期刊文献+

一种基于小波变换的灰度图像水印算法 被引量:1

A method for gray-level image watermarking in wavelet transform
在线阅读 下载PDF
导出
摘要 本文提出了一种基于小波变换的采用灰度图像作为水印的盲水印算法,水印经过图像置乱后,把水印分解成8个二值位平面,选择高4位二值位平面嵌入到原始图像的中频子带。实验结论和攻击测试表明,本文所提议的算法对JPEG有损压缩和加性噪声等图像攻击有较强的鲁棒性。 A blind watermarking method based on wavelet transform is proposed in the paper, which selects a gray-level image as the watermarking,After be scrambled,the watermarking can be decomposed into eight binary images.The higher four binary images are embedded into the middle frequency coefficients of the original image,Experimental results and the testings of attacking prove that the method is robust enough to some image attacking processes such as JPEG compressing and adding noise.
出处 《微计算机信息》 北大核心 2007年第18期31-32,23,共3页 Control & Automation
基金 广西科技厅企业创新能力建设项目桂科能(0330013-10J)
关键词 数字水印 鲁棒性 小波变换 灰度图像 图像置乱 digital watermarking, robustness, wavelet transform, gray-level image, image scrambling
  • 相关文献

参考文献6

二级参考文献17

  • 1曹政华,颜锦奎.视频图像实时小波变换系统[J].微计算机信息,2005,21(5):138-139. 被引量:16
  • 2WALTON S. Information authentication for a slippery new age [J]. Dr Dobbs Journal, 1995, 20(4) : 18 -26.
  • 3SCHYNDEL R, TIRKEL A, OSBORNE C. A digital watermark [ A ]. Proceedings of the IEEE International Conference on Image Processing [ C ]. Austin, Texas,1994.
  • 4FRIEDMAN G L. The trustworthy digital camera: Restoring credulity to the photographic image [ J ]. IEEE Transon Consumer Electronics, 1993 (39) : 905 - 910.
  • 5WOLFGANG R B, DELP E J. A watermark for digital images [ A ]. Proceedings of the IEEE International Conference on Image Processing[ C ]. Austin, Texas, 1996.
  • 6WOLFGANG R B, DELP E J. Fragile watermark using the VW2D watermark [ A ]. Proceedings of the SPIE/IS&T International Conference on Security and Watermarking of Multimedia Contents [ C ]. San Jose, CA,1999.
  • 7LIN C Y, CHANG S F. Issues and solutions for authenticating MPEG Video [ A ]. Proc of SPIE Security and Watermarking of Multimedia Contents [ C ]. San Jose,CA, 1999.
  • 8LIN C Y, CHANG S F. Generating robust digital signature for image/video authentication[ A]. Multimedia and Security Workshop at ACM Muhimedia 98 [ C ]. Bristol, UK, 1998.
  • 9KUNDUR D, HATZINAKOS D. Towards a telltale watermarking technique for tamper-proofing [ A ]. Proc IEEE Int Conf On Image Processing Chicago [ C ]. Illinois,1998.
  • 10Ming Sun Fu,et al.Data Hiding Watermarking for halftone images[J].IEEE Trans on Image Processing,2002,4:477-484.

共引文献102

同被引文献8

  • 1李晓强,薛向阳.基于多通道的彩色图像水印方案[J].计算机学报,2004,27(9):1238-1244. 被引量:26
  • 2楼偶俊,王相海.提升方案小波和DCT下的图像盲水印算法[J].计算机辅助设计与图形学学报,2005,17(4):846-851. 被引量:7
  • 3Bender W, Gruhl D, Morimoto N ,et al. Techniques for data hiding. IBM System Journal, 1996, 35 (3-4):313-336
  • 4Ruanaidh J J K, Dowling W J, Rotation T Pun, et al. Scale and translation invariant digital image watermarking. In: Proceedings of the International Conference on Image Processing. Santa Barbara, USA: ICIP,1997, 536-541
  • 5Piva A, Barni M, Bartoloni E, et al. DCT-based watermarking recovering without resorting to the uncorrupted original image. In: Proceedings of the International Conference on Image Processing (ICIP). Santa Barbara, USA: IEEE, 1997, 520-523
  • 6Xia X G, Boncelet C G, Arce G R, et al .Wavelet transform based watermark for digital images. Optics Express, 1998, 3 (12) : 497-511
  • 7Wang H J M, Su P-C, Kuo C C J, et al.Wavelet based digital image watermarking. Optics Express, 1998, 3(12) : 491-496
  • 8李忠源,郭全成,任亚萍.图像中的信息隐含及水印技术[J].电子学报,2000,28(4):61-63. 被引量:21

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部