期刊文献+

一种基于混沌动力系统同步原理的非对称水印

Asymmetric digital watermarking based on chaotic synchronization theory
下载PDF
导出
摘要 提出了一种基于混沌动力系统同步原理的非对称数字水印构造方法。将二值水印图像转化为二进制数字信号,控制混沌驱动系统两路交替输出信号,形成载有水印信息的混沌信号,并将其作为水印信号嵌入载体图像。水印提取过程中将提取出的水印信号送入混沌响应子系统,根据响应子系统的输出信号与水印信号的相关性来恢复水印图像。在水印嵌入及提取过程中使用不同的混沌系统模型、参数及状态变量初值,实现了非对称数字水印系统的构造。 A method of making an asymmetric digital watermarking based on chaotic synchronization theory is proposed in this paper. Firstly, we transform the double value watermark image into binary digital signals that control the alternative output of two-way chaos signals in chaotic driving system. Secondly, we embed the final chaotic signals which are loaded with watermark information into the carrier image. During the watermark extraction process, we input the watermark signals extracted from the carrier image with watermark information into the chaotic response system, and revert the watermark signals to the watermark image according to the relativity between the outputting signals of chaotic response system and the watermark signals. Different chaotic models, parameters and initial values of variable in watermark embedding process and extraction process are applied; therefore, the digital watermarking on the theory of chaotic synchronization is an asymmetric digital watermarking.
作者 刘伟 宋文敏
出处 《信息化纵横》 2009年第9期35-39,共5页
关键词 混沌同步 非对称数字水印 混沌键控 小波变换 chaotic synchronization asymmetric digital watermarking chaotic shift keying wavelet transform
  • 相关文献

参考文献4

二级参考文献15

  • 1[1]Joachim J Eggers,Jonathan K Su,Bernd Girod. Asymmetric watermarking schemes,Sicherheit in Mediendaten.GMD Jahrestagung,Proceedings ,Springer Verlag, 2000
  • 2[2]Scott Craver,Stefan Katzenbeisser. Copyright protection protocols based on asymmetric watermark:the ticket concept[C].In:Proceedings of the Sixth Conference on Communication and Multimedia Security(CMS'01),German ,2001: 159~170
  • 3[3]Bruce Schneier. Applied Cryptograpy: Protocols, Algorithms,and Source Code in C[M].2nd ed,New York:John Wiley and Sons,1996
  • 4[4]Frank Hartung,Bernd Girod.Copyright protection in video delivery networks by watermarking of pre-compressed video[C].In :2nd European Conference on Multimedia Applications,Services and Techniques (ECMAST'97), Milan, Italy, Lecture Notes in Computer Science,1997; 1242:423~436
  • 5[5]Frank Hartung,Bernd Girod. Watermarking of uncompressed and compressed video[J].Signal Processing,Special issue on copyright protection and access control for multimedia services, 1998 ;66(3):283~301
  • 6[6]Frank Hartung,Bernd Girod.Fast public-key watermarking of compressed video[C].In:Proceedings of the IEEE International Conference on Image Processing(ICIP97),Santa Barbara,CA,USA,1997;1:528~531
  • 7[7]R G van Schyndel,A Z Tirkel,I D Svalbe. Key independent watermark detection[C].In:IEEE International Conference on Multimedia Computing and Systems, Florence, Italy, 1999; 1: 580~585
  • 8[8]Joachim J Eggers,Jonathan K Su,Bernd Girod. Public key watermarking by eigenvectors of linear transforms[C].In :European Signal Processing Conference( EUSIPCO'2000 ) , Tampere,Finland,2000
  • 9[9]Joachim J Eggers,Bernd Girod. Robustness of public key watermarking schemes[C].In:V3D2 Watermarking Workshop,Erlangen,Germany,1999
  • 10[10]T Furon,P Duhamel.An asymmetric public detection watermarking technique[C].In:Workshop on Information Hiding,Dresden,Germany,1999

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部