[1]冯祥斌,陈永红.应用P-Fibonacci加密的模糊自适应水印算法[J].华侨大学学报(自然科学版),2014,35(3):287-292.[doi:10.11830/ISSN.1000-5013.2014.03.0287]
 FENG Xiang-bin,CHEN Yong-hong.A Novel Fuzzy Adaptive Watermarking Algorithm Based on P-Fibonacci Encryption[J].Journal of Huaqiao University(Natural Science),2014,35(3):287-292.[doi:10.11830/ISSN.1000-5013.2014.03.0287]
点击复制

应用P-Fibonacci加密的模糊自适应水印算法()
分享到:

《华侨大学学报(自然科学版)》[ISSN:1000-5013/CN:35-1079/N]

卷:
第35卷
期数:
2014年第3期
页码:
287-292
栏目:
出版日期:
2014-05-16

文章信息/Info

Title:
A Novel Fuzzy Adaptive Watermarking Algorithm Based on P-Fibonacci Encryption
文章编号:
1000-5013(2014)03-0287-06
作者:
冯祥斌 陈永红
华侨大学 计算机科学与技术学院, 福建 厦门 361021
Author(s):
FENG Xiang-bin CHEN Yong-hong
College of Computer Science and Technology, Huaqiao University, Xiamen 361021, China
关键词:
P-Fibonacci变换 Fibonacci P-code 位平面 数字水印 模糊归类 自适应 离散小波变换
Keywords:
P-Fibonacci transform Fibonacci P-code bit-plane digital watermarking fuzzy classified adaptive discrete wavelet transform
分类号:
TP391.41
DOI:
10.11830/ISSN.1000-5013.2014.03.0287
文献标志码:
A
摘要:
结合P-Fibonacci加密算法和模糊归类,提出一种自适应水印新算法.利用P-Fibonacci加密具有良好的均匀性及安全性,将水印图像的像素位置打乱,消除了二维数字水印图像的像素空间相关性,使嵌入水印后的块效应降低.对原始载体图像进行分块,结合人类视觉系统的纹理和照度掩蔽特性,得到纹理模糊函数和各图像子块的归类结果,并自适应地确定水印的嵌入强度.对载体图像的各子块进行离散小波变换(DWT),将经P-Fibonacci加密算法加密后的水印信息重复嵌入各子块DWT域的低频部分.实验结果表明:该算法抗JPE
Abstract:
A new adaptive watermarking algorithm based on P-Fibonacci encryption and fuzzy classified is proposed. The P-Fibonacci encryption has a good uniformity and safety, disrupting the watermark image’s pixel position by P-Fibonacci encryption algorithm, which can eliminate the spatial correlation of the two-dimensional digital watermark image pixels, and ultimately, reducing the blockiness when embedding watermark information. Simultaneously, blocked the original carrier image, and according to the texture and illumination masking characteristics of the human visual system, obtained a fuzzy function which based on the texture characteristics of the original image, establishing the texture fuzzy function and the classification results of each sub-block, according to the results, determined the embedding strength adaptively. Then discrete wavelet transform(DWT)is performed on the sub-images, and the encrypted watermarks were embedded in the low frequency of the DWT domain repeatedly. The experimental results show that the presented algorithm has a good robustness against common signal processing attacks such as JPEG compression, Gaussian noise, filtering and geometric attack such as cropping.

参考文献/References:

[1] REZA M S,KHAN M S A K,ALAM M G R,et al.An approach of digital image copyright protection by using watermarking technology[J].International Journal of Computer Science Issues,2012,9(2):280-286.
[2] MAO Jia-fa,ZHANG Ru,NIU Xin-xin,et al.Research of spatial domain image digital watermarking payload[J].Eurasip Journal on Information Security,2011,2011(2011):502748.
[3] KIM J,WON S,ZENG Wen-jun,et al.Copyright protection of vector map using digital watermarking in the spatial domain[C]//7th International Conference on Digital Content, Multimedia Technology and Its Applications.Busan:IEEE Computer Society Conference Publishing Services,2011:154-159.
[4] HAN Wei-yuan,YAN Yang,ZHI Hui-lai.Digital watermark encryption algorithm based on Arnold and DCT transform[C]//Proceedings of the 2011 International Conference on Electrical, Information Engineering and Mechatronics.Henan:Springer London Ltd,2012:613-621.
[5] XU Tian-qi,CHANG Di,ZHANG Xia.A video digital watermarking algorithm based on DCT domain[C]// 2nd International Conference on Consumer Electronics, Communications and Networks.Three Gorges:IEEE Computer Society Conference Publishing Services,2012:1600-1603.
[6] AGRESTE S,ANDALORO G,PRESTIPINO D,et al.An image adaptive, wavelet-based watermarking of digital images[J].Journal of Computational and Applied Mathematics,2007,210(1/2):13-21.
[7] HABIBOLLAH D,MORTEZA M,AKHLAGIAN T F.Robust blind DWT based digital image watermarking using singular value decomposition[J].International Journal of Innovative Computing,Information and Control,2012,8(7):4691-4703.
[8] SHARINGER J.Fast encryption of image data using chaotic Kolmogorov flows[J].SPIE,1997,7(2):318-325.
[9] MIYAMOTO M,TANAKA K,SUGIMURA T.Truncated baker transformation and its extension to image encryption[C]//Proceedings of SPIE on Advanced Materials and Optical Systems for Chemical.Boston:Society of Photo Optical,1999:13-25.
[10] ZOU Jian-cheng,WARD R K.Some novel image scrambling methods based on chaotic dynamical system[C]//Proceedings of the 9th Joint Inter Computer Conf.Zhuhai:IEEE Computer Society Conference Publishing Services,2003:188-191.
[11] ZOU Jian-cheng,WARD R K.Introducing two new image scrambling methods[C]//Proceedings of 2003 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing.Victoria:IEEE Computer Society Conference Publishing Services,2003:708-711.
[12] GEVORKIAN D Z,EGIAZARIAN K O,AGAIAN S S,et al.Parallel algorithms and VLSI architectures for stack filtering using Fibonacci P-codes[J].IEEE Transactions on Signal Processing,1995,43(1):286.

备注/Memo

备注/Memo:
收稿日期: 2012-11-17
通信作者: 陈永红(1974-),男,教授,主要从事图像处理、计算机控制、信息安全技术的研究.E-mail:djandcyh@163.com.
基金项目: 福建省自然科学基金资助项目(2011J05151 ); 华侨大学高层次人才科研启动项目(10Y0199); 教育部留学回国人员科研启动基金资助项目(2009年度)
更新日期/Last Update: 2014-05-20