期刊文献+

结合边缘增强的零水印

Zero-watermarking algorithm using edge enhancing
下载PDF
导出
摘要 鲁棒性和不可见性是水印的两个重要特性。为实现该目的,利用奇异值的稳定性和图像梯度提出了一种新的零水印算法。该算法先对图像做分块奇异值分解,提取每块的最大奇异值构成原图像的缩略图;然后计算缩略图的梯度模值并二值化,得到边缘增强的二值图像,即图像的特征信息。最后将处理过的水印信息与图像特征信息做异或运算,其结果将作为提取水印的密钥。实验证明,本算法对滤波、锐化、直方图均衡、压缩、剪切等图像处理操作具有很强的鲁棒性。 Robustness and invisibility are two important characteristics of watermarking. To meet these requirements, a new zero-watermarking algorithm based on Singular Value Decompositon (SVD) and gradient was proposed in this paper. Firstly, do block-SVD transform on the host image. Then select the largest singular value of each block. After that a small scale image which is similar to the host image will be obtained. Secondly calculate the small scale image' s gradient modulus, and divide these data into two parts using the following rules: if the value is greater than the mean, the result is 1 ; or is 0. The consequence is the image' s characteristic information. Finally do XOR operation on the characteristic data and the watermark data. When detecting the watermark, the result of XOR operation will be used as the key. The experimental results show that this approach has good performance to the filtering, sharpening, histogram equalization, JPEG compression and crop.
机构地区 红河学院工学院
出处 《计算机应用》 CSCD 北大核心 2012年第A02期180-181,185,共3页 journal of Computer Applications
关键词 奇异值分解 梯度 零水印 边缘增强 Singular Value Decomposition (SVD) gradient zero-watermarking edge enhancing
  • 相关文献

参考文献5

二级参考文献26

  • 1黄良永,肖德贵.二值图像Arnold变换的最佳置乱度[J].计算机应用,2009,29(2):474-476. 被引量:23
  • 2马桂珍,房宗良,姚宗中.SUSAN边缘检测算法性能分析与比较[J].现代电子技术,2007,30(8):189-191. 被引量:32
  • 3韩琳,杨明.基于小波变换的纹理特征提取分析[J].电脑知识与技术,2007(6):1395-1395. 被引量:8
  • 4叶登攀.基于二值化图像构造的零水印版权保护方案[J].计算机应用研究,2007,24(8):239-241. 被引量:11
  • 5SWANSON M D, ZU B, TEWF IKA H. Robust data hiding for images [ J]. Proc IEEE 7th Digital Signal Processing Workshop ( DSP 96), 1996(9) : 37 -40.
  • 6QI DONGXU, ZOU JIA CHUN, HAN XIAOYOU. A New Class of Scrambling Transformation and It's Application in The Image Information Covering [ J ]. Science in china Series, 2000,43 ( 3 ) : 304 -312.
  • 7Smith S M, Brady J M. SUSAN--A new approach to low level image processing [J].International Journal of Computer Vi- sion, 1997,23 ( 1 ) :45 - 78.
  • 8Hans G E.Windows Emulation.http://www. linux-magazine.com/issue/03/WindowsEmulation.pdf
  • 9Kunder D , Hatzinakos D . Towards a telltale watermarking technique for tamper proffing [ A]. Proceedings of the IEEE International Conference on Image Processing [ C]. Chicago, Illiois, 1998. 409 -418.
  • 10Yu G J, Hy M L, Lu C S. Mean quantization - based fragile water - marking for image authentication[ J]. Op tlcal Engineering, 2001, 40 (7): 1396 -1408.

共引文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部