期刊文献+

一种结合SPIHT编码的自嵌入水印算法

A Self-Embedding Watermarking Algorithm Based on SPIHT Coding
原文传递
导出
摘要 针对当前基于DCT(离散余弦变换)的自嵌入水印算法对恢复图像细节能力不足的问题,提出了一种基于小波域内嵌编码的自嵌入水印算法。小波变换克服了DCT在图像压缩中的局限性,SPIHT编码则利用了小波变换系数的特性,提高了压缩性能,在同等的嵌入容量时,使水印含有更多图像信息,从而在保证水印透明性的前提下,较传统方法提高了图像恢复质量。同时,鉴于SPIHT算法为内嵌编码,可根据需要调节水印大小从而改变嵌入强度,这也是传统方法所不具备的。Logistic和Cat双重混沌映射的应用,提高了水印安全性和水印检测的能力。最后,进行了算法性能测试实验,验证了本文算法的有效性。 Considering the problem that the current self-embedding watermarking algorithms are insufficient on detailpreserving, an integer wavelet transform combined with SPIHT algorithm is employed to implement a self-embedding watermarking algorithm for image content authentication. Wavelet transform can overcome the defect of Discrete Cosine Transform on image compression. And the characteristic of wavelet transform coefficients is taken into account, compression performance is enhanced and more image information is included of equivalent embedding capacity. In this way the watermarked image possesses not only good perceptual transparence but also better self-recovering capability compared with traditional techniques. For the SPIHT algorithm is an embedded coding algorithm, it can adjust the size of watermarking to change the embedding intensity according to the actual situation, which cannot be held by other methods. And Logistic map and cat map increase the security and ability of tamper localization of watermark. Finally, experimental results show the efficiency of the algorithm.
出处 《中国图象图形学报》 CSCD 北大核心 2010年第7期1054-1061,共8页 Journal of Image and Graphics
基金 国家重点基础研究发展计划(973)项目(2003CB716104) 国家自然科学基金重点项目(30730036) 广东省产学研项目(cgzhzd0717)
关键词 整数小波变换 SPIHT编码 自嵌入 LOGISTIC映射 CAT映射 integer wavelet transform, SPIHT encoding, self-embedding, Logistic map, Cat map
  • 相关文献

参考文献10

  • 1Fridrich J. Methods for tamper detection in digital images[ C ]// Proceedings of the ACM Workshop on Multimedia and Security. Orlando: ACM Press, 1999: 19-23.
  • 2Lin E T, Delp E J. A review of fragile image watermarks[ C ]// Proceedings of the Multimedia and Security Workshop at ACM Multimedia' 99. Orlando: ACM Press, 1999 : 25-29.
  • 3Wu M, liu B. Watermarking for image authentication [ C ]// Proceedings of the IEEE International Conference on Image Processing. Chicago, nlinois, USA: IEEE Computer Society, 1998 : 437-441.
  • 4Fridrich J , Goljan M. Protection embedding [ C ]//Symposium on Hiding in Digital Media. Newark, Technology, 1999. of digital images using self Content Security and Data N J: New Jersty Institute of.
  • 5张鸿宾,杨成.图像的自嵌入及窜改的检测和恢复算法[J].电子学报,2004,32(2):196-199. 被引量:49
  • 6钱振兴,程义民,王以孝,田源.一种图像自嵌入方法[J].电子学报,2006,34(7):1347-1350. 被引量:12
  • 7Amir Said. A new fast and efficient image codec based on set partitioning in hierarchical trees [ J ]. IEEE Transactions on CASVT, 1996, 6(3) : 243-250.
  • 8Shapiro J M. Embedded image coding using zerotree of wavelet coefficients[J]. IEEE Transactions on Signal Processing, 1993, 41 (12) : 3445-3462.
  • 9Boliek M, Christopoulos C, Majani E. ISO/IEC JTC1/SC29/ WG1 N1646R JPEG2000 PartI Final Committee Draft (Version 1.0) [ S ]. Geneva : ISO/IEC, 2000.
  • 10冯前进,陈武凡.基于内嵌块优化等级树(EBOHT)算法的图像编码[J].计算机学报,2002,25(11):1170-1174. 被引量:7

二级参考文献29

  • 1程义民,钱振兴,王以孝,田源.基于数位信息的信息隐藏方法[J].电子与信息学报,2005,27(8):1304-1309. 被引量:15
  • 2[1]Shapiro J M. Embedded image coding using zerotrees of wavelet coefficients. IEEE Trans Signal Processing, 1993,41 (12): 3445 -3462
  • 3[2]Said A, Pearlman W A. A new, fast, and efficient image codes based on set partitioning in hierarchical trees. IEEE Trans Circuits, Systems, and Video Technology, 1996, 6(3):243-249
  • 4[3]JPEG2000 final committee ISO/IEC JTC1/SC29/WG1 N1646.draft vi. 0. March 16,2000
  • 5[4]Taubmam D. High performance scalable image compression with EBCOT. IEEE Trans Image Processing, 2000, 9(7):1158-1170
  • 6[5]Buccigrossi R W. Image compression via joint statistical characterization in the wavelet domain. IEEE Trans Image Processing, 1999, 8(12):1688-1701
  • 7[6]Villasenor J D. Wavelet filter evaluation for image compression. IEEE Trans Image Processing, 1995, 4 (8) : 1061 - 1069
  • 8[7]Strela V, Heller P N, Strang G et al. The application of multiwavelet filter banks to image processing. IEEE Trans Image Processing,1999, 8(4) :548-563
  • 9[1]Lin E T,Delp E J.A review of fragile image watermarks [A].Proc.of the Multimedia and Security Workshop (ACM Multimedia'99) [C].Orlando,1999.25-29.
  • 10[2]Walton S.Information authentication for a slippery new age [J].Dr.Dobbs Journal,1995,20(4):18-26.

共引文献57

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部