期刊文献+

基于Shamir秘密共享的整数小波联合数字水印算法

The Digital Watermarking Algorithm of Integer Wavelet for Joint Ownership Based on Shamir Secret Sharing Scheme
在线阅读 下载PDF
导出
摘要 针对多水印系统中的联合问题,提出一种基于Shamir秘密共享的联合数字水印算法,把经过预处理的水印嵌入到整数小波域的中频系数上,该算法生成的水印不可见性较好,并且对单一攻击及多种复合攻击尤其对剪切攻击具有很好的鲁棒性,可验证数字作品的联合问题,并能很好地检测出作品的伪作者. Due to the fact about joint ownership of multiple image and based on Shamir secret sharing scheme, a digital watermarking algorithm for joint ownership which embeds the pretreated watermarks in the intermediate frequency of integer wavelet transform is proposed in the article. The algorithm has a good hiding effect and is robust for single attack and even collage attacks especially for attack of cutting. This algorithm can justify joint ownership, and it could inspect the counterfeit author.
出处 《江西理工大学学报》 CAS 2009年第4期29-32,共4页 Journal of Jiangxi University of Science and Technology
关键词 联合数字水印 秘密共享 整数小波 鲁棒性 digital watermarking for joint ownership secret sharing integer wavelet robustness
  • 相关文献

参考文献9

  • 1Van Schyndel R G, Tirkel A Z, Osborne C F. A Digital Watermark [C]. In: Proceedings of IEEE International Conference on Image Processing. California: USA, Los Alamitos, 1994.
  • 2Petar Horvatic, Norbert Schiffner. Multimedia Watermark[J]. Computer Graphik Topics, 2006, 18(3): 23-23.
  • 3Raval M S, Rege P P. Discrete Wavelet Transform Based Multiple Watermarking Scheme [C]. IEEE ENCON 2003 Conference on Convergent Technologies for the Asia-Pacific Region, New Delhi, India Allied Publishers Put Ltd, 2003, 935-938.
  • 4Liang X, WU H Z. Multiple Perceptual Watermarks Sing Multiple-based Number Conversion in Wavelet Domain[C]. ICCT2003-Intemational Conference on Communication Technology, Beijing University of Posts& Telecommunication Press, 2003, 213-216.
  • 5陈晓苏,郭蔚,刘立刚,肖道举.基于中国剩余定理的联合数字水印[J].计算机工程与科学,2004,26(9):27-30. 被引量:3
  • 6Sidney Burrus C,Ramesh A,Gopinat.小波与小波变换导论[M].程正兴译.北京:机械工业出版社.2008.
  • 7A Shamir. How to Share a Secret [J]. Information Communication, 1979, 22(1): 612-613.
  • 8牛少彰,钮心忻,杨义先.基于Shamir秘密共享方案的数字水印算法[J].中国图象图形学报(A辑),2003,8(10):1178-1182. 被引量:5
  • 9李江华,陈丰.一种基于DCT理论的空域数字水印算法—DAS算法[J].江西理工大学学报,2007,28(3):41-43. 被引量:4

二级参考文献11

  • 1李淑芝,李江华,范成功.基于DCT域图像数字水印算法几个关键问题的研究[J].南方冶金学院学报,2005,26(6):39-43. 被引量:4
  • 2汪和生.基于图像变换域的双重数字水印方法[J].广西大学学报(自然科学版),2006,31(3):228-232. 被引量:4
  • 3A Shamir. How to Share a Secret[J]. Commun ACM, 1979,22(11):612-613.
  • 4C Asmuth, J Bloom. Modular Approach to Key Safeguarding[J].IEEE Trans on Information Theory, 1983,29(2) :208 - 210.
  • 5Cox I J, Killian J, Leighton F T, et al. Secure Spread Spectrum Watermarking for Multimedia[J]. IEEE Trans Image Processing,1997,6(12): 1673 - 1687.
  • 6H Guo, N D Georganas. Digital Image Watermarking for Joint Ownership[A]. Proc of ACM Multimedia 2002[C]. 2002.
  • 7[1]Van Schyndel R G, Tirkel A Z, Osborne C F. A digital watermark [ A ]. In: Proceedings of IEEE International Conference on Image processing[C]. Los Alamitos,California,USA, 1994: 86 ~ 90.
  • 8[2]Wolfgang P, Delp E. A watermark for digital image[A]. In:Proceedings of IEEE International Conference on Image Processing [C], Los Alamitos, California, USA, 1996:219 ~222.
  • 9[3]Cox I J, Linnartz J P M G. Some general methods for tampering with watermarks [J]. IEEE Journal on Selected Areas in Communications, 1998,16(4): 587~593.
  • 10[4]Cox I J. Secure spread spectrum watermarking for multimedia [J]. IEEE Transactions on Image Processing, 1997.6(12):1673~1687.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部