期刊文献+

一种新的第三方双重图像水印算法

Novel algorithm of third party's double watermark applied in image
下载PDF
导出
摘要 提出一种新的第三方双重图像水印算法。该算法依赖于可信任第三方提供的时间戳以及用户的私钥和授权码生成双重水印信息,然后将其嵌入在图像分块除直流分量外的DCT系数上。水印检测时可分别对水印作品时间戳和隶属关系的合法性进行检测。仿真实例和安全分析表明,该算法对嵌入参数敏感,对图像的常规操作具有较好的鲁棒性。在没有第三方的参与下,任何用户都不能构造和检测出合法的水印信息,这限制了恶意盗版者进行分析和攻击的一些前提条件,保证了水印系统的安全。 This paper presented a novel algorithm of the third party' s double watermark. The algorithm relied on the third party' s timestamp and users' secret keys and authorization codes,produced a double watermark. Then it would be embedded into the discrete cosine transform coefficients exception of direct current in digital image blocks. Timestamp and ownership watermark detecting results could be provided separately. Simulation experiments and analysis work reveal that the algorithm sensitizes to embedding parameters and has benign robustness subject to general operations. Any user can not embed and detect the valid watermark information without the participation of the third party, which confines the preconditions of malice pirates' attack and then guarantees its safety.
出处 《计算机应用研究》 CSCD 北大核心 2010年第1期262-264,267,共4页 Application Research of Computers
关键词 第三方水印 双重水印算法 静止图像 鲁棒性 third party watermark double watermarking algonithm still digital image robustness
  • 相关文献

参考文献9

  • 1PODILCHUNK C I, DELP E J. Digital watermarking:algol4thms and applications[ J]. IEEE Signal Processing Magazine, 2001,18 (4) :33-46.
  • 2伍凯宁,曹汉强,朱耀庭,王程.数字水印攻击技术及对策研究[J].计算机应用研究,2004,21(9):153-154. 被引量:15
  • 3王志雄,王慧琴,李人厚.数字水印应用中的攻击和对策综述[J].通信学报,2002,23(11):74-79. 被引量:19
  • 4KIROVSKI D, MALVAR H. Embedding and detecting spread-spectrum watermarks under estimation attacks[ C ]//Proc of IEEE International Conference on Acoustics, Speech and Signal Processing. 2002: 1293-1296.
  • 5KALKER T, LINNARTZ J R M G, DIJK M van. Watermark estimation through detector analysis [ C ]//Proc of International Conference on Image Processing. 1998:425-429.
  • 6CRAVER S, MEMON N, YEO B L, et al. Resolving rightful owner-ships with invisible watermarking techniques : limitations, attacks and implications[ J]. IEEE Journal on Selected Areas Jn Communications,1998,16(4) :573-586.
  • 7李昌利,卢朝阳.数字水印的去同步攻击及其对策[J].中国图象图形学报(A辑),2005,10(4):403-409. 被引量:15
  • 8PETITCOLAS F A P. Watermarking schemes evaluation [ J ]. IEEE Trans on Signal Processing,2000,17 (5) :58- 64.
  • 9[EB/OL]. http://www, petitcolas, net/fabien/software/StirMark- Benchmark_4 0_129. zip.

二级参考文献60

  • 1[1]HARTUNG F, KUTTER M. Multimedia watermarking techniques[J]. Proceedings of IEEE, 1999,87(7):1079-1107.
  • 2[2]VOYATZIS G, PITAS I. The use of watermarks in the protection of digital multimedia products[J]. Proceedings of IEEE, 1999,87(7):1197-1207.
  • 3[3]BONCELET X X C, ARCE G. A multiresolution watermark for digital images[A]. Proc IEEE Int Conf Image Processing[C]. Santa Barbara, CA: Oct 1997.1097-1100.
  • 4[4]BARTOLINI M B F,CAPPELLINI V, PIVA A. A DCT-domain system for robust image watermarking[A].Signal Processing[C]. 1998.1202-1206.
  • 5[5]TAO,DICKINSON B. Adaptive watermarking in the DCT domain[A]. Proc Int Cong Image Processing (ICIP)[C]. Lausanne, Switzerland: Sept 1996.540-543.
  • 6[6]COX I J, LINNARTZ J P. Some general methods for tampering with watermarks[J]. IEEE J Selct Areas Commun (Special Issue on Copyright and Privacy Protection), 1998,16(5) :587-593.
  • 7[7]NIKOLAIDIS A,TSEKERIDOU S. A survey on watermarking application scenarios and related attacks[A]. Signal Processing[C]. 2001.991-995.
  • 8[8]STONE H S. Analyis of Attacks on Image Watermarks with Randomized Coefficients[M]. NJ: NEC RES Inst Princeton, 1996 .
  • 9[9]HARTUNG F. Difital Watermarking and Fingerprinting of Uncompressed and Compressed Video[D]. Erlangen, Germany: Telecommun Lab, Univ Erlangen-Nuremberg, 1999.
  • 10[10]KUGN M. StirMark[EB/DL]. http://www.cl.cam.ac.uk/~mgk25/stirmark/,1997-11.

共引文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部