期刊文献+

基于分数阶傅里叶变换和扩展变换抖动调制的鲁棒数字水印算法 被引量:5

Robust Watermarking Algorithm Based on Fractional Fourier Transform and Spread Transform Dither Modulation
下载PDF
导出
摘要 针对现有分数阶傅里叶变换水印算法在透明性和鲁棒性等方面的不足,提出了一种基于分数阶傅里叶变换和扩展变换抖动调制的鲁棒数字水印算法。首先对载体图像进行提升小波分解,将低频子带均匀分割,并对各子块进行分数阶傅里叶变换。然后,从频率角度构造载体向量,选择幅值系数的中低频系数构成每个子块的载体向量。在水印嵌入时,先对载体向量进行投影变换,再根据水印信息对投影后所得数据进行抖动调制。水印的提取过程采用了最小距离检测,实现了水印的盲检测。实验结果表明,该算法不仅具有很好的透明性,而且对JPEG压缩、滤波、噪声、剪切等常见的图像攻击具有良好的鲁棒性。此外,所提算法水印的安全性和实用性也优于常见算法。 Aiming at the existent algorithms' defects in transparency and robustness,a new robust image watermarking algorithm based on fractional Fourier transform and spread transform dither modulation was presented in this paper.First,lifting wavelet transform is performed on the original image.The lowpass subband is segmented into non-overlapping blocks,and each block is transformed by the fractional Fourier transform.Then,the low-frequency coefficients of the amplitude information are chosen to construct the host vectors depending on frequency.In the process of embedding watermark,spread transform is performed on the host vectors to obtain the projected host vectors,and then the binary watermark is embedded using dither modulation.A minimum distance decoder is used to decode the watermark.The experimental results show that the proposed algorithm can obtain better transparency as well as robustness against common image attacks such as JPEG compression,filtering,noisy,cropping and so on.Compared with previous similar schemes,the presented method achieves higher practicality and reliability.
出处 《计算机科学》 CSCD 北大核心 2016年第11期200-204,共5页 Computer Science
基金 江苏省自然科学基金项目(BK20141195)资助
关键词 数字水印 分数阶傅里叶变换 扩展变换抖动调制 鲁棒性 Digital watermarking Fractional Fourier transform Spread transform dither modulation Robustness
  • 相关文献

参考文献5

二级参考文献42

  • 1王宏霞,何晨,丁科.基于混沌映射的鲁棒性公开水印[J].软件学报,2004,15(8):1245-1251. 被引量:50
  • 2唐国坪,廖晓峰.基于混沌映射的抗剪切鲁棒水印算法[J].计算机工程,2005,31(9):34-36. 被引量:19
  • 3Cox I J,Miller M L,Bloom J A.Digital Watermarking[M].San Francisco:Mordan Kaufmann Publishers,2002:5~6.
  • 4Cox I J,Kilian J,Leighton T.Secure spread spectrum watermarking for multimedia[J].Proceedings of IEEE International Conference on Image Processing,1997,6(12):1673~1687.
  • 5Hartung F,Su J K,Girod B.Spread spectrnm watermarking:malicious attacks and counter-attacks[A].In:Proceedings of SPIE,Security and Watermarking of Multimedia Contents[C],San Jose,CA,USA,1999:147~158.
  • 6Chen B,Wornell G W.Quantization index modulation:a class of provably good methods for digital watermarking and information embedding[J].IEEE Transactions on Information Theory,2001,4(47):1423~1443.
  • 7Chen B,Wornell G W.Quantization index modulation methods for digital watermarking and information embedding of multimedia[J].Journal of VLSI Signal Processing Systems,2001,27(1):7~33.
  • 8Sullivan K,Bi Z,Madhow U.Steganalysis of quantization index modulation data hiding[A].In:IEEE International Conference on Image Processing[C],Singapore,2004:1165~1168.
  • 9Fernando P G,Balado F,Juan R H.Performance analysis of existing and new methods for data hiding with known-host information in additive channels[J].IEEE Transactions on Signal Processing,2003,51(4):960~980.
  • 10Eggers J J,Bauml R,Tzschoppe R.Scala costa scheme for information embedding[J].IEEE Transactions on Signal Processing,2003,51(4):1003~1019.

共引文献162

同被引文献38

引证文献5

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部