期刊文献+

基于混沌序列和噪声敏感度的自适应盲检测水印算法

Adaptive blind watermarking based on chaotic sequence and noise sensitivity
下载PDF
导出
摘要 提出了一种新的自适应盲检测水印算法。首先混沌序列经过细胞自动机和平滑处理,然后生成水印比特,最后根据噪声敏感度系数自适应地嵌入原始图像的中频系数中,并且提供了一套盲检测方法。实验证明,算法在保证图像具有良好感知透明性的同时,还对一些常见攻击方式(如高斯噪声、中值滤波、JPEG压缩和剪切等)具有很好的鲁棒性。 By integrating existing technology used in chaotic sequence and noise sensitivity, a novel adaptive blind watermark algorithm was proposed. In order to enhance robustness of the embedded watermarking, a chaotic sequence was changed into watermark bits by cellular automata processing and smoothing. The embedding procedure operates adaptively in the domain of intermediate coefficients, according to the noise sensitivity. Robustness of it on selected attacks like Gaussian noise, median filtering, JPEG compression and cropping was tested. In addition, the perceptual transparency had been improved as well. Furthermore, the watermark can be detected without the original image.
出处 《计算机应用研究》 CSCD 北大核心 2008年第9期2816-2818,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(60572015)
关键词 混沌序列 噪声敏感度 自适应盲检测水印算法 鲁棒性 感知透明性 chaotic sequence noise sensitivity adaptive blind watermarking robustness perceptual transparency
  • 相关文献

参考文献10

  • 1邹复好,卢正鼎,凌贺飞,李瑞轩.基于Watson视觉模型的自适应视频水印[J].计算机工程,2006,32(12):22-23. 被引量:3
  • 2张立和,伍宏涛,胡昌利.基于三维Gabor变换的视频水印算法[J].软件学报,2004,15(8):1252-1258. 被引量:16
  • 3王向阳,杨红颖,陈利科.基于人眼视觉系统的自适应量化数字水印算法研究[J].小型微型计算机系统,2005,26(9):1525-1529. 被引量:24
  • 4LEWIS A S,KNOWLES G. Image compression using the 2D waveIet transformation [ J]. IEEE Trans on Image Processing, 1992, 1 (4) :244-250.
  • 5REDDY A A, CHATTERJI B N. A new wavelet based logo-watermarking scheme [ J ]. Pattern Recognition Letters, 2005,26 ( 1 ) : 1019-1027.
  • 6HSU C,WU J. DCT-based watermarking for video[ J]. IEEE Trans on Consumer Electronics,1998,44(1 ):206-216.
  • 7WOLFRAM S. Origins of randomness in physical system[J]. Physical Review Letters, 1985,55 (5) :449-452.
  • 8吕凤军.数字图像处理编程入门[M].北京:清华大学出版社,1999..
  • 9张志明,华宇宁,赵雷.基于SVD-DWT的彩色图像水印算法[J].沈阳理工大学学报,2006,25(3):59-62. 被引量:1
  • 10HE Hong-jie, ZHANG Jia-shu, WANG Hong-xia. Synchronous counterfeiting attacks on self-embedding watermarking schemes[ J]. International Journal of Computer Science and Network Security (IJCSNS) ,2006,6( 1 ) :251-257.

二级参考文献38

  • 1张立和,伍宏涛,胡昌利.基于三维Gabor变换的视频水印算法[J].软件学报,2004,15(8):1252-1258. 被引量:16
  • 2唐庆生,佘堃.基于离散小波变换的数字水印技术[J].成都信息工程学院学报,2005,20(1):57-60. 被引量:8
  • 3董梅,高康林.矩阵奇异值分解和Arnold置乱技术在图像隐藏中的应用[J].山东大学学报(理学版),2005,40(3):71-75. 被引量:11
  • 4Lu C S, Liao H Y M. Multipurpose watermarking for image authentication and protection[J]. IEEE Trans. on Image Processing, 2001, 10(10): 1579-1592.
  • 5Podichuk C I, Delp E J. Digital watermarking: Algorithms and applications [J]. IEEE Signal Processing Magazine, 2001, 18(4): 33-46.
  • 6Peter Meerwald, Andreas Uhl. A survey of waveletdomain watermarking algorithms [C]. In : Proceedings of SPIE Vol. 4314 :Electronic Imaging, Security and Watermarking of Multimedia Contents Ⅲ, San Jose, California, U.S.A., Jan, 2001.
  • 7Lumini A, Maio D A. A waveletbased image watermarking scheme[C]. ITCC00 Proc 2000 Int Conf Information Tech..Coding and Computing. Las Vegas, USA: IEEE Signal Processing Society, 2000, 122-127.
  • 8Kaewkamnerd N, Rao K R. Wavelet based image adaptive watermarking scheme[J]. Electronics Letters, 2000, 36(2): 312-313.
  • 9Kim J R, Moon Y S. A robust waveletbased digital watermark thresholding[C]. ICIP99 Proc 1999 Int Conf Image Processing,Kobe Japan: IEEE Signal Processing Society, 1999, 2, 202-204.
  • 10Kunder D and Hatzinakos. Attack characterization for effective watermarking[C]. ICIP99 Proc 1999 Int Conf Image Processing, Kobe Japan: IEEE Signal Processing Society, 1999, 2,24O-244.

共引文献66

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部