期刊文献+

基于DCT变换和m序列的二值水印嵌入算法 被引量:2

A Binary Watermark Embedding Algorithm Based on m-sequence and DCT
在线阅读 下载PDF
导出
摘要 针对因特网上数字图像的版权保护、认证和完整性等问题,基于DCT变换和m序列,提出了一种二值水印嵌入算法,实现了二值图像的嵌入和提取.实验表明,该算法当JPEG压缩比达到12时还能很好的恢复出水印,而且对剪切、噪声、滤波等图像处理操作也具有很好的鲁棒性. Aiming at these problems of digital images on the internet, including copyright protection, authentication and integrity, etc. the paper proposes a binary watermark embedding algorithm based on DCT and m- sequence, which achieves the embedding and extracting of a binary image. Experiment results show that the algorithm is robust against image processing operations such as cropping, image filtering, noises and JPEG lossy compression.
出处 《哈尔滨理工大学学报》 CAS 2004年第5期76-79,共4页 Journal of Harbin University of Science and Technology
关键词 水印嵌入 算法 DCT变换 JPEG压缩 二值图像 鲁棒性 图像处理 M序列 滤波 数字图像 digital watermark m sequence discrete cosine transform
  • 相关文献

参考文献6

  • 1EYADAT Mohammad. Factors that Affect the Performance of the DCT-block Based Image Watermarking Algorithms[A].Proceedings of the International Conference On Information Technology[C]. Coding and Computing, 2004. 650-654.
  • 2KOCH E, ZHAO J. Towards Robust and Hidden Image Copyright Labeling[A]. IEEE Workshop on Nonlinear Signal and Image Processing[C]. Neos Marmaras, Greece, 1995. 452-455.
  • 3COX I J, JOE KILLIAN F T, et al. Secure Spread Spectrum Watermarking for Multimedia[J]. IEEE Transactions On Image Processing, 1997, 6(12): 1673-1687.
  • 4BARNI M, BARTOLINI F. A DCT-Domain System for Robust Image Watermarking [J]. Signal Processing, 1998,66(3):357-372.
  • 5SCHYNDEL R G van, TIRKEL A Z, et al. A digital watermark[J]. Proceedings of the IEEE international Conference on image Processing, 1994, (2): 86-90.
  • 6RAYMOND B Wolfgang, EDWARD J Delp. A Watermark for Digital Images [A]. Proceedings of the IEEE International Conference on Image Processing[C]. Lausanne, Switzerland, 1996. 219-222.

同被引文献11

  • 1COX J, KILLIAN J, LEIGHTON F T, et al. Secure spread spectrum watermarking for multimedia[J]. IEEE Trans actions on Image Processing, 1997, 6(12): 1673-1687.
  • 2CRAVER S, MEMON N, YEO B L, et al. Can invisible watermarks resolve rightful ownerships? [J]. In : SPIE Electronic Imaging: Storage and Retrieval of Image and Video Databases.1997, SC22: 316-321.
  • 3CRAVER S, MEMON N, YEO B L, et al. Resolving rightful ownemhips with invisible watermarking techniques: limitations, attacks, and implications [J]. IEEE Journal on Selected Areas in Communications, 1998, 16(4): 573-586.
  • 4MOHANTY S P, RAMAKRISHNAN K R, KANKANHALLi M S. A DCT domain visible watermarking technique for images[C]. Proceeding of IEEE Intermation al. Conference on Multimedia and Expo., 2000:1029-1032.
  • 5LEE J S.CDMA系统工程手册[M].许希斌,周世东,赵明,等译.北京:人民邮电出版社,2001.
  • 6Lu Chun- Shien. Towards robust image watermarking: combining content- dependent key, moment normalization, and side- informed embedding[J]. Signal Processing: Image Communicatlon,2005,20(2) : 129 - 150.
  • 7Dong P, Galatsanos N P. Affine transformation resistant wa termarkingbased on image normalization [ C]//IEEE Int. Conf. Image Processing. Rochester, NY : [ s. n. ], 2002 : 489 - 492.
  • 8Parameswaran L, Anbumani K. A Robust Image Watermarking Scheme using Image Moment Normalization[J ]. Transactions on Engineering, Computing and Technology, 2006, 13 : 239 - 243.
  • 9Petitcolas F A P. StirMark 3.1 [EB/OL]. 1999:http:// www.petitcolas. net/fabien/watermarking/stirmark/.
  • 10Sami E. I. Baba,Lala Z. Krikor,Thawar Arif,Zyad Shaaban.Watermarking of Digital Images in Frequency Domain[J].International Journal of Automation and computing,2010,7(1):17-22. 被引量:6

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部