期刊文献+

基于频域DCT特性的数字图像双水印算法 被引量:3

Dual Watermarking Algorithm Based on DCT Domain of Digital Image
下载PDF
导出
摘要 本文提出了一类基于DCT特性的鲁棒加半脆弱的双水印算法。首先根据图像的纹理特性将原始图像分块,然后,利用不同的嵌入因子将可见水印嵌入到原始图像以显示所有权,然后通过混沌序列确定不可见水印的嵌入位置,将它嵌入到高纹理区以认证图像,从而达到防篡改的目的。经验证,此双水印系统能够有效达到标识认证图像所有权的目的,有较高的鲁棒性和实效性。 A new dual watermarking algorithm that based DCT domain is presente. The original image was first segmented into blocks based on the texture property, and different embedding intensities were used to embed the watermarking into the Discrete Cosine Transform(DCT) domain of the original image to indicate ownership of the image. And then the invisible watermarking was embedded into the high frequence part to verify ownershipof the image through the chaotic sequence. The experiment shows that the prposed dual watermarking system can indicate and verify the ownership with high robust and practicality.
出处 《信息技术与信息化》 2009年第1期62-63,87,共3页 Information Technology and Informatization
关键词 可见水印 不可见水印 DCT变换 混沌序列 Visible watermark Invisible watermark Discrete cosine transformatio Chaotic sequences
  • 相关文献

参考文献6

二级参考文献52

  • 1曾国良,丁宗豪.静像数据压缩及其标准JPEG(上)[J].电视技术,1994,18(4):2-5. 被引量:15
  • 2DEEPA Kundur, DIMITRIOS Hatzmakos. Digital Watermarking for Telltale Tamper Proofing and Authentication[J]. Proc.of the IEEE Special Issue on Identification and Protection of Multimedia Information, 1999, 87(7): 1180-1667.
  • 3FRIDRICH J, COLJAN M, et al. New Fragile Authentication Watermark for Images[A]. Proc. Of the IEEE Int. Conf. On Image Processing[C]. Vancouver, Canada: IEEE, 2000.
  • 4CHEN M, HE Y, LAGENDIJK R L. Error Detection by Fragile Watermarking[A]. Proc. Of the Picture Coding Symposium[C]. Seoul, Korea, 2001. 287-290.
  • 5FRIDRICH J. Methods for Detecting Changes in Digital Images[C]. ISPACS99, Melbourne, 1998.
  • 6KENNEDY M P, Ogorxalek. Special Issual on Chaos Synchronization and Control: Theory and Application[J]. IEEE Transactions on Circuits and Systems, 1997, 44(10): 853-1039.
  • 7COSTANTINI M A Farina. The Fusion of Different Resolution SAR Images[J]. Proc. of The IEEE, 1997, 85:139-146.
  • 8Lu C S, Liao H Y M. Multipurpose watermarking for image authentication and protection[J]. IEEE Trans. on Image Processing, 2001,10(10):1579-1592.
  • 9Lu Z M, Liu C H. Semi-fragile image watermarking method based on index constrained vector quantisation[J]. IEE Electronics Letters, 2003,39(1):35-36.
  • 10Zhang Jing, Zhang Chun-tian. Digital watermarking techniques for image authentication[J]. Journal of Image and Graphics, 2003,8(4):367-373.

共引文献169

同被引文献17

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部