期刊文献+

基于小波技术的数字水印方法研究及应用

Research and application of digital watermark based on wavelet technology
下载PDF
导出
摘要 本文主要讨论在小波域嵌入数字水印的研究。在低频区域嵌入水印,其稳定性好,但容易被人眼察觉;高频域嵌入水印不易被察觉,但稳定性差、易遭到恶意攻击。本文选择在低频和高频区分别嵌入水印,并选择不同的嵌入强度。水印图像选择具有特殊意义的二值图像‘吉林大学’水印,用Matlab7.6.0(R2008)仿真。实验表明,本算法对压缩、滤波、噪声攻击有很强的鲁棒。 This paper focuses on the research of digital watermark embedded in wavelet domain. The digital watermark embedded in the low frequency region is stable, but easy detected by human eyes, while is not so noticeable but vulnerable to attack in the high frequency. This paper embeds watermark both in low frequency and high frequency, and selects different embedding strength for different frequent. The author picked up the binary image of Jilin university as watermark image and made an experiment on the algorithms in the environment of Matlab7.6.0 (R2008). The results showed that this algorithm had great robustness to compression, filtering and noise attack.
出处 《气象水文海洋仪器》 2010年第2期44-46,共3页 Meteorological,Hydrological and Marine Instruments
关键词 数字水印 小波变换 鲁棒性 digital watermark wavelet transform robustness
  • 相关文献

参考文献2

二级参考文献10

  • 1Stefan C Katzenbeisser. Information hiding techniques for stenography and digital watermarking[C]. Boston: Artech House,2000. 17-41.
  • 2Brassil J T, Low S H, Maxemchuk N F, et al.Electronic marking and identification technique to discourage document copying[C]. Toronto: Proceedings of IEEE INFOCOM '94, 1994. 1278-1287.
  • 3Maxemchuk N F. Electronic document distribution [J]. AT&T Technical Journal, 1994,(9/10): 73-80.
  • 4Maxemchuk N F, Low S H, Lapone A P. Document identification for copyright protection using centroid detection[J]. IEEE Transactions on Communication, 1998,46(3):372-383.
  • 5Peter Wayner. Mimic functions[J]. Cryptologia, 1992, XVI(3):193-214.
  • 6Peter Wayner. Strong theoretical steganography[J]. Cryptologia,1995, XIX(3): 285-299.
  • 7Mark Chapman, George Davida. Hiding the hidden: A software system for concealing ciphertext as innocuous text[C]. Berlin:Proceedings of the International Conference on Information and Communication Security, 1997. 333-345.
  • 8Mikhail Atallah J, Victor Raskin, Michael Crogan, et al. Natural language watermarking: Design, analysis, and a proof-of- concept implementation[C]. Pittsburgh: 4th International Information Hiding Workshop, 2001.185- 199.
  • 9Mikhail Atallah J, Victor Raskin, Christian F Hempelmann.Natural language watermarking and tamperproofing[C]. Berlin:5th International Information Hiding Workshop, 2002. 196-212.
  • 10Mikhail Atallah J, McDonough C J, Raskin V Nirenburg, et al.Natural language processing for information assurance and security[C]. New York: ACM Press, 2000. 51-65.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部