期刊文献+

基于DCT变换的扩频盲水印算法 被引量:1

A Blind Spread Spectrum Watermarking Algorithm Based on the DCT Transform
在线阅读 下载PDF
导出
摘要 文章提出了一种改进的数字图像扩频水印技术。该算法用两个不相关的伪随机序列分别代表水印信息中的0和1,从而达到扩频的目的,将扩频后的水印信号,嵌入到分块DCT域的中高频段系数中,并利用伪随机序列的相关性实现了水印信息的盲提取。实验仿真表明:图像经过JPEG有损压缩、中值滤波、锐化滤波等图像处理操作后仍然稳健。 The paper proposes an improved spread spectrum watermarking algorithm. Two independent pseudo-random sequence substitute the ‘0' and‘1 'in the binary image are used, thus achieve the goal of spread spectrum. The modulated signal is embedded in the high-middle frequency band of block DCT. The watermark can get in blind way. The experiments show the proposed algorithm is effective and robust to many common image processing operations, especially to JPEG compression, median filters and sharpening filter.
出处 《计算机与数字工程》 2009年第7期147-150,共4页 Computer & Digital Engineering
关键词 盲水印 扩频技术 DCT变换 相关性 blind watermark, spread spectrum, DCT transform, relevance
  • 相关文献

参考文献7

二级参考文献25

  • 1沈允善.扩谱技术[M].北京:国防工业出版社,1995..
  • 2[1]Petitcolas F A P, Anderson R J, Kuhn M G Information Hiding-A Survey[A]. Proceedings of the IEEE[C], 1999, 87(7):1062-1078.
  • 3[2]Craver S. Can invisible watermarks resolve rightful ownerships?[R]. :IBM research Division, 1996.
  • 4[3]Cox I. Secure Spread Spectrum Watermarking for Multimedia[R]. Princeton: NEC Research Institute, 1995.
  • 5[4]Watson A B. Visually optimal DCT quantization matrices for individual images[A]. Proceedings of the IEEE Data Compression Conference[C]. Snowbird, Utah, 1993. 178-187.
  • 6[2]Kundur D,Hatzinakos D.Characterization for Improved Robust Watermarking[J].IEEE Trans.On Signal Processing,2001,49 (10) 2383-2396.
  • 7[5]CHARLES G,BONCELET J T.Hiding information in image[C].Proceedings of the IEEE International Conference on Image Processing,1998,(2) 3,96-398.
  • 8[6]Watson B A.DCT Tune:A technique for visual optimization of DCT quantization matrices for individual images[J].Society for Information Display Digest of Technical Papers,1993:946-949.
  • 9[7]Jayant S N,Johnson D J,Safranek R.Signal compression based on models of human perception[J].Proc.of IEEE,1993,8l (10) 1385-1422.
  • 10S Voloshynovskiy, S Pereira,T Pun,et al.Attacks on Digital Watermarks:Classification,Estimation Based Attacks,and Benchmarks[J].IEEE Communications Magazine,2001,39(8):118-126.

共引文献35

同被引文献10

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部