文件名称:A-Watermarking-Algorithm(MATLAB)--
-
所属分类:
- 标签属性:
- 上传时间:2013-04-14
-
文件大小:741.47kb
-
已下载:1次
-
提 供 者:
-
相关连接:无下载说明:别用迅雷下载,失败请重下,重下不扣分!
介绍说明--下载内容来自于网络,使用问题请自行百度
盲水印提取时不需要参考原始载体图像,在信息隐藏、版权保护等方面具有更广泛的应用前景。提出的盲水印算法在分块离散余弦变换(DCT)和离散小波变换(DWT)的基础上,利用关系双方DCT系数和DWT系数在受到攻击时具有相同变化趋势的特点,采用关系嵌入和量化嵌入的自适应选择嵌入策略,较大幅度地提高了盲水印提取的鲁棒性。同时在量化嵌入中采用抖动调制,实现了水印透明性和鲁棒性调节的便捷性。大量仿真实验结果表明该算法对噪声干扰、低通滤波、JPEG压缩、对比度增强等攻击有很好的鲁棒性和透明性。关键词 数字水印盲水印关系嵌入量化嵌入离散余弦变换离散小波变换
按这篇文章的算法,自己编的matlab,没有攻击时水印提取率为1,加水印后图像PSNR有45+,。有攻击后提取率也有0.9+。-Blind watermark extraction can be fulfilled without referring to the original host image. Therefore it hasmuch
prospective applications in the fields of information hiding and copyright protection. Based on blocking Discrete Cosine
Transform (DCT) and blocking DiscreteWaveletTransform (DWT), the proposed blind watermarking algorithm uses an
embedding strategy of adaptively selecting either relationship embedding or quantization embedding. The relationship em-
bedding comes from the observation thatboth themagnitudes of coefficients concerned in the relationship usually have thesame change trend when the image is attacked. This strategy remarkably improves the robustness ofwatermark extraction.In addition, dithermodulation is used in quantization embedding, bywhich the tradeoff between transparency and robus-tness ofwatermarking can be easily adjusted. Simulation results show that the algorithm is fairly robust against the attacks such as noise, filtering, compression, and contrast
按这篇文章的算法,自己编的matlab,没有攻击时水印提取率为1,加水印后图像PSNR有45+,。有攻击后提取率也有0.9+。-Blind watermark extraction can be fulfilled without referring to the original host image. Therefore it hasmuch
prospective applications in the fields of information hiding and copyright protection. Based on blocking Discrete Cosine
Transform (DCT) and blocking DiscreteWaveletTransform (DWT), the proposed blind watermarking algorithm uses an
embedding strategy of adaptively selecting either relationship embedding or quantization embedding. The relationship em-
bedding comes from the observation thatboth themagnitudes of coefficients concerned in the relationship usually have thesame change trend when the image is attacked. This strategy remarkably improves the robustness ofwatermark extraction.In addition, dithermodulation is used in quantization embedding, bywhich the tradeoff between transparency and robus-tness ofwatermarking can be easily adjusted. Simulation results show that the algorithm is fairly robust against the attacks such as noise, filtering, compression, and contrast
(系统自动生成,下载前可以参看下载内容)
下载文件列表
一种基于关系和量化的强鲁棒性盲水印算法/
一种基于关系和量化的强鲁棒性盲水印算法/dct_dwt.m
一种基于关系和量化的强鲁棒性盲水印算法/dct_dwt_attack.m
一种基于关系和量化的强鲁棒性盲水印算法/fun_ner.m
一种基于关系和量化的强鲁棒性盲水印算法/fun_psnr.m
一种基于关系和量化的强鲁棒性盲水印算法/lena.bmp
一种基于关系和量化的强鲁棒性盲水印算法/sity-four.bmp
一种基于关系和量化的强鲁棒性盲水印算法/一种基于关系和量化的强鲁棒性盲水印算法.caj
一种基于关系和量化的强鲁棒性盲水印算法/新建 文本文档.txt
一种基于关系和量化的强鲁棒性盲水印算法/dct_dwt.m
一种基于关系和量化的强鲁棒性盲水印算法/dct_dwt_attack.m
一种基于关系和量化的强鲁棒性盲水印算法/fun_ner.m
一种基于关系和量化的强鲁棒性盲水印算法/fun_psnr.m
一种基于关系和量化的强鲁棒性盲水印算法/lena.bmp
一种基于关系和量化的强鲁棒性盲水印算法/sity-four.bmp
一种基于关系和量化的强鲁棒性盲水印算法/一种基于关系和量化的强鲁棒性盲水印算法.caj
一种基于关系和量化的强鲁棒性盲水印算法/新建 文本文档.txt
本网站为编程资源及源代码搜集、介绍的搜索网站,版权归原作者所有! 粤ICP备11031372号
1999-2046 搜珍网 All Rights Reserved.