期刊文献+

几种图像数据隐藏方法的比较研究 被引量:4

Comparative Study of Some Image Data Hiding Methods
下载PDF
导出
摘要 近年来,图像数据隐藏技术得到了突飞猛进的发展,得到了很多鼓舞人心的成果。在图像隐藏技术中,使用最多的图像嵌入规则有三种:加法嵌入规则、乘法嵌入规则以及基于融合技术的图像嵌入规则。本文对这三种图像嵌入规则的性能进行了分析和研究,通过比较我们发现,如果将图像隐藏过程看作是一个水印信道模型,则基于融合技术的图像嵌入规则所能隐藏的信息量远远高于另两种嵌入规则,而乘法嵌入规则其水印信道容量不受原始图像DCT系数标准差变化的影响,因此,在原始图像DCT系数标准差不稳定的情况下,采用乘法嵌入规则是一个好的选择。 Though image data hiding (Digital watermarking) as a tool for copyright protection is quite recent, a great deal of research has been carried out mainly addressing the development of robust, yet unperceivable, watermarking strategies. As it is now becoming evident, however, other important issues have to be analyzed in order to make watermark-based copyright protection feasible. Among them, the analysis and comparison of the performance of additive embedding method, multiplicative embedding method and fusion embedding method plays a mayor role. In this paper, the watermarking is assumed to consist in the modification of a set of full-frame DCT coefficients. The watermark channel is modeled by letting the watermark be the signal and the original image DCT coefficients the noise introduced by the channel. To derive the capacity of each coefficient, the channel transition matrix is computed. An evaluation of the number of bits that can be hidden within an digital image by means of frequency domain watermarking, using three embedding methods respectively, is given. These computative results are derived by using three embedding methods, respectively. Experimental results show that the performance of fusion embedding method is the best.
作者 金聪 彭嘉雄
出处 《信号处理》 CSCD 2004年第2期127-132,共6页 Journal of Signal Processing
基金 国家自然科学基金项目资助(F60085002) 中国科学院信息安全国家重点实验室开放课题基金(No.03-02) 湖北省教育厅重点基金项目资助(2003A012)
关键词 图像隐藏 嵌入规则 版权保护 信道容量 信息隐藏 image hiding embedding method copyright protection channel capacity
  • 相关文献

参考文献15

  • 1Cox.I.J,Killian.J,Thomson.F and Shamoon.T.Secure spread spectrum watermarking for multimedia.IEEE Transaction on Image Processing.6:1673—1687,1997.
  • 2Rosa. A. de, Barni. M, Bartolini. F, et al. Optimum decoding of non-additive full frame DFT watermarks, in Proceedings of the Third International Information Hiding Workshop, 167-179, Dresden, 1999.
  • 3Hernandez. J. R, and Perez-Gonzalez. F. Statistical analysis of watermarking schemes for copyright protection of images. Proceedings of the IEEE, 87:1142-1166, 1999.
  • 4Podilchuk. C. I, Wenjun Z. Digital image watermarking using visual models. In: SIEP Proceedings on Human Vision and Electronic Imaging, 3016: 100-111, 1997.
  • 5Swanson M.D, Tewfik A. H. Multimedia data-embedding and watermarking technologies. Proceedings of the IEEE,86(6) : 1064-1087, 1998.
  • 6Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik,Transparent robust image watermarking, Proc. of the 1996 IEEE Int. Conf. on Image Processing, Vol. Ⅲ,211-214, 1996.
  • 7Bami M., Bartolini.F., De Rosa A., and Piva A., Capacity of the watermark channel: How many bits can be hiddenwithin a digital image?, Proc. SPIE, vol. 3657, 437-448,1999.
  • 8Gallager R.G. Information Theory and Reliable Communication. Wiley, New York, 1968.
  • 9Chen B., Womell G.W. An information-theoretic approach to the design of robust digital watermarking systems. Proc. Int. Conf. on Acoustics, Speed and Signal Processing (ICASSP), Phoenix, AZ, March 1999.
  • 10Moulin P. The role of information theory in watermarking and its application to image watermarking. Signal Processing, 81(6): 1121-1139, June 2001.

共引文献4

同被引文献30

  • 1张大奇,张永红,康宝生.基于RB曲线融合的数字图像隐藏技术[J].中国图象图形学报,2006,11(2):235-243. 被引量:16
  • 2张永红,康宝生,张雪锋.基于混沌序列的迭代混合数字图像隐藏技术[J].计算机工程与设计,2007,28(4):879-881. 被引量:11
  • 3Matthews R A J.On the derivation of a chaotic encryption algorithm[J].Cryptologia, 1989,4 : 29-42.
  • 4Habutsu T,Nishio Y,Sasase l,et al.A secret eryptosystem by iterating a chaotic map[C]//Advances in Cryptology EURCRYPT'91. Berlin : Springer-Verlag, 1991 : 127-140.
  • 5Bianco M E,Mayhew G L.High speed encryption system and method[J].US patent. 1994,5 ( 15 ) : 365-588.
  • 6Zhang Han,Wang Xiu Feng,et al.A new image encryption algorithm based on chaos system[C]//International Conferenee on Robotics, Intelligent Systems and Signal Processing,Changsha,China,2003:778-782.
  • 7Parker A T,Short K M.Reconstructing the keystream from a chaotic encryption scheme[J].IEEE Transactions on Circuits and systems-I Fundamental Theory and Applications, 2001,48( 15 ) : 104-112.
  • 8Zhang Yonghong,Kang Baosheng,Zhang Xuefeng.lmage encryption algorithm based on Chaotic sequence[C]//rhe 16th International Conference on Artificial Reality and Telexistence, 2006: 221-223.
  • 9Zhang Yonghong.lmage encryption algorithm based on Chaotic sequence[C]//ICIF2007,2007-08.
  • 10Zhou Jiancheng,Tang Xuhui,Li Guofu.Mapping transforms and periodicity of digital watermarking[J].Transaction of North Industry University,2000, 12( 13): 13-16.

引证文献4

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部