期刊文献+

基于DWT-SVD域的图像水印算法

Image Watermarking Algorithm Based on DWT-SVD Domain
下载PDF
导出
摘要 离散小波变换和奇异值分解都可以作为数字水印算法有效的工具,提出一种基于离散小波变换和奇异值分解的数字水印算法。此算法先将整个图像分成4个区域,然后再对每个区域运用奇异值分解方法,通过修改奇异值来嵌入水印信息。实验结果表明,该算法具有很好的稳健性,在经过一般的信号处理操作后,嵌入的水印能被可靠地提取和检测。 Discrete Wavelet Transformation(DWT) and Singular Value Deeomposition(SVD)are used as tools for embedding data into an image. Proposes a hybrid watermarking algorithm based on DWT and SVD. Decomposes the whole image into four subbands,and then applies the SVD to each subband,and embeds the watermark data by modifying the singular values. Experimental result shows that the watermarking algorithm performs well in robustness ,the embedded watermark can be detected reliably,following usual signal processing.
作者 陈心晶 张明
出处 《现代计算机》 2010年第4期81-83,共3页 Modern Computer
关键词 数字水印 小波变换 奇异值分解 鲁棒性 Watermarking Wavelet Transformation Singular Value Decomposition Robust
  • 引文网络
  • 相关文献

参考文献10

  • 1Petitcolas F A P,Anderson R J,Kuhn M G. Attacks on Copyright Marking System. In Proc. of 2nd Int. Workshop Information Hiding,Portland,OR,Apr 14-17,1998:218-238.
  • 2Unzign, http://www.ahem.org/watermark.
  • 3Cox I J,Linnartz J. Public Watermarks and Resistance Tampering. In Proc. of ICIP'97 ,Washington, DC, 1997:26-29.
  • 4Cox I J, Linnartz J. Some General Methods for Tampering with Watermarks. IEEE J. on Selected Areas in Communications, 1998,16(4):587-593.
  • 5Braudaway G W,Minter F. Automatic Recovery of Invisible Image Watermarks from Geometrically Distorted Image[A]. In Proceedings of SPIE Security and Watermarking of Multimedia Contents[C]. SanJose, CA,USA,2000:74-81.
  • 6Herley C. Why Watermarking is Nonsense [J]. IEEE Signal Processing Magazine, 2002,19(5 ):10-11.
  • 7Ruanaidh J J K O, Pun T Rotation. Scale and Translation Invariant Spread Spectrum Digital Image Watermarking[J]. Signal Processing, 1998, 66(3): 303-317.
  • 8周波,陈健.基于奇异值分解的、抗几何失真的数字水印算法[J].中国图象图形学报(A辑),2004,9(4):506-512. 被引量:96
  • 9Liu R,Tan T. A SVD-Based Watermarking Scheme for Protecting Rightful Ownership[J]. IEEE Transactions on Multimedia,2002(1 ):121-128.
  • 10Leon S J. Linear Algebra with Applications[M]. New York: Macmillan, 1986:343-356.

二级参考文献9

  • 1Petitcolas F A P, Anderson R J, Kuhn M G. Attacks on copyright marking systems [A]. In: Proceedings of Workshop Information Hiding[C]. Portland, OR, USA, 1998: 218-238.
  • 2Herley C. Why watermarking is nonsense [J]. IEEE Signal Processing Magazine, 2002, 19(5) : 10-11.
  • 3Braudaway G W, Minter F. Automatic recovery of invisible image watermarks from geometrically distorted image[A]. In:Proceedings of SPIE Security and Watermarking of Multimedia Contents Ⅱ [C]. San Jose, CA, USA, 2000:74-81.
  • 4Ruanaidh J J. K. O. , Pun T. Rotation, scale and translation invariant spread spectrum digital image watermarking[J]. Signal Processing, 1998, 66(3): 303-317.
  • 5Andrews H, Patterson C. Singular value decomposition(SVD)image coding[J]. IEEE Transactions on Communications, 1976,24(4) : 425-432.
  • 6Liu R, Tan T. An SVD-based watermarking scheme for protecting rightful ownership [J]. IEEE Transactions on Multimedia, 2002,4(1) : 121-128.
  • 7Leon S J. Linear Algebra with Applications [M]. New York:Macmillan, 1986: 343-356.
  • 8Horn R A, Johnson C R. Matrix Analysis [M]. Cambridge:Cambridge University, 1985 : 431-432.
  • 9Miller M L, Bloom J A. Computing the probability of false watermark detection [A]. In: Proceedings of 3rd International Workshop Information Hiding [C], Dresden, Germany, 1999:146-158.

共引文献95

;
使用帮助 返回顶部