期刊文献+

基于喷泉码的数字图像水印的研究 被引量:1

Study of Digital Image Watermarking Based on Fountain Code
下载PDF
导出
摘要 为了提高数字图像水印信息传输过程中的鲁棒性,这里提出一种基于喷泉码的数字水印算法,该方案利用喷泉码在删除信道中的优异性能,将信道编码与扩频水印结合后在图像中嵌入水印信息.然后对这种方案在水印系统中的鲁棒性进行了一系列仿真测试,并和未编码方案及水印系统中常用到的LDPC编码方案作了比较.仿真证明,应用该方案可以提高数字水印系统的鲁棒性,降低水印信息在传输过程中的误码率,而且水印编码复杂度要远远低于LDPC方案. This paper presents a new algorithm based on fountain code to improve robustness of the watermark in digital image watermarking system. Employing the outstanding performance of LT codes in erasure channel, the proposed scheme combines channel coding with spread spectrum watermarking to recover watermark. In the end, this paper makes a series of tests with fountain coding scheme and LDPC coding scheme and non cod- ing scheme, the result shows the scheme proposed in this paper can raise robustness of the digital watermark- ing system, lower the bit error rate (BER) between watermark and recovered watermark effectively. In addi- tion, fountain coding scheme has lower complexity compared with LDPC coding scheme.
出处 《郑州大学学报(工学版)》 CAS 北大核心 2014年第6期52-55,共4页 Journal of Zhengzhou University(Engineering Science)
基金 国家自然科学基金委员会-中国民用航空总局联合研究基金项目(U1204607)
关键词 数字水印 喷泉码 鲁棒性 digital image watermark fountain code robustness
  • 相关文献

参考文献9

  • 1尹浩,林闯,邱锋,丁嵘.数字水印技术综述[J].计算机研究与发展,2005,42(7):1093-1099. 被引量:135
  • 2CHEN Yong-cong, CHANG Long-wen. A secure and robust digital watermarking technique by the block ci- pher RC6 and secure hash algorithm [ C ]//Proceedings of 2001 IEEE, International conference on Image Pro- cessing. Thessaloniki, Greece: IEEE Rress, 2001: 518 -521.
  • 3许文丽,李磊,王育民.抗噪声、几何失真和JPEG压缩攻击的鲁棒数字水印方案[J].电子与信息学报,2008,30(4):933-936. 被引量:15
  • 4霍智勇,朱秀昌.基于LDPC码的数字图像水印技术研究[J].中国图象图形学报,2007,12(11):2018-2025. 被引量:6
  • 5MICHAEL L. LT Codes[C]// 43rd Annual IEEE Symposium on Computer Science. Vancouver B Press, 2002:271 - 280. Proceedings of the the Foundations of C, Canada: IEEE.
  • 6慕建君,焦晓鹏,曹训志.数字喷泉码及其应用的研究进展与展望[J].电子学报,2009,37(7):1571-1577. 被引量:42
  • 7MORA-JIMENEZ I, NAVIA-VAZQUEZ A. A new spread spectrum watermarking method with self-synchro- nization capabilities [ C ]//Proceedings of 2000 IEEE, International Conference on Image Processing. Vancou- ver BC, Canada: IEEE Press, 2000:415 - 418.
  • 8DAVID J C M. Fountain codes[J]. IEEE Communica- tions Proceedings, 2005,152 ( 6 ) : 1062 - 1068.
  • 9SHOKROLLAHI A. Raptor codes[ J]. IEEE Transac- tions on Information Theory, 2006, 52(6) : 2551 -2567.

二级参考文献50

  • 1谷利民,方艳梅,黄继武.基于叠加嵌入的码分多址数字水印信道性能分析[J].计算机学报,2005,28(2):268-273. 被引量:7
  • 2朱岩,孙中伟,杨永田,冯登国.扩频CDMA水印性能分析及其多小波域内的应用研究[J].计算机学报,2005,28(8):1376-1385. 被引量:12
  • 3方艳梅,谷利民,黄继武.利用边信息嵌入的CDMA水印信道性能研究[J].电子学报,2006,34(1):45-50. 被引量:13
  • 4P Elias.Coding for two noisy channels[A].Proc.Third London Symp.Information Theory[C].London,U.K.:Buttersworth's Scientific Publications,1955.61-76.
  • 5J Blomer,M Mitzenmacher,A Shokrollahi.An xor-based erasure-resilient coding scheme[DB/OL].ftp://ftp.icsi.berkeley.edu/pub/techreports/1995/tr-95-048.pdf,ICSI Technical Report,No.TR-95048,1995.
  • 6L Rizzo.Effective erasure codes for reliable computer communication protocols[J].ACM Computer Communication Review,1997,27(2):24-36.
  • 7L Rizzo.On the feasibility of software FEC[DB/OL].DETT Technical Report LR-970131,http://www.iet.unipi.it/ -luigi/softfec.ps,1997.
  • 8F J MacWilliams,N J A Sloane.The Theory of Error-Correcting Codes[M].North Holland:Amsterdam,1977.
  • 9S Reed,G Solomon.Polynomial codes over certain finite fields[J].Journal of the Society for Industrial and Applied Mathematics,1960,8:300-304.
  • 10M Luby,M Mitzenmacher,M Shokrollahi,Daniel Spielman.Practical loss-resilient codes[A].Proceedings of the TwentyNinth Annual ACM Symposium on Theory of Computing[C].El Paso:Texas,USA,1997.150-159.

共引文献194

同被引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部