期刊文献+

一种基于傅立叶变换的相关性检测的水印方法

A Watermark Algorithm on Relativity Examination Based on Fourier Transform
在线阅读 下载PDF
导出
摘要 本文提出了一种有意义的基于傅立叶变换的水印方法。在嵌入水印之前首先对水印信息利用Amold变换进行置乱,然后采用修改中高频部分的方法进行嵌入,嵌入水印时采用嵌入两个不相关伪随机序列的方法。实验结果表明,该方法提高了水印的安全性,提高传统相关性检测方法的准确率并且提高了鲁棒性。 This thesis provides a meaning watermark algorithm based on DFT. The watermark data was scrammed with Arnold transform before embedding, then modify the high and the middle frequency part to embedding, embedding watermark adopt embedding two not related, The experiment results shows that, this algorithim enhances the security, increases the accurate rate of the traditional relativity examination and the robustness.
作者 李翔 高尚兵 陈昊 LI Xiang,GAO Shang-bing,CHEN Hao(1.Department of Computer Engineering,Huaiyin Institute of Techlonogy,Huaiyin 223001, China;2. Personnel Authority,Huai'an 223001, China)
出处 《电脑知识与技术》 2008年第2期751-753,757,共4页 Computer Knowledge and Technology
关键词 数字水印 傅立叶变换 信息安全 Digital watermarking Fourier transform information security
  • 相关文献

参考文献1

二级参考文献27

  • 1Q Ruanaidh J J, Dowling W J, Boland F M. Watermarking digital images for copyright protection. In: IEEE proceeding on Vision, Signal and Image Processing, 1996. 8,143 (4):250-256.
  • 2Bender W, Gruhl D, Morlmoto N et al, Techniques for data hiding. IBM System Journal, 1996,35(3&4):313-336.
  • 3Kobayashi. Digital watermarking:Historical roots. IBM Research Reports, Tokyo Research Laboratories, 1997.
  • 4Voyatzis G, Nikolaidis N, Pitas 1. Digital watermarking: An overview. In:9th European Signal Processing Conference.Island of Rhodes,Greece. 1998:9-12
  • 5Jiri Fridrich. Appiications of data hiding in digital images. In:the ISPAC'98 Conference in Melbourne, Australia, 1998.11.
  • 6Mahalingam Ramkumar. Data hiding in multimedia-theory and apphcations. [Ph. D. Degree], New Jerseyl Department of Electrical and Computer Engineering, New Jersey Institute of Technology,1999.
  • 7Cox I J, Matt L Miller. A review of watermarking and the importance of perceptual modeling. SPIE Proceeding on Human Vision and Electronic Imaging, 1997,3016:92-99.
  • 8Ramkumar M, Akansu A N. Image watermarks and counterfeit attacks: some problems and solutions. In: Proceeding on Content Security and Data Hiding in Digital Media Conference Newark, NJ, 1999,102-112.
  • 9Van Schyndel R, Tirkel A. Osborne C. A digital watermark,In: IEEE Proceeding on International Conference on Image Processing, Austin, Tex. , IEEE Press, 1994:86-90.
  • 10Maxemchuk N F. Electronic document distribution, AT&T Technical Journal, 1994. 9,73(5):73-80.

共引文献161

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部