期刊文献+

具有自适应性的半脆弱数字水印算法 被引量:5

Self-adaptive semi-fragile digital watermarking algorithm
在线阅读 下载PDF
导出
摘要 为了解决数字水印算法的鲁棒性与脆弱性之间的矛盾,提出了一种新的具有自适应性的半脆弱数字水印算法,重点介绍了数字水印的嵌入算法。该算法通过采用改进的低通滤波器,调整中间像素灰度、改变两端的灰度差分来实现水印的嵌入。实验结果表明,该算法对Photoshop下所有级别的JPEG压缩均具有鲁棒性,而对所有几何变换等恶意攻击具有脆弱性;并可根据所提取水印判断出恶意攻击的类型、程度、区域等特征,具有较好的自适应性。 In order to solve the contradiction between robustness and vulnerability of digital watermarking algorithm,this paper proposed a new self-adaptive semi-fragile digital watermarking method,with emphasis on digital watermarking embedding algorithm.By using improved low-pass filter,this algorithm adjusted gray value of middle pixel and changed gray-value diffe-rential of two terminal to embed the digital watermark.The experimental results show that this algorithm has strong robustness on all JPEG compression of Photoshop and has vulnerability for all geometric transformation malicious attacks.And from the extracted watermark,it can judge the characteristics of malicious attacks,such as types,extent and region.This algorithm shows good adaptability.
出处 《计算机应用研究》 CSCD 北大核心 2011年第5期1937-1939,共3页 Application Research of Computers
基金 河南省教育厅科技攻关资助项目(2010C510016)
关键词 数字水印 半脆弱 低通滤波器 灰度差分 梯度阈值 自适应性 digital watermarking semi-fragile low-pass filter gray-value differential gradient threshold self-adaptive
  • 相关文献

参考文献9

二级参考文献44

  • 1向德生,文宏,熊岳山.小波域鲁棒自适应图像水印嵌入方案[J].计算机工程与应用,2004,40(36):81-83. 被引量:9
  • 2孙宏伟,董未名,宋斌恒,孙家广.基于主分量分析和遗传算法的码书设计算法[J].计算机辅助设计与图形学学报,2004,16(12):1651-1655. 被引量:2
  • 3ZHU Bin SWANSON M D,TEWFIK A H. Transparent robust authentication and distortion measurement technique for images [ C ]//Proc of the 7th IEEE Digital Signal Processing Workshop. 1996:45-48.
  • 4LIN C Y, CHANG S F. Semi-fragile watermarking for authenticating JPEG visual content [ C ]// Proe of SPIE International Conference on Security and Watermarking of Multimedia Contents II. San Jose : [ s. n. ] ,2000:140-t5|.
  • 5WALTON S. Image authentication for a slippery new age [ J ]. Dr Dobb's J, 1995,20(4) : 18-26.
  • 6LEE Y K, CHEN L H. High capacity image steganography model [ J ]. IEE Proceedings-vision Image Signal Process, 2000,147 ( 3 ) : 288-294.
  • 7WANG Ran-zan, LIN Chi-fang, LIN Ja-chen. Image hiding by nptimal LSB substitution and genetic algorithm[ J ]. Pattern Recognit,2001 ,34(3) :671-683.
  • 8WANG C M,WU N I,TSAI C S,et al. A high quality steganographic method with pixel-value differencing and modulus function [J].The Joumal of Systems and Software,2008,83 (1) :150-158.
  • 9WU H C, WU N I, TSAI C S, et al. Image steganographic scheme based on pixel-value differencing and LSB replacement methods [ J ]. IEE Proceedings-vision Images Signal Process,2005,152 ( 5 ) : 611-615.
  • 10JUNG K H, HA K J, YOO K Y. Image data hiding method based on multi-pixel differencing and LSB substitution methods [ C ]//Proc of International Conference on Convergence and Hybrid Information Technology. Daejeon, South Korea: IEEE Press,2008 : 35- 358.

共引文献38

同被引文献53

引证文献5

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部