全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
电子学报  2006 

基于格的灰度级水印技术

, PP. 2438-2442

Keywords: 灰度级水印,小波,混沌序列,格矢量量化,D4格

Full-Text   Cite this paper   Add to My Lib

Abstract:

提出一个新的灰度级水印算法.首先,使用量化技术对灰度级水印进行预处理,实现灰度级水印的数据压缩;然后,对原始图像进行小波分解,在小波域中使用格矢量量化技术构造水印的嵌入和提取算法.提取水印不需要原图像.为增强水印的安全性,使用混沌序列作为密钥对水印序列进行调制.实验结果表明,与同类算法相比该算法在获得较好感知质量含水印图像的同时提高了水印的鲁棒性.

References

[1]  Cox I J,Kkllian J,et al.Secure spread spectrum watermarking for multimedia[J].IEEE Trans on Image Processing,1997,6(12):1673-1687.
[2]  Niu X M,Sun S H,Lu Z M,Efficient gray-level digital image watermarking based on vector quantization[J].Journal of Harbin Institute of Technology,2001,8(2):101-107.
[3]  钟桦,焦李成.自适应灰度级数字水印技术[J].计算机学报,2002,25(12):1364-1370.
[4]  张军,王能超.数字图像的自适应公开水印技术[J].计算机学报,2002,25(12):1371-1377.
[5]  Li X Q,Xue X Y.A novel blind watermarking based on lattice vector quantization[A].Proceeding of the Canadian Conference on Electrical and Computer Engineering[C].Niagara Falls,Canada:IEEE,2004,3.1823-1826.
[6]  Conway J H,Sloane N J A.Fast quantization and decoding algorithms for lattice quantizers and codes[J].IEEE Transaction on Information Theory,1982,28(2):227-232.
[7]  杨文学,赵耀.抵抗仿射变换攻击的多比特图像水印[J].信号处理,2004,20(6):245-250.
[8]  Dong P,et al.Digital watermarking robust to geometric distortions[J].IEEE Transaction on Image Processing,2005,14(12):2140-2150.
[9]  Hartung F,Kutter M.Multimedia watermarking techniques[J].Proceeding of IEEE,1999,87(7):1079-1107.
[10]  Cox I J,Miller M L.The first 50 years of electronic watermarking[J].EURASIP Journal on Applied Signal Processing 2002,2:126-132.
[11]  Petitcolas F A P,Anderson R J,Kuhn M G.Information hidinga survey[J].Proceedings of the IEEE,1999,87(7):1062-1078.
[12]  刘瑞桢,谭铁牛.基于奇异值分解的数字图像水印方法[J].电子学报,2001,29(2):168-170.Liu Rui-zhen,Tan Tie-niu.SVD based digital watermarking method[J].Acta Electronica Sinica,2001,29(2):168-170.(in Chinese)
[13]  Niu X M,Lu Z M,Sun S H.Digital watermarking of still image wilh gray-scale digital watermarks[J].IEEE Transaction on Consumer Electronics,2000,46(1):137-145.
[14]  Conway J H,Sloane N J A.Voronoi regions of lattices,second moments of polytopes,and quantization[J].IEEE Transaction on Information Theory,1982,28(2):211-226.
[15]  康显桂,黄继武,抗仿射变换的扩频图像水印算法[J].电子学报,2004,32(1):8-12.Kang Xian-gui,Huang Ji-wu.Spread-spectrum watermarking resists to affine transformation[J].Acta Electronica Sinica,2004,32(1):8-12.(in Chinese)

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133