期刊文献+

基于四重奇异值分解的小波包数字图像水印算法 被引量:1

Digital Image Watermarking Algorithm in Wavelet Packets Transform Base on Quartic SVD
下载PDF
导出
摘要 结合奇异值分解和小波包分解的特点,提出了一种基于四重奇异值分解的小波包数字图像水印算法.该算法先对载体图像进行分块,然后对每块二级小波包分解后的频带四重使用奇异值分解和再次分块的方法构造矩阵,将SVD后提取的奇异值重新分配和组合,最后将灰度水印图像有效地嵌入到多次组合后的矩阵中.这不仅能增加嵌入的信息量,而且极大地提高了水印的安全性,实现了水印的透明性和鲁棒性之间的最佳平衡. In this paper, a new digital image watermarking algorithm in wavelet packets based on quartic SVD is proposed. First, the image is divided into multi-block. Then the new matrix is constructed by quartic SVD on the sub-band after two wavelet packets for each block and again block, which will re-allocation and combination for the extraction' s sin- gular value after SVD, and finally the gray watermarking image is embedded into the matrix after multiple combinations. The algorithm increases embedded information capacity and enhances the watermark's security, and achieves the optimal balance of the imperceptibility and robustness.
作者 张敏 蒋华
出处 《微电子学与计算机》 CSCD 北大核心 2009年第6期146-149,共4页 Microelectronics & Computer
基金 国家自然科学基金项目(50175070)
关键词 数字水印 四重奇异值分解 小波包分解 透明性 鲁棒性 digital watermarking quartic SVD wavelet packets transform transparence robustness
  • 相关文献

参考文献7

二级参考文献29

  • 1曾志华,钱雪忠.基于DCT和SVD联合的数字水印算法[J].计算机工程与设计,2007,28(1):109-111. 被引量:8
  • 2Petitcolas F A P, Anderson R J, Kuhn M G. Attacks on copyright marking systems [A]. In: Proceedings of Workshop Information Hiding[C]. Portland, OR, USA, 1998: 218-238.
  • 3Herley C. Why watermarking is nonsense [J]. IEEE Signal Processing Magazine, 2002, 19(5) : 10-11.
  • 4Braudaway G W, Minter F. Automatic recovery of invisible image watermarks from geometrically distorted image[A]. In:Proceedings of SPIE Security and Watermarking of Multimedia Contents Ⅱ [C]. San Jose, CA, USA, 2000:74-81.
  • 5Ruanaidh J J. K. O. , Pun T. Rotation, scale and translation invariant spread spectrum digital image watermarking[J]. Signal Processing, 1998, 66(3): 303-317.
  • 6Andrews H, Patterson C. Singular value decomposition(SVD)image coding[J]. IEEE Transactions on Communications, 1976,24(4) : 425-432.
  • 7Liu R, Tan T. An SVD-based watermarking scheme for protecting rightful ownership [J]. IEEE Transactions on Multimedia, 2002,4(1) : 121-128.
  • 8Leon S J. Linear Algebra with Applications [M]. New York:Macmillan, 1986: 343-356.
  • 9Horn R A, Johnson C R. Matrix Analysis [M]. Cambridge:Cambridge University, 1985 : 431-432.
  • 10Miller M L, Bloom J A. Computing the probability of false watermark detection [A]. In: Proceedings of 3rd International Workshop Information Hiding [C], Dresden, Germany, 1999:146-158.

共引文献150

同被引文献4

引证文献1

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部