期刊文献+

基于Moment Normalization和M序列的二值水印算法

A Binary Watermark Embedding Algorithm Based on M-Sequence and Moment Normalization
下载PDF
导出
摘要 针对因特网上数字图像的版权保护、认证和完整性等问题,基于DCT变换、image moment normalization和m序列,提出了一种二值水印嵌入算法,实现了二值图像的嵌入和提取。根据m序列的伪随机性和抗干扰性能,使水印具有良好的隐蔽性和稳健性;使用了moment normalization能抵制各种几何攻击。实验表明该算法具有很好的鲁棒性、实用性和可操作性。 Aiming at these problems of digital image on the Intemet,including copyright protection, authentication and integrity,proposes a binary watermark embedding algorithm based on m- sequence,moment normalization and DCT,which achieves the embedding and extracting of a binary image. Based on the strongly confidential and anti -jamming characteristics of m - sequence spread spectrum technology, the algorithm has strong rohustness; moreover, regarding resistance to geometrical attacks,use moment normalization mechanisms to recover geometrica/distortion. Experiment results show that the algorithm has good robustness,practicability and maneuverability.
出处 《计算机技术与发展》 2008年第5期153-155,167,共4页 Computer Technology and Development
基金 国家自然科学基金资助项目(10571052)
关键词 数字水印 DTC MOMENT NORMALIZATION M序列 digital watermark moment normalization m - sequence
  • 相关文献

参考文献7

  • 1Lu Chun- Shien. Towards robust image watermarking: combining content- dependent key, moment normalization, and side- informed embedding[J]. Signal Processing: Image Communicatlon,2005,20(2) : 129 - 150.
  • 2Dong P, Galatsanos N P. Affine transformation resistant wa termarkingbased on image normalization [ C]//IEEE Int. Conf. Image Processing. Rochester, NY : [ s. n. ], 2002 : 489 - 492.
  • 3Parameswaran L, Anbumani K. A Robust Image Watermarking Scheme using Image Moment Normalization[J ]. Transactions on Engineering, Computing and Technology, 2006, 13 : 239 - 243.
  • 4周利军,周源华.数字图像水印的扩频实现[J].红外与激光工程,2000,29(5):27-31. 被引量:6
  • 5陈海永,刘泊,邢佳.基于DCT变换和m序列的二值水印嵌入算法[J].哈尔滨理工大学学报,2004,9(5):76-79. 被引量:2
  • 6LEE J S.CDMA系统工程手册[M].许希斌,周世东,赵明,等译.北京:人民邮电出版社,2001.
  • 7Petitcolas F A P. StirMark 3.1 [EB/OL]. 1999:http:// www.petitcolas. net/fabien/watermarking/stirmark/.

二级参考文献7

  • 1沈允善.扩谱技术[M].北京:国防工业出版社,1995..
  • 2EYADAT Mohammad. Factors that Affect the Performance of the DCT-block Based Image Watermarking Algorithms[A].Proceedings of the International Conference On Information Technology[C]. Coding and Computing, 2004. 650-654.
  • 3KOCH E, ZHAO J. Towards Robust and Hidden Image Copyright Labeling[A]. IEEE Workshop on Nonlinear Signal and Image Processing[C]. Neos Marmaras, Greece, 1995. 452-455.
  • 4COX I J, JOE KILLIAN F T, et al. Secure Spread Spectrum Watermarking for Multimedia[J]. IEEE Transactions On Image Processing, 1997, 6(12): 1673-1687.
  • 5BARNI M, BARTOLINI F. A DCT-Domain System for Robust Image Watermarking [J]. Signal Processing, 1998,66(3):357-372.
  • 6SCHYNDEL R G van, TIRKEL A Z, et al. A digital watermark[J]. Proceedings of the IEEE international Conference on image Processing, 1994, (2): 86-90.
  • 7RAYMOND B Wolfgang, EDWARD J Delp. A Watermark for Digital Images [A]. Proceedings of the IEEE International Conference on Image Processing[C]. Lausanne, Switzerland, 1996. 219-222.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部