期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
基于动态失真补偿量化索引调制的可逆数据隐藏算法
1
作者 叶天语 钮心忻 +1 位作者 马兆丰 杨义先 《电子与信息学报》 EI CSCD 北大核心 2010年第6期1489-1492,共4页
不同于传统的失真补偿量化索引调制,该文提出了动态失真补偿量化索引调制的概念。两者的区别在于量化步长和失真补偿参数是否可变。首先推导出动态失真补偿量化索引调制可逆性的成立条件,然后推导出失真补偿参数的可允许范围,最后利用... 不同于传统的失真补偿量化索引调制,该文提出了动态失真补偿量化索引调制的概念。两者的区别在于量化步长和失真补偿参数是否可变。首先推导出动态失真补偿量化索引调制可逆性的成立条件,然后推导出失真补偿参数的可允许范围,最后利用可逆性设计一个具体的可逆数据隐藏算法。在只执行一遍时,它的数据隐藏率高达1bit每像素,高于其他可逆数据隐藏算法。另外,算法的动态特性有利于防止参数泄露。实验结果表明:不管初始条件如何,该算法既能正确解码出秘密信息,又能准确恢复原始载体。 展开更多
关键词 信息隐藏 动态失真补偿量化索引调制 可逆数据隐藏 数据隐藏率
在线阅读 下载PDF
A block-based secure and robust watermarking scheme for color images based on multi-resolution decomposition and de-correlation
2
作者 Muhammad IMRANz Bruce AHARVEY +1 位作者 Muhammad ATIF Adnan Ali MEMON 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2019年第7期946-964,共19页
This paper presents a block-based secure and robust watermarking technique for color images based on multi-resolution decomposition and de-correlation.The principal objective of the presented scheme is to simultaneous... This paper presents a block-based secure and robust watermarking technique for color images based on multi-resolution decomposition and de-correlation.The principal objective of the presented scheme is to simultaneously meet all the four requirements(robustness,security,imperceptibility,and capacity)of a good watermarking scheme.The contribution of this study is to basically achieve the four contradictory requirements that a good watermarking scheme must meet.To do so,different approaches are combined in a way that the four requirements are achieved.For instance,to obtain imperceptibility,the three color channels(red,green,and blue)are de-correlated using principal component analysis,and the first principal component(de-correlated red channel)is chosen for watermark embedding.Afterwards,to achieve robustness,the de-correlated channel is decomposed using a discrete wavelet transform(DWT),and the approximate band(the other three bands are kept intact to preserve the edge information)is further decomposed into distinct blocks.The random blocks are chosen based on a random generated key.The random selected blocks are further broken down into singular values and vectors.Based on the mutual dependency on singular values and vectors’matrices,the values are modified depending on the watermarking bits,and their locations are saved and used as another key,required when the watermark is to be extracted.Consequently,two-level authentication levels ensure the security,and using both singular values and vectors increases the capacity of the presented scheme.Moreover,the involvement of both left and right singular vectors along with singular values in the watermarking embedding process strengthens the robustness of the proposed scheme.Finally,to compare the presented scheme with the state-of-the-art schemes in terms of imperceptibility(peak signal-to-noise ratio and structural similarity index),security(with numerous fake keys),robustness(normalized correlation and bit error rate),and capacity,the Gonzalez and Kodak datasets are used.The comparison shows significant improvement of the proposed scheme over existing schemes. 展开更多
关键词 Copyright protection Data hiding Multi-resolution decomposition De-correlation SECURITY
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部