期刊文献+

一种鲁棒性盲水印算法 被引量:6

Algorithm for robust blind image watermark
下载PDF
导出
摘要 鲁棒性数字水印特别是盲水印是保护数字作品版权的重要手段 .提出一种针对彩色图像的鲁棒性盲数字水印方法 .该方法根据灰度图水印信号序列 ,结合宿主图像DCT(DiscreteCosineTransformation)系数相关性自适应地嵌入水印信号 ,提取水印时不需要原始宿主图像 ,可以批量处理 ,适用在Internet上检测侵权数字作品 .实验结果证明该方法对JPEG有损压缩。 Based on DCT (Discrete Cosine Transformation) domain, an algorithm for robust blind color image watermark was presented. It inserted adaptively a gray image for watermark to a color image according to block correlation of DCT coefficients, and extracted watermark without the original image. It can be used to detect the piratical digital works on internet. Experimental results demonstrate that this algorithm is transparent and robust. It is strong to withstand JPEG compression, cropping and some other image processing attacks.
出处 《北京航空航天大学学报》 EI CAS CSCD 北大核心 2003年第10期905-908,共4页 Journal of Beijing University of Aeronautics and Astronautics
基金 国家 8 63基金资助项目 ( 2 0 0 2AA1170 2 0 )
关键词 数字图像处理 鲁棒性 数字水印 离散余弦变换 Algorithms Image processing Internet Pattern recognition Robustness (control systems)
  • 相关文献

参考文献7

  • 1Dittmann J, Steinmetz, Steinmetz R. Content-based digital signature for motion pictures authentication and content-fragile watermarking [A]. Proc of the 6th IEEE International Conference on Multimedia Computing and Systems [C]. Florence, Italy,1999.209~213
  • 2易开祥,石教英,孙鑫.数字水印技术研究进展[J].中国图象图形学报(A辑),2001,6(2):111-117. 被引量:161
  • 3Cox I J, Kilian J, Leighton F T, et al. Secure spread spectrum watermarking for multimedia[R]. Princeton, USA:NEC Research Institute, 1995
  • 4Craver S, Memon N, Yeo B L, et al. Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications[J]. IEEE Journal on Selected Areas in Communications, 1998, 16(4): 573~586
  • 5Zeng Wenjun, Liu Bede. A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images[J]. IEEE Transactions on Image Processing,1999,8(11): 1534~1548
  • 6Kutter M, Peticolas F A P. A fair benchmark for images watermarking[A]. Proceeding of SPIE[C]. 1999. 3657~3665
  • 7Pennebaker W B, Mitchell J L. JPEG: still image data compression standard[M]. New York: Van Nostrand Reinhold, 1993. 34~38

二级参考文献27

  • 1Q Ruanaidh J J, Dowling W J, Boland F M. Watermarking digital images for copyright protection. In: IEEE proceeding on Vision, Signal and Image Processing, 1996. 8,143 (4):250-256.
  • 2Bender W, Gruhl D, Morlmoto N et al, Techniques for data hiding. IBM System Journal, 1996,35(3&4):313-336.
  • 3Kobayashi. Digital watermarking:Historical roots. IBM Research Reports, Tokyo Research Laboratories, 1997.
  • 4Voyatzis G, Nikolaidis N, Pitas 1. Digital watermarking: An overview. In:9th European Signal Processing Conference.Island of Rhodes,Greece. 1998:9-12
  • 5Jiri Fridrich. Appiications of data hiding in digital images. In:the ISPAC'98 Conference in Melbourne, Australia, 1998.11.
  • 6Mahalingam Ramkumar. Data hiding in multimedia-theory and apphcations. [Ph. D. Degree], New Jerseyl Department of Electrical and Computer Engineering, New Jersey Institute of Technology,1999.
  • 7Cox I J, Matt L Miller. A review of watermarking and the importance of perceptual modeling. SPIE Proceeding on Human Vision and Electronic Imaging, 1997,3016:92-99.
  • 8Ramkumar M, Akansu A N. Image watermarks and counterfeit attacks: some problems and solutions. In: Proceeding on Content Security and Data Hiding in Digital Media Conference Newark, NJ, 1999,102-112.
  • 9Van Schyndel R, Tirkel A. Osborne C. A digital watermark,In: IEEE Proceeding on International Conference on Image Processing, Austin, Tex. , IEEE Press, 1994:86-90.
  • 10Maxemchuk N F. Electronic document distribution, AT&T Technical Journal, 1994. 9,73(5):73-80.

共引文献160

同被引文献29

引证文献6

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部