首页 | 本学科首页   官方微博 | 高级检索  
     

基于函数映射机制的鲁棒性二重数字水印算法
引用本文:张渊,丁勇,罗小华. 基于函数映射机制的鲁棒性二重数字水印算法[J]. 医学教育探索, 2011, 0(3): 359-366
作者姓名:张渊  丁勇  罗小华
作者单位:浙江大学超大规模集成电路设计研究所,杭州 310027;浙江大学超大规模集成电路设计研究所,杭州 310027;浙江大学超大规模集成电路设计研究所,杭州 310027
基金项目:国家863高技术研究发展计划(2009AA011706);浙江大学基本科研业务费专项(KYJD09012)
摘    要:针对二重数字水印嵌入信息量相对较大及其水印之间相互干扰的特点,提出了一种基于函数映射机制的二重数字水印算法。将第一、二重水印建立某种函数映射关系,在嵌入水印时,只需嵌入一份水印样本,并结合小波变换、离散余弦变换和奇异值分解技术,将水印嵌入在寄主图像中。仿真实验结果表明:该算法不仅具有很好的透明性,而且对各种常规数字信号处理和几何攻击也有很强的鲁棒性。

关 键 词:数字水印; 小波变换; 离散余弦变换; 几何攻击
收稿时间:2010-10-20

Robust Dual Digital Watermarking Algorithm Based on Function Mapping Mechanism
ZHANG Yuan,DING Yong and LUO Xiao-hua. Robust Dual Digital Watermarking Algorithm Based on Function Mapping Mechanism[J]. Researches in Medical Education, 2011, 0(3): 359-366
Authors:ZHANG Yuan  DING Yong  LUO Xiao-hua
Affiliation:Institute of Very Large Scale Integrated Circuit Design, Zhejiang University, Hangzhou 310027, China;Institute of Very Large Scale Integrated Circuit Design, Zhejiang University, Hangzhou 310027, China;Institute of Very Large Scale Integrated Circuit Design, Zhejiang University, Hangzhou 310027, China
Abstract:For the dual digital watermarking, the information capacity to be embedded is relatively large and the two watermarks easily interfere with each other. Aiming at these characteristics, this paper proposes a robust dual digital watermarking algorithm by means of function mapping mechanism. In this algorithm, a kind of function mapping relationship between the first-level and the second-level watermarks is established. Thus, only one watermark is required during embedding watermarking. Then, the watermark is embedded into host image by using the discrete wavelet transform, discrete cosine transform and singular value decomposition technology. Experimental results show that the proposed scheme has better transparency, and stronger robustness to some common digital signal processing and geometrical attacks.
Keywords:digital watermarking   wavelet transform   discrete cosine transform   geometrical attacks
点击此处可从《医学教育探索》浏览原始摘要信息
点击此处可从《医学教育探索》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号