期刊文献+

基于混沌特性的小波数字水印算法研究 被引量:1

Research on Wavelet Digital Watermarking Algorithm Based on Chaotic Property
下载PDF
导出
摘要 为了提高水印信息的隐藏性和安全性,基于混沌序列的优良特性,本文提出了一种用于图像数字水印嵌入和检测的算法。由于混沌序列对初值具有敏感性,攻击者很难从一段有限长度的序列推断出整个混沌序列的初始条件,因此可保证水印信息的安全性。嵌入水印后的图像具有很好的不可见性,并且对常见的信号处理和噪声干扰具有较好的鲁棒性。  A wavelet watermarking algorithm based on the excellent property of chaotic sequence is proposed in this paper. Because the chaotic sequence is very sensitive to the initial value, the attackers cannot deduce the whole sequence from the finite sequence and the security of watermark information is ensured. At the same time, the proposed scheme has good robustness and imperceptibility to common information processing operations and noise attack.
出处 《科技广场》 2007年第5期132-134,共3页 Science Mosaic
关键词 数字水印 混沌特性 小波变换 Digital Watermarking Chaotic Property Wavelet Transform
  • 相关文献

参考文献5

二级参考文献18

  • 1谢荣生 秦红磊 郝燕玲 等.混沌二维置换网络的设计及其在图象数字水印隐藏中的应用[A]..信息隐藏(CIHW2000/2001)论文集[C].,2001.88—96.
  • 2[1]Chang-Hsing Lee,Yeuan-Kuen Lee.An Adaptive Digital lmage Watermarking Technique for Copyright Protection [J] .IEEE Transactions on Consumer Electronics,1999,45(4): 1005-1015.
  • 3[2]Christine I,Podilchuk,Wenjun Zeng.Image-adaptive Watermarking Using Visual Models[J].IEEE Journal on Selected Areas in Communications,1998,16(4) :525-539.
  • 4[3]Young-sik Kim,O-Hyung Kwon,Rae-Hong Park.Wavelet Based Watermarking Method for Digital Images Using the Human Visual System [J].Electronics Letters,1999,35 (6): 466-468.
  • 5[4]Chiou-Ting Hua,Ja-Ling Wu.Multiresolution Watermarking for Digital Image[J].IEEE Transaction on Circuits and System-II:Analog and Digital Signal Processing,1998,45 ( 8 ): 1097-1101 .
  • 6[5]Kennedy M P,Ogorxalek.Special Issual on Chaos Synchronization and Control: Theory and Application[J].IEEE Transactions on Circuits and Systems,1997,44(10): 853-1039.
  • 7[6]C I Podilchuk,W Zeng.Perceptual Watermarking of Still Images[J].in Proc.Of Wirkshop Multimedia Signal Processing,Princeton,NJ,June 1997.
  • 8[1]Provos N,Honeyman P. Detecting Steganographic Content on the Internet. Technical Report CITI 01-1a,University of Michigan, 2001.
  • 9[2]Kelley Jack. Terror groups hide behind Web encryption.http://www.usatoday.com/life/cyber/tech/2001-02-05-biladen.htm.
  • 10[3]Uma maheswaran Sekarj ,Detection of Hidden Information in Images Using Neutral Network.

共引文献64

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部