期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Chaotic system and QR factorization based robust digital image watermarking algorithm 被引量:9
1
作者 宋伟 侯建军 +1 位作者 李赵红 黄亮 《Journal of Central South University》 SCIE EI CAS 2011年第1期116-124,共9页
In order to protect copyright of digital images,a new robust digital image watermarking algorithm based on chaotic system and QR factorization was proposed.The host images were firstly divided into blocks with same si... In order to protect copyright of digital images,a new robust digital image watermarking algorithm based on chaotic system and QR factorization was proposed.The host images were firstly divided into blocks with same size,then QR factorization was performed on each block.Pseudorandom circular chain(PCC) generated by logistic mapping(LM) was applied to select the embedding blocks for enhancing the security of the scheme.The first column coefficients in Q matrix of chosen blocks were modified to embed watermarks without causing noticeable artifacts.Watermark extraction procedure was performed without the original cover image.The experimental results demonstrate that the watermarked images have good visual quality and this scheme is better than the existing techniques,especially when the image is attacked by cropping,noise pollution and so on.Analysis and discussion on robustness and security issues were also presented. 展开更多
关键词 digital watermarking QR factorization pseudorandom circular chain logistic mapping
在线阅读 下载PDF
A new image watermarking framework based on levels-directions decomposition in contourlet representation
2
作者 M.F.Kazemi M.A.Pourmina A.H.Mazinan 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第3期521-532,共12页
With the development of digital information technologies,robust watermarking framework is taken into real consideration as a challenging issue in the area of image processing,due to the large applicabilities and its u... With the development of digital information technologies,robust watermarking framework is taken into real consideration as a challenging issue in the area of image processing,due to the large applicabilities and its utilities in a number of academic and real environments.There are a wide range of solutions to provide image watermarking frameworks,while each one of them is attempted to address an efficient and applicable idea.In reality,the traditional techniques do not have sufficient merit to realize an accurate application.Due to the fact that the main idea behind the approach is organized based on contourlet representation,the only state-of-the-art materials that are investigated along with an integration of the aforementioned contourlet representation in line with watermarking framework are concentrated to be able to propose the novel and skilled technique.In a word,the main process of the proposed robust watermarking framework is organized to deal with both new embedding and de-embedding processes in the area of contourlet transform to generate watermarked image and the corresponding extracted logo image with high accuracy.In fact,the motivation of the approach is that the suggested complexity can be of novelty,which consists of the contourlet representation,the embedding and the corresponding de-embedding modules and the performance monitoring including an analysis of the watermarked image as well as the extracted logo image.There is also a scrambling module that is working in association with levels-directions decomposition in contourlet embedding mechanism,while a decision maker system is designed to deal with the appropriate number of sub-bands to be embedded in the presence of a series of simulated attacks.The required performance is tangibly considered through an integration of the peak signal-to-noise ratio and the structural similarity indices that are related to watermarked image.And the bit error rate and the normal correlation are considered that are related to the extracted logo analysis,as well.Subsequently,the outcomes are fully analyzed to be competitive with respect to the potential techniques in the image colour models including hue or tint in terms of their shade,saturation or amount of gray and their brightness via value or luminance and also hue,saturation and intensity representations,as long as the performance of the whole of channels are concentrated to be presented.The performance monitoring outcomes indicate that the proposed framework is of significance to be verified. 展开更多
关键词 contourlet based watermarking framework levels-directions decomposition embedding process de-embedding process peak signal-to-noise ratio structural similarity indices normal correlation bit error rate
在线阅读 下载PDF
Research on secure buyer-seller watermarking protocol
3
作者 Liu Quan Chen Zheng Zhou Zude 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期370-376,384,共8页
A new buyer-seller watermarking protocol is proposed by applying a double encryption method and a novel mechanism of embedding a buyer's watermark. The protocol can effectively prevent against collusion attacks and t... A new buyer-seller watermarking protocol is proposed by applying a double encryption method and a novel mechanism of embedding a buyer's watermark. The protocol can effectively prevent against collusion attacks and the man in the middle attack if the third party is not trusted. Also, based on the proposed scheme for the first-hand transaction, a new buyer-reseller watermarking protocol and a formal multi-party watermarking protocol are also proposed. The proposed buyer-resell watermarking protocol only needs the original seller to provide transfer certificate and encryption-decryption service to support the second-hand transaction, and the multi-party watermarking protocol with distributed certificate authorities can overcome the difficulty in the combination of multicast mechanism with multiple unique watermarks and allow a seller to multicast the watermarked digital contents and key transaction information to n buyers. Furthermore, the idea of zero knowledge proof is also applied into the proposed scheme to allow the seller to take an effective control on the task performed by the third party. 展开更多
关键词 watermarking protocol zero knowledge proof distributed certification authorities.
在线阅读 下载PDF
Application of transmit diversity for improved robust watermarking 被引量:1
4
作者 Sun Rui Sun Hong Yao Tianren 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2004年第2期163-170,共8页
Many common multimedia signal processing,including cropping,filtering,and perceptual coding,make watermark signal fading-like modification.A scheme that applies transmit diversity technique to improve robustness of di... Many common multimedia signal processing,including cropping,filtering,and perceptual coding,make watermark signal fading-like modification.A scheme that applies transmit diversity technique to improve robustness of digital watermarking is presented.First,the scheme decomposes the original image using wavelet pyramid algorithm and chooses the middle-frequency band for transmission channel that the watermark will be embedded into.Then the watermark is pseudo-randomly permuted.The scheme makes use of space-time coding and differential detection technique to embed and extract watermark.The extracting process has access to neither the original image nor channel state information.Experimental results demonstrate that the scheme improves the performance of robust watermarking. 展开更多
关键词 digital watermark transmit diversity space-time coding differential detection wavelet transform.
在线阅读 下载PDF
基于Watson视觉感知模型的能量调制水印算法 被引量:16
5
作者 凌贺飞 卢正鼎 +1 位作者 邹复好 李瑞轩 《软件学报》 EI CSCD 北大核心 2006年第5期1124-1132,共9页
提出一种具有大容量、低复杂性的鲁棒水印算法,主要适合于(但不局限于)JPEG图像和MPEG视频流的实时水印嵌入与检测,因为该算法直接运行于DCT(discretecosinetransform)块数据上.算法主要通过在感知范围内修改DCT块的中低频系数来调制块... 提出一种具有大容量、低复杂性的鲁棒水印算法,主要适合于(但不局限于)JPEG图像和MPEG视频流的实时水印嵌入与检测,因为该算法直接运行于DCT(discretecosinetransform)块数据上.算法主要通过在感知范围内修改DCT块的中低频系数来调制块能量.在能量调制过程中,利用Watson视觉感知模型推导出一条准则,用于限制DCT系数的修改幅度.该系统具有较大的水印容量,可实现在512×512图像中嵌入2048比特.实验表明,算法不仅具有较好的透明性,而且对一些常见的攻击(如高斯噪声、低通滤波、JPEG压缩、增减亮度等)和部分几何攻击(如线性偏移、剪切等)具有较好的鲁棒性. 展开更多
关键词 数字水印 能量调制水印(energy MODULATED watermarking简称EMW) Watson视觉感知模型 离散余弦变换(discrete COSINE transorm简称DCT)
在线阅读 下载PDF
基于数字水印的消费者权益保护协议研究 被引量:6
6
作者 周四清 余英林 《计算机工程》 CAS CSCD 北大核心 2002年第1期73-74,共2页
在电子商务环境中,数字产品很容易被非法复制和传播,使版权人与消费者的权益都得不到有效的保护,无疑妨碍了电子商务的应用与发展。数字水印技术是保护数字产品知识产权的一个潜在解决方案。基于加密技术和数字水印技术,文章给出了版权... 在电子商务环境中,数字产品很容易被非法复制和传播,使版权人与消费者的权益都得不到有效的保护,无疑妨碍了电子商务的应用与发展。数字水印技术是保护数字产品知识产权的一个潜在解决方案。基于加密技术和数字水印技术,文章给出了版权人与消费者权益保护协议的形式化描述,为数字产品的网络发布提供安全保证。 展开更多
关键词 数字水印 电子商务 加密 消费者权益保护协议 数字产品 INTERNET
在线阅读 下载PDF
Novel copyright protection scheme for digital content 被引量:3
7
作者 Fan Kefeng Wang Meihua +1 位作者 Mo Wei Zhao Xinhua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第2期423-429,共7页
A novel copyright protection scheme for digital content is presented, which is a private watermarking scheme based on the watermark embedding in the DCT domain and watermark extraction Using independent component anal... A novel copyright protection scheme for digital content is presented, which is a private watermarking scheme based on the watermark embedding in the DCT domain and watermark extraction Using independent component analysis (ICA). The system includes the key for watermark extraction and the host image. The algorithm splits the original image into blocks and classifies these blocks based on visual masking, that is, noise visibility function (NVF). Watermark components with different strength are inserted into chosen direct current components of DCT coefficients according to the classifier. The watermark extraction is based on the characteristic of the statistic independence of the host image, watermark and key. Principle component analysis (PCA) whitening process and FastICA techniques are introduced to ensure a blind watermark extraction without requiring the original image. Experirnental results show the proposed technique is robust under attacks such as image filtering and adding noise, cropping and resizing. In addition, the proposed private watermarking system can be improved to the application of the DTV content protection system. 展开更多
关键词 digital content copyright protection digital watermarking noise visibility function independent component analysis.
在线阅读 下载PDF
A multiple watermarks algorithm for image content authentication
8
作者 蔡立军 李睿 易叶青 《Journal of Central South University》 SCIE EI CAS 2012年第10期2866-2874,共9页
A novel multiple watermarks cooperative authentication algorithm was presented for image contents authentication.This algorithm is able to extract multiple features from the image wavelet domain,which is based on that... A novel multiple watermarks cooperative authentication algorithm was presented for image contents authentication.This algorithm is able to extract multiple features from the image wavelet domain,which is based on that the t watermarks are generated.Moreover,a new watermark embedding method,using the space geometric model,was proposed,in order to effectively tackle with the mutual influences problem among t watermarks.Specifically,the incidental tampering location,the classification of intentional content tampering and the incidental modification can be achieved via mutual cooperation of the t watermarks.Both the theoretical analysis and simulations results validate the feasibility and efficacy of the proposed algorithm. 展开更多
关键词 multiple watermarks cooperation authentication wavelet transform image wavelet domain intentional contenttampering incidental modification
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部