期刊文献+

基于块奇偶性的数据隐藏

Data hiding based on the parity of blocks
下载PDF
导出
摘要 针对嵌入式系统中,图像数字水印算法计算量较大的问题,设计了基于像素奇偶性的数字水印嵌入方法。通过分析原始像素的位置信息,选择像素块的边缘位置嵌入水印数据,减少了对原始图像的影响。与其他数字水印算法相比,在相同条件下,本文的方法计算量小,并具有较高的图像质量。 To reduce the heavy operation of image watermarking algorithm in the embedded system, a kind of data hiding algorithm is clesiynel based on the parity of blocks. Through analyzing the locations of pixels, the algorithm selects the edge of the image to embed watermark data. The results show that the method has less amount of operation and better qualities than other algorithms under the same condition.
出处 《河北工业科技》 CAS 2012年第5期318-320,326,共4页 Hebei Journal of Industrial Science and Technology
关键词 数据隐藏 数字水印 奇偶性 位平面 data hiding image watermarking parity bit plane
  • 相关文献

参考文献6

  • 1NI Zhi-cheng, SHI Yun-qing, ANSARI N. Reversible data hiding[J]. IEEE Transactions on Circuits and Systems for Video Technology,2006, 16(3) ,356-362.
  • 2GHOUT1 L, BOURIDANE A, IBRAHIM M. Digital image watermarking using balanced muhiwavelets[-J']. IEEE Trans- actions on Signal Processing,2006, 54(4)=1 519-1 536.
  • 3YANG H, KOT A. Pattern-based data hiding for binary im- age authentication by connectivity-preserving[J]. IEEE Trans-actions on. Mu|t-media,2007, 9(3) - A75-496.
  • 4LIU N, AMIN P, SUBBALAKSHMI K. Security and robust- ness enhancement for image data hiding[J]. IEEE Transac- tions on Multimedia,2007, 9(3) z466-474.
  • 5宋伟,侯建军,李赵红.一种基于块分类和差值扩展的可逆数据隐藏算法[J].中南大学学报(自然科学版),2011,42(3):693-702. 被引量:7
  • 6郭萌,张鸿宾,魏磊.二值图像中的数据隐藏算法[J].电子学报,2009,37(11):2409-2415. 被引量:12

二级参考文献29

  • 1I J Cox,M L Miller. The first 50 years of electronic watermarking[J]. Applied Signal Processing,2002,56(2) :126- 132.
  • 2F A P Petitcolas, R J Anderson, M G Kuhn. Information hidinga survey[ J ]. Proceedings of the IEEE, 1999, 87 (7) : 1062 - 1078.
  • 3F Hartung,M Kutter. Multimedia watermarking techniques, proceedings of the IEEE[J]. 1999,87(7) :1079 - 1107.
  • 4I J Cox, M L Miller, J A Bloom, J Fridrich, T Kalker. Digital Watermarking and Steganography ( Second Edition) [M]. San Mateo,CA:Morgan Kaufmann,2008.1 - 13.
  • 5M Yeung,F Mintzer. Invisible watermarking for image verification[ J]. J. of Electronic Imaging, 1998,7 (3) : 578 - 591.
  • 6I Cox, J Kilian, T Leighton, T Shamoon. Secure spread spectrum watermarking for multimedia[J]. IEEE Trans. Image Processing, 1997,6(12) : 1673 - 1687.
  • 7K Matsui, K Tanaka. Video-steganography: how to secretly embed a signature in a picture[J].Proc.IMA Intellectual Property Project, 1994,1 (1) :187 - 206.
  • 8M Fu, O Au. Data hiding by smart pair toggling for halftone images[ A]. Proc. IEEE Inter. Conf. On Acoustics, Speech, and Signal Processing[ C ]. Istanbul, Turkey, 2000.2318 - 2321.
  • 9N F Maxemchuk, S Low. Marking text document [ A ]. Proc.IEEE ICIP'97[C]. Santa Barbara,CA,USA, 1997.13 - 13.
  • 10E Koch, J Zhao. Embedding robust labels into images for copyright protection[A]. Proc. Inter. Congr. Intellectual Property Rights for Specialized Information, Knowledge and New Technologies[C].Hamburg, Germany, 1995.242 - 251.

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部