期刊文献+

用于植物病害图像认证的小波域半脆弱水印方案

Wavelet domain semi-fragile watermarking scheme for plant disease image authentication
下载PDF
导出
摘要 根据JPEG压缩保护图像细节和在绿色分量上嵌入水印更能抵抗一般的保护内容的图像处理这一事实,提出一种用于彩色植物病理图像认证的小波域半脆弱水印方案.实验结果表明,该方案篡改定位准确,嵌入水印容量大,有很好的抗JPEG压缩性能,同时很好的保护了用于病害识别与诊断的颜色、纹理及图像细节特征等重要信息. A wavelet domain semi-fragile watermarking scheme for color plant-disease image authentication was presented based on the facts that image detail was protected in JPEG compression and embedding watermark in green component was more robust against content-protection image processing. The experimental results showed that the proposed scheme had the advantages such as exactly locating for malicious tampering, big embedding capability, good robustness to JPEG compression, and good protection to key characteristics used for disease recognition and diagnosis such as color, texture, and image detail.
出处 《仲恺农业技术学院学报》 2008年第3期45-49,共5页 Journal of Zhongkai Agrotechnical College
基金 仲恺农业工程学院科研基金(G3072520) 仲恺农业工程学院创新基金(200739)资助项目
关键词 植物病害 内容认证 半脆弱水印 JPEG压缩 小波域 plant disease content authentication semi-fragile watermarking JPEG compression wavelet domain
  • 相关文献

参考文献13

二级参考文献40

  • 1张中月,齐开国.应用Hash函数增强数字图像半易损性水印的易损性[J].计算机辅助设计与图形学学报,2004,16(6):845-849. 被引量:4
  • 2Kundur D, Hatzinakos D. Digital watermarking for telltale tamper proofing and authentication[J]. Proceedings of the IEEE, 1999, 87(7): 1167~1181
  • 3Hu Junquan, Huang Jiwu, Huang Daren, et al. Image fragile watermarking based on fusion of multi-resolution tamper detection[J]. Electronics Letters, 2002, 38(24): 1512~1513
  • 4Kundur D, Hatzinakos D. Digital watermarking using multiresolution wavelet[A]. In: Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, Seattle, Washington, 1998, 5: 2969~2972
  • 5Rivest R. The MD5 message digest algorithm[OL]. http://www.faqs.org/rfcs/rfc1321.html, 1992
  • 6Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding-A survey[J]. Proceedings of the IEEE, 1999, 87(7): 1063~1077
  • 7Wang P W, Memon Nasir. Secret and public key image watermarking schemes for image authentication and ownership verification[J]. IEEE Transactions on Image Proceedings, 2001, 10(10): 1593~1601
  • 8Wong P W. A public key watermark for image verification and authentication[A]. In: Proceedings of IEEE International Conference Image Processing, Chicago, IL, 1998. 425~429
  • 9[1]Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding a survey[J]. Proceedings of the IEEE, 1999,87(7):1062~1078.
  • 10[2]Peticolas F A P, Anderson R J, Kuhn M G. Attacks on copyright marking system [ A ]. In: Second International Workshop on Information Hiding[C], Portland, Oregon. U.S.A., April 14-17, 1998, Published in: Lecture Notes in Computer Science[J], 1998,1525: 218~238.

共引文献128

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部