期刊文献+

基于汉明码的文本可逆数字水印研究 被引量:2

Research on text reversible digital watermarking based on Hamming code
在线阅读 下载PDF
导出
摘要 提出了一种新颖的文本可逆数字水印算法。对载体文本进行预处理,将原始可替换同义词的编码值分组作为信息位进行汉明编码,将获得的监督码元比特流利用矩阵编码的方式通过插入空格嵌入到文本中。水印信息则分组利用同义词修改位置编码的方式选定同义词进行替换来实现嵌入。在提取时利用汉明码的译码原理与可替换同义词分组位置编码规则,提取出水印信息并对原始文本进行无损恢复,即实现了文本可逆数字水印。该算法不仅能有效恢复出原始文本,且具有良好的隐蔽性,增强了水印方案的实际应用能力。 This paper proposes a novel text reversible digital watermarking algorithm. The algorithm preprocesses the original text, using the hamming code to encode the coded values of the original grouped replaceable synonyms, which are regarded as the data bits, and then embeds the obtained parity bits into the text by inserting spaces with matrix coding.It selects a synonym to be replaced to embed the watermarking information according to the codes of the locations of the changed synonyms in a group. During the extraction, in terms of the decoding theory of Hamming code and the rule of encoding the location of the changed synonyms in a group, the watermarking information is extracted and the original text will be restored losslessly. This algorithm not only can recover the original text completely, but also can achieve good invisibility.Therefore, the watermarking proposed scheme has improved practical ability.
出处 《计算机工程与应用》 CSCD 北大核心 2016年第11期84-87,118,共5页 Computer Engineering and Applications
基金 国家自然科学基金(No.61202439 No.61103215) 湖南省教育厅一般项目(No.12C0011) 湖南省交通运输厅科技进步与创新项目(No.201334)
关键词 汉明码 矩阵编码 同义词替换 可逆数字水印 Hamming code matrix coding synonym substitution reversible digital watermarking
  • 相关文献

参考文献14

  • 1Feng J B,Lin I C,Tsai C S,et al.Reversible watermarking:current status and key issues[J].IJ Network Security,2006,2(3):161-170.
  • 2Honsinger C W,Jones P W,Rabbani M,et al.Lossless recovery of an original image containing embedded data:US,Patent 6,278,791[P].2001-08-21.
  • 3Coatrieux G,Le Guillou C,Cauvin J M,et al.Reversible watermarking for knowledge digest embedding and reliability control in medical images[J].IEEE Transactions on Information Technology in Biomedicine,2009,13(2):158-165.
  • 4谢于明,程义民,王以孝,郭志川.基于线性预测的图像无损信息隐藏方法[J].计算机辅助设计与图形学学报,2006,18(4):585-591. 被引量:8
  • 5姜传贤,陈孝威.鲁棒可逆文本水印算法[J].计算机辅助设计与图形学学报,2010,22(5):879-885. 被引量:11
  • 6Chang C C,Chen K N,Lee C F,et al.A secure fragile watermarking scheme based on chaos-and-hamming code[J].Journal of Systems and Software,2011,84(9):1462-1470.
  • 7Fei W,Tang X.Reversible text watermarking algorithm using prediction-error expansion method[C]//International Conference on Computer,Networks and Communication Engineering(ICCNCE 2013),2013.
  • 8Yang G,Li J,He Y,et al.An information hiding algorithm based on intra-prediction modes and matrix coding for H.264/AVC video stream[J].AEU-International Journal of Electronics and Communications,2011,65(4):331-337.
  • 9Lin I C,Hsu P K.A data hiding scheme on word documents using multiple-base notation system[C]//Proceedings 2010 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing,Darmstadt,Germany,2010:31-33.
  • 10Topkara U,Topkara M,Atallah M J.The hiding virtues of ambiguity:quantifiably resilient watermarking of natural language text through synonym substitutions[C]//Proc of the 8th ACM Multimedia and Security Workshop.New York:ACM,2006:164-174.

二级参考文献23

  • 1田源,程义民,王以孝.一种新的数据隐藏方法[J].电子学报,2004,32(9):1444-1447. 被引量:24
  • 2王冰,职秦川,张仲选,耿国华,周明全.图像为载体的信息隐藏数据量研究[J].计算机辅助设计与图形学学报,2004,16(7):999-1004. 被引量:2
  • 3张华熊,孙水发,仇佩亮.DCT域图像水印方案的可靠性分析[J].计算机辅助设计与图形学学报,2004,16(9):1231-1234. 被引量:6
  • 4程义民,谢于明,王以孝,郭志川.一种彩色视频信息的隐秘传输方法[J].中国图象图形学报(A辑),2005,10(1):93-97. 被引量:11
  • 5谢于明,程义民,王以孝,郭志川.基于线性预测的图像无损信息隐藏方法[J].计算机辅助设计与图形学学报,2006,18(4):585-591. 被引量:8
  • 6Honsinger C W,Jones P W,Rabbani M,et al.Lossless recovery of an original image containing embedded data:US,6278791[P].2001-08-21.
  • 7Coatrieux G,Guillou C L,Gauvin J M,et al.Reversible watermarking for knowledge digest embedding and reliability control in medical images[J].IEEE Transactions on Information Technology in Biomedicine,2009,13(2):158-165.
  • 8Low S H,Maxemchuk N F,Brassil J T,et al.Document marking and identification using both line and word shifting[C] //Proceedings of the 14th Annual Joint Conference on the IEEE Computer and Communications Societies,Boston,1995:853-860.
  • 9Topkara M,Topkara U,Atallah M J.Words are not enough:sentence level natural language watermarking[C] //Proceedings of the 4th ACM International Workshop on Content Protection and Security,Santa Barbara,2006:37-46.
  • 10Atallah M J,Raskin V,Crogan M,et al.Natural language watermarking:design,analysis,and a proof-of-concept implementation[M] //Lecture Notes in Computer Science,Heidelberg:Springer,2001,2137:185-200.

共引文献17

同被引文献13

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部