期刊文献+

基于DCT域的半盲自恢复水印技术

Self-recovery and Half-blind Watermarking Technology Based on DCT
下载PDF
导出
摘要 提出了一种可自恢复水印的半盲数字水印技术,采用了双重数字水印的方法,建立了一套独有的自恢复系统来获取数字水印技术所必须具备的高稳健性。人类视觉模型在算法中的引入则为水印的透明性提供了有力的保障,该算法的抽取和检测不需要原始水印参与,是一种半盲水印算法。实验证实了该算法不仅可以有效地应对各种常规的信号处理攻击,而且还可以防止大部分恶意水印攻击,相比于其他多种同类型水印算法,其稳健性和透明性都有明显提高。 A kind of self - recovery and half - blind watermarking technology was proposed By adopting the method of dual water- marks, a unique self - recovery system to obtain great robustness needed in watermarking technology was built. The introduction of the human visual system offers forceful guarantee for the invisibility of watermarking. The extraction and detection of the algorithm is a kind of half - blind watermarking. There is no need for them to get involved in the original watermarking. The experiment results prove that the algorithm can not only effectively resist various regular attacks to signal processing attacks, but also can prevent major intentional watermarking attacks. Compared with other similar watermarking algorithms, the robustness and transparency of the proposed algorithm has been greatly improved.
作者 黄华文 吴晓
出处 《武汉理工大学学报(信息与管理工程版)》 CAS 2008年第6期881-885,919,共6页 Journal of Wuhan University of Technology:Information & Management Engineering
基金 湖北省自然科学基金资助项目(2005ABA282)
关键词 数字水印 双重数字水印技术 半盲检测 自恢复系统 加密存储文档 watermarking dual watermarking half- blind detecting self- recovery encrypted document
  • 相关文献

参考文献10

  • 1BARNI M, BARTOLINI F. Data hiding for fighting piracy [ J ]. IEEE Signal Processing Magazines, 2004,21 (2) :28 -39.
  • 2TianLibin ChenFangjiong WeiGang.BLIND ADAPTIVE MULTIUSER DETECTION BASED ON A CONSTRAINED MMSE CRITERION[J].Journal of Electronics(China),2004,21(4):328-331. 被引量:1
  • 3叶登攀,戴跃伟,王执铨,姚志军.基于语义内容的双重认证视频水印方案[J].信息与控制,2004,33(5):590-596. 被引量:2
  • 4SARAJU S, MOHANTY P, KANKANHALLI M. A dual watermarking technique for images [ C ]. ACM Multimedia '99. Florida: [ s. n. ] , 1999 : 101 - 107.
  • 5SILVSTRE G C M. Informed audio watermarking scheme using digital chaotic signals [ J ]. IEEE International Conference on Acoustics, Speech, and Signal Processing,2001(3) :1361 -1364.
  • 6KIM S W, SUTHARAN S. An entropy masking model for multimedia content watermarking [ C ]. In Procs of the 37^th Hawaii Int' l Conf. on System Science. [s. l. ]:[s. n. ] ,2004:701 -822.
  • 7WATSON A B. DCT quantization matrices visually optimized for individual images [ C ]. ALLEBACH J P, ROGOWITZ B E. Human Vision, Visual Processing and Digital Display IV of SPIE Procs. CA: [ s. n. ], 1993:202 - 216.
  • 8WOLFGANG R B. Perceptual watermarks for digital images and video[ J ]. Procs of the IEEE, 1999,87 (7) : 1108- 1126.
  • 9JIN C, QU Z G, ZHANG Z M, et al. Web dual watermarking technology using an XML document [ J ]. IET Information Security ,2007,1 ( 1 ) :37 - 42.
  • 10QU Z G, JIN C. Self - restoring dual watermarking technology [ C ]. IEEE International Conference on System of Systems Engineering. San Antonio Texas: [s. n. ] ,2007:42 -46.

二级参考文献6

  • 1[1]Lin C Y, Chang S F. Issues and solutions for authenticating MPEG video [ A ]. Proceedings of the SPIE-The International Society for Optical Engineering [C]. San Jose, CA:1999, vol. 3657.54 ~ 57.
  • 2[3]Yin P, Yu H H. Classification of video tampering methods and countermeasures using digital watermarking [ A ]. Proceedings of SPIE-The Intemational Society for Optical Engineering [ C ]. San Jose, CA:2001, vlo. 4518. 239~246.
  • 3[4]Queluz M P. Authentication of digital images and video: generic models and a new contribution [ J]. Signal Processing: Image Communication, 2001,16 ( 5 ): 461 ~ 475.
  • 4[5]Otsu N. A threshold selection method from gray-level histogram [J]. IEEE Transactions on Systems, Man and Cybernetics, 1979,SMC -9(1) :62 ~66.
  • 5[7]Holliman M, Memon N. Counterfeiting attacks on oblivious blockwise independent invisible watermarking schemes [ J ]. IEEE Transactions on Image Processing, 2000,9(3 ) :432 ~441.
  • 6朱仲杰,蒋刚毅,郁梅,吴训威.基于运动矢量的视频图象数字水印算法[J].电路与系统学报,2002,7(3):58-61. 被引量:8

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部