期刊文献+

一种随机选取嵌入位置的DWT域盲水印

A DWT Based on Watermarking Algorithm by Randomly Selecting Embedding Positions
下载PDF
导出
摘要 提出了一种基于离散小波变换域的盲水印算法.水印嵌入前,利用随机的状态对水印图像进行置乱.对载体图像进行离散小波变换后,利用随机状态在分解后的低频子带中量化系数的思想随机地嵌入水印信息.由于置乱和选取的位置具有随机性,所以该算法有效地增加了攻击者提取水印的难度,提高了算法的安全性.仿真结果表明,该算法具有较强的鲁棒性,可以抵抗诸如噪声、压缩、几何裁剪以及中值滤波等常见的图像攻击. A blind watermarking algorithm based on discrete wavelet transform (DWT) was proposed. Before embedding, it scrambles the watermark by random state, then chooses the embedding position randomly in the wavelet low-frequency sub-band of the cover image according to the watermark, then embeds the watermark image with the quantization thought. Since using secret keys that make the embedding positions change randomly, it greatly enhances the security of the watermark. The simulation result shows that this algorithm is robust to common watermarking attacks.
出处 《襄樊学院学报》 2010年第2期25-27,38,共4页 Journal of Xiangfan University
关键词 离散小波变换(DWT) 图像置乱 盲水印 量化水印嵌入 DWT Scrambling Watermarking Robustness Watermark image embedding with the quantization thought
  • 相关文献

参考文献6

  • 1张永库.数字水印技术及典型的攻击分析[J].信息技术,2006,30(11):165-167. 被引量:2
  • 2冯象初,甘小冰,宋国乡.数值泛蛹与小波理论[M].西安:电子科技大学出版社,2003.
  • 3MEMON N, WONG P W. Protecting digital content[J]. Communications of the ACM, 1998, 41(7): 35-43.
  • 4赵翔,郝林.数字水印综述[J].计算机工程与设计,2006,27(11):1946-1950. 被引量:46
  • 5王秋生.[D].哈尔滨:哈尔滨工业大学,2001.
  • 6ANDERSON R J, PETITCOLAS E On the limits ofsteganography[J]. IEEE Journal of Selected Areas in Communications, 1998, 16(4): 474-481.

二级参考文献16

  • 1Saraju P Mohanty.Digital watermarking:A tutorial review[EB/OL].http://citeseer.ist.psu.edu/cache/papers/cs/27454/http:zSzz Szwww.csee.usf.eduzSz~smohanzyzSzresearchzSzReportszSz WMSurvey 1999Mohanty.pdf/mohanty99digital.pdf.
  • 2Petitcolas F A P.Information hiding-A survey[J].Proceedings of theIEEE,1999,87(7):1062-1078.
  • 3Moulin P,Mihcak M K.A framework for evaluating the datahiding capacity of image sources[J].IEEE Trans on Image Processing,2002,(11):1029-1042.
  • 4Swanson M D.Multimedia data embeddingand watermarking technologies[J].Proc of the IEEE,1998,86(6):1064-1087.
  • 5Yeung M M.Digital watermarking[J].Communications of the ACM,1998,41(7):31-33.
  • 6Eggers J,Buml R,Girod B.A communications approach to image steganograp hy[C].San Jose,USA:Proceedings of SPIE:Electronic Imaging 2002,Security and Watermarking of Multimedia Contents Ⅳ,2002.26-37.
  • 7Mintzer F.Opportunities for watermarking standards[J].Communications of the ACM,1998,41(7):57-64.
  • 8P'erez-Gonz'alez F,Balado F,Hern' andez J R.Performance analysis of existing and new methods for data hiding with known host information in additive channels[J].IEEE Trans on Signal Processing,Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery,2003,51(4):598-635.
  • 9Hartung F,Kitter M.Multimedia watermarking techniques[J].Proceedings of the IEEE,1999,87(7):1079-1107.
  • 10Wolfgang R B.Perceptual watermarking for digital Images and video[J].Proceedings of the IEEE,1999,87(7):1108-1126.

共引文献49

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部