期刊文献+

一种DCT域文档图像鲁棒性水印算法 被引量:1

A Robust DCT Domain Document Image Watermarking Algorithm
下载PDF
导出
摘要 本文提出了一种基于DCT域的文档图像水印算法。该算法利用文档图像自身的特性,通过将一个用于标识文档方向的水印信号和一个用于标识版权的水印信号嵌入图像DCT变换后的系数中,达到了较强的鲁棒性并能比较有效地防止因为旋转而引起的水印不可检测问题。 This paper presents a DCT coefficient based document image watermarking algorithm. The algorithm employs the self characteristics of a document image to embed a document direction identification watermark and a copyright identification watermark into the DCT coefficient of the document image. The algorithm therefore has better robustness and can effectively avoid the undetectable watermark caused by document image rotation.
出处 《山东科学》 CAS 2010年第2期54-57,共4页 Shandong Science
关键词 文档图像 水印算法 版权保护 document image watermarking algorithm copyright protection
  • 相关文献

参考文献7

二级参考文献41

  • 1F Hartung, J K Su, and B Girod. Spread spectrum watermarking:Malicious attacks and counterattacks[C]. in Proc.SPIE Security and watermarking of Multimedia Contents 99,San Jose, CA, Jan.1999. 被引量:1
  • 2J R Hernández, F Pérez-González and J M Rodríguez. The impact of channel coding on the profermance of spatial watermarking for copyright protection[C]. in Proc.IEEE ICASSP 98, Seattle, WA, May 1998. 被引量:1
  • 3M Kutter. Watermarking resisting to translation, rotation, and scaling[C]. in Proc.SPIE Int .Symp. on voice, video, and Data Communication, Nov.1998. 被引量:1
  • 4M Kutter, F Jordan. Digital signature of color images using amplitude modulation[J]. J.Electron.Imaging, Apr.1998, (7). 被引量:1
  • 5S Craver, N menon. On the invertibility of invisible watermarking techniques[C]. in Proc.IEEE ICIP'97, 1 :540-543. 被引量:1
  • 6G Nicchiotti and E Ottaviani. Non-invertible statistical wavelet watermarking[C]. Proc.Europ.Signal Processing Conf. Rhodes,Greece, Sept.1998. 被引量:1
  • 7L Qiao and K Nahrstedt. Watermarking schemes and protocols for protecting rightful ownership and customer's rights[J]. J.Visual Commun. Image Representation, Sept 1998, 9:194-210. 被引量:1
  • 8I Cox, J Kilian. Secure spread spectrum watermarking for images, audio and video[R]. NEC Res.Inst.Princeton,NJ Tech.Rep.95-10,1995. 被引量:1
  • 9H S Stone. Analysis of attacks on image watermarks with randomized coefficients[R]. NEC Res.Inst.Princeton.NJ,Tech.Rep., May 1996. 被引量:1
  • 10I Cox, J Kilian. Collusion-secure fingerprinting for digital data[J]. IEEE Trans.Inform.Theory, Sept 1998, 44. 被引量:1

共引文献444

同被引文献34

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部