期刊文献+

基于随机分块的脆弱性水印算法设计 被引量:1

Design of Fragile Watermarking Algorithm Based on Random Blocks
在线阅读 下载PDF
导出
摘要 提出了一种基于混沌系统的图像脆弱性水印(易损水印)算法。经过验证,此算法设计较为合理,具有良好的性能,能达到满意的效果。 The fragile digital watermarking scheme is presented. The results of experiments reveal that the scheme presented here is greatly practical, with an excellent ability to locate juggling actions and of high security, as the same time, because of non-overlapping, time complexity is good than others algorithm.
出处 《武汉大学学报(信息科学版)》 EI CSCD 北大核心 2006年第9期832-834,共3页 Geomatics and Information Science of Wuhan University
基金 甘肃省自然科学基金资助项目(3ZS042-B25-007) 甘肃省科技攻关计划资助项目(IGS035-A052-011)
关键词 数字水印 脆弱 混沌映射 digital watermarking fragile chaotic mappin
  • 相关文献

参考文献8

  • 1Bender W, Gruhl D,Morimoto N, et al. Techniques for Data Hiding[J]. IBM System Journal, 1996,35(3/4) :313-335
  • 2Petitcolas F A P, Anderson R J, Kuhn M G. Information Diding: aSurvey[J]. IEEE, 1999,87(7):1062-1078
  • 3吴秋新,钮心析,杨义先,等.信息隐藏技术—隐写术与数字水印[M].北京:人民邮电出版社,2001
  • 4张贵仓,章毓晋,李睿.图像混合信息隐藏技术的研究[J].西北师范大学学报(自然科学版),2003,39(4):35-38. 被引量:5
  • 5王宏霞,何晨,丁科.基于混沌映射的鲁棒性公开水印[J].软件学报,2004,15(8):1245-1251. 被引量:50
  • 6Cox I J, Kilian J, Leighton F T, et al. Secure Spreadspectrum Watermarking for Muitimedia[J].IEEE Trans. on Image Processing, 1997,6(12):1 673-1 687
  • 7CoxIJ MillerML BloomJA.数字水印[M].北京:电子工业出版社,2003..
  • 8丁科,何晨,王宏霞.一种定位精确的混沌脆弱数字水印技术[J].电子学报,2004,32(6):1009-1012. 被引量:25

二级参考文献19

  • 1Bender W, Gmhl D, Morimoto N, et al. Techniques for data hiding[ J] . IBM System Journal, 1996, 35(3---4):313-335.
  • 2Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding-a survey[J]. Proc of IEEE, 1999, 87(7):1062-1078.
  • 3C S Lu, H Y Mark Liao. Multipurpose watermarking for image authentication and protection[J]. IEEE Trans on Image Processing,2001, 10(10):1579-1592.
  • 4M U Celik, G Sharma, E Saber, et al. Hierarchical watermarking for secure image authentication with localization[J]. IEEE Trans on Image Processing. 2002,11(6):585-595.
  • 5P W Wong. Public key watermark for image verification and authentication[A] .Proc of 1998 IEEE Int Con on Image Processing[C]. Chicago, IL, USA: IEEE, 1998,1:455-459.
  • 6D Kundur, D Hatzinakos. Digital watermarking for telltale tamper profing and authentication[J]. Proc of the IEEE, 1999, 87(7):1167-1180.
  • 7YWWang,JFDoherty,REVanDyck. Awavelet-basedwatermarking algorithm for ownership verification of digital images[J]. IEEE Trans on Image Processing.2002,1(2):77-88.
  • 8C Hang, S Sun. Chaotic frequency hopping sequence[J]. IEEE Trans on Communications, 1998,46(11):1433-1437.
  • 9Wu CF, Hsieh WS. Digital watermarking using zerotree of DCT. IEEE Trans. on Consumer Electronics, 2000,46(1):87-94.
  • 10Kutter M, Petitcolas FAP. Fair evaluation methods for image watermarking system. Journal of Electronic Imaging, 2000,9(4): 445-455.

共引文献105

同被引文献5

  • 1LI C.-T. Digital fragile watermarking scheme for authentication of JPEG images[J].IEEE Proceedings:Vision Image and Signal Processing,2004,(06):460-466.
  • 2XIE Liehua,AREC R G,GRAVEMAN F R. Approximate image message authentication codes[J].IEEE Transactions on Multimedia,2001,(02):242-252.
  • 3WANG Hongxia,DING Ke,LIAO Changxing. Chaotic watermarking scheme for authentication of JPEG images[J].International Symposium on Biometrics and Security Technologies,2008.1-4.
  • 4NIKOLAIDIS A,PITAS I. Asymptotically optimal detection for additive watermarking in the DCT and DWT domains[J].IEEE Transactions on Image Processing,2003,(05):563-571.doi:10.1109/TIP.2003.810586.
  • 5张春田,张静.基于混沌映射的鲁棒性图像水印算法[J].电子学报,2002,30(1):69-72. 被引量:14

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部