期刊文献+

基于混沌与细胞自动机的数字水印模式 被引量:6

Digital Watermarking Pattern Based on Chaos and Cellular Automata
在线阅读 下载PDF
导出
摘要 本文提出了基于混沌与细胞自动机的数字自动转化为灰度图像的方法.数字作为密钥,不同数字能产生不同的灰度图像,其实现过程为数字作为种子,使用混沌迭代产生随机序列,然后转化成二值图像,经细胞自动机处理,再使用平滑过程,这样就产生了灰度图像.灰度图像作为嵌人宿主信号的数字水印模式,该水印模式的能量集中在低频.实验结果显示该水印模式有好的特性,使用该水印模式的水印算法能抵抗一些常见的攻击. An algorithm which automatically transforms number to gray-image using the number as key is proposed. Distinct number leads to distinct gray-image. Its implementation is that random sequence is made by chaotic iterations using number as seed, then the sequence is transformed to two-value image. By cellular automata processing and after smoothing operation the gray-image is generated. The gray-image is regarded as a digital watermarking pattern and the pattern has most of its power concentrated in low frequencies. The watermarking is embed into original image in spatial apace, and it is detected by using DCT. The experiment results show that the pattern has good property. The watermarking algorithm based on the pattern can resist some usual attacks.
出处 《电子学报》 EI CAS CSCD 北大核心 2004年第4期580-582,共3页 Acta Electronica Sinica
基金 国家自然科学基金重大研究计划项目(No.90104005) 国家自然科学基金(No.60173051) 教育部高等学校优秀青年教师教学 科研奖励基金
关键词 混沌 细胞自动机 数字水印模式 数字水印 Algorithms Chaos theory Image processing Security of data
  • 相关文献

参考文献9

  • 1Schyndel R G,Tirkel A Z,Osbome C F,A Digital Watermark[A].Proc of IEEE Int Conf Image Processing[C],Austin Texas,USA,1994,II,86-90.
  • 2Bender W,Gruhl D,Morimoto N,Techniques for Data Hiding[A].Proceeding of the SPIE,Storage and Retrieval for Image and Video Database III[C].San Jose,Feb,1995,2420,164-173.
  • 3David G Green.Cellular Automata[OL].http://life.csu.edu.au/complex/tutorials/tutorial1.html.
  • 4Rucker R,John W[OL].Http://www.ifs.tuwien.ac.at/-aschatt/info/ca/ca.html.
  • 5Alexander S.Cellular Automata[OL].http://www.fourmilab.ch/cellab/.
  • 6Jiri Fridrich,etc,Secure Encryption and Hiding of Intelligence Data,AFRL-IF-RS-TR,Mission Research Corporation,Final Technical Report[OL].1998,9.at http://www.rl.af.mil/programs/shid/
  • 7StefanKatzenbeisser FabienAPPetitcolas 吴秋新 译.Information Hiding Techniques for Steganography and Digital Watermarking[M].北京:人民邮电出版社,2001.35-36.
  • 8张军,王能超,施保昌.基于混沌映射和遗传算法的公开数字水印技术[J].模式识别与人工智能,2002,15(1):42-47. 被引量:13
  • 9王丽娜,于戈,王国仁.基于混沌特性改进的小波数字水印算法[J].电子学报,2001,29(10):1424-1426. 被引量:20

二级参考文献4

  • 1Horvatic P,Information Security for Global Information Infrastructures IFIP/SEC,2000年,181页
  • 2Zhang H,Optical Soc Am.B,1986年,3卷,2期
  • 3Swanson M D,IEEE Signal Processing Society 1997 Workshop on Multimedia Signal Processing
  • 4夏光升,陈明奇,杨义先,胡正名.基于模运算的数字水印算法[J].计算机学报,2000,23(11):1146-1150. 被引量:34

共引文献31

同被引文献43

  • 1王慧琴,李人厚,王志雄.基于DCT域的加密二值图像数字水印新算法[J].小型微型计算机系统,2003,24(1):103-106. 被引量:8
  • 2I J Cox,J Kilian,T Shamoon. Secure spread spectrum watermarking for multimedia[J].IEEE Trans on Image processing, 1997 ;6(12):1673~1687.
  • 3Kan Li,Xiao-ping Zhang. An image watermarking method integrating with JPEG-2000 still image compression standard[C].In:electrical computer engineering,IEEE CCECE Canadian conference on,2003;3:2051~2054.
  • 4Reza Safabakhsh,shiva Zaboli et al. Digital watermarking on still image using wavelet transform[C].In:proceedings of the international conference on information technology:coding and computing,IEEE,2004.
  • 5Wei Wei Xiao ,Zhen Ji et al.A watermarking algorithm based on chaotic encryption[C].In:proceedings of IEEE telecon 02,2002:545~548.
  • 6Stephane B,Boremi T,David S,et al.ICA for watermarking digital images[J].Journal of Machine Learning Research,2003,4:1471-1498.
  • 7Schyndel R,Tirkel A,Osborne C.A digital watermark[C]∥IEEE Proceedings of International Conference on Image Processing.Austin:IEEE Press,1994:86-90.
  • 8Podilchuk C I,Zeng W.Image-adaptive watermarking using visual models[J].IEEE Journal on Selected Areas in Communications,1998,16(4):525-539.
  • 9Jayant N,Johnston J,Safranek R.Signal compression based models of human perception[J].Proceedings of the IEEE,1993,81(10):1385-1422.
  • 10Cox J,Kilian J,Leighton F T,et al.Secure spread spectrum watermarking for images,audio,and vide[C]∥IEEE Proceedings of International Conference on Image Processing.Princeton:NEC Research Institute,1996:243-246.

引证文献6

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部