期刊文献+

以改进影像逼真度为约束条件的变换域水印嵌入强度 被引量:6

Upper limit of embedded strength of transformation domain digital watermarking under invisible target of improved image fidelity constraint
在线阅读 下载PDF
导出
摘要 在改进影像逼真度透明性指标约束下,对变换域数字水印各AC系数嵌入强度的上限进行了讨论,给出了满足改进影像逼真度约束的嵌入强度上限估计式.该结论及其推论可作为影像逼真度透明性指标的充分条件,用于确定数字水印的嵌入强度maxΔFuv及嵌入版本数r等具体参数.实验结果证明了该结论的有效性. The upper limit of embedded strength of transformation domain digital watermarking under the invisible target of improved image fidelity constraint is discussed. Also, the evaluation expression of embedded strength under the above constraint is presented. This conclusion and its inference can be regarded as a sufficient requirement, used to determine the embedding parameters of watermarking such as the embedded strength max |ΔFuv| and the number of embedded editions r. The experimental results have proved the validity of the conclusion.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2005年第3期339-343,共5页 Journal of Xidian University
关键词 影像逼真度 误差 水印 嵌入强度 Embedded systems Errors Image processing
  • 相关文献

参考文献3

二级参考文献30

  • 1易开祥.数字图像加密与数字水印技术研究[博士学位论文].杭州:浙江大学,2001 20-25.
  • 2[6]B Natarajan. Robust Public Key Watermarking of Digital Images[M].Computer Systems Laboratory,HP Labs, 1997
  • 3[7]P W Wong. Image Security and Watermarking[M].Imaging Tech Dept,HP Labs, 1996
  • 4[8]P W Wong. A Public watermark for image verification and autentication[C].In :Proceedings of the Internaltional Conference on Image Processing, Chicago, Illinois, 1998
  • 5[9]A Menezes,P van Oorschot,S Vanstone. Handbook of Applied Cryptography[M].CRC Press, 1996
  • 6[10]S Craver. Zero Knowledge Watermark Detection[C].In:Proceedings of the Third International Workshop on Information Hiding,Springer Lecture Notes in Computer Science , 2000 :101~116
  • 7[11]S Craver,S Katzenbeisser. Security Analysis of Pubic-Key Watermarking Schemes[M].2001
  • 8[12]J J Eggers,J K Su,B Girod.Asymmetric Watermarking Schemes[M].Proceedings sicherheit in Mediendaten, GMD Jahrestagung, Springer Verlag, 2000
  • 9[13]A Kerckhoffs. La Cryptographie Militaire[J].Journal des Sciences Militaires, 1883 ;9:5~38
  • 10[14]A Scholtz Robert.The origins of spread-spectrum communications[J].IEEE Transactions on Communications, 1982 ;822~853

共引文献30

同被引文献38

引证文献6

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部