期刊文献+

基于DCT变换的自适应图像水印实现 被引量:4

Adaptive image watermark realization based on DCT transform
下载PDF
导出
摘要 提出了一种基于DCT变换的自适应水印嵌入和检测方法。这种方法可以根据分块图像矩阵的特征,利用DCT变换的特点和自适应算法,在不同的分块区域中嵌入不同强度的水印,在图像的每个分块区域内都能实现水印强度和透明性的自适应调节。在检测水印时,还采用了一种有四级优先级的图像恢复方法,可以更好地恢复水印图像。利用这种方法成功地进行了水印的嵌入与检测,并对水印图像进行了量化攻击、JPEG压缩攻击、高斯噪声攻击和裁剪攻击检验。实验表明,这种方法可以在保证透明性的条件下,具备很好的鲁棒性,有较好的实用价值。 A watermark embedding and detecting adaptive measure based on discrete cosine transform (DCT) was introduced. Different intense watermarks were imbedded to different ranges on adaptive algorithm based on the character of segmental image matrix and the property of DCT. Adaptive regulation of intensity and transparence was realized in every segmental area. An image restoration method with four priority levels was introduced for better detecting effect. Imbedding and detecting experiments of watermark were successfully realized with this method. Quantization attack, JPEG compression attack, gaussian noise attack, cutting attack were respectively added to the experiment. The experiments showed that the method could ensure both the quality of watermark transparence and a nice robustness. Therefore, it enjoys a good practicability.
出处 《光学仪器》 2013年第3期51-57,62,共8页 Optical Instruments
基金 黑龙江省自然基金资助项目(F201211)
关键词 DCT变换 自适应 图像水印 DCT adaptive image watermark
  • 相关文献

参考文献5

二级参考文献23

共引文献19

同被引文献29

  • 1UNGERBOECK G. Trellics-coded modulation with redundant signal sets-Part Ⅱ: State of the art [J]. IEEE Communication Magazine, 1987,25 (2): 12-21.
  • 2TAUBMAN D S, MARCELLIN M W. JPEG2000-Image Compression Fundamentals, Standards and Practice [M]. Boston: Kluwer Academic Publishers, 2002.
  • 3Fridrich J, Goljan M. Images with self-correcting capabilities[C]//Proceedings of IEEE International Conference on Image Processing, 1999:792-796.
  • 4Qian Z X, Feng G R. Inpainting assisted self-recovery with decreased embedding data[J]. IEEE Signal Processing Letters, 2010, 17(11):929-932.
  • 5Suthaharan S. Fragile image watermarking using a gradient image for improved localization and security[J]. Pattern Recognition Letters, 2004, 25(16):1893-1903.
  • 6Walton S. Image authentication for a slippery new age[J]. Dr Dobb's Journal, 1995, 20(4):18-26.
  • 7Chang C C, Hu Y S, Lu T C. A watermarking-based image ownership and tampering authentication scheme[J]. Pattern Recognition Letters, 2006, 27(5):439-446.
  • 8He H J, Chen F, H. Tai M, Kalker T, Zhang J S. Performance analysis of a blockneighborhood-based self-recovery fragile watermarking scheme[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1):185-196.
  • 9Qin C, Chang C C, Chen K N. Adaptive self-recovery for tampered images based on VQ indexing and inpainting[J]. Signal Processing, 2013, 93(4):933-946.
  • 10Qin C, Chang C C, Chen P Y. Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism[J]. Signal Processing, 2012, 92(4):1137-1150.

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部