期刊文献+

基于块的小波域图像数字水印技术 被引量:3

A Block-Based Image Digital Watermarking Technique in DWT-Domain
在线阅读 下载PDF
导出
摘要 在数字化技术和网络技术迅速发展的今天,信息安全显得越来越重要,数字水印技术在版权保护方面的应用已成为信息安全领域的一个热点。利用小波变换和人类视觉特性的相似性,提出了一个基于块的小波域图像数字水印方案。该方案结合加密技术,通过密钥控制水印信号的嵌入,在不影响图像的感知质量的同时,对于常见攻击具有较好的稳健性,并且在水印提取过程中不需要原始图像。 Nowadays, information sees an increasing need for security, coupled with the rapid development of the digital and networks technologies. The digital watermarking technology is becoming a hot button issue in the field of information security, due to its application in copy right protection. The researches on the similarity between the characters of Human Visual System and the characters of Wavelet Transform lead to a new insight of digital watermarking algorithm based on block and DWT. This scheme, using the encrypting technology, controls the course of watermark embedding by keys, has its own robustness without much impact on the origin picture. And the origin picture is not necessary in the course of watermark extraction.
出处 《武汉理工大学学报(信息与管理工程版)》 CAS 2004年第1期15-18,25,共5页 Journal of Wuhan University of Technology:Information & Management Engineering
基金 北京大学视觉与听觉信息处理国家实验室基金资助项目(2003005).
关键词 数字水印 小波变换 版权保护 digital watermark wavelet transform copyright protection
  • 相关文献

参考文献6

二级参考文献17

  • 1[1]J Cox,J Kilian,T Leighton et al. Secure spread spectrum watermarking for multimedia[J].IEEE Trans on Image Processing,1997;6(12)
  • 2[2]JPEG2000 final committee draft[S].version 1.0,ISO/IEC FCD15444-1,2000
  • 3[3]Shapiro J M.Embedded image coding using zerotree of wavelet coefficients[J].IEEE Trans on Signal Processing, 1993 ;41 (12) :3445~3462
  • 4[4]A Said,W A Pearlman.A new,fast,and efficient image codec based on set partitioning in hierarchical trees[J].IEEE Trans on Circutes and System for Video Technology, 1996;6(3) :243~250
  • 5[5]M Ramkumar,A N Akansu,A A Alatan. On the choice of transforms for data hiding in compressed Video[C].In:Proce of ICASSP'99,Phoenix, AZ, USA, 1999: 3049~3052
  • 6[6]D Kundur,D Hatzinakos. Mismatching perceptual models for effective watermarking in the presence of compression[C].In:Proceedings of the SPIE Conference on Multimedia Systems and Applications,Boston,MA,USA
  • 7[7]R B Wolfgang,C I Podilchuk,E J Delp. The effect of matching watermark and compression transforms in compressed color images[C].In:ICIP'98, Chicago, IL, USA, 1998
  • 8[8]Mitchell D Swanson,Bin zhu,Ahmed H Tenfik. Multiresolution video watermarking using perceptual models and scene segmentation[C].In:ICIP97, California, USA, 1997
  • 9[9]Andrew B Waston,Gloria Y Yang,Joshua A Solomon et al.Visibility of wavelet quantization noise[J].IEEE Trans on Image Processing, 1997
  • 10[10]Raymond B Wolfgang,Christine I Podilchuk,Edward J Delp. Perceptual watermarks for digital images and video[J].Proceedings of the IEEE,Special issue on Identification and Protection of Multimedia Information, 1999; 87(7): 1108~1126

共引文献53

同被引文献20

  • 1熊昌镇,邹建成,齐东旭.一种基于混沌映射的数字图像加密新算法[J].中山大学学报(自然科学版),2004,43(A02):29-33. 被引量:17
  • 2[1]Suhail M A,Obaidat M S.A Robust Digital Watermarking Technique.IEEE Electronics,Circuits and sysytems,2000,2:629-632
  • 3[2]Wen Nung Lie,Guo Shiang Lin,Chih Liang Wu.Robust Image Watermarking On the DCT Domain.IEEE Circuits and Systems,2000,1:228-231
  • 4Hernandez J R, Amado M. DCT-Domain Watermarking Techniques for Still Images as Detector Performance Analysis and a New Structure[J]. IEEE Transactions on Image Processing,2000,9(1):55-68.
  • 5Ming-Shing Hsieh, Din-Chang Tseng. Hiding Digital Watermarks Using Multire- Solution Wavelet Tansform[J]. IEEE Transactions on Industrial Electronics, 2001, 48(5): 211-214.
  • 6Tsekeridou S,Solachidis V.Statistical of Water Marking System Based on Bernoulli Chaotic Sequence[J]. Signal Processing, 2001,81(6):1 273-1293.
  • 7Tompa M,Woll H.How to Share a Secret with Cheaters[J].Journal of Cryptology,1988,1(2):133-138.
  • 8Léger A,Omachi T,Wallace G.The JPEG still picture compression algorithm[J].In Optical Engineering,1991,30(7):947-954.
  • 9AIGRIER M,Kombinatorik[M].Berlin:Springer-Verlag,1975.
  • 10Boyar J,Chaum D,Damgard I.Convertible Undeniable Signatures[C]// Advances in Cryptology-CRYPTO '90 Proceedings.Springer-Verlag,1991:189-205.

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部