计算机科学 ›› 2014, Vol. 41 ›› Issue (12): 48-52.doi: 10.11896/j.issn.1002-137X.2014.12.011

• 第十届中国信息和通信安全学术会议 • 上一篇    下一篇

一个基于离散混沌加密的数字水印算法

陈河山,吕珍珍,罗伟   

  1. 河南大学 开封475001;解放军信息工程大学 郑州450004;解放军信息工程大学 郑州450004
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金(11204379),河南省科技创新杰出青年计划项目(104100510025)资助

Digital Image Watermarking Algorithm Based on Dispersed Chaotic Mapping System

CHEN He-shan,LV Zhen-zhen and LUO Wei   

  • Online:2018-11-14 Published:2018-11-14

摘要: 设计了一个基于离散混沌动力系统和小波分解的数字图像水印算法。在水印图像预处理阶段,利用Logistic映射生成的混沌序列对水印图像进行扩展置乱,再利用Logistic映射生成密钥来对水印信息进行加密,从而保证了水印信息的安全性。在水印图像嵌入阶段,对宿主图像进行三层小波分解,利用小波系数大小关系将水印嵌入到水平方向的高频系数中。分析和实验结果表明,该算法具有良好的鲁棒性,水印的安全性和不可见性明显优于常见算法。

关键词: 数字水印算法,离散混沌系统,Logistic映射

Abstract: This paper designed a digital image watermarking algorithm based on a dispersed chaotic mapping system and wavelet transform.In the process of preprocessing watermark,the Logistic mapping produces key to encrypt the grey value in the pixel to insure the security of watermark.In the process of embedding watermark,three-level wavelet decomposition on image is conducted and watermark is embedded in the high frequency wavelet coefficients according to the size of wavelet coefficients.Analysis and experiment results show that the algorithm possesses relatively strong robustness,and better security and transparency than ordinary algorithms.

Key words: Image watermarking,Dispersed chaotic mapping system,Logistic mapping

[1] 王宏霞,何晨,丁科.基于混沌映射的鲁棒性公开水印[J].软件学报,2004,15(8):1245-1251
[2] 唐国坪,廖晓峰.基于混沌映射的抗剪切鲁棒水印算法[J].计算机工程,2005,31(9):34-36
[3] Yuan Chun,Zhong Yu-zhuo,Yang Shi-qiang.Composite chaotic pseudo-random sequence encryption algorithm for compressed video[J].Tsinghua Science and Technology,2004,9(2):234-241
[4] Liu Jian-ming,Lv Hui-jing.A New Duffing-Lorenz Chaotic Algorithm and Its Application in Image Encryption[C]∥International Conference on Control Engineering and Communication Technology (ICCECT).2012:1022-1025
[5] Rahnama N,Talebi S.Secure communication via hybrid method in nonlinear chaotic systemsSecure communication via hybrid method in nonlinear chaotic systems[C]∥2012 20th Iranian Conference on Electrical Engineering (ICEE).2012:1262-1267
[6] Rahnama N,Talebi S.Performance comparison of chaotic spreading sequences generated by 1D and 3D chaotic systems in a chaos-based DS-CDMA system[C]∥Sixth International Symposium on Telecommunications (IST).2012:404-409
[7] Tenny R,Tsimring L S.Additive mixing modulation for public key encryption based on distributed dynamics[J].IEEE Tran-sactions on Circuits and Systems,2005,52(3):672-679
[8] Mao Yao-bin,Chen Guan-rong.Chaos-based image encryption[M]∥Handbook of Geometric Computing.2005:231-265
[9] 胡汉平,刘双红,王祖喜,等.一种混沌密钥流产生方法[J].计算机学报,2004,27(3):408-412
[10] Cicek I,Pusane A E,Dundar G.Random number generation using field programmable analog array implementation of logistic map[C]∥Signal Processing and Communications Applications Conference (SIU).2013:1-4
[11] Hsu Chien-Lung,Lin Tzu-Wei.Password authenticated key exchange protocol for multi-server mobile networks based on Chebyshev chaotic map[C]∥2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).2013:90-95
[12] Jin Chan-ho,Ryu Heung-Gyoon.Design of chaotic CDSK modulation system using different chaotic maps[C]∥2013 15th International Conference on Advanced Communication Technology (ICACT).2013:222-226
[13] 刘晓克,万里红,等.Henon映射的图像加密新算法[J].中国计量学院学报,2008,19(4):338-341
[14] 陈关荣,吕金虎.Lorenz系统族的动力学分析、控制与同步[M].北京:科学出版社,2003:2-40
[15] 王炳锡,等.数字水印技术[M].西安:西安电子科技大学出版社,2003
[16] 何岸,胡伟刚.中文文本数字水印算法的研究[J].中南林业科技大学学报:自然科学版,2011,1(8):204-210
[17] 高铁红,莫然.一种基于小波系数动态量化的鲁棒数字水印算法[J].武汉大学学报:理学版,2011,7(5):449-454
[18] 杜浩.基于人类视觉系统的自适应数字图像水印算法[J].计算机与现代化,2011,8:164-170
[19] Mehul R,Priti R.Discrete wavelet transform based multiple watermarking scheme[C]∥Proeeedings of IEEE Region 10 Technical Conference on Convergent Technologies for the Asia-Paci-fic 2003.Bangalore,India,2003:14-17
[20] 钮心忻.信息隐藏与数字水印[M].北京:北京邮电大学出版社,2004

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 编辑部. 新网站开通,欢迎大家订阅![J]. 计算机科学, 2018, 1(1): 1 .
[2] 雷丽晖,王静. 可能性测度下的LTL模型检测并行化研究[J]. 计算机科学, 2018, 45(4): 71 -75 .
[3] 孙启,金燕,何琨,徐凌轩. 用于求解混合车辆路径问题的混合进化算法[J]. 计算机科学, 2018, 45(4): 76 -82 .
[4] 张佳男,肖鸣宇. 带权混合支配问题的近似算法研究[J]. 计算机科学, 2018, 45(4): 83 -88 .
[5] 伍建辉,黄中祥,李武,吴健辉,彭鑫,张生. 城市道路建设时序决策的鲁棒优化[J]. 计算机科学, 2018, 45(4): 89 -93 .
[6] 史雯隽,武继刚,罗裕春. 针对移动云计算任务迁移的快速高效调度算法[J]. 计算机科学, 2018, 45(4): 94 -99 .
[7] 周燕萍,业巧林. 基于L1-范数距离的最小二乘对支持向量机[J]. 计算机科学, 2018, 45(4): 100 -105 .
[8] 刘博艺,唐湘滟,程杰仁. 基于多生长时期模板匹配的玉米螟识别方法[J]. 计算机科学, 2018, 45(4): 106 -111 .
[9] 耿海军,施新刚,王之梁,尹霞,尹少平. 基于有向无环图的互联网域内节能路由算法[J]. 计算机科学, 2018, 45(4): 112 -116 .
[10] 崔琼,李建华,王宏,南明莉. 基于节点修复的网络化指挥信息系统弹性分析模型[J]. 计算机科学, 2018, 45(4): 117 -121 .