期刊文献+

基于汉字结构隐藏算法的二值文本认证技术 被引量:2

Binary document authentication technology based on Chinese character structure hiding
下载PDF
导出
摘要 在深入分析二值文本隐藏技术评价准则的基础上,结合汉字笔画结构特点,提出了一种具有最佳视觉效果的认证数字水印方案。首先结合像素可翻动性评分准则与汉字结构特征,选择标准的16模块,然后在此模块中依据DRDM准则选择最佳翻动8模块,翻动图像中的8模块来嵌入水印信息,实验表明该算法视觉隐蔽性极佳,并能完成篡改定位。 This paper proposes a novel data hiding method for binary images authentication based on analyzing the measurement of document images and considering the structure of Chinese character.First unify the pixels flippability scores and the Chinese character structural feature,choose 16 standard modules,and then choose 8 best flip patterns module according to DRDM rule, flip the 8 best flip patterns module to embed watermark.The experiment shows this algorithm has best visual quality,and can be used to location the tampers at the same time.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第3期102-104,111,共4页 Computer Engineering and Applications
基金 陕西省国际科学与技术合作项目基金(No.2006KW-21)
关键词 汉字结构 二值文本 认证 视觉效果 Chinese character structure binary document authentication visual quality
  • 相关文献

参考文献8

  • 1Awan I,Gilani S A M,Shah S A.Utilizalion of maximum data hiding capacity in object-based texl document authentication[C]//IEEE Proc IIH-MSP, 2006.
  • 2Wu M, Liu B. Data hiding in binary images for authentication and annotation[J].IEEE Multimedia,2004,6(4):528-538.
  • 3L Haiping,W Jian,Kot A C,et al.An objective distortion measure for binary document images based on human visual perecption[C]// 16th International Conference on Pattern Recognition, 2002,4:293.
  • 4Lu H,Kot A C,Cheng J.Secure data hiding in binary document images for authentication[J].Proc ISCAS' 04,2004,3 : 806-809.
  • 5吴建国,俞庆英,吴海辉.汉字笔画若干数据的统计方法研究与应用[J].安徽大学学报(自然科学版),2005,29(3):14-20. 被引量:14
  • 6Yang Huijuan,Kot A C.Pattern-based data hiding for binary image authentication by connectivity preserving[C]//Proc IEEE Transactions on Multimedia, 2007.9(3 ) :475-485.
  • 7Yang Huijuan,Kot A C.Dala hiding for binary images authentication by considering a larger neighborhood[C]//IEEE International Symposium on Circuits and Systems,27-30 May 2007: 1269-1272.
  • 8XI Yan-hua,ZHANG Min-rui.Fragile Watermarking Based on Smoothness for Document Image[C]//Proc IEEE 1-4244-1035-5/07,2007 : 249-252.

二级参考文献2

  • 1刘韵玲 叶玉秀.汉字写法规范词典[M].上海:上海辞书出版社,1992..
  • 2张炘中.汉字识别技术[M].北京:清华大学出版社,1992..

共引文献13

同被引文献22

  • 1刘春庆,戴跃伟,王执铨.一种新的二值图像信息隐藏方法[J].东南大学学报(自然科学版),2003,33(z1):98-101. 被引量:16
  • 2侯振华,陈生潭.脆弱性数字水印研究[J].计算机应用,2003,23(z2):106-108. 被引量:17
  • 3王欣,张旭东.一种针对汉字文本图像的数字水印技术[J].计算机工程与应用,2005,41(25):57-60. 被引量:5
  • 4唐承亮,肖海青,向华政.基于文字RGB颜色变化的脆弱型文本数字水印技术[J].计算机工程与应用,2005,41(36):6-8. 被引量:21
  • 5朱从旭,陈志刚.一种灵敏的文本图像认证混沌脆弱水印技术[J].小型微型计算机系统,2006,27(1):151-154. 被引量:16
  • 6WU Min, TANG E, LIU B. Data hiding in digital binary images [ M ]//Proc IEEE Int Conf on Multimedia and Expositions. New York: IEEE Press, 2000: 393-396.
  • 7YANG Hui-juan, KOT A C. Data hiding for text document image authentication by connectivity- preserving [ M ]//Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP '05). New York .. IEEE Press, 2005: 505-508.
  • 8XI Yan-hua, ZHANG Min-rui. A document watermarking algorithm based on partitionedcharacter image [M]/ /Proceedings of 2009 International Conference on E-Business and Information System Security. New York: IEEEPress, 2009: 365-368.
  • 9LU Hai-ping, WANG Jian, KOT A C, et al. An objective distortion measure for binary .document images based on human visual perception [M]// Proceedings of the IEEE Region 10 Annual International Conference ( TENCON 2004 ). New York: IEEEPress, 2002: 239-242.
  • 10Yang H J, Kot A C: Pattern-based data hiding for binary image authentication by connectivity-preserving[J].IEEE Transac- tions on Multimedia, 2007, 9 (3): 475-486.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部