期刊文献+

一种统计特性的数字水印算法 被引量:2

Watermarking algorithm based on statistical property
下载PDF
导出
摘要 提出一种鲁棒的DCT域盲水印算法,将DCT系数进行特殊的自定义排列分组,并根据奇偶差实现水印的最优化嵌入。该算法突破了传统的分块、寻找合适中频系数模式,解决了合适中频系数难找且嵌入容量小的问题。实验表明该算法计算简单,且具有良好的不可见性,并且在抵抗噪声和JPEG压缩攻击方面具有较强的鲁棒性。 A novel robust blind watermarking algorithm in DCT domain was proposed. The DCT coefficients are arranged in a specific way, and then the watermark is embedded based on odd-even difference for optimal embedding. This algorithm works in a new pattern other than block-division and search of the DCT coefficients in the middle frequencies in the traditional pattern, which can overcome the problem in searching suitable coefficients in the middle frequencies for watermark embedding and the small embedding capacity. Experimental results show that the algorithm is simple and good at perceptual transparency as well as robustness against noise and JPEG compression.
出处 《重庆大学学报(自然科学版)》 EI CAS CSCD 北大核心 2009年第8期882-886,共5页 Journal of Chongqing University
基金 国家自然科学基金重点资助项目(60573047) 国家博士后科学基金资助项目(20060400714)
关键词 数字水印 离散余弦变换 奇偶差 digital watermarking discrete cosine transform (DCT) odd-even difference
  • 相关文献

参考文献18

  • 1VAN SCHYNDEL R G, TRIKEL A Z, OSBORNE C F. A Digital Watermark [C]// Proceedings 1994 International Conference on Image Processing, Nov 13-16, 1994. Austin, Texas, USA. [s.l.]: IEEE, 1994: 86-90.
  • 2WOLFGANG R B,DELP EJ . A watermark for digital image [C]// Proceedings of 3rd IEEE International Conference on Image Processing, Sep 16-19, 1996, Lausanne, Switzerland.[s. l]: IEEE, 1996:219-222.
  • 3BENDER W, GRUHL D, MORIMOTO N, et al. Techniques for data hiding[J]. IBM System Journal, 1996,35(3/4): 313-316.
  • 4LEE C H, LEE Y K. An adaptive digital image watermarking technique for copyright protection [J]. IEEE Transactions on Consumer Electronics, 1999, 45(4) : 1005-1015.
  • 5PODILCHUK C I, ZENG W J. Image-adaptive watermarking using visual models[J]. IEEE Journal on Selected Areas in Communications, 1998, 16 (4): 525-539.
  • 6HERNANDEZ J R, AMADO M. PEREZGONZ- NALEZ F. DCT-domain watermarking techniques for still images. Detector performance analysis and a new structure [J]. IEEE Transctions on Image Processing, 2000,9(1) :55-68.
  • 7TAO B, DICKINSON B. Adaptive watermarking in the DCT domain [C]//1997 IEEE International Conference on Acoustics, Speech and Signal Proceedingds, Apr 21- 24, 1997, Lausanne, Switzerland.[s. l. ]: IEEE, 1997: 2985-2988.
  • 8COX I J. Secure spread spectrum watermarking for multimedia [J]. IEEE Trans on Image Processing, 1997, 6(12) :1673-1687.
  • 9COX I J. LINNARTZ J P M G. Some general methods for tampering with watermarks [J]. IEEE Journal on Selected Areas in communications, 1998, 16 (4): 587 -593.
  • 10宋玉杰,刘瑞祯,谭铁牛,王蕴红.数字水印技术在印刷品防伪中的应用[J].中国图象图形学报(A辑),2001,6(5):450-454. 被引量:28

二级参考文献15

  • 1易翔,王蔚然.彩色图像多签名水印算法的研究[J].电子科技大学学报,2005,34(5):665-668. 被引量:9
  • 2李忠源 付震中.印刷图象中的信息隐含.第二届信息隐藏学术研讨会论文集[M].北京,2000.34-36.
  • 3[3]Eggers J, Bauml R, Girod B. A communications approach to image steganography [A]. In: Proceedings of SPIE [C], 2002, 4675: 26-37.
  • 4[4]Petitcolas F, Anderson R, Kuhn M. Information hiding - a survey [J]. Proceedings of the IEEE,1999,87(7):1062-1078.
  • 5[5]Brown A. S-tools for windows [EB/OL]. ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools4.zip,1996.
  • 6[6]Machado R. Ezstego, stego online, stego [EB/OL]. http://www.stego.com,1997.
  • 7[7]Hansmann F. Steganos, DeusEx machina communications [EB/OL]. http://www.steganography.com,1996.
  • 8[8]Chen M, Wong E K, Memon N, et al. Recent developments in document image watermarking and data hiding [A]. In: Proceedings of SPIE [C]. 2001, 4518:166-175.
  • 9[9]Fridrich J, Rui D. Secure steganographic methods for palette images [A]. In: Pfitzmann A, ed. Information Hiding: Third International Workshop, LNCS[C]. Springer-Verlag,1999, 1768: 47-60.
  • 10Swanson M D,Signal Processing,1998年,66卷,337页

共引文献172

同被引文献16

  • 1Cox I J. Secure Spread Spectrum Watermarking for Multimedia [J]. IEEE Transactions on Image Processing, 1997,6 (12) : 1673-1687.
  • 2Voloshynovskiy S, Pun T, Fridrich J, Memon N. Security of data hiding technologies [ J]. Signal Processing, 2003, 83 (10) :2065 -2067.
  • 3Bhatnagar G, Raman B. A new robust reference watermarking scheme based on DWT-SVD [ J]. Computer Standards & Interfaces, 2009, 31( 5): 1002-1013.
  • 4I J COX. Secure spread spectrum watermarking for multimedia [ J ]. IEEE Transactions on Image Processing, 1997,6 ( 12 ) : 1673 - 1687.
  • 5R Liu, T Tan. A SVD - based watermarking scheme for protecting rightful ownership [ J]. IEEE Transactions on Multimedia, 2002, 4(1) :121 -128.
  • 6G Bhatnagar, B Raman. A new robust reference watermarking scheme based on DWT-SVD [ J ]. Computer Standards & Inter- faces, 2009,31 (5):1002 - 1013.
  • 7刘俊景,蒋华.一种基于离散余弦变换与奇异值分解的数字图像水印算法[J].微电子学与计算机,2007,24(10):111-114. 被引量:14
  • 8初勇波,冯子亮.一种空间域和频率域结合的数字水印算法[J].计算机工程与应用,2008,44(8):115-116. 被引量:5
  • 9朱贤坤,张贵仓,吕宝成,张旭.小波分块的鲁棒性数字水印算法[J].计算机工程与应用,2008,44(34):93-94. 被引量:7
  • 10王伟静,赵苑苑.基于小波域的数字水印算法[J].计算机技术与发展,2009,19(4):122-124. 被引量:2

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部