期刊文献+

一种格矢量量化半易损水印算法 被引量:5

Semi-fragile Watermarking Scheme Using Lattice Vector Quantization
下载PDF
导出
摘要 在抵抗JPEG压缩的同时保持较好的篡改检测能力是用于图像内容认证的半易损水印的关键问题.提出一种基于格的半易损水印算法,将图像的DCT变换系数分组量化为高维空间中的格点,通过比较格点坐标与DCT系数之间的关系自适应地在格点中嵌入水印信息.实验结果表明,与同类算法相比该算法具有较好的性能,含水印图像的峰值信噪比超过49dB,在抵抗质量因子为50的JPEG压缩的情况下仍具有较好的篡改检测和定位能力. The key point of semi-fragile watermark for image content authentication is resisting to JPEG compression while maintaining high detection ability to tamper. In this paper, a semi-fragile watermark based on lattice is proposed. First, the DCT coefficients of original image are grouped and quantized into lattice point in high-dimension space. Then, information bits are adaptively embedded into lattice according to comparing results between the DCT coefficient and coordinate of high-dimension lattice point. The Experimental results demonstrated that the proposed algorithm has the advantages than the others, PSNR of the watermarked image is larger than 49dB, and can effectively detect and localize the tampered area at the same time resist against JPEG compression with quality factor as low as 50.
出处 《小型微型计算机系统》 CSCD 北大核心 2009年第2期327-331,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60402008 60533100)资助 上海市教委科技发展基金项目(05AZ71)资助 上海市教委优秀青年教师科研专项基金项目资助
关键词 半易损水印 离散余弦变换 格矢量量化 semi-fragile watermark discrete cosine transform lattice vector quantization
  • 相关文献

参考文献2

二级参考文献15

  • 1Friedman G.L.. The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Transactions on Consumer Electronics, 1993, 39(4): 905~910. 被引量:1
  • 2Schneier B.. Applied Cryptography Second Edition: Protocols, Algorithms, and Source Code in C.2. New York: John Wiley & Sons, Inc., 1996. 被引量:1
  • 3Schyndel R.G.., Tirkel A.Z., Osborne C.F.. A digital watermark. In: Proceedings of the ICIP, Austin, Texas, 1994, 86~90. 被引量:1
  • 4Yeung M., Mintzer F.. An invisible watermarking technique for image verification. In: Proceedings of the ICIP, Santa Barbara, California, 1997, 680~683. 被引量:1
  • 5Fridrich J., Goljan M., Baldoza A.C.. New fragile authentication watermark for images. In: Proceedings of the ICIP, Vancouver, Canada, 2000, 446~449. 被引量:1
  • 6Wong P.W., Memon N.. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing, 2001, 10(10): 1593~1601. 被引量:1
  • 7Fridrich J.. Image watermarking for tamper detection. In: Proceedings of the ICIP, Chicago, 1998, 404~408. 被引量:1
  • 8Kundur D., Hatzinakos D.. Digital watermarking for telltale tamper proofing and authentication. Proceedings of the IEEE, 1999, 87(7): 1167~1180. 被引量:1
  • 9Lin Ching-Yung, Chang Shih-Fu. Semi-fragile watermarking for authenticating JPEG visual content. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents, EI'00, San Jose, CA, 2000, 140~151. 被引量:1
  • 10Bhattacha S., Kutter M.. Compression tolerant image authentication. In: Proceedings of the ICIP, Chicago, 1998, 435~439. 被引量:1

共引文献50

同被引文献48

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部