期刊文献+

一种傅里叶域图像数字水印方案的研究 被引量:4

Study on Digital Image Watermarking in the Fourier Transform Domain
在线阅读 下载PDF
导出
摘要 基于快速傅里叶变换提出了一种傅里叶谱域图像水印算法。对图像和水印图像分别进行傅里叶变换,将作为水印的32×32大小的图像的二维傅里叶谱降维为一维序列,叠加在图像傅里叶谱域中适当位置上,再经过快速傅里叶逆变换得到水印图像。选择的嵌入方案即适当的位置既不会使水印图像产生明显失真,又可以抵抗图像压缩和低通滤波。在JPEG压缩、图像旋转、高斯低通滤波的攻击方式下,对水印图像进行了鲁棒性分析,实验表明该算法具有良好的抗攻击性和安全性。 This paper presents a digital image watermarking in the Fourier transform domain. The original image and the watermark image are respectively transformed. The watermark image of 32 × 32 in the frequency domain is viewed as one dimensional sequence, and added to a proper place in the frequency domain of the original image. Then the original image in the frequency domain added with watermark is inversely transformed and the watermark image is obtained. The selection of a proper place can not only avoid obvious distortion of watermarked image, but also resist lossy image compression and lowpass filtering. The robustness of the watermark image under different attacks, such as jPEG compression, image rotation and Guassian lowpass filtering, has been analyzed. The results show that this algorithm has a better security and anti-attack performance.
出处 《北京石油化工学院学报》 2006年第1期1-4,共4页 Journal of Beijing Institute of Petrochemical Technology
关键词 数字水印 傅里叶变换 鲁棒性 digital watermarking fourier transform robustness
  • 相关文献

参考文献7

二级参考文献25

  • 1[1]Swanson,M.,Kobayashi,M.,and Tewfik,A.Multimedia data embedding and watermarking technologies.Proceedings of the IEEE,1998:86(6),1064~1087.
  • 2[2]Fabien,A.P.,Petitcolas,F.,Ross,J.Anderson and Markus G.Kuhn.Information Hiding-A Survey.Proceedings of the IEEE,1999:87(7),1062~1078.
  • 3[3]Cox,I.J.,Kilian,J.,and Leighton,T.,et al.Secure spread spectrum watermarking for multimedia.IEEE Trans.on Image Processing,1997:6(12),1673~1687.
  • 4[4]Wolfgang,R.B.,and Delp,E.J.Fragile watermarking using the VW2D watermark.Proceedings of the SPIE/IS&T Conference on Security and Watermarking of Multimedia Contents,SPIE Vol.3657,San Jose,CA,January 1999.
  • 5[5]Friedman,G.L.The trustworthy digital camera:restoring credibility to the photographic image.IEEE Trans.on Consumer Electronics,Vol.39,November 1993,905~910.
  • 6[6]Smith,J.R.and Comiskey,B.O.Modulation and information hiding in images.Proceedings of First Intern.Workshop on Information Hiding,R.Anderson ed.Lecture notes in Computer Science,Vol.1174,Springer Verlag 1996,207~226.
  • 7[7]Petitcolas,F.,and Anderson,R.Weaknesses of copyright marking systems.Proceedings of the ACM Multimedia and Security Workshop,Bristol,United Kingdom,September 1998,55~62.
  • 8[1]Bender W, Gruhl D, Morimoto N. Techniques for Data Hiding[A]. Proceedings of the SPIE[C]. USA San Jose CA, 1995.
  • 9[2]Katzenbeisser, etc. Information Hiding Techniques for Steganography and Digital Watermarking[M]. London:Artech House, Inc. 2000.
  • 10[3]The Army Image: In Need of Change?. 美国政府报告ADA376361[EB/OL]. http://www. dtic. mil.

共引文献48

同被引文献30

引证文献4

二级引证文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部