期刊文献+

基于曲波和混沌序列的数字图像脆弱水印算法

Digital Image Fragile Watermarking Algorithm Based on Curvelet and Chaotic Sequences
下载PDF
导出
摘要 提出一种基于曲波和混沌序列的数字图像脆弱水印算法.本算法采用混沌序列和位运算对水印图像进行加密,并使用曲波对载体和水印图像做变换.在嵌入强度上,为了能够具有更好的透明性,使用周围像素均值为依据,调整基本嵌入强度值,使得水印的透明性进一步增强.在进行曲波变换时,也采用效率比较高的Wrap-ping作为实现方法,有效地提高了算法效率.实验证明该算法对各种攻击具有较高的敏感性,可以作为图像认证的方法. Based on Curvelet and chaotic sequences,a digital image fragile watermarking algorithm is presented.The algorithm scrambling watermarking image used Logistic chaotic sequence and bit exchange and used Curvelet transform the initial image and watermarking image.According to the average coefficient,the algorithm is self-adjust the basic embed intension.The algorithm has highly efficiency for using the Wrapping.The large amount of emulation experiment indicates the algorithm has highly efficiency and security.And effect of concealing is very good.
作者 袁玲
出处 《喀什师范学院学报》 2010年第3期59-62,共4页 Journal of Kashgar Teachers College
关键词 数字水印 曲波 混沌 脆弱水印 The digital watermarking Curvelet Chaotic fragile watermarking
  • 相关文献

参考文献1

二级参考文献17

  • 1R G van Schyndel,A Z Tirkel,C F Osborne.A digital watermark.Proc.of the IEEE Int.Conf.on Image Processing,1994,2:86- 90. 被引量:1
  • 2R B Wolfgang,E J Delp.Fragile watermarking using the VW2D watermark.Proc.SPIE,Security and Watermarking of Multimedia Contents.California:San Jose,1999.204-213. 被引量:1
  • 3S Walton.Information authentication for a slippery new age.Dr.Dobbs Journal,1995,20(4):18-26. 被引量:1
  • 4P Wong.A watermark for image integrity and ownership verification.Proc.IS & T PIC.Portland:Oregon,1998. 被引量:1
  • 5M Yeung,F Mintzer.An invisible watermarking technique for image verification.Proc.ICIP' 97.California:Santa Barbara,1997. 被引量:1
  • 6Jiri Fridrich,M Goljan,N Memon.Further attacks on yeung-mintzer fragile watermarking scheme.Proc.SPIE Photonic West,Electronic Imaging 2000,Security and Watermarking of Multimedia Contents.California:San Jose,2000. 被引量:1
  • 7M Holliman,N Memon.Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes.IEEE Trans.on Image Processing,2001,9(3):432-441. 被引量:1
  • 8Jiri Fridrich,Miroslav Goljan,Arnold C Baldoza.New fragile authentication watermark for images.ICIP' 2000.Canada:Vancouver,2000. 被引量:1
  • 9S C Byun,I L Lee,T H Shin,B HAhn.A public key based watermarking for color image authentication.Proc.of ICASSP.2002. 被引量:1
  • 10P W Wong,N Memon.Secret and public key authentication watermarking schemes that resist vector quantization attack.Proc.of SPIE Security and Watermarking of Multimedia,2000,3971(40). 被引量:1

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部