期刊文献+

一种基于降频的数字水印算法

A digital image watermarking algorithm based on reduced frequency
在线阅读 下载PDF
导出
摘要 文章在基于小波变换数字水印研究的基础上提出了一种新的基于降频的数字水印算法,通过编码压缩将若干位二值水印经过编码后压缩为一位嵌入,并结合改进的比较频域系数大小的嵌入方法实现了水印的降频嵌入。实验结果表明,该方法具有较好的不可见性和抗JPEG压缩的能力,且对其他的一些攻击也具有一定的鲁棒性。 On the basis of research on the watermarking technique by means of wavelet transform, the paper presents a new watermarking coded algorithm based on reduced frequency. Several bits of binary watermarking are coded and compressed into one bit. In the experiment the watermarking was embedded through the reduced frequency and realized by using the improved algorithm combined with the comparing frequency domain coefficients. The experimental results show that the algorithm makes the watermark better invisible and robust to JPEG compression and some other attacks to a certain degree.
出处 《合肥工业大学学报(自然科学版)》 CAS CSCD 北大核心 2008年第7期1085-1087,1091,共4页 Journal of Hefei University of Technology:Natural Science
基金 安徽省自然科学基金资助项目(070412046)
关键词 数字水印 二值水印 小波变换 降频 digital watermarking binary watermarking wavelet transform reduced frequency
  • 相关文献

参考文献8

  • 1黄继武,Yun Q.SHI,程卫东.DCT域图像水印:嵌入对策和算法[J].电子学报,2000,28(4):57-60. 被引量:292
  • 2向德生,熊岳山.基于DWT的图像水印算法研究[J].计算机工程与设计,2005,26(3):611-613. 被引量:13
  • 3Cox I J, Kilian J,Leighton F T,et al. Shamoon spread spectrum watermarking for multimedia[J]. IEEE Transactions on Image Processing, 1997,6 (12) : 1673-1687.
  • 4Pickholtz R,Schilling D,Milstein L. Theory of spread-spectrum communications., a tutorial[J]. IEEE TransaCtions on Communication, 1988,30 (5) :855- 884.
  • 5Sweldens W. The lifting scheme: a new philosophy in biorthogonal wavelet constructions [C]//Proceedings of SPIE on Wavelet Applications in Signal and Image Processing(Ⅲ). San Diego: SPIE, 1995: 68-79.
  • 6宋琪,朱光喜,李宁.基于整数小波变换的灰度图像水印技术[J].计算机工程与应用,2004,40(6):54-56. 被引量:10
  • 7Lie W N,Chang L C. Robust and high-quality time-domain audio watermarking subject to psychoacoustic masking [C]//The 2001 IEEE International Symposium on Circuits and Systems. Sydney, Australia, 2001 : 149-152.
  • 8Lin C Y, Chang S F. A robust image authentication method distinguishing JPEG compression from malicious manipulation[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2001,11 (2) : 153-168.

二级参考文献9

共引文献312

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部