期刊文献+

一种基于灰度均匀分布的自适应文本可见水印算法

A self-adaptive text visible watermarking algorithm based on uniform distribution of gray level
下载PDF
导出
摘要 文本可见水印技术主要用于明确文本类数字媒体的版权标识,防止非法使用。现有文本可见水印算法的抗二值化攻击能力较差,为克服此缺陷,根据文本图像的灰度分布和纹理的特点,提出了一种基于灰度均匀分布的自适应文本可见水印算法。首先提取文本行轮廓,然后依据行轮廓自适应产生嵌入强度,再由嵌入强度对水印黑色像素进行筛选,最后将载体文本与筛选后的水印映射到同一灰度范围。该算法具有嵌入强度自适应、嵌入位置随机和抗二值化攻击等特点。实验结果显示,算法在不影响载体文本可读性的同时,具有良好的水印可视性和鲁棒性,适用于任何形式的二值文本和图形水印。 Text visible watermarking is mainly used for determining copyright of the text digital media in order to prevent illegal usage. In order to overcome the drawback that the existing text visible watermarking algorithms have weak binaryzation attack-resisting capability, the paper proposes a self-a- daptive text visible watermarking algorithm based on uniform distribution of gray level, according to the characteristics of gray level and texture of text image. Firstly, the row-outline of the cover text image is extracted, and the embedding strength of watermark is determined by the outline; Secondly, the embed- ding strength is used to select the black pixels of watermark. Finally, the cover text image and the wa- termark are mapped to the same gray-level range. The algorithm has advantages of adaptive embedding strength, random embedding position and strong binaryzation attack-resisting capability. The experi- mental results show that the algorithm has good visibility and robustness and it can apply to any forms of text and graphics watermark.
作者 李翔 丁文霞
出处 《计算机工程与科学》 CSCD 北大核心 2013年第7期71-76,共6页 Computer Engineering & Science
基金 国家自然科学基金资助项目(60902092)
关键词 文本图像 可见水印 二值化攻击 text image visible watermarking binaryzation attack
  • 相关文献

参考文献9

二级参考文献40

  • 1胡晶晶,孙星明.基于单词间字符统计特征的文本数字水印[J].计算机工程,2005,31(23):116-118. 被引量:7
  • 2LOW S H, MAXEMCHUK N, LAPONE A M. Document identification for copyright protection using centroid detection [ J]. IEEE Transactions on Communications, 1998, 46(3) : 372 -381. 被引量:1
  • 3Maxemchuk N F. Electronic document distribution [ J]. ATT Technical Journal, 1994, 73(5) : 73 - 80. 被引量:1
  • 4LOW S H, MAXEMCHUK N F, BRASSIL J T, et al. Document marking and identification using both line and word shifting[ J]. INFOCOM '95: Bringing hfformation to People, 14th Annual Joint Conference of the IEEE Computer and Communications Societies. Boston, MA, USA: IEEE Press, 1995,2853-860. 被引量:1
  • 5KIM Y W, OH I S. Watermarking text document images using edge direction histograms [ J]. Pattern Recognition Letters, 2004, 25 (11) : 1243 - 1251. 被引量:1
  • 6ZHAO J, KOCH E. Embedding robust labels into images for copyright protection[ J]. Proceedings of the international Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies. Vienna, Austria: [s. n.], 1995: 242- 251. 被引量:1
  • 7AMANO T, MISAKI D. A feature calibration method for watermarking of document images [ J]. Proceedings of the fifth international conference on document analysis and recognition. [ S. l. ] : IEEE Press, 1999:91-94. 被引量:1
  • 8CHEN P M. A visible watermarking mechanism using a statistic approach [ C]//WCCC-ICSP 2000: 5th International Conference on Signal Processing Proceedings. [ S.l. ] : IEEE Press, 2000, 2:910 -913. 被引量:1
  • 9RAJMOHAN M S K, RAMAKRISHNAN K R. Adaptive visible watermarking of images [ C]//IEEE International Conference on Multimedia Computing and Systems. [ S. l ] : IEEE Press, 1999, 1:568 - 573. 被引量:1
  • 10G W Braudaway, K A Magerlein, F C Mintzer. Protecting public-available images with a visible image watermark [A]. Proc. SPIE, Coal on Optical Security and Counterfeit Deterrence Techniques [C]. SPIE,1996.San Jose,CA,USA SPIE. 被引量:1

共引文献153

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部