期刊文献+

基于SVD的抗几何攻击数字水印研究

A Anti-geometric-attack Watermarking Scheme Based on SVD
在线阅读 下载PDF
导出
摘要 简单介绍了数字图像水印的原理、作用及其常用几何攻击方法,并指出通常的水印算法并不能很好地抵抗几何攻击,使得这些算法的适用性受到很大的限制。针对几何攻击,结合SVD分解在图像处理方面所具有的特性,实现了一个基于SVD分解的数字图像水印嵌入和提取方案,经过实验数据分析,可以有效地抵抗常见的旋转、镜像、平移、剪切、高斯滤波、JPEG压缩等攻击方法。 this paper give a introduction of digital image watermarking.Because most of the watermarking scheme can not be against of geometric-attack,such as rotation,mirroring,chopping etc.based on SVD's feather on image processing,this paper presents a block-embed watermarking scheme.
作者 张丽
出处 《电脑编程技巧与维护》 2010年第6期107-108,共2页 Computer Programming Skills & Maintenance
关键词 数字水印 抗几何攻击 SVD watermarking anti-geometric-attack SVD
  • 相关文献

参考文献6

  • 1R.G.van Schyndel, A.Z.Tirkel, C.F.Osbone. A digital watermark. Proc IEEE Int.Conference on Image Processing, 1994, 2: 86-90.
  • 2王慧琴,李人厚.一种结合空间域和DCT域的数字水印新算法[J].通信学报,2002,23(8):81-86. 被引量:12
  • 3J.J.K.O.Ruanaidh,W.J.Dowling, F.F.Boland. Phase watermarking of Digital Images. Proceedings of the IEEE Int.Conference on Image Processing, 1996, 3: 239.
  • 4陈青,苏祥芳,王延平.采用小波变换的鲁棒隐形水印算法[J].通信学报,2001,22(7):61-66. 被引量:14
  • 5Golub.G.H,VanLoan.C.F.矩阵计算[M].袁亚湘译.北京:科学出版社,2001:77-79.
  • 6Akntas.A.G, Malaschonok.G.I. applications of singular value decomposition. Mathematics and Computers in Simulation, 2004: 15-31.

二级参考文献10

  • 1[1]BORS A, PITAS I. Image watermarking using DCT domain constraints[A]. Proc IEEE ICIP' 96[C]. 1996,231 - 234.
  • 2[2]SCHYNDEL R,TIRKEL A,OSBORNE C.A digital watermark[A] .Proc ICIP'94[C]. 1994,86-90.
  • 3[3]COX I, KILIAN J,SHAMOON T. Secure spread spectrum watermarking for multimedia[J]. IEEE Trans on Image Processing, 19976(12): 1673 - 1687.
  • 4[4]OHNISHI J,MATSUI K. Embedding a seal into a picture under orthogonal wavelet transform[A]. Proc ICMCS'96[C]. 1996,514 -521.
  • 5[5]SHAPIRO J. Embedded image coding using zerotrees of wavelet coefficients[J]. IEEE Trans on Signal Processing, 1993,41 (12):3445- 3462.
  • 6[1]LEE C H, LEE Y K. An adaptive digital image watermarking technique for copyright protection[J]. IEEE Transactions on Consumer Electronics, 1999, 45(4):1005-1015.
  • 7[2]CHRISTINE I, PODILCHUK, ZENG W J. Image―adaptive watermarking using visual models[J].IEEE Journal on Selected Areas in Communications, 1998, 16(4):525-539.
  • 8[3]HERNANDEZ J R, AMADO M, PEREZGONZNALEZ F. DCT-domain watermarking techniques for still images?detector performance analysis and a new structure[J]. IEEE Transctions on Image Processing, 2000, 9( 1): 55-68.
  • 9[4]BORS A G , PITAS I .Image watermarking using DCT domain constraints[A] Proc IEEE Int Conf Image Processing[C]. Lausanne, Switzerland, 1996.3: 231-234.
  • 10[5]WATSON A B. Efficiency of a model human image code[J]. Opt Soc Am, 1987, 4(12): 2401-2415.

共引文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部