期刊文献+

基于Turbo码的图像数字水印技术 被引量:5

An Application of Turbo Code in Image Watermarking
下载PDF
导出
摘要 在详细分析数字水印系统等效信道的基础上,提出了一种基于Turbo码的图像数字水印算法.该算法利用Turbo码的纠错性能和人眼视觉特性,以实现静止图像中数字水印的嵌入和提取;在水印嵌入之前,对水印序列进行Turbo码编码,然后利用人眼视觉特性进行水印嵌入,并采用了Turbo迭代译码算法进行水印提取,最后进行了数值仿真和算法比较.实验结果表明,该算法降低了水印在传输过程中的误码率,提高了水印的抗攻击能力,同时较好地解决了水印的鲁棒性和不可见性之间的矛盾. Based on the analysis of the equivalent channel in the digital watermarking system,a watermarking algorithm for digital image on the basis of Turbo code is proposed in this paper.The algorithm embeds and retrieves the watermark signature into and out of the static image by employing the Turbo code technology and the human visual characteristics.The watermark was first Turbo coded and embedded into the host image,then retrieved from the watermarked image using Turbo iterative methods.The results demonstrate that the proposed algorithm has geratly decreased the error code rate of the retrieved watermark and improved the attack-defending ability.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2003年第5期633-636,共4页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金资助项目(60072041)
  • 相关文献

参考文献9

  • 1Bender W,Gruhl D,Morimoto N. Techniques for Data Hiding [A]. Wayne Niblack, Ramesh C Jain, eds.Storage and Retrieval for Image and Video Databases Ⅲ[C]. New York: SPIE Press, 1995,2420:164-173.
  • 2Chiou H, Ja W. Hidden Digital Watermarks in Images[J]. Image Processing, 1999,8(1) : 58-68.
  • 3Petiteolas F A P, Anderson R J. Weakness of Copyright Masking Systems [EB/OL]. http://www. cl.cam. ac. uk/- fapp2/publications/acm98-weaknesses.doc, 1998-09-10.
  • 4Petiteolas F A P,Anderson R J, Kuhn M G. Information Hiding-A Survey [J]. Proceedings of the IEEE,1999 ,87(7) : 1062-1078.
  • 5Watson A B. Visually Optimal DCT Quantization Matrices for Individual Images [ EB/OL]. http://intl.ieeexplore. ieee. org , 1999-03-30.
  • 6Voloshynovskiy S, Pereira S, Iquise V, et al. Attack Modelling: Towards a Second Generation Watermarking Benchmark [J]. Signal Processing, 2001,81(6):1177-1214.
  • 7Cox I, Kilinan J, Leighton Tom,et al. Secure Spread Spectrum Watermarking for Multimedia [R]. Princeton:NEC Research Institute, 1995-10-25.
  • 8Xia Shuang-kui, Ru Guo-bao, Sun Hong. Digital Watermarking Technique of image Based on Visual Masking [J]. J Wuhan Univ(Nat Sci Ed), 2002,48(5):640-644(Ch).
  • 9Xian Dong-liang. Research on Turbo Code[D]. Wuhan:School of Electronic Information, Wuhan University,2002,12 (Ch).

同被引文献20

  • 1陈心浩,陈军波,陈亚光.基于Turbo码的信息隐藏技术[J].计算机工程与应用,2004,40(15):62-64. 被引量:5
  • 2刘锋,钱永涛.基于DCT的盲数字水印技术研究[J].信息安全与通信保密,2005,27(8):85-87. 被引量:3
  • 3Chiou H, Ja W. Hidden Digital Watermarks in Images[J]. Image Processing, 1999,8 ( 1 ) : 58 - 68.
  • 4C·Berrou, A·Glavirux,P·Thitimajshima. Near Shannon Limit Error- correcting Coding and Decoding: Turbo - Codes(1 ) [C]. Proc ICC'93, 1993: 1064-1070.
  • 5Chris Shoemaker. Hidden Bits:A Survey of Techniques for Digital Watermarking[J]. EER- 290 spring,2002.
  • 6Shoemaker C. Hidden Bits: A Survey of Techniques for Digital Watermarking[EB/OL]. (2002-04-25). http://www.vu.union.edu/ -shoemakc/watermarking/.
  • 7Berrou C, Glavirux A, Thitimajshima E Near Shannon Limit Error-correcting Coding and Decoding: Turbo-codes(1)[C]//Proe. of the Int'l Conf. on Communications. Geneva, Switzerland: [s. n.], 1993: 1064-1070.
  • 8Berrou C, Glavieux A, Thitimajshima P. Near Shannon Limit Error-Correcting Coding and Decoding :Turbo-Codes[C]. USA:Institute of and Electronis Engieers 1993:1064-1070.
  • 9Benedetto S, Montorsi G. Parallel Concatenated Trellis Coed Modulation[J]. In Proc IEEE Int, 1997,15(05):280-285.
  • 10Berrou C,Glavirux A,Thitimajshima P.Near shannon limit errorcorrecting coding and decoding:Turbo-codes( 1 )[C]//IEEE Proceedings of the Int Conf on Communications,Geneva,Switzerland,May 1993 : 1064-1070.

引证文献5

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部