2.765

2022影响因子

(CJCR)

  • 中文核心
  • EI
  • 中国科技核心
  • Scopus
  • CSCD
  • 英国科学文摘

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于线性空间隐藏模型的可逆图像水印算法

姜传贤 杨铁军 董明刚 程小辉 李智

姜传贤, 杨铁军, 董明刚, 程小辉, 李智. 基于线性空间隐藏模型的可逆图像水印算法. 自动化学报, 2014, 40(10): 2324-2333. doi: 10.3724/SP.J.1004.2014.02324
引用本文: 姜传贤, 杨铁军, 董明刚, 程小辉, 李智. 基于线性空间隐藏模型的可逆图像水印算法. 自动化学报, 2014, 40(10): 2324-2333. doi: 10.3724/SP.J.1004.2014.02324
JIANG Chuan-Xian, YANG Tie-Jun, DONG Ming-Gang, CHENG Xiao-Hui, LI Zhi. A Reversible Image Watermarking Algorithm Using Linear Space Hiding Model. ACTA AUTOMATICA SINICA, 2014, 40(10): 2324-2333. doi: 10.3724/SP.J.1004.2014.02324
Citation: JIANG Chuan-Xian, YANG Tie-Jun, DONG Ming-Gang, CHENG Xiao-Hui, LI Zhi. A Reversible Image Watermarking Algorithm Using Linear Space Hiding Model. ACTA AUTOMATICA SINICA, 2014, 40(10): 2324-2333. doi: 10.3724/SP.J.1004.2014.02324

基于线性空间隐藏模型的可逆图像水印算法

doi: 10.3724/SP.J.1004.2014.02324
基金项目: 

国家自然科学基金(61262076, 61262075, 61203109),广西省自然科学基金(2012GXNSFBA053172), 贵州省自然科学基金(QKH20102257), 桂林理工大学科研基金(002401003348)资助

详细信息
    作者简介:

    杨铁军 桂林理工大学信息科学与工程学院教授. 主要研究方向为图像处理.E-mail: yattie@163.com

A Reversible Image Watermarking Algorithm Using Linear Space Hiding Model

Funds: 

Supported by National Natural Science Foundation of China (61262076, 61262075, 61203109), Natural Science Foundation of Guangxi Province (2012GXNSFBA053172), Natural Science Foundation of Guizhou Province (QKH20102257), and Research Grant of Guilin University of Technology (002401003348)

  • 摘要: 提出一种基于线性空间隐藏模型的可逆图像水印算法.通 过对原始图像载体互不重叠的划分形成图像块序列,对其进行整数小波变换,获取待嵌水印子带.根据0/1水印序列和线性空间隐藏模型,将水印不可感知地嵌入到图像的小波域中,提高水印鲁棒性和不可见性. 只需判断奇偶性提取水印,并且通过简单逆向平移恢复原始.线性空间隐藏模型的提出实现了水印间相互独立,从而 使该算法能扩展到多著作权的无损水印领域.投票原则的使用又进一步提高水印的 鲁棒性和降低了误检率.在无外界干扰的条件下,拥有密 钥和其他秘密参数的用户能够无损恢复原始图像.仿真实验表明,与相关工作比较该算 法能应对一定程度的有损压缩和高斯噪声攻击,表现出 较高的鲁棒性、安全性和不可见性.
  • [1] Huang Ji-Wu, Tan Tie-Niu. A review of invisible image watermarking. Acta Automatica Sinica, 2000, 26(5): 645-655(黄继武, 谭铁牛. 图像隐形水印综述. 自动化学报, 2000, 26(5): 645-655)
    [2] [2] Barton J M. Method and Apparatus for Embedding Authentication Information within Digital Data, U.S. Patent 5646997, August 1997
    [3] Feng Ji, An Ling-Ling, Deng Cheng, Gao Xin-Bo. Encryption for image watermarking based on multiple cellular automata. Acta Automatica Sinica, 2012, 38(11): 1824-1830(冀峰, 安玲玲, 邓成, 高新波. 基于多重元胞自动机的图像水印加密算法. 自动化学报, 2012, 38(11): 1824-1830)
    [4] [4] Gao X B, An L L, Li X L Tao D C. Reversibility improved lossless data hiding. Signal Processing, 2009, 89(10): 2053-2065
    [5] [5] Fridrich J, Goljan M, Du R. Invertible authentication. In: Proceedings of in Photonics West 2001: Electronic Imaging, Security and Watermarking of Multimedia Contents III. San Jose, CA: SPIE, 2001. 197-208
    [6] [6] Chan Y K, Chen W T, Yu S S, Ho Y A, Tsai C S, Chu Y P. A HDWT-based reversible data hiding method. Journal of Systems and Software, 2009, 82(3): 411-421
    [7] [7] Tian J. Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology, 2003, 13(8): 890-896
    [8] [8] Naskar R, Chakraborty R S. Reversible watermarking utilising weighted median-based prediction. IET Image Processing, 2012, 6(5): 507-520
    [9] [9] Lee C C, Wu HC, Tsai C S, Chu Y P. Adaptive lossless steganographic scheme with centralized difference expansion. Pattern Recognition, 2008, 41(6): 2097-2106
    [10] Coatrieux G, Pan W, Cuppens-Boulahia N, Cuppens F, Roux C. Reversible watermarking based on invariant image classification and dynamic histogram shifting. IEEE Transactions on Information Forensics and Security, 2013, 8(1): 111-120
    [11] Gao X B, An L L, Yuan Y, Tao D C, Li X L. Lossless data embedding using generalized statistical quantity histogram. IEEE Transactions on Circuits and Systems for Video Technology, 2011, 21(8): 1061-1070
    [12] Wang Jun-Xiang, Ni Jiang-Qun, Pan Jin-Wei. A high performance reversible watermarking scheme baselineskip based on histogram shifting. Acta Automatica Sinica, 2012, 38(1): 88-96(王俊祥, 倪江群, 潘金伟. 一种基于直方图平移的高性能可逆水印算法. 自动化学报, 2012, 38(1): 88-96)
    [13] de Vleeschouwer C, Delaigle J F, Macq B. Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Transactions on Multimedia, 2003, 5(1): 97-105
    [14] Zou D K, Shi Y Q, Ni Z C, Su W. A semi-fragile lossless digital watermarking scheme based on integer wavelet transform. IEEE Transactions on Circuits and Systems for Video Technology, 2006, 16(10): 1294-1300
    [15] Ni Z C, Shi Y Q, Ansari N, Su W, Sun Q B, Lin X. Robust lossless image data hiding designed for semi-fragile image authentication. IEEE Transactions on Circuits and Systems for Video Technology, 2008, 18(4): 497-509
    [16] Zeng T Z, Ping L D, Pan X Z. A lossless robust data hiding scheme. Pattern Recognition, 2010, 43(4): 1656-1667
    [17] An L L, Gao X B, Li X L, Tao D C, Deng C, Li J. Robust reversible watermarking via clustering and enhanced pixel-wise masking. IEEE Transactions on Image Processing, 2012, 21(8): 3598-3611
    [18] An L L, Gao X B, Yuan Y, Tao D C. Robust lossless data hiding using clustering and statistical quantity histogram. Neurocomputing, 2012, 77(1): 1-11
    [19] An L L, Gao X B, Yuan Y, Tao D C, Deng C, Ji F. Content-adaptive reliable robust lossless data embedding. Neurocomputing, 2012, 79(1): 1-11
    [20] Irany B M, Guo X, Hatzinakos D. A high capacity reversible multiple watermarking scheme for medical images. In: Proceedings of the 2011 17th International Conference on Digital Signal Processing. Corfu, Italia: IEEE, 2011. 1-6
  • 加载中
计量
  • 文章访问数:  1416
  • HTML全文浏览量:  64
  • PDF下载量:  1116
  • 被引次数: 0
出版历程
  • 收稿日期:  2013-04-24
  • 修回日期:  2014-04-04
  • 刊出日期:  2014-10-20

目录

    /

    返回文章
    返回