江苏科技大学学报(自然科学版)
江囌科技大學學報(自然科學版)
강소과기대학학보(자연과학판)
Journal of Jiangsu University of Science and Technology(Natural Science Edition)
2015年
5期
454-461
,共8页
暴琳%李垣江%龚淼%张贞凯
暴琳%李垣江%龔淼%張貞凱
폭림%리원강%공묘%장정개
Tetrolet变换%混沌映射%奇异值分解%零水印
Tetrolet變換%混沌映射%奇異值分解%零水印
Tetrolet변환%혼돈영사%기이치분해%령수인
Tetrolet transform%chaos mapping%singular value decomposition%zero-watermark
文中提出了一种Tetrolet变换域中基于离散余弦变换( discrete cosine transformation,DCT)和奇异值分解( singular value decomposition,SVD)的彩色图像数字水印算法.该算法先对二值水印图像进行混沌加密预处理,对提取的彩色载体图像YCbCr空间的亮度分量进行Tetrolet变换,将三层低频子带系数进行分块DCT变换;再对DCT变换结果进行SVD分解;最后将加密水印的奇异值嵌入,并根据高频分量的特征信息提取零水印.水印检测时,在低频区域提取鲁棒水印,并在高频区域提取认证水印,同时实现图像版权保护和内容认证.仿真实验结果表明:该算法在保证水印安全性和不可感知性的基础上,对常规图像处理攻击以及几何攻击等均具有较好的稳健性.
文中提齣瞭一種Tetrolet變換域中基于離散餘絃變換( discrete cosine transformation,DCT)和奇異值分解( singular value decomposition,SVD)的綵色圖像數字水印算法.該算法先對二值水印圖像進行混沌加密預處理,對提取的綵色載體圖像YCbCr空間的亮度分量進行Tetrolet變換,將三層低頻子帶繫數進行分塊DCT變換;再對DCT變換結果進行SVD分解;最後將加密水印的奇異值嵌入,併根據高頻分量的特徵信息提取零水印.水印檢測時,在低頻區域提取魯棒水印,併在高頻區域提取認證水印,同時實現圖像版權保護和內容認證.倣真實驗結果錶明:該算法在保證水印安全性和不可感知性的基礎上,對常規圖像處理攻擊以及幾何攻擊等均具有較好的穩健性.
문중제출료일충Tetrolet변환역중기우리산여현변환( discrete cosine transformation,DCT)화기이치분해( singular value decomposition,SVD)적채색도상수자수인산법.해산법선대이치수인도상진행혼돈가밀예처리,대제취적채색재체도상YCbCr공간적량도분량진행Tetrolet변환,장삼층저빈자대계수진행분괴DCT변환;재대DCT변환결과진행SVD분해;최후장가밀수인적기이치감입,병근거고빈분량적특정신식제취령수인.수인검측시,재저빈구역제취로봉수인,병재고빈구역제취인증수인,동시실현도상판권보호화내용인증.방진실험결과표명:해산법재보증수인안전성화불가감지성적기출상,대상규도상처리공격이급궤하공격등균구유교호적은건성.
This paper presented a color image digital watermarking algorithm based on the discrete cosine trans-formation(DCT)and the singular value decomposition(SVD)in the Tetrolet transform domain.Firstly, the water-marking image was pretreated by chaotic encrypting.The Y branch of YCbCr space in the host image was trans-formed by the Tetrolet transform.Secondly, the three-level low-frequency coefficients were transformed by DCT and the results were decomposed by means of the SVD.Lastly, the encrypted watermark image was embedded into these coefficients.The zero-watermark was extracted in the high-frequency coefficients.Image copyright pro-tection and image content authentication were achieved by this new method.Simulation results show that the pro-posed watermarking algorithm has good security, visibility and robustness against common image processing and geometric attacks.