期刊文献+

能识别二次扫描和印刷的半脆弱数字水印算法 被引量:2

A semi-fragile digital watermark algorithm identifying scan and printing times
在线阅读 下载PDF
导出
摘要 提出了一种能识别二次扫描和印刷的半脆弱数字水印算法。该算法利用了矩阵奇异值的特性和印刷过程中色域转换的误差,对常见的几何攻击有较强的抵抗能力,同时对原始图像扫描和印刷的次数有着严格的要求,适用于印刷品防伪。 This paper novel digital watermark algorithm identifying scan and printing times, which can be used in printing anti-counterfeiting. The algorithm makes use of the character of singularity value and the error in color-space conversion, making it robust for the geometric distortion and sensitive for the times of scan and printing.
出处 《电子技术应用》 北大核心 2010年第10期136-138,142,共4页 Application of Electronic Technique
关键词 数字水印 半脆弱 门票防伪 奇异值分解 混沌序列 digital watermark semi-fragile ticket anti-counterfeiting singularity value divides (SVD) chaos sequence
  • 相关文献

参考文献16

  • 1MOULIN P, O'SULLIVAN J A. Information-theoretic analysis of watermarking[C]. Proc. Int. Conf. On Ac., Sp.And Sig., Proc(ICASSP), lstanbul, Turkey, June 2000.
  • 2PETITCOLAS F A P, ANDERSON R J. KUHN A M. Information hiding-a survey[J]. Proceedings of the IEEE, Special Issue on Protection of Multimedia Content,1999, 87(7): 1062-1078.
  • 3TIRKEL A, RANKIN G, VAN S R, et al. Electronic watermark[C]. Proceedings DICTA, 1993:666-672.
  • 4MACQ B, DELAIGIE J F, VLEESCHOUWER D. Digital watermarking[C]. Proc. SPIE 2659; Optical Security and Counterfeit Deterrence Technique, 1996:99-110.
  • 5KUTTER M, WINKLER S. A vision-base masking model for spread spectrum image watermarking[J]. IEEE Trans. Image Processing, 2002,11 (1): 16-25.
  • 6罗雪萍.鲁棒性数字水印技术研究[D].兰州:兰州大学,2005.
  • 7胡惠博.抗拷贝攻击的盲图像数字水印方法[D].山东:山东大学,2005.
  • 8张春田,苏育挺,管晓康.多媒体数字水印技术[J].通信学报,2000,21(9):46-52. 被引量:95
  • 9KUNDUR D, HATZINAKOS D. A robust digital image watermarking method using wavelet-based fusion[C], Proc. of ICIP'97, 1997.
  • 10O'RUANAIDH J, DOWLING W, BOLAND F. Phase watermarking of digital images[C]. Proc. of ICIP'96, Vol.3, 1996:239-242.

二级参考文献19

  • 1Petitcolas F A P, Anderson R J, Kuhn M G. Attacks on copyright marking systems [A]. In: Proceedings of Workshop Information Hiding[C]. Portland, OR, USA, 1998: 218-238.
  • 2Herley C. Why watermarking is nonsense [J]. IEEE Signal Processing Magazine, 2002, 19(5) : 10-11.
  • 3Braudaway G W, Minter F. Automatic recovery of invisible image watermarks from geometrically distorted image[A]. In:Proceedings of SPIE Security and Watermarking of Multimedia Contents Ⅱ [C]. San Jose, CA, USA, 2000:74-81.
  • 4Ruanaidh J J. K. O. , Pun T. Rotation, scale and translation invariant spread spectrum digital image watermarking[J]. Signal Processing, 1998, 66(3): 303-317.
  • 5Andrews H, Patterson C. Singular value decomposition(SVD)image coding[J]. IEEE Transactions on Communications, 1976,24(4) : 425-432.
  • 6Liu R, Tan T. An SVD-based watermarking scheme for protecting rightful ownership [J]. IEEE Transactions on Multimedia, 2002,4(1) : 121-128.
  • 7Leon S J. Linear Algebra with Applications [M]. New York:Macmillan, 1986: 343-356.
  • 8Horn R A, Johnson C R. Matrix Analysis [M]. Cambridge:Cambridge University, 1985 : 431-432.
  • 9Miller M L, Bloom J A. Computing the probability of false watermark detection [A]. In: Proceedings of 3rd International Workshop Information Hiding [C], Dresden, Germany, 1999:146-158.
  • 10Hsuand J C T,IEEE Trans Image Processing,1999年,8卷,1期,58页

共引文献381

同被引文献24

  • 1牛少彰,伍宏涛,谢正程,刘歆,杨义先.抗打印扫描数字水印算法的鲁棒性[J].中山大学学报(自然科学版),2004,43(A02):1-4. 被引量:17
  • 2孙刘杰,庄松林.双随机相位加密同轴傅里叶全息水印防伪技术[J].光学学报,2007,27(4):621-624. 被引量:47
  • 3REDDY V P,VARADARAJAN D S.Human visual system sentient imperceptible and efficient wavelet-based water- marking scheme for copyright protection of digital images[J]. IJCSNC International Journal of Computer Science and Network Security, 2009,9(4) : 255-264.
  • 4CHO J S,SHIN S W,LEE W H,et al.Enhancement of robustness of image watermarkings into color image based on DWT and DCT[C].In:International Conference on Infor- mation Technology: Coding and Computing,San Jose, Las Vegas, USA : [s.n.], 2000 : 483-488.
  • 5CHEN B,WORNELL G W.Provably robust digital water- marking[C].In : Proc.of the SPIE : Multimedia Systems and Applications II.Bellingham :Society of Photo-Optical Instru- mentation Engineers, 1999.
  • 6PAN R,GAO Y X.Image watermarking method based on DWT transform[J].Journal of Image and Graphics, 2004,6 (6) : 613-620.
  • 7WU C,ZHU W P,SWAMY M N S.A watermark embedding scheme in wavelet transfrom domain[J].IEEE Region 10 Conference, 2004,1 (11) : 279-282.
  • 8EASLEY G, LABATE D, LIM W. Spae directional image represen- tations using discrete shearlet transform [ J ]. Appl. Comput. Har- mon. A-nal,2008,25 (11) :25--46.
  • 9CHANG C C, CHEN K N, LEE C F,et al. A secure fragile water- marking scheme based on chaos-and-hamming code[ J ]. Journal of Systems and Software ,2011,84 ( 3 ) : 1462-1470.
  • 10BABA S I, LALA Z K, THAWAR A ,et al. Watermarking of digital images in frequency domain[ J ]. International Journal of Automation and Computing,2OlO ,7 ( 1 ) : 17-22.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部