基于反攻击的数字图像水印方法  

Counterattack-Based Digital Image Watermarking Method

在线阅读下载全文

作  者:梅时春[1] 李人厚[1] 罗印升[1] 党红梅[1] 

机构地区:[1]西安交通大学系统工程研究所

出  处:《小型微型计算机系统》2004年第10期1828-1830,共3页Journal of Chinese Computer Systems

摘  要:在实际应用中 ,加有水印的数字图像不可避免会遭到一些有意或无意的攻击 .针对一些常用的攻击方法 ,提出了一种反攻击方法和相应的水印算法 ;算法自适应地选择水印嵌入位置和确定水印序列长度 ;水印嵌入在 DWT域进行 ;根据人眼视觉掩蔽特性确定水印嵌入强度 .实验结果表明该方法具有较好的图像自适应性和水印不可见性 ;对JPEG压缩。In real application situation, the watermarked images are unavoidably manipulated by malicious attackers (such as collusion attackers, removal attackers) or those who are unintentional to distort the watermark using various manipulation tools. A counterattack method and a counterattack based watermarking algorithm are presented in this paper. The watermarking algorithm can select the position where the watermark is embedded and determine the length of the watermark adaptively with different images. The watermark is embedded into the coefficients of discrete wavelet transform (DWT) of the original images and the watermark strength is determined with human visual masking. The experiments show that the algorithm has good adaptivety and that the quality of watermarked images is guaranteed. The algorithm is very robust against attacks such as JPEG compression, the image filtering and the noise addition.

关 键 词:数字水印 反攻击 视觉掩蔽 

分 类 号:TP391[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象