首页 | 本学科首页   官方微博 | 高级检索  
     

基于DCT变换的脆弱水印技术
引用本文:张作林,陈建华. 基于DCT变换的脆弱水印技术[J]. 计算机工程与应用, 2005, 41(8): 78-80
作者姓名:张作林  陈建华
作者单位:福州大学计算机系,福州,350002
基金项目:福建省自然科学基金项目(编号:A0110009),福建省教育厅科研项目(编号:JB03026),福州大学科技发展基金项目(编号:2002-XQ-21)
摘    要:提出了一种用于图像鉴定的脆弱水印方法。该方法首先对图像进行8×8分块,计算每一块的DCT值,然后选择所要保护的区域,确定完全属于该区域的分块,并提取这些分块的特定位置的低频分量,采用Hash函数加密生成相应的具有固定长度的数字摘要,然后选取该数字摘要的若干位作为脆弱水印,并把其隐藏到该区域其余的DCT分块中去,以实现水印检测时不需要任何额外信息,试验表明这是一种行之有效的图像鉴别方法。

关 键 词:DCT变换  图像鉴别  脆弱水印  Hash函数
文章编号:1002-8331-(2005)08-0078-03

A Fragile Watermarking Technique Based on DCT Transform
Zhang Zuolin,Chen Jianhua. A Fragile Watermarking Technique Based on DCT Transform[J]. Computer Engineering and Applications, 2005, 41(8): 78-80
Authors:Zhang Zuolin  Chen Jianhua
Abstract:This paper proposes a fragile watermarking method for image authentication,in the method,the original image is firstly divided into 8×8 blocks,then choose the region to be protected.It calculates the DCT for each block and choose blocks completely belonging to the region,gets the lowest frequency components of specific positions from the blocks chosen,then encryptes them by the Hash function which generates the message digest with fixed length;chooses some bits of the message digest as the fragile watermark and hides it into other DCT blocks of the region in order to implement watermark detection without needing the original image.Experiments show that implementing image authentication using this method is very useful.
Keywords:Discrete Cosine Transfer  image authentication  fragile watermark  Hash function  
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号