期刊文献+

二值图像信息隐藏技术研究进展

在线阅读 下载PDF
导出
摘要 现代二值图像在多媒体产品中得到了广泛应用。但由于二值图像独有的特点,现有的用于灰度图像和彩色图像的信息隐藏技术不能直接应用到二值图像中。本文分析了二值图像的特点,并将近年来二值图像的信息隐藏研究成果进行了分类阐述,最后探讨了今后二值图像信息隐藏的发展前景。
作者 胡婧
出处 《中国新通信》 2006年第15期58-62,共5页 China New Telecommunications
  • 相关文献

参考文献22

  • 1[1]Chen J,Chen T-Sh.A novel data embedding method for two-color facsimile images.Proceedings of International Symposium on Multimedia Information Processing,Chung-Li,Taiwan,1998
  • 2[2]Pan G,Wu Y,Wu Z.A novel data hiding method for two color imges.Computer Science Information and Communication Security,Springer-Vertag,Nov2001.261~270
  • 3[4]Wi M,Tang E,Liu B.Data Hiding in digital binary images.IEEE Int' l Conf on Multimedia and Expo,2000
  • 4[5]Tseng Y,Pan H K.Secure and invisible data hiding in 2-color images.IEEE Symposium on Computers and Communications,2000
  • 5[6]Pan H K,Chen Y Y,Tseng Y C.A secure data hiding scheme for two-color images.IEEE Symposium on Computer and Communications,2000
  • 6[7]Bayer B E.An optimum method for two-color rendition of continuous-tone pictures.9th Proc IEEE Int Conf Commun,1973.2611 ~2615
  • 7[8]Flo Yd R W,Steinbergl.Adaptive algorithm for spatial gray scale.Proc SID Int Symp Tech Papers,1975.36~37
  • 8[9]Fu M S,Au O C.Data hiding for halftone images.SPIE Conf on Security and Watermarking of Multimedia Contents Ⅱ,2000,3971:228~236
  • 9[10]Fu M S,Au O C.Improved halftone images data hiding with intensity selection.IEEE International Symposium on Circuits and Systems,2001(5):243~246
  • 10[11]Wang H S A.Data hiding techniques for printed binary images.The International Conference on Information Technology:Coding and Computing,2001.2~4

二级参考文献12

  • 1[1]Nikolardis N, Pitas I. Robust image watermarking in the spatial domain [J]. Signal Processing, 1998, 66(3): 385-403.
  • 2[2]Shinfeng D Lin, Chin-Feng Chen. A robust DCT-based watermarking for copyright protection [J]. IEEE Transactions on Consumer Electronics, 2000, 46(3): 415-421.
  • 3[3]Jiwu Huang, Yun Q Shi. Adaptive Image Watermarking Scheme Based on Visual Masking [J]. Electronics Letters, 1998, 16th: 748-750.
  • 4[4]Steven H Low, Nicholas F Maxemchuk. Capacity of Text Marking Channel [J]. IEEE Signal Processing Letters, 2000, 7(12): 345-347.
  • 5[5]Bender W, Gruhl D, Morimoto N, Lu A. Techniques for data hiding [J]. IBM Syst. 1996, 3: 215-218.
  • 6[6]Brassil J, Low S, Maxemchuk N, O'Gorman L. Electronic marking and identification techniques to discourage document copying, IEEE J. Select. Areas Commun [J]. 1995, 13: 1122-1225.
  • 7[7]Brassil J T, Low S H, Maxemchuk N F. Copyright Protection for the Electronic Distribution of Text Documents [J]. 1999, Proc. Ieee, 87: 1181-1196.
  • 8[8]Lu H, Shi X, Shi Y Q, Kot A C, Chen L. Watermark embedding in DC components of DCT for binary images [C]. in proc. IEEE Int. Workshop on Multimedia Signal Processing, US Virgin Islands, 2002: 300-303.
  • 9Stefan Katzenbeisser,Fabien A P Petitcolas.Information Hiding Techniques for Steganography and Digital Watermarking[M].Artech House Publishers,2000.
  • 10[英]Stefan Katzenbeisser,Fabien A P Petitcdas.信息隐藏技术--隐写术与数字水印[M].吴秋新,钮心忻,杨义先,等译.北京:人民邮电出版社,2001.

共引文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部