期刊文献+

多重数字水印嵌入技术的稳健性仿真研究 被引量:2

Multiple Digital Watermarking Embedding Technology Robustness Simulation
下载PDF
导出
摘要 研究用于数字图像版权保护的数字水印嵌入技术,为保证数字水印的抗攻击性嵌入多张数字水印,但传统的数字水印嵌入需多次操作嵌入水印,极易造成对前水印的损坏,导致数字水印的稳健性不高的问题。为了解决这一难题,提出了一种基于DCT变换的多重数字水印嵌入技术,通过将数字水印图像分块,并经DCT变换得到多个频率块,根据频率块系数选取出数字水印的多个特征频率块,利用DWT变换将多个特征频率块融合后进行DCT反变换得到单个融合的数字水印,完成多重数字水印的嵌入,避免了多次嵌入操作损坏前水印的问题。仿真结果表明,这种方法不仅能够保证数字水印的抗攻击性,而且具有较高的稳健性,取得了满意的结果。 Research the copyright protection for digital image watermarking embedding technology.This paper put forward a multiple digital watermark technology based on DCT transform.The digital watermark image was partitioned into blocks,and the DCT transform was used to obtain multiple frequency blocks.According to the coefficient of frequency blocks,of the frequency characteristics were selected and fused with DWT transformation,then the inverse DWT transform was used to get a single digital watermarking,thus complete multiple digital watermarking embedding.Simulation experiments show that the method can ensure watermark resistant to attackd with high robustness,and achieves satisfactory results.
作者 张敬 邱栋
出处 《计算机仿真》 CSCD 北大核心 2012年第5期291-294,共4页 Computer Simulation
关键词 数字水印 抗攻击性 稳健性 Digital watermarking Resistance to attack Robustness
  • 相关文献

参考文献5

二级参考文献73

  • 1俞银燕,汤帜.一种具有硬件适应性的数字内容版权保护机制[J].北京大学学报(自然科学版),2005,41(5):800-808. 被引量:13
  • 2Rosenblatt W.,Trippe W.,Mooney S.Digital Rights Management:Business and Technology.New York:M & T Books,2002 被引量:1
  • 3Garnett N.Digital rights management,copyright,and napster.ACM SIGecom Exchanges,2001,2(2):1~5 被引量:1
  • 4Davis R.The digital dilemma.Communications of the ACM,2001,44(2):77~83 被引量:1
  • 5Biddle P.,England P.,Peinado M.,Willman B.The darknet and the future of content distribution.In:Feigenbaum J.ed.Digital Rights Management,Lecture Notes in Computer Science 2696,Berlin:Springer-Verlag,2003,155 ~ 176 被引量:1
  • 6Sibert O.,Bernstein D.,Wie D.V.The DigiBox:A self-protecting container for information commerce.In:Proceedings of the 1st USENIX Workshop on Electronic Commerce,New York,1995,171~183 被引量:1
  • 7Konstantas D.,Morin J.H.Trading digital intangible goods:The rules of the game.In:Proceedings of the 33rd Hawaii International Conference on System Sciences,IEEE Computer Society,Maui,Hawaii,2000,3362~3371 被引量:1
  • 8Chong C.N.,Buuren R.,Hartel P.H.,Kleinhuis G.Security attributes based digital rights management.In:Boavida F.,Monteiro E.,Orvalho J.eds.Protocols and Systems for In teractive Distributed Multimedia,Lecture Notes in Compute Science 2515,Berlin:Springer-Verlag,2002,339~352 被引量:1
  • 9Yau J.C.K.,Hui L.C.K.etal.A digital rights managemen system for e-content.University of Hong Kong,Hong Kong HKU CSIS Technical Reports TR-2004-03,2004 被引量:1
  • 10Rump N.Definitions,aspects,and overview.In:Becker E.et al.eds.Digital Rights Management:Technological,Economic,Legal and Political Aspects,Lecture Notes in Computer Science 2770,Berlin:Springer-Verlag,2003,3~6 被引量:1

共引文献159

同被引文献7

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部