期刊文献+

基于BP神经网络的盲数字水印算法

Blind Watermark Technology Based on BP-neural Networks for Image
下载PDF
导出
摘要 该文将二值水印嵌入到宿主图像的小波变换域的低频分量中,利用BP神经网络很好的非线性映射和自学习、自适应学习特点实现水印信息的盲提取,仿真实验结果表明该算法既能抵抗常规的图像处理攻击,也能抵抗一定程度的几何攻击,如JPEG压缩、剪切、加噪和滤波等,具有较好的鲁棒性和不可见性。 The watermark is embedded the host image low-frequency coefficients based on wavelet transform. Using the self-learning and adaptive capabilities of neural network and a segment sequences can train the neural network. While the model of neural network is made certain, the blind watermark is extracted. The experimental results show that the algorithm is robustness and imperceptibility against the original image process attacks such as JPEG compression, cropping, noise and filtering etc.
作者 徐奔
出处 《电脑知识与技术》 2009年第5期3478-3480,共3页 Computer Knowledge and Technology
关键词 数字水印 盲提取 BP神经网络 小波变换 digital watermark blind extracting BP-neural network wavelet transform
  • 相关文献

参考文献8

二级参考文献56

  • 1向德生,杨格兰,熊岳山.数字水印技术研究[J].计算机工程与设计,2005,26(2):326-328. 被引量:37
  • 2卢铁成.信息加密技术[M].成都:四川科学技术出版社,1989..
  • 3[1]Swanson,M.,Kobayashi,M.,and Tewfik,A.Multimedia data embedding and watermarking technologies.Proceedings of the IEEE,1998:86(6),1064~1087.
  • 4[2]Fabien,A.P.,Petitcolas,F.,Ross,J.Anderson and Markus G.Kuhn.Information Hiding-A Survey.Proceedings of the IEEE,1999:87(7),1062~1078.
  • 5[3]Cox,I.J.,Kilian,J.,and Leighton,T.,et al.Secure spread spectrum watermarking for multimedia.IEEE Trans.on Image Processing,1997:6(12),1673~1687.
  • 6[4]Wolfgang,R.B.,and Delp,E.J.Fragile watermarking using the VW2D watermark.Proceedings of the SPIE/IS&T Conference on Security and Watermarking of Multimedia Contents,SPIE Vol.3657,San Jose,CA,January 1999.
  • 7[5]Friedman,G.L.The trustworthy digital camera:restoring credibility to the photographic image.IEEE Trans.on Consumer Electronics,Vol.39,November 1993,905~910.
  • 8[6]Smith,J.R.and Comiskey,B.O.Modulation and information hiding in images.Proceedings of First Intern.Workshop on Information Hiding,R.Anderson ed.Lecture notes in Computer Science,Vol.1174,Springer Verlag 1996,207~226.
  • 9[7]Petitcolas,F.,and Anderson,R.Weaknesses of copyright marking systems.Proceedings of the ACM Multimedia and Security Workshop,Bristol,United Kingdom,September 1998,55~62.
  • 10Fabin A P Peticolas,Ross J Anderson. Attacks on Copyright Marking System[A].Second workshop on information hidding,Portland,Orgeon[C].USA,Apri,1998,218-238.

共引文献102

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部