期刊文献+

联合非下采样Contourlet变换与奇异值分解的多水印算法 被引量:3

Multiple watermarks algorithm based on nonsubsampled Contourlet transform and singular value decomposition
下载PDF
导出
摘要 为解决最近报道的Contourlet变换域基于奇异值分解的水印算法存在的高虚警率问题,提出一种多水印算法。对Arnold置乱后的水印图像进行奇异值分解,将其中一个正交矩阵嵌入原始图像非下采样Contourlet域的两个高频方向子带中,并利用奇异值来调整原始图像非下采样Contourlet域剩余子带的系数矩阵,通过逆变换得到含水印图像。抽取水印时首先计算从待检测图像抽出的正交矩阵和真实水印正交矩阵的相似度,与阈值进行比较,以决定抽取过程是否进行。由于非下采样Contourlet变换的高冗余性,最终可抽取出多个水印图像。实验表明,算法较好地克服了高虚警率问题。一系列的攻击实验证明算法具有较好的鲁棒性。 In order to solve the high false alarm rate flaw in Contourlet transform domain based on singular value decomposition watermarking algorithms reported recently, this paper proposed a multiple watermarks algorithm. Arnold scrambled watermark image was decomposed with singular value decomposition, then an orthogo-nal matrix was embedded into the two high frequency directional subbands of original image in the nonsubsampled Contourlet domain. By using the singular values to adjust the rest nonsubsampled Contourlet transform coefficient matrices of the original image, the inverse transformation was done to obtain the watermarked image. Similarity of the extracted orthogonal matrix from the image to be inspected and the real or- thogonal matrix was calculated and compared to a given threshold, to decide whether the process of extracting should proceed or not. Multiple watermark images were finally extracted due to the high redundancy of the nonsubsampled Contourlet trans- form. Experiments show that, the algorithm can solve the problem of high false alarm rate flaw. A series of experiments prove that the proposed algorithm is robustness to commom attacks.
作者 刘大瑾
出处 《计算机应用研究》 CSCD 北大核心 2013年第12期3850-3853,共4页 Application Research of Computers
基金 南京理工大学教科研课题项目
关键词 非下采样CONTOURLET变换 奇异值分解 高虚警率 多水印 nonsubsampled Contourlet transform singular value decomposition high false alarm rate multiple watermarks
  • 相关文献

参考文献21

二级参考文献134

共引文献332

同被引文献42

  • 1张静,张春田.二值图像数字水印技术综述[J].计算机工程,2005,31(3):1-3. 被引量:9
  • 2杨建龙,王建民,李德毅.软件水印技术及其新进展[J].计算机工程,2007,33(17):168-170. 被引量:14
  • 3Zhang Xinpeng. Reversible data hiding in encrypted images[J] . IEEE Signal Processing Letters, 2011, 18(4):255-258.
  • 4Hong Wien, Chen T S, Wu Hanyan. An improved reversible data hiding in encrypted images using side match[J] . IEEE Signal Processing Letters, 2012, 19(4):199-202.
  • 5Zhang Xinpeng. Separable reversible data hiding in encrypted image[J] . IEEE Trans on Information Forensics and Security, 2012, 7(2):826-832.
  • 6Ma Kede, Zhang Weiming, Zhao Xianfeng, et al. Reversible data hiding in encrypted images by reserving room before encryption[J] . IEEE Trans on Information Forensics and Security, 2013, 8(3):553-562.
  • 7Zhang Weiming, Ma Kede, Yu Nenghai. Reversibility improved data hiding in encrypted images[J] . Signal Processing, 2014, 94(1):118-127.
  • 8Image database[EB/OL] . (2014). http://sipi. usc. edu/database/.
  • 9Xiao Di, Liao Xiaofeng, Wei Pengcheng. Analysis and improvement of a chaos based image encryption algorithm[J] . Chaos Solitons Fractals, 2009, 40(5):2191-2199.
  • 10Do M N ,Vetterli M. Contourlets : A Directional Multire- solution Image Representation ~ C l//Proceedings of IEEE International Conference on Image Processions. Washington D. C., USA : IEEE Press, 2002 : 357-360.

引证文献3

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部