期刊文献+

基于小波视觉模型的乘性水印算法 被引量:4

Multiplicative watermarking algorithm based on wavelet visual model
下载PDF
导出
摘要 虽然小波域加性水印算法具有较好的不可感知性,但其鲁棒性较弱。因此,结合小波域视觉模型,提出了一种基于小波视觉模型的乘性图像水印算法。在水印嵌入过程中,为平衡水印的不可感知性和鲁棒性,以中频子带作为水印嵌入空间,并根据图像的频域敏感度、亮度敏感度、纹理复杂度确定水印的嵌入强度。在水印检测过程中,采用广义高斯分布(GGD)对小波系数的统计特性进行刻画,并通过奈曼—皮尔逊(NP)准则确定水印系统的检测阈值,给出了水印系统的虚警概率和检测概率之间的接收者操作特征(ROC)曲线关系。最后通过实验测试了该算法在抗压缩、叠加噪声、缩放和剪切等攻击时的鲁棒性能。仿真结果表明:该算法具有较好的检测性能以及在抗攻击时具有较强的鲁棒性。 The additive watermarking algorithm has good imperceptibility,however,the robustness of watermark is poor.As a result,a multiplicative image watermarking method was proposed by combining the visual model in the wavelet domain.In the proposed embedding scheme,the middle-frequency subband acted as the watermark embedding space,which was used to achieve the tradeoff between the imperceptibility and the robustness of watermarking system.Besides,the embedding strength factor was determined by considering the frequency masking,luminance masking and texture masking of host image.In the proposed detection scheme,the probability density function of wavelet coefficients was modeled by the Generalized Gaussian Distribution(GGD),and the watermark decision threshold was obtained by using the Neyman-Pearson(NP) criterion,and the Receiver Operating Characteristic(ROC) curve between the probability of false alarm and the probability of detection was derived.Finally,the robustness of the proposed watermarking was tested when being against common image processing attacks such as JPEG compression,Additive White Gaussian Noise(AWGN),scaling and cropping.The experimental results demonstrate that the proposed method has good detection performance and good robustness.
出处 《计算机应用》 CSCD 北大核心 2011年第8期2165-2168,2173,共5页 journal of Computer Applications
基金 江西省教育厅教研课题项目(JXJG-08-60-2)
关键词 数字水印 广义高斯分布 小波变换 视觉模型 接收者操作特征曲线 digital watermarking Generalized Gaussian Distribution(GGD) wavelet transform visual model Receiver Operating Characteristic(ROC) curve
  • 相关文献

参考文献15

  • 1LANGELAAR G C, SETYAWAN I, LAGENDIJK R L. Watermark- ing digital image and video data: A state-of-the-art overview [ J]. IEEE Transactions on Signal Processing, 2000, 17(5) : 20 -46.
  • 2BI NING, SUN QIYU, HUANG DAREN, et al. Robust image wa- termarking based on multiband wavelets and empirical mode decom- position [ J]. IEEE Transactions on Image Processing, 2007, 16 (8): 1956-1967.
  • 3ZHENG DONG, WANG SHA, ZHAO JIYING. RST invariant image watermarking algorithm with mathematical modeling and analysis of the watermarking processes [ J]. IEEE Transactions on Image Pro- cessing, 2009. 18(5): 1055 - 1067.
  • 4吕林涛,郝亮.面向图像内容认证的半脆弱数字水印算法[J].计算机应用,2010,30(5):1239-1242. 被引量:11
  • 5COX 1, KILIAN J, LEIGHTON T, et al. Secure spread spectrum watermarking for multimedia [ J]. IEEE Transactions on Image Pro- cessing, 1997, 12(6): 1673-1678.
  • 6BRIASSOULI A, TSAKALIDES P, STOURAITIS A. Hidden mes- sages in heavy-tails: DCT-domain watermark detection using Alpha- stable models [ J]. IEEE Transactions on Muhimedia, 2005, 7(4) : 700 -715.
  • 7HERNANDEZ J R, AMADO M, PEREZ-GONZALEZ F. DCT-do- main watermarking techniques for still images: Detector performance analysis and a new structure [ J]. IEEE Transactions on Image Pro- cessing, 2000, 9(1): 55-68.
  • 8CHENG QIANG, HUANG T S. Robust optimum detection of trans- form domain muhiplicative waleruaarks [ J]. IEEE Transactions on Signal Processing, 2003, 51(4): 906-924.
  • 9LEWIS S, KNOWLES G. Image compressions using the 2-D wavelettransform [ J]. IEEE Transactions on Image Processing, 1992, 2 (1): 244 -250.
  • 10BARNI M, BARTOLINI F, PIVA A. Improved wavelet-based wa- termarking through pixel-wise masking [ J]. IEEE Transactions on Image Processing, 2001, 10(5): 783-791.

二级参考文献11

  • 1王振飞,施保昌,王能超.基于小波变换和人类视觉系统的稳健水印算法[J].华中科技大学学报(自然科学版),2007,35(1):26-28. 被引量:10
  • 2王向阳,杨红颖,侯丽敏.一种新的半脆弱彩色图像数字水印算法[J].自动化学报,2007,33(6):561-566. 被引量:12
  • 3LU C-S,LIAO H-F M.Multipurpose watermarking for image authentication and protection[J].IEEE Transactions on Image Processing,2001,10(10):1579-1592.
  • 4WONG P W.A public key watermark for image verificatian and anthentication[C]//ICIP 98:Proceedings of the IEEE International Conference on Image Processing.Washington,DC:IEEE Press,1998,1:455-459.
  • 5CHANG C-C,LIN P-Y.Adaptive watermark mechanism for rightful ownership protection[J].Journal of Systems and Software,2008,81(7):1118-1129.
  • 6QI HUIYAN,ZHENG DONG,ZHAO JIYING.Human visual system based adaptive digital image watermarking[J].Signal Processing,2008,88(1):174-188.
  • 7SUN QIBIN,CHANG S-F,KURATO M,et al.A quantitative semi-fragile JPEG2000 image authentication system[C]//ICIP 02:Proceedings of the IEEE International Conference on Image Processing.Washington,DC:IEEE Press,2002,2:921-924.
  • 8SUN RUI,SUN HONG,YAO TIANREN.A SVD-and quantization based semi-fragile watermarking technique for image authentication[C]// Proceedings of the 6th International Conference on Signal Processing.Washington,DC:IEEE Press,2002,2:1592-1595.
  • 9王国栋,刘粉林,刘媛,姚刚.一种能区分水印或内容篡改的脆弱水印算法[J].电子学报,2008,36(7):1349-1354. 被引量:24
  • 10李剑,李生红,孙锬锋.基于Logistic混沌序列和奇异值分解的半脆弱水印算法[J].上海交通大学学报,2009,43(7):1144-1148. 被引量:12

共引文献10

同被引文献28

引证文献4

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部