期刊文献+

基于DCT和DHT组合的半脆弱图像水印方案

Semi-Fragile Watermarking Scheme Based on DCT and DHT
在线阅读 下载PDF
导出
摘要 半脆弱性水印方案要求对一般的数字水印攻击具有一定的稳健性,同时具有一定的检测篡改能力.对DCT和DHT的组合变换特性进行了分析,设计了一种新的半脆弱性方案.该方案首先对图像作整体DCT变换,再选择DCT系数的中、低频域进行DHT变换,将水印信息嵌入在DCT和DHT变换后的系数中.选择DCT系数的中、低频域嵌入水印使水印具有一定的稳健性;DCT和DHT变换后的系数反映了图像的部分特征,对图像的篡改类型和区域具有一定的检测能力.实验验证了该方案的有效性. A semi-fragile watermarking scheme needs robustness to some common attacks and capability of checking tamper.The combination of DCT and DHT is analyzed.From the analysis,a novel semi-fragile watermarking scheme is presented.In this scheme,the host image is first transformed by DCT,then some region of low or middle frequency coefficients is chosen to be transformed by DHT.Last,the watermark is embedded into the region.The watermark embedded into the low or middle frequency coefficients is robust.After the tw...
出处 《吉首大学学报(自然科学版)》 CAS 2010年第1期30-34,共5页 Journal of Jishou University(Natural Sciences Edition)
基金 国家自然科学基金资助项目(60802047) 国家自然科学基金委员会与中国工程物理研究院联合基金资助(10776077)
关键词 数字水印 稳健性 半脆弱性 DCT DHT digital watermark robust semi-fragile DCT DHT
  • 相关文献

参考文献7

二级参考文献23

  • 1陈生潭,侯振华,王虹现.双重认证的变换域图像半脆弱数字水印算法[J].计算机辅助设计与图形学学报,2005,17(5):1114-1119. 被引量:10
  • 2王兴元,石其江.基于图像特征和超混沌迭代的图像认证算法[J].计算机研究与发展,2005,42(11):1896-1902. 被引量:11
  • 3李春,黄继武.一种抗JPEG压缩的半脆弱图像水印算法[J].软件学报,2006,17(2):315-324. 被引量:40
  • 4Lin C Y, Chang S F. Semi-fragile watermarking for authentication JPEG visual content [A]. In: Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents Ⅱ, San Jose, CA, 2000. 3971:140~151
  • 5Lu Zheming, Liu Chunhe, Xu Dianguo, et al. Semi-fragile image watermarking method based on index constrained vectorquantization [ J ]. IEE Electronics Letters, 2003, 39 (1): 35 ~36
  • 6Lu C S, Liao H Y M. Multipurpose watermarking for image authentication and protection [J ]. IEEE Transactions on Image Processing, 2001, 10(10): 1579~ 1592
  • 7Alexandre H Paquet, Rabab K Ward. Wavelet-based digital watermarking for image authentication [A] . In: IEEE Canadian Conference on Electrical and Computer Engineering, Winnipeg,Manitoba, 2002. 2:879~884
  • 8Yi Kaixiang, Shi Jiaoying. An adaptive 2-Dimension digital watermarking system [A] . In: Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents, San Jose, CA, 2001. 4314:560~566
  • 9Pennebaker W, Mitchell J L. JPEG Still Image Data Compression Standard [M]. van Nostrand Reinhold, Tomson Publishing Inc. 1993
  • 10Chao H M, Hsu C M, Miaou S G. A Data Hiding Technique with Authentication, Integration and Confidentiality for Electronic Patient Records. IEEE Trans Inf Technol Biomed, 2003, 6 (1): 46-53

共引文献66

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部