期刊文献+

一种基于位平面的差值扩展可逆水印算法 被引量:4

A difference expansion reversible watermarking algorithm based on bit plane
下载PDF
导出
摘要 为了提高算法的嵌入容量和降低失真率等问题,文章提出一种基于图像位平面图分解理论的差值扩展算法,该算法只针对图像较低层的位平面图进行信息嵌入,不改变图像的其他较高位平面的像素值,通过这样的操作,在减小图像失真的同时,提高了总的信息隐藏量。 In order to improve the algorithm's embedding capacity and reduce distortion rate, a differ- ence expansion reversible watermarking algorithm is proposed by using the decomposition theory of bit plane of the image. In this algorithm, the information is only embedded at the lower level planes, and the image pixels of the other level planes are not changed, so that larger information embedding capac- ity is achieved with less distortion of the image.
出处 《合肥工业大学学报(自然科学版)》 CAS CSCD 北大核心 2012年第10期1345-1348,共4页 Journal of Hefei University of Technology:Natural Science
基金 安徽省自然科学基金资助项目(11040606M138) 合肥工业大学科学研究发展基金资助项目(2009HGXJ0036)
关键词 可逆数字水印 差值扩展 位平面 最低有效位(LSB) 信息隐藏量 reversible digital watermarking difference expansion bit plane least significant bit (LSB) information embedding capacity
  • 相关文献

参考文献8

  • 1胡敏,刘辉.基于特征点的自适应三维网格数字水印算法[J].合肥工业大学学报(自然科学版),2010,33(1):55-59. 被引量:5
  • 2王玲玲,胡社教.基于DCT系数量化的自适应数字水印算法[J].合肥工业大学学报(自然科学版),2010,33(8):1198-1201. 被引量:3
  • 3Barton J M. Method and apparatus for embedding authenti- cation information within digital data: US, 5646997 [P]. 1997-07-08.
  • 4Tian J. Reversible watermarking by difference expansion [C]//Proe Workshop on Multimediaand Security, 2002: 19-22.
  • 5Alattar A M. Reversible watermark using the difference ex- pansion of a generalized integer transform[J]. IEEE Trans- actions on Image Processing,2004,13(8):1147-1156.
  • 6Kamstra L, Henk J A, Heijmans M. Reversible data em- bedding into images using wavelet techniques and sorting [J]. IEEE Transactions on Image Processing, 2005,14(12) : 2082- 2090.
  • 7Thodi D M, Rodriguez J J. Expansion embedding tech- niques for reversible watermarking[J]. IEEE Transactions on Image Processing, 2007,16(3):721-730.
  • 8刘向丽,刘向阳,寇卫东.利用差分扩展实现可逆水印[J].光电子.激光,2008,19(8):1094-1096. 被引量:9

二级参考文献29

  • 1李红蕾,凌捷,徐少强.关于图象质量评价指标PSNR的注记[J].广东工业大学学报,2004,21(3):74-78. 被引量:35
  • 2张静,郑国勤.基于几何特征的三维网格数字水印算法[J].计算机辅助设计与图形学学报,2005,17(4):740-747. 被引量:28
  • 3李妍,张佑生,张挺.一种基于直方图的可逆数字水印算法[J].计算机技术与发展,2006,16(10):122-124. 被引量:8
  • 4李雷达,郭宝龙,孙磊.基于局部Zernike矩的RST不变水印[J].光电子.激光,2007,18(1):117-120. 被引量:11
  • 5Ohbuchi R, Masuda H, Aono M. Watermarking three-dimensional polygonal models [C]//Proceedings of ACM Multimedia 97. New York: ACM Press, 1997 : 261-- 272.
  • 6Ohbuchi R, Masuda H, Aono M. Data embedding algorithms for geometrical and non-geometrical targets in three-dimensional polygonal models [J]. Computer Communication, 1998,21 (15) : 1344-- 1354.
  • 7Ohbuchi R, Masuda H, Aono M. Watermarking three-dimensional polygonal models through geometric and topological modifications[J]. IEEE Journal on Selected Areas in Communications, 1998 , 16(4) : 551-- 560.
  • 8Benedens O. Watermarking of 3D polygon based models with robustness against mesh simplification[C]//Proceedings of SPIE: Security and Watermarking of Multimedia Contents. San Jose, California, 1999 : 329-- 340.
  • 9Praun E, Hoppe H, Finkelstein A. Robust mesh watermarking[C]//Computer Graphics Preceedings, Annual Conference Series, ACM SIGGRAP. Losangle, 1999 : 49-- 56.
  • 10Ohbuchi R, Takahashi S, Miyazawa T, et al. Watermarking 3D polygonal meshes in the mesh spectral domain[C]// Proceedings of Graphics Interface. San Francisco, 2001: 9--17.

共引文献14

同被引文献40

  • 1纪震,李慧慧,肖薇薇,张基宏.基于混沌序列的数字水印信号研究[J].电子学报,2004,32(7):1131-1134. 被引量:31
  • 2于丽荣,罗里波.中国剩余定理在非标准数论中的推广[J].数学学报(中文版),2005,48(5):1029-1034. 被引量:1
  • 3芦斌,罗向阳,刘粉林.一种基于混沌的软件水印算法框架及实现[J].软件学报,2007,18(2):351-360. 被引量:15
  • 4朱夜明,乔宗敏.Lorenz超混沌系统的全局同步控制[J].合肥工业大学学报(自然科学版),2007,30(8):1007-1009. 被引量:9
  • 5张小华 刘芳 焦李成.一种基于混沌序列的图象加密技术.中国图象图形学报,2003,8(4):374-378.
  • 6Zaidi S,Wang H X. On the analysis of software watermark- ing[C]//Houssain K, Yang L. Proceedings of the Software Technology and Engineering (ICSTE), 2010 2nd Interna- tional Conference on. Chengdu: Institute of Electrical and E- lectronics Engineers, 2010 .. 256--260.
  • 7Collberg C S, Thomborson C. Watermarking, tamper-proo- fing,and obfuscation-tools for software protection[J]. Soft- ware Engineering, IEEE Transactions on, 2002, 28 (8):735--746.
  • 8PalsbergJ, Krishnaswamy S, Kwon M, et al. Experience with software watermarking[C]//Bob W. Proceedings of the Computer Security Applications, 16th Annual Confer- ence. California: IEEE Computer Society Press, 2000111--15.
  • 9Christian C, Clark T. Software watermarking: Models and dynamic embeddings[C]//Patrick P F. Conference Record of the Annual ACM Symposium on Principles of Program- ming Languages. San Antonio: Association for Computing Machinery, 1999 : 311--324.
  • 10Yin K X,Yin K,Zhu J Q, A robust dynamic software water- marking[C]//2009 International Conference on Information Technology and Computer Science, Los Alamitos: IEEE Computer Society, 2009 : 15-- 18.

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部