期刊文献+

基于DWT和BEMD的图像水印嵌入算法

Image Watermark Embedding Algorithm Based on DWT and BEMD
下载PDF
导出
摘要 信息隐藏是信息安全的一个新的重要内容,数字水印技术是信息隐藏技术研究领域的重要分支。鲁棒性和隐藏性是数字水印技术的关键。本文提出了一种基于离散小波变换和二维经验模式分解的图像数字水印算法,在嵌入水印前把水印进行Arnold变换,把水印信息置乱,消除像素的空间相关性,从而提高了水印信息的安全性和鲁棒性。实验结果表明,该水印算法具有很强的不可见性和抗几何处理的鲁棒性,算法简单且易于实现,具有很高的实用价值。 Hiding Information technology is a new important part of information security. And Digital watermarking technology is an important branch in the field of information hiding technology. Robustness and hiding are the key technologies of digital watermarking technology. We proposes an image digital watermark algorithm which combines Discrete Wavelet Transform(DWT) and Bi-dimensional Empirical Mode Decomposition(BEMD). The security and the robustness of watermarking were improved by Arnold transform which scrambles watermarking information and eliminates pixel' s space relativity. The experimental results show that the watermarking algorithm has strong hiding and robustness for anti-attack. The proposed technique is really practical in the real world, and easy to realize.
出处 《信息通信》 2011年第6期1-2,5,共3页 Information & Communications
关键词 图像数字水印 离散小波变换 二维经验模式分解 Arnold置乱变换 Digital watermarking for images DWT DEMD Arnold scrambling transformation
  • 相关文献

参考文献5

  • 1Huang N E, Zheng Shen, Long S R. The empirical mode decomposition and hilbert spectrum for nonlinear non-stationary time series analysis [J]. Porc R Soc London Ser A, 1998, 454(1971): 903-995.
  • 2J. C. Nunes, al. Image analysis Y. Bouaoune, E. by bidimensional Delechelle et empirical mode decomposition. Image and Vision Computing, Vol.21 No. 12, 2003, 4: 1019-1026.
  • 3Liang Hiding Based Proc. of IEEE Intelligence Lingfei, Ping Ziliang. Information on Empiri-cal Mode Decomposition[C]// Pacific-Asia Work-shop on Computational and Industrial Application. Wuhan,China: [s. n.], 2008: 561-563.
  • 4张华熊,仇佩亮.置乱技术在数字水印中的应用[J].电路与系统学报,2001,6(3):32-36. 被引量:107
  • 5顾艳春,韩国强,沃焱,龙建益.基于小波变换和置乱技术的二值水印新算法[J].计算机工程与设计,2008,29(15):4017-4020. 被引量:5

二级参考文献12

  • 1LU C S, LIAO H Y M. Multipurprose watermarking for image authentication and protection[J]. IEEE Transactions on Image Processing, 2001,10(10):1579-1592.
  • 2Cox I J, Miller M L. Watermarking application and their properties[C]. Las Vegas, USA: Proc of International Conference on Information Technology: Coding and Computing, 2000:6-10.
  • 3Yuan Quan, Yao Hongxun, Gao Wen, et al. Blind watermarking method based on DWT middle frequency pair [C]. Beijing, China:IEEE International Conference on Multimedia and Expo, 2002:473-476.
  • 4Mohidul Islam S M, Debnath R, Alamgir Hossain S K. DWT based digital watermarking technique and its robustness on image rotation, scaling, JPEG compression, cropping and multiple watermarking[C]. Cairo, Egypt: IEEE International Conference on Information and Communication Technology, 2007:246-249.
  • 5Guzman V V H, Miyatake M N, Meana H M H. Analysis of a wavelet-based watermarking algorithm[C]. Veracruz, Mexico:IEEE 14th International Conference on Electronics Communications and Computers, 2004: 283-287.
  • 6Liu Lian-Shan, Li Ren-Hou, Gao Qi. A new watermarking method based on DWT green component of color image [C]. Shanghai, China: IEEE International Conference on Machine Learning and Cybernetics, 2004: 3949-3954.
  • 7Liu Hongmei, Liu Jiufen, Huang Jiwu, et al. A robust DWT-based blind data hiding algorithm[C]. Phoenix, USA: IEEE International Symposium on Circuits and Systems, 2002:672-675.
  • 8Cox I J, Kilian J, Leighton T, et al.Secure spread spectrum watermarking for multimedia[J]. IEEE Transactions on Image Processing, 1997,6(12): 1673-1687.
  • 9Arnold V I, Avez A. Ergodic problems of classical mechanics [M]. New Jersey: Benjamin, NY, 1968.
  • 10丁玮,闫伟齐,齐东旭.基于生命游戏的数字图像置乱与数字水印技术[J].北方工业大学学报,2000,12(1):1-5. 被引量:34

共引文献110

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部