期刊文献+

基于广义Arnold变换与支持向量机的图像水印算法 被引量:2

Image Watermarking Scheme Based on Generalized Arnold Transform and Support Vector Machine
在线阅读 下载PDF
导出
摘要 提出了一种基于广义Arnold变换与支持向量机模型的图像数字水印算法.选定的二值水印图像经过置乱以后,水印的嵌入位置通过广义Arnold变换随机产生,利用部分选定位置图像块中像素之间的关系来训练支持向量机,并采用水印嵌入增强处理技术,加强了水印的嵌入强度.在训练好的支持向量机辅助下,水印的检测过程可以看作是嵌入算法的一个逆过程.实验结果表明,该算法具有较好的鲁棒性,能有效抵抗Jpeg压缩、噪声等多种攻击. An image watermarking scheme based on generalized Arnold transform and support vector ma- chine was proposed in this paper. Firstly, the watermark embedding positions and support vector machine training data selection were generated according to the given generalized Arnold transform, then the support vector machine was trained and the randomly permuted binary watermark was embedded into the host. The embedding strength was enhanced based on the watermark strengthen technique. Following the reverse step of the watermark embedding, the watermark could be extracted by the aids of the trained support vector ma- chine. The experimental results showed that the proposed scheme had good robustness against several attacks, such as Jpeg compression, noisy and shearing.
作者 付永钢
出处 《集美大学学报(自然科学版)》 CAS 2011年第1期65-70,共6页 Journal of Jimei University:Natural Science
基金 福建省自然科学基金项目(2007J0029 2009H0036) 厦门市科技项目(3502Z20103016 3502Z20075054) 集美大学优秀青年骨干教师基金项目(Z01108)
关键词 数字水印 鲁棒性 支持向量机 信息隐藏 广义Arnold变换 digital watermarking robustness support vector machine information hiding ized Arnold transform general
  • 相关文献

参考文献7

二级参考文献51

  • 1祁亨年.支持向量机及其应用研究综述[J].计算机工程,2004,30(10):6-9. 被引量:196
  • 2李旭,顾涛.基于神经网络的多类水印嵌入技术[J].计算机工程,2005,31(15):144-145. 被引量:3
  • 3刘建民,赵健,谢端.基于RBF神经网络的空域图像水印改进算法[J].计算机工程与应用,2005,41(36):36-38. 被引量:2
  • 4付永钢,申丽萍,申瑞民,卢宏涛.基于子采样方法的鲁棒性水印算法[J].上海交通大学学报,2005,39(12):1929-1932. 被引量:3
  • 5DEEPA KUNDUR, KANNAN KARTHIK. Video fingerprinting and encryption principles for digital fights management [J]. Proceedings of IEEE, 2004, 92(6):918-932.
  • 6CHAN C K, CHENG L M. Hiding data in images by simple LSB substitution [ J ]. Pattern Recognition, 2004, 37: 469-474.
  • 7VlVl OKTAVIA, WON - HYUNG LEE. A fragile watermarking technique for image authentication using singular value decomposition [ C ] //Advances in Multimedia Information Processing. LNCS Tokyo: Springer- verlag press, 2004: 42- 49.
  • 8LINE T, PODILCHUK C I, DELP E J. Detection of image alterations using semi-fragile watermarks [C] //SPIE Conference on Security and Watermarking of Multimedia Contents n. San Jose, USA: SPIE press, 2000: 152-163.
  • 9DITIMANN J. Content-fragile watermarking for image authentication [ C ] //Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents Ⅲ. San Jose, USA: SPIE press, 2001 : 175-184.
  • 10SHIHWEI S, TATE L, CHANG P C. Image watermarking synchronization by significant MSB plane matching [ C ] // Proceeding of 3^rd IEEE Pacific Rim Conference on Multimedia LNCS. Hsin-Chu, Taiwan: Springer-verlag press, 2002 : 468-476.

共引文献159

同被引文献24

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部