期刊文献+

基于人类视觉系统的自适应数字图像水印算法 被引量:2

Research on Adaptive Watermarking Techniques for Digital Images Based on HVS
下载PDF
导出
摘要 结合人类视觉系统(Human Visual System,HVS),对离散余弦变换(Discrete Cosine Transform,DCT)域水印算法进行改进,通过修改JPEG(Joint Photographic Experts Group,联合图像专家组)量化表得到自适应量化步长的量化表,用修正后的量化表对DCT系数进行量化,然后按照Zig-Zag扫描顺序实现自适应选择水印图像的嵌入频段(现有的算法大都选用固定步长和固定的嵌入频段)。实验表明,该算法具有很好的不可见性和稳定性。 This thesis researches the watermarking techniques.Through combining human visual system,an improved algorithm based on DCT transform is proposed.The way is to use the adaptive quantization on the basis of JPEG quantization table,and meanwhile selecting the place of watermark embedding improved.Experimental results show that the selection of embedded place makes algorithm adapted to the image with different general characters and local characteristics,and therefore it generates a lot of mobility.At the same time,good stability and visibility are testified from the experimental data and macroscopic observation.
作者 杜浩
出处 《计算机与现代化》 2011年第8期164-167,170,共5页 Computer and Modernization
关键词 人类视觉系统 离散余弦变换 量化 human visual system DCT quantization
  • 相关文献

参考文献17

二级参考文献51

  • 1[3]Nicchiotti G, Ottaviano. E Non-invertible statistical wavelet watermarking [A]. In: Proc. 9th Europ. Signal Processing Conf. (EUSIPCO'98) [C], Rhodes, Greece, USA, 1998:2289~2292. 被引量:1
  • 2[4]Nikolaidis N, Pitas I. Robust image watermarking in the spatial domain[J]. Signal Processing, 1998, 66(3): 385~403. 被引量:1
  • 3[5]Tzovaras D, Karagiannis N, Strintzis M G. Robust image watermarking in the subband or discrete cosine transform domain [A]. In: Proc. of the 9th European Signal Processing Conf.(EU-SIPCO'98) [C], Rhodes, Greece, USA, 1998: 2285~2288. 被引量:1
  • 4[6]Wolfgang R B, Delp E J. A watermark for digital images[A].In: Proceedings of the IEEE International Conference on Image Processing Ⅲ [C], Lausanne, Switzerland, 1996: 219~222. 被引量:1
  • 5[7]Fleet D J. Embedding invisible information in color images[A].In: Proceedings of the IEEE International Conference on Image Processing[C], Santa Barbara, CA, USA, 1997,1: 532 ~ 535. 被引量:1
  • 6[8]Bender W, Gruhl D, Morimoto N et al. Techniques for data hiding[J]. IBM System Journal, 1996, 35 (3-4): 313~337. 被引量:1
  • 7[9]Delaigle J F, De Vleeschouwer C, Macq B. Watermarking algorithm based on a human visual model[J]. Signal Processing,1998,66(3): 319~335. 被引量:1
  • 8[10]Ruanaidh J J K O, Pun T. Rotation, translation and scale invariant digital image watermarking[A]. In: Proceedings of the IEEE, International Conference on Image Processing[C], Santa Barbara, California, USA, 1997: 26~29. 被引量:1
  • 9[11]Ruanaidh J J K O, Pun T. Rotation, translation and scale invariant sprectrum digital image watermarking [J]. Signal Processing, Special Issue on Copyright Protection and Control,1998, 66(3): 536~539. 被引量:1
  • 10[12]Lin Ching-Yung, Wu Min, Jeffrey et al. Rotation, scale and translation resilient public watermarking for images[J]. IEEE Transactions on Image Processing, 2001, 10(5) :767~782. 被引量:1

共引文献127

同被引文献16

  • 1王宏霞,何晨,丁科.基于混沌映射的鲁棒性公开水印[J].软件学报,2004,15(8):1245-1251. 被引量:50
  • 2唐国坪,廖晓峰.基于混沌映射的抗剪切鲁棒水印算法[J].计算机工程,2005,31(9):34-36. 被引量:19
  • 3Liu Jian-ming, Lv Hui~ing. A New Dulling-Lorenz Chaotic Al- gorithm and Its Application in Image Eneryption[C]~//Interna- tional Conference on Control Engineering and Communication Technology (ICCECT). 2012 : 1022-1025. 被引量:1
  • 4Rahnama N,Talebi S. Secure communication via hybrid method in nonlinear chaotic systemsSeeure communication via hybrid method in nonlinear chaotic systems [C]//2012 20th Iranian Conference on Electrical Engineering (ICEE). 2012 : 1262-1267. 被引量:1
  • 5Rahnama N, Talebi S. Performance comparison of chaotic sprea ding sequences generated by 1D and 3D chaotic systems in a chaos-based DS-CDMA system[C]~//Sixth International Sympo- sium on Telecommunications (IST). 2012:404-409. 被引量:1
  • 6Tenny R,Tsimring L S. Additive mixing modulation for public key eneryption based on distributed dynamics[J]. IEEE Tran- sactions on Circuits and Systems, 2005,52(3) .. 672-679. 被引量:1
  • 7Mao Yao-bin, Chen Guan-rong. Chaos-based image eneryption [M]~//Handbook of Geometric Computing. 2005:231-265. 被引量:1
  • 8Cicek I, Pusane A E, Dundar G. Random number generation u- sing field programmable analog array implementation of logistic map[C]//Signal Processing and Communications Applications Conference (SIU). 2013 : 1-4. 被引量:1
  • 9Hsu Chien-Lung, Lin Tzu-Wei. Password authenticated key ex- change protocol for multi-server mobile networks based on Che- byshev chaotic map[C]//2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). 2013 .. 90-95. 被引量:1
  • 10Jin Chan-ho,Ryu Heung-Gyoon. Design of chaotic CDSK modu- lation system using different chaotic maps[C]//2013 15th Inter- national Conference on Advanced Communication Technology (ICACT). 2013 .. 222-226. 被引量:1

引证文献2

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部