期刊文献+

基于三维轴距的水印算法

Watermarking Algorithm Based on 3D Wheelbase
下载PDF
导出
摘要 为了提高水印的不可见性和鲁棒性,设计了基于三维轴距的水印算法.首先利用计算鬼成像加密技术对原水印图像进行加密;然后在三维直方图的基础上定义图像的三维轴距,求得轴距最大时所有像素点的集合;最后借助粒子群优化算法,在集合中找到最好的点作为水印嵌的位置.不可见性和鲁棒性仿真实验结果表明,基于三维轴距的水印算法是有效性的. In order to obtain watermarking with superior robustness and invisibility,a watermarking algorithm based on 3D wheelbase is proposed.Firstly,the watermark image is encrypted by calculating the encryption technology of ghost imaging,then the 3D wheelbase of the image is defined on the basis of 3D histogram,and the set of all pixel points when the wheelbase is maximum is obtained.Finally,the best point in this set is found as the embedding position of the watermark through particle swarm optimization algorithm.Simulation experiments of robustness and invisibility show the effectiveness of the proposed algorithm.
作者 唐晗 陈留洋 鲁荣波 TANG Han;CHEN Liuyang;LU Rongbo(College of Information Science and Engineering,Jishou University,Jishou 416000,Hunan China;College of Land and Tourism,Luoyang Normal University,Luoyang 471934,Henan China)
出处 《吉首大学学报(自然科学版)》 CAS 2021年第3期29-33,共5页 Journal of Jishou University(Natural Sciences Edition)
关键词 计算鬼成像 三维轴距 粒子群 图像加密 鲁棒性 不可见性 computational ghost imaging three-dimensional wheelbase particle swarm image encryption robustness invisibility
  • 相关文献

参考文献5

二级参考文献18

  • 1张立保,马新悦,陈琪.基于感兴趣区的图像零水印算法[J].通信学报,2009,30(S2):117-120. 被引量:8
  • 2袁占亭,张秋余,陈宁.数字水印的鲁棒性分析与研究[J].计算机工程与设计,2005,26(3):614-616. 被引量:16
  • 3霍智勇,朱秀昌.基于LDPC码的数字图像水印技术研究[J].中国图象图形学报,2007,12(11):2018-2025. 被引量:6
  • 4ELSHAZLY E H,FARAGALLAH O S, MAHMOUD A M,et al. Robust and Secure Fractional Wavelet Image Water- marking[J]. Signal,Image and Video Processing,2015,9(1) :89 - 98. 被引量:1
  • 5LEE YANGSUN,KANG HEAU JO, KIM YOON-HO. Copyright Authentication Enhancement of Digital Watermarking Based on Intelligent Human Visual System Seheme[C]. 9th International Conference, KES 2005, Melbourne, Australia, 2005:567 - 572. 被引量:1
  • 6FATEMIZADEH E, MANESHI M. A New Watermarking Algorithm Based on Human Visual System for Content Integ- rity Verification of Region of Interest[J]. Comoutin: and Informaties.2012,31(4):877 -899. 被引量:1
  • 7FAZLI A R,SARBISHEIE G. A High-Security Image Watermarking Scheme Against Woa Attacks Using Ds Cdma and Entropy Criterion[J]. Arabian Journal Forence & Engineering, 20 14,39 (6) : 4 853 - 4 863. 被引量:1
  • 8KORUS P, BIALAS J, DZIECH A. A New Approach to High-Capacity Annotation Watermarking Based on Digital Foun- tain Codes[J]. Multimed Tools & Applications, 2014,68 (1) : 59 - 77. 被引量:1
  • 9MICHAEL L. LT Codes[C] // Proceedings of the 43rd Annual IEEE Symposium on the Foundations of Computer Sci- ence. Canada : IEEE Press, 2002 : 271 - 280. 被引量:1
  • 10INGEMAR J COX,JOE KILIAN,TOM LEIGHTON,et al. Secure Spread Spectrum Watermarking for Multimedia[J]. IEEE Transactions on Image Processing, 1997,6 (12) : 1 673 - 1 687. 被引量:1

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部