期刊文献+

基于NSCT-SVD的多重数字水印算法 被引量:10

Multiple Digital Watermarking Algorithm Based on NSCT-SVD
在线阅读 下载PDF
导出
摘要 针对现有水印算法难以抵抗多种类型攻击的问题,提出一种基于非下采样Contourlet变换(NSCT)和奇异值分解(SVD)的多重数字水印算法。该算法采用不同的密钥对水印信息进行Arnold置乱,其宿主图像经过二层NSCT变换后得到大小相同的低频子带和高频子带。为提高算法鲁棒性,对各子带进行奇异值分解,将3个加密水印信息重复嵌入到具有最大奇异值的NSCT域低频和高频子带的子块中。在水印检测时,从3个提取结果中选取归一化均方误差最小的水印作为最终水印。实验结果表明,该算法能够有效抵抗JPEG压缩、椒盐噪声、剪切和中值滤波等多种类型的攻击,并且在保证水印不可见的前提下,提高了水印的鲁棒性和嵌入容量。 Aiming at the problem that those existing digital watermarking algorithms are difficult in resisting kinds of attacks, a multiple digital watermarking algorithm based on Non-subsampled Contourlet Transform(NSCT) and Singular Value Decomposition(SVD) is presented The watermarking is scrambled by different keys, applying NSCT with two levels on the host image to get low and high frequency sub-bands with same size. It takes SVD operation for each sub-band, and embeds three encrypted copies of the watermarking into the maximum singular values of blocks in low and high frequency sub-bands of the NSCT domain respectively. In the extraction stage, the final watermarking is derived by choosing the minimum Normalized Mean Squared Error(NMSE) value amongst the three extracted watermarking. Experimental results show that the proposed algorithm can resist many types of attacks effectively, such as JPEG compression, pepper noise, cropping, median filter, etc, and it improves the robustness and embedding capacity of watermarking on the premise of guarantee the watermarking is invisible
出处 《计算机工程》 CAS CSCD 2014年第7期106-109,113,共5页 Computer Engineering
基金 湖南省教育厅科研基金资助项目(06C522)
关键词 数字水印 非下采样CONTOURLET变换 奇异值分解 ARNOLD置乱 鲁棒性 版权保护 digital watermarking Non-subsampled Contourlet Transform(NSCT) Singular Value Decomposition(SVD) Arnold scrambling robustness copyright protection
  • 相关文献

参考文献14

  • 1汪保友,王俊杰,胡运发.数字水印与版权保护[J].计算机应用与软件,2004,21(1):30-32. 被引量:30
  • 2Potdar V M,Han S. A Survey of Digital Image Watermarking Techniques[A].Perth,Australia,2005.709-716.
  • 3Do M N,Vetterli M. The Contourlet Transform:An Efficient Directional Multi-resolution Image Representation[J].IEEE Transactions on Image Processing,2005,(12):2091-2106.
  • 4Barni M,Bartolini F,Piva A. Improved Wavelet-based Water-marking Through Pixel-wise Masking[J].IEEE Transactions on Image Processing,2001,(05):783-791.
  • 5Jayalakshimi M,Merchant S N,Desai U B. Digital Water-marking in Contourlet Domain[A].Hong Kong,China:IEEE Press,2006.861-864.
  • 6Tao Peining,Eskicioglu P. A Robust Multiple Watermarking Scheme in the Discrete Wavelet Transform Domain[A].Philadelphia,USA,2004.133-144.
  • 7Ghannam S,Abou-Chadi F E Z. Enhancing Robustness of Digital Image Watermarks Using Contourlet Transform[A].Cairo,Egypt,2009.3645-3648.
  • 8Kaviani H R,Karimi N,Samavi S. Robust Watermarking in Singular Values of Contourlet Coefficients[A].Tehran,Iran,2011.1-5.
  • 9da Cunha A L,Zhou Jianping,Do M N. The Nonsubsampled Contourlet transform:Theory,Design and Applications[J].IEEE Transactions on Image Processing,2006,(10):3089-3101.
  • 10Gao Guangyong,Cai Baoqin,Xu Saowen. Watermark Performance Contrast Between Contourlet and Non-subsampled Contourlet Transform[A].Shenyang,China,2012.507-511.

二级参考文献27

  • 1景丽,肖慧敏.基于SIFT特征的小波域数字图像鲁棒水印方法[J].计算机应用研究,2009,26(2):766-768. 被引量:5
  • 2李敏,费耀平.基于队列变换的数字图像置乱算法[J].计算机工程,2005,31(1):148-149. 被引量:19
  • 3[1]Swanson,M.,Kobayashi,M.,and Tewfik,A.Multimedia data embedding and watermarking technologies.Proceedings of the IEEE,1998:86(6),1064~1087.
  • 4[2]Fabien,A.P.,Petitcolas,F.,Ross,J.Anderson and Markus G.Kuhn.Information Hiding-A Survey.Proceedings of the IEEE,1999:87(7),1062~1078.
  • 5[3]Cox,I.J.,Kilian,J.,and Leighton,T.,et al.Secure spread spectrum watermarking for multimedia.IEEE Trans.on Image Processing,1997:6(12),1673~1687.
  • 6[4]Wolfgang,R.B.,and Delp,E.J.Fragile watermarking using the VW2D watermark.Proceedings of the SPIE/IS&T Conference on Security and Watermarking of Multimedia Contents,SPIE Vol.3657,San Jose,CA,January 1999.
  • 7[5]Friedman,G.L.The trustworthy digital camera:restoring credibility to the photographic image.IEEE Trans.on Consumer Electronics,Vol.39,November 1993,905~910.
  • 8[6]Smith,J.R.and Comiskey,B.O.Modulation and information hiding in images.Proceedings of First Intern.Workshop on Information Hiding,R.Anderson ed.Lecture notes in Computer Science,Vol.1174,Springer Verlag 1996,207~226.
  • 9[7]Petitcolas,F.,and Anderson,R.Weaknesses of copyright marking systems.Proceedings of the ACM Multimedia and Security Workshop,Bristol,United Kingdom,September 1998,55~62.
  • 10Cox I J,MillerM L,Bloom J A.Digital watermarking[M].USA:Morgan Kaufman Publisher,2002:422-446.

共引文献53

同被引文献67

  • 1张勤,崔丽.基于DWT的一种数字水印算法[J].北京师范大学学报(自然科学版),2015,51(1):19-22. 被引量:21
  • 2王发玉,石真安.自发性臀筋膜室综合征1例报告[J].中医正骨,2005,17(1):55-55. 被引量:2
  • 3谢守江,张鸿宾,刘波.基于小波变换的3维网格水印[J].中国图象图形学报,2006,11(10):1387-1394. 被引量:3
  • 4李晓明,郑链,胡占义.基于SIFT特征的遥感影像自动配准[J].遥感学报,2006,10(6):885-892. 被引量:155
  • 5Kaufman G, Choi B. Ischemic necrosis of muscles of the buttock. A case report [ J ]. J Bone Joint Surg Am, 1972, 54(5) :1079 - 1082.
  • 6Evanski PM, Waugh TR. Gluteal compartment syndrome case reoort [ J ]. J Trauma, 1977,17 (4) :323 - 324.
  • 7蔡贤华,陈庄洪,徐永年,等.钝伤致不伴骨盆骨折的臀上动脉破裂一例[J].临床外科杂志,2000,8(1):24.
  • 8Do M N,Vetterli M.The Contourlet transform:an efficient directional multiresolution image representation [J].IEEE Transactions on ImageProcessing,2005,14(12):2091-2106.
  • 9Song Wei,Hou Jianjun,Li Zhaohong,et al.Chaotic system and QR factorization based robust digital image watermarking algorithm [J].Journal of Central South University of Technology,2011,18(1):116-124.
  • 10Mitra P,Gunjan R,Gaur M S.A multiresolution watermarking based on Contourlet transform using SVD and QR decomposition [C]Proc.of IEEE International Conference on Recent Advances in Computing and Software Systems. Chennai,India,2012:135-140.

引证文献10

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部