期刊文献+

基于压缩传感和LDPC码的图像水印算法研究 被引量:5

Research of Image Watermark Algorithm Based on Compressive Sensing and LDPC
下载PDF
导出
摘要 现有的数字水印算法在鲁棒性和篡改检测方面存在不足,提出一种新的水印算法.该算法通过对原始图像进行线性随机投影,得到的压缩测量值经过LDPC(Low Density Parity Check,低密度奇偶校验码)编码,以水印方式嵌入到原始图像中;篡改检测时,同样对篡改图像进行线性随机投影,得到的测量值作为边信息,对提取的水印进行LDPC译码.通过估计原始图像和篡改图像的压缩测量值,并求解一个l1范数问题,实现图像的篡改检测.仿真实验证明,该算法不仅具有较强的抗攻击能力,还具有较好的篡改检测能力. As the robustness and tamper detection for existing digital watermarking algorithms are poor, this paper proposes a new watermarking algorithm. It conducts liner random projection on the original image. The compressive measurements are encoded with LDPC ( Low Density Parity Check) and embedded into the original image as watermark. While tampering detection, it also conducts liner random projection on the tampered image. The measurements act as side information when the extracted watermark is decoded. By estimating the compressive measurements between original image and tampered image, it can detect the tamper to image. Simulation results show that the proposed algorithm not only has strong ability against attacks, but also has good ability for tamper detection.
作者 周燕 周灵
出处 《小型微型计算机系统》 CSCD 北大核心 2011年第3期572-576,共5页 Journal of Chinese Computer Systems
基金 广东省自然科学基金项目(10152800001000016 10452800001004185 9151040701000002)资助 广东省科技计划基金项目(0911052600008)资助
关键词 压缩传感 随机投影 LDPC 图像水印 篡改检测 compressive sensing random projection LDPC image watermark tamper detection
  • 相关文献

参考文献5

二级参考文献29

  • 1刘九芬,黄达人,黄继武.图像水印抗几何攻击研究综述[J].电子与信息学报,2004,26(9):1495-1503. 被引量:43
  • 2谢小贤,舒志彪.一种基于DMWT与SVD相结合的图像数字水印算法[J].计算机工程与科学,2006,28(1):62-64. 被引量:5
  • 3许宪东,季振洲.DCT水印中拉伸系数与嵌入位置的选择[J].计算机应用与软件,2006,23(9):124-127. 被引量:13
  • 4Wong P.W.,Memon N..A public key watermark for imag everification and authentication.In:Proceedings of the IEEE International Conference on Image Processing,Chicago,1998,1: 455-459.
  • 5Memon N.,Vora P.,Yeo B.L.,Yeung M..Distortion bounded authentication techniques.In:Proceedings of the SPIE,Security and Watermarking of Multimedia Contents II,San Jose,USA,2000,397l:164-174.
  • 6Quelue M.P..Towards robust,content based techniques forimage authentication. In: Proceedings of the IEEE 2nd Workshop on Multimedia Signal Processing,Redondo Beach,1998,297-302.
  • 7Rey C.'Dugelay J.L..Blind detection of malicious alterations on still image using robust watermarks.In:IEE Seminar on Secure Images and Image Authentication.London,2000,7/1-7/6.
  • 8Xie Lie-Hua, Arce G.R.. A class of authentication digital Watermarks for secure multimedia communication.IEEEtransactions on Image Processing,2001,10(11):1754-1764.
  • 9Mallat S..Zhong S.Charactedzation of signals from multiscale edges.IEEE Transactions on Pattern Analysis and Machine Intelligence,1992,14(7):710-732.
  • 10Mallat S..A Wavelet Tour of Signal Processing.Second Edition.Beijing;China Machine Press'2002.

共引文献56

同被引文献50

  • 1李旭东.基于分块DCT和量化的图像盲水印算法[J].计算机工程,2006,32(21):139-140. 被引量:25
  • 2蔡丽敏,冯久超,肖永豪.基于坐标对准的抗剪裁数字水印盲检测技术[J].计算机科学,2007,34(5):234-236. 被引量:2
  • 3SCHYNDEL V R, TRIKLEL A, OSBOME C. A digital watermark [C]// Proceedings of International Conference on Image Processing. Texas: IEEE, 1994(2): 86-90.
  • 4CANDleS E. Compressive sampling[C]//Proe. of the In- ternational Congress of Mathematicians. Spain: EMS, 2006 : 1433-1452.
  • 5CANDES E J, TAO T. Near optimal signal recovery fromrandom projections, universal encoding strategies [J]. IEEE Transactions on Information Theory, 2006,52 (12) : 5406-5425.
  • 6DONOHO D L. Compressed sensing [ J]. IEEE Transac- tions on Information Theory, 2006, 52(4) : 1289-1306.
  • 7Candes E J ,Wakin M B. An introduction to compressive sampling [ J ]. IEEE Signal Processing Magazine,2008,25 (2) :21-30.
  • 8Romberg J. Image via compressive sampling[ J ]. IEEE Signal Processing Magazine,2008,25 (2) : 14-20.
  • 9Valenzise G, Tagliasacchi M, Tubaro S, et al. A compressive-sensing based watermarking scheme for sparse image tampering identification[ C ]. IEEE 16th International Conference on Image Processing,2009 : 1265-1268.
  • 10Rachbin Y, Baron D. The secrecy of compressed sensing measurements [ C ]. Proc Forty - sixth Annual Allerton Conference, 2008 : 813- 817.

引证文献5

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部