期刊文献+

基于DCT的大容量二值水印嵌入新算法

A novel high capacity binary watermarking algorithm based on DCT
下载PDF
导出
摘要 传统的基于DCT变换的二值水印嵌入算法通常是在分块系数矩阵中选择一对中频系数实现1bit水印信息的嵌入,水印嵌入容量有限,为提高载体图像的安全性,提出了一种新的基于DCT的大容量二值水印嵌入算法。本算法首先对二值水印图像进行Arnold置乱加密处理,其次对所选取的载体图像进行分块DCT变换,然后选择4个中频系数进行排序,充分利用两两之间的3个差值关系实现水印的嵌入。若待嵌入水印位为0,通过改变系数值使得差值大于或等于阈值A,若待嵌入水印位为1,通过改变系数值使得差值等于阈值B,最终使得每块选择4个系数值实现了3bit二值水印信息的嵌入,水印嵌入容量大大优于传统方法。仿真实验表明,本算法实现了大容量水印的嵌入与提取且抵抗图像裁剪、图像加噪、JPEG压缩等攻击效果较好。 For embedding in the cover image are mostly binary watermarking algorithms based on DCT,the capacity of traditional methods which select one pair of middle capacity frequency coefficients to embed one bit watermark is limited.In order to increase the safety of cover images,this paper proposes a novel high capacity binary image watermarking algorithm based on DCT.Firstly,the binary watermark is preprocessed to enhance the security by Arnold scrambling.Secondly,the paper appliesblock DCT to the selected cover image,then adopts four middle frequency coefficients to reorder and makes full use of differences among the above coefficients to embed watermarks.If the watermark bit to be embedded is 0,so that by changing the coefficient value to make differences are greater than or equal to the threshold value A,and if the watermark bit to be embedded is 1,so that by changing the coefficient value to make differences are equal to the threshold value B.Finally,three binary watermark bits are embedded in each block by changing four middle frequency coefficients,and watermark embedding capacity is much better than traditional methods.The simulation experiments show that the method achieve embedding and extraction of the large capacity watermark and has strong robustness to cutting,image adding noise,JPEG compression,and other attacks.
作者 窦永梅
出处 《电子设计工程》 2014年第9期97-100,共4页 Electronic Design Engineering
基金 运城学院院级科研项目资助(YQ-2011070)
关键词 二值水印图像 离散余弦变换(DCT) ARNOLD置乱 大容量 盲提取 binary watermark image Discrete Cosine Transform(DCT) Arnold scrambling high capacity blind extraction
  • 相关文献

参考文献5

二级参考文献50

  • 1Cox I J, Matthew L M, Jeffrey A B, et al. Digital Watermarking and Steganography [ M], Second Edition, Burlington, MA, USA: Morgan Kaufmann Publishers (Elsevier), 2007.
  • 2Zheng Dong, Liu Yan, Zhao Ji-ying, Abdulmotaleb E1 saddlk. A survey of RST invariant image watermarking algorithms [ J ]. ACM Computing Surveys, 2007, 39(2): 1-91.
  • 3Kim H S, Lee H K. Invariant image watermark using zernike IEEE Transactions on Circuits and Systems for Video Technology, 2003,13 ( 8 ) : 766-775.
  • 4Cben Q, Yang X L, Zhao J Y. Robust image watermarking with zernike moments [ C ]//Proceedings of Canadian Conference on Electrical and Computer Engineering (CCECE). Saskatoon, Saskatchewan, Canada: IEEE Press, 2005:1340-1343.
  • 5Xin Y, Liao S, Pawlak M. Geometrically robust image watermarking via pseudo-Zernike moments [ C ]//Proceedings of IEEE Canadian Conference on Electrical and Computer Engineering. Ontario, Canada: [s.n. ], 2004, 2(2): 939-942.
  • 6Xin Yong-qing, Liao Simon, Pawlak M. Circularly orthogonal moments for geometrically robust image watermarking [ J]. Pattern Recognition, 2007,40( 12 ) : 3740-3752.
  • 7Cohen L. Wavelet moments and time-frequency analysis [ C ]// Proceedings of SPIE, Advanced Signal Processing Algorithms, Architectures, and Implementations IX Denver, Colo USA: [ s. n. ]1999, 3807: 434-445.
  • 8Son Y H , You B J, Oh S R, et al. Affine-invariant image normalization for Log-Polar Images using momentums [ C ]// Proceedings of the 2002 International Conference on Control, Automation, and Systems. Gyeongju, Korea: [ s. n. ]2003:1140- 1145.
  • 9Cox I J. Secure Spread Spectrum Watermarking for Multimedia [J]. IEEE Transactions on Image Processing, 1997,6 (12) : 1673-1687.
  • 10Voloshynovskiy S, Pun T, Fridrich J, Memon N. Security of data hiding technologies [ J]. Signal Processing, 2003, 83 (10) :2065 -2067.

共引文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部