期刊文献+

基于人类视觉特性HVS和DWT的数字水印算法 被引量:6

Digital Watermarking Algorithm Based on HVS and DWT
在线阅读 下载PDF
导出
摘要 伴随着网络技术和多媒体技术的飞速发展,如何保护多媒体信息的安全成为国际上研究的热门课题。数字水印技术是保护版权和认证来源及完整性的新型技术,提出了一种基于人类视觉特性HVS和DWT的静态图像数字水印算法,借鉴了人类视觉特性HVS算法的思想,并做了一些改进。实验表明该算法稳健性较好,有一定的抗裁剪、噪声、压缩和涂改的能力,并且算法复杂度较低,实用性较强。 With the rapid development of the network and the multimedia technical , how protects the security of the multimedia informations becomes the popular topic on internationally studies. The digital watermark technology is anew technology for protecting the copyfight,the authentication origin and integrity. Proposes one kind of gradation image digital watermark algorithm based on human visual system(HVS) and digital wavelet transformation(DWT), has profited from the HVS algorithm thought, and has made some improvements. The experiment indicated this algorithm robustness is good, to cuts out, the noise, the compression, the modification are strong, and the algorithm order of complexity is low, the usability is strong.
出处 《计算机技术与发展》 2007年第7期135-138,共4页 Computer Technology and Development
基金 国家自然科学基金资助项目(69975010 60374054) 山东省自然科学基金资助项目(Y2003G01 Z2004G02)
关键词 数字水印 DWT HVS digital watermark DWT HVS
  • 相关文献

参考文献6

  • 1胡昌华,张军波.基于MATLAB的系统分析与设计--小波分析[M].西安:西安电子科技大学出版社,2001.
  • 2王晓丹,吴崇明.基于MATLAB的系统分析与设计--图像处理[M].西安:西安电子科技大学出版社,2001.
  • 3姜明新,迟学芬.基于小波多分辨率分解的数字图像水印算法[J].吉林大学学报(信息科学版),2005,23(2):221-224. 被引量:5
  • 4Sepsirisuk K.An adaptive digital watermark based on a tree structure using the human visual system[J].IEEE IN T,2005,2:1062-1065.
  • 5Porter J P.Image adaptive watermarking techniques using models of the human visual system[C]//System Theory.[s.l.]:[s.n.],2006:354-357.
  • 6Kunder D.Digital Watermarking Using Multiresolution Wavelet Decomposition[C]//IEEE IN T Conf A SSP 1998.[s.l.]:[s.n.],1998:2969-2972.

二级参考文献9

  • 1VAN SCHYNDEL R, TIRKEL A, OSBORNE C. A Digital Watermark [A]. In: Proc ofthe IEEE on International Conference on Image Processing. Austin [ C]. Texas, USA: IEEE Press, 1994:86 90.
  • 2COX I J, MILLER M L. The First 50 Years of Electronic Watermarking [ J ]. EURASIP J of Applied Signal Processing,2002, (2): 126-132.
  • 3TSEKERIDOU S. Bernoulli Shifts Generated Chaotic Watermarks: Theoretic Investigation [ J ]. IEEE International Conference on Acoustics, Speech, and Signal Processing, 2001, (3): 1 361-1 364.
  • 4TSEKERIDOU S. Statistical Analysis of a Watermarking System Based on Bernoulli Chaotic Sequences [ J ]. Signal Processing, 2001, 81 (6): 1 273-1 293.
  • 5NIKOLAIDIS A, PITAS I. Comparison of Different Chaotic Maps with Application to Image Watermarking [J]. IEEE International Symposium on Circuits and Systems, 2000, (5): 509-512.
  • 6DAUBECHIES I. Orthonormal Bases of Compactly Supported Wavelets [J]. Commun on Pure and Appl Math, 1998, 41(7): 909-996.
  • 7VETTERLI M, KOVACEVIC J. Wavelet and Subband Coding [M]. Englewood Cliffs, NJ: Prentice-Hall, 1995.
  • 8VOLOSHYNOVSKIY S. Attacks on Digital Watermarks: Classification Estimation Based Attacks and Benchmarks [ J ].IEEE Communications Magazine, 2001, 39 (8): 118-126.
  • 9KUTTER M, VOLOSHYNOVSKIY S, HERRIGEL A. The Watermark Copy Attack [A]. Proceedings of SIPE: Security and Watermarking of Multimedia Contents Ⅱ. San Jose [C]. California: [s. n. ], 2000, 3 971: 358-370.

共引文献4

同被引文献44

引证文献6

二级引证文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部