期刊文献+

一种基于DWT&IE的彩色信息隐藏技术

Information hidden technology for colour image based on DWT&IE
下载PDF
导出
摘要 提出了一种通过彩色图像空间转换,使其从RGB空间转到YCbCr空间的表示,再利用小波变换,将图像的彩色信息嵌入进YCbCr空间的Y分量中,并在原始图像信息的基础上生成基于原始图像的一个特征值(ImageEigen-value),应用于彩色信息的隐藏和重构的方法。图像的重构和再现仅有赖于原始图像的特征值,不需要原始图像即能达到真实图像彩色信息的重构,并具有防伪、鉴别和抗修改的效果。彩色图像的传播图像是一个具有纹理特征的灰度图,利于在网络平台传递,既可隐藏彩色信息,又可适当压缩图像;在不便提供原始图像的前提下,仅提供图像特征值,对图像文件的保护和彩色信息的隐藏有一定的参考意义。 Method for transforming the color image to the YCbCr space from the RGB is presented. By using the wavelet transformation, the image chromatic information is inserted into the Y component. Based on a primitive image, characteristic value (image eigen-value) renews the Y component to hide image's chromatic information. Reconstruction or reappearance of the image depends on the primitive image essential key value only, which does not need the primitive image. This method can achieve the forgery-proof and the distinction effect for a real image. Before the color image reconstruction, the product is the textural property gray image, which is useful across over the network. The method may both hide the chromatic information and compress the image suitably that certain reference use for image document's protection and chromatic information's hideaway, while the primitive image couldn't be reached, instead of image eigen value only.
作者 赖红武
出处 《浙江科技学院学报》 CAS 2008年第4期265-268,296,共5页 Journal of Zhejiang University of Science and Technology
关键词 信息隐藏 图像特征 小波变换 信息安全 information hidden image eigen-value DWT information security
  • 相关文献

参考文献7

二级参考文献57

  • 1Honsinger C.W., Jones P., Rabbani M., Stoffel J.C.. Lossless recovery of an original image containing embedded data. U.S. Patent No. 6,278,791, 2001
  • 2Fridrich J., Goljan M., Du R.. Lossless data embedding for all image formats. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 572~583
  • 3Tian J.. Wavelet-based reversible watermarking for authentication. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 679~690
  • 4Holliman M., Memon N.. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000, 9(3): 432~441
  • 5Fridrich J., Goljan M., Memon N.. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262~274
  • 6Wu J., Zhu B., Li S., Lin F.. Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes. In: Proceedings of the IEEE International Conference on Multimedia & Expo (ICME'04), Taiwan, 2004
  • 7Wu J., Zhu B., Li S., Lin F.. New attacks on SARI image authentication system. In:Proceedings of the SPIE,Vol.5306, Security and Watermarking of Multimedia Contents VI, San Jose, California, USA, 2004, 602~609
  • 8Yeung M., Mintzer F.. Invisible watermarking for image verification. Journal of Electronic Imaging, 1998, 7(3): 578~591
  • 9Wu M., Liu B.. Watermarking for image authentication. In: Proceedings of the IEEE International Conference on Image Processing, Chicago, USA, 1998, 2: 437~441
  • 10Memon N., Shende S., Wong P.. On the security of the Yeung-Mintzer authentication watermark. In:Proceedings of the IS&T PICS Symposium, Savannah, Georgia, 1999, 301~306

共引文献78

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部