检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Amel Ali Alhussan Hanaa A.Abdallah Sara Alsodairi Abdelhamied A.Ateya
机构地区:[1]Department of Computer Sciences,College of Computer and Information Sciences,Princess Nourah bint Abdulrahman University,P.O.Box 84428,Riyadh,11671,Saudi Arabia [2]Department of Information Technology,College of Computer and Information Sciences,Princess Nourah bint Abdulrahman University,Riyadh,84428,Saudi Arabia [3]Department of Electronics and Communications Engineering,Zagazig University,Zagazig,Sharqia,44519,Egypt
出 处:《Computer Systems Science & Engineering》2023年第7期403-416,共14页计算机系统科学与工程(英文)
基 金:This work was supported by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2022R308);Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
摘 要:Securing medical data while transmission on the network is required because it is sensitive and life-dependent data.Many methods are used for protection,such as Steganography,Digital Signature,Cryptography,and Watermarking.This paper introduces a novel robust algorithm that combines discrete wavelet transform(DWT),discrete cosine transform(DCT),and singular value decomposition(SVD)digital image-watermarking algorithms.The host image is decomposed using a two-dimensional DWT(2D-DWT)to approximate low-frequency sub-bands in the embedding process.Then the sub-band low-high(LH)is decomposed using 2D-DWT to four new sub-bands.The resulting sub-band low-high(LH1)is decomposed using 2D-DWT to four new sub-bands.Two frequency bands,high-high(HH_(2))and high-low(HL_(2)),are transformed by DCT,and then the SVD is applied to the DCT coefficients.The strongest modified singular values(SVs)vary very little for most attacks,which is an important property of SVD watermarking.The two watermark images are encrypted using two layers of encryption,circular and chaotic encryption techniques,to increase security.The first encrypted watermark is embedded in the S component of the DCT components of the HL_(2)coefficients.The second encrypted watermark is embedded in the S component of the DCT components of the HH2 coefficients.The suggested technique has been tested against various attacks and proven to provide excellent stability and imperceptibility results.
关 键 词:WATERMARKING discrete wavelet transform discrete cosine transform singular value decomposition circular encryption chaotic encryption
分 类 号:TP309.7[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.142.187.179