首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于JPEG2000攻击的数字水印技术研究
引用本文:任旭峰,张贵仓,苏燕燕.基于JPEG2000攻击的数字水印技术研究[J].苏州科技学院学报(自然科学版),2009,26(3):54-58.
作者姓名:任旭峰  张贵仓  苏燕燕
作者单位:西北师范大学,数学与信息科学学院,甘肃,兰州,730070
摘    要:基于JPEG2000压缩过程特性,在保持较高的对篡改检测能力情况下,提出了一种新的有效的抗JPEG2000压缩的水印算法,对嵌人水印图像做JPEG压缩,提取水印仍能保持很好的稳定性,并能抵抗一些常见的攻击。该算法根据图像相邻小波高频系数之间的大小关系,在JPEG2000压缩之后大多数没有发生变化这一事实,嵌入区域选择了中间频率,并使用Watson矩阵做量化调制参数。理论分析和实验结果表明:该算法的水印具有很好的抵抗JPEG2000压缩的能力,对恶意攻击有很好的篡改定位能力,并对其不可见性、检测篡改能力和JPEG2000压缩的鲁棒性做了测试。

关 键 词:数字水印  JPEG2000  图像压缩  小波变换  篡改检测

A Digital Watermarking Technology Research Resisting to JPEG2000 Attack
REN Xu-feng,ZHANG Gui-cang,SU Yan-yan.A Digital Watermarking Technology Research Resisting to JPEG2000 Attack[J].Journal of University of Science and Technology of Suzhou,2009,26(3):54-58.
Authors:REN Xu-feng  ZHANG Gui-cang  SU Yan-yan
Institution:(College of Mathematics and Information Science ,Northwest Normal University ,Lanzhou 730070, China)
Abstract:Based on the characteristic of JPEG2000 compression process, a new digital watermarking method is proposed while maintaining high detection ability to tamper. It accepts JPEG 2000 compression on the watermarked image to a pre-determined quality factor, and rejects malicious attacks. It is a fact that most of the coefficients of high frequency have the same relative energy relations after JPEG2000 compression,and Watson matrix is used to do quantitative modulation parameters. Experiments and theoretic analysis demonstrate a good performance in resisting to JPEG2000 compression and localizing tampered areas. A test of the invisibility, tamper detection capability and robustness of JPEG2000 compression is given.
Keywords:JPEG2000
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号