期刊文献+

基于多小波变换和分块SVD的彩色图像水印算法 被引量:11

A Color Image Watermarking Algorithm Based on Multi-Wavelet Transform and Block-SVD
在线阅读 下载PDF
导出
摘要 提出了一种基于多小波变换和分块SVD的非盲水印算法。选择彩色图像的饱和度分量作为水印的嵌入域,水印为有意义的灰度图像,水印经Arnold置乱后被嵌入到饱和度分量多小波变换的不同中频区域中。实验证明,该算法不仅对噪声、JPEG压缩、剪切及Photoshop处理具有很好的鲁棒性,而且能抵抗旋转、放缩和平移等几何攻击。 A non-blind watermarking algorithm is proposed based on multi-wavelet transform and block singular value decomposition.Choosing the saturation component of a color image as the watermark embedding domain,the watermark is a meaningful grayscale image.After Arnold scrambling,watermark is embedded into the different mid-frequency regions of the saturation component which through multi-wavelet transform.The examples demonstrate that the algorithm not only has good robustness to the noise,JPEG compression,shear ...
出处 《工程图学学报》 CSCD 北大核心 2010年第2期128-133,共6页 Journal of Engineering Graphics
基金 中国民航大学科研基金资助项目(07kym12) 中国民航大学科研基金资助项目(09cauc_e10)
关键词 计算机应用 图像水印 多小波变换 分块奇异值分解 computer application image watermarking multi-wavelet transform block singular value decomposition
  • 相关文献

参考文献3

二级参考文献27

  • 1张冠男,王树勋,温泉.一种嵌入可读水印的自适应盲水印算法[J].电子学报,2005,33(2):308-312. 被引量:28
  • 2Petitcolas F A P, Anderson R J, Kuhn M G. Attacks on copyright marking systems [A]. In: Proceedings of Workshop Information Hiding[C]. Portland, OR, USA, 1998: 218-238.
  • 3Herley C. Why watermarking is nonsense [J]. IEEE Signal Processing Magazine, 2002, 19(5) : 10-11.
  • 4Braudaway G W, Minter F. Automatic recovery of invisible image watermarks from geometrically distorted image[A]. In:Proceedings of SPIE Security and Watermarking of Multimedia Contents Ⅱ [C]. San Jose, CA, USA, 2000:74-81.
  • 5Ruanaidh J J. K. O. , Pun T. Rotation, scale and translation invariant spread spectrum digital image watermarking[J]. Signal Processing, 1998, 66(3): 303-317.
  • 6Andrews H, Patterson C. Singular value decomposition(SVD)image coding[J]. IEEE Transactions on Communications, 1976,24(4) : 425-432.
  • 7Liu R, Tan T. An SVD-based watermarking scheme for protecting rightful ownership [J]. IEEE Transactions on Multimedia, 2002,4(1) : 121-128.
  • 8Leon S J. Linear Algebra with Applications [M]. New York:Macmillan, 1986: 343-356.
  • 9Horn R A, Johnson C R. Matrix Analysis [M]. Cambridge:Cambridge University, 1985 : 431-432.
  • 10Miller M L, Bloom J A. Computing the probability of false watermark detection [A]. In: Proceedings of 3rd International Workshop Information Hiding [C], Dresden, Germany, 1999:146-158.

共引文献109

同被引文献103

引证文献11

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部