Computer Science ›› 2018, Vol. 45 ›› Issue (6): 135-140.doi: 10.11896/j.issn.1002-137X.2018.06.023
• Information Security • Previous Articles Next Articles
WANG Qian1, YU Lai-hang1,4, CAO Yan2, ZHANG Lei3, QIN Jie1, YE Hai-qin1
CLC Number:
[1]ZHU X S,CHEN Y M,DONG H H,et al.Robust Double Domain Watermarking for Binary Document Image[J].Chinese Journal of Computers,2014,37(6):1352-1364.(in Chinese) 朱新山,陈砚鸣,董宏辉,等.基于双域信息融合的鲁棒二值文本图像水印[J].计算机学报,2014,37(6):1352-1364. [2]CHEN Q,WENG X F.Novel blind image watermarking based on pseudo Zernike moments[J].Application Research of Computers,2016,33(9):2810-2818.(in Chinese) 陈青,翁旭峰.一种新的基于伪Zernike矩的图像盲水印算法[J].计算机应用研究,2016,33(9):2810-2818. [3]CHEN Y,ZHENG H Y,DING Q L.Watermarking Algorithm Based on Zernike Moments and NSCT-SVD[J].Computer Scien-ce,2016,43(8):84-88.(in Chinese) 陈盈,郑洪源,丁秋林.基于Zernike矩和NSCT-SVD的数字水印算法研究[J].计算机科学,2016,43(8):84-88. [4]HE C,ASHANF M R,TAMAKI S,et al.A New Robust Watermarking Algorithm for Digital Image Based on -SVD and Fibonacci Scrambling[J].Technical Report of Ieice Sat,2013,11(2):53-58. [5]ZHOU Y,ZENG F Z,ZHAO H M.Double Video Watermarking Algorithm Based on Compressive Sensing[J].ComputerScien-ce,2016,43(5):132-139.(in Chinese) 周燕,曾凡智,赵慧民.基于压缩感知的视频双水印算法研究[J].计算机科学,2016,43(5):132-139. [6]VARGHESE J,SUBASH S,HUSSAIN O B,et al.An improved digital image watermarking scheme using the discrete Fourier transform and singular value decomposition[J].Turkish Journal of Electrical Engineering & Computer Sciences,2016,24(5):3432-3447. [7]YAN F,WANG L Z,SHI L,et al.Digital Image Watermarking Algorithm Based on DWT and PNN[J].Natural Science Journal of Xiangtan University,2016,38(3):89-93.(in Chinese) 闫凤,王立中,石磊,等.基于DWT和PNN的数字图像水印算法[J].湘潭大学自然科学学报,2016,38(3):89-93. [8]WANG X,WANG P,ZHANG P,et al.A norm-space,adaptive,and blind audio watermarking algorithm by discrete wavelet transform[J].Signal Processing,2013,93(4):913-922. [9]MEHTA R,RAJPAL N.A hybrid semi-blind gray scale image watermarking algorithm based on DWT-SVD using human visualsystem model[C]//Sixth International Conference on Contemporary Computing.IEEE:Piscataway,NJ,2013:163-168. [10]ANSARI R,DEVANALAMATH M M,MANIKANTAN K, et al.Robust Digital image Watermarking Algorithm in DWT-DFT-SVD domain for color images[C]//International Confe-rence on Communication,Information & Computing Technology.IEEE:Piscataway,NJ,2012:1-6. [11]KESHAVARZIAN R.A new ROI and block based watermarking scheme using DWT [C]//Electrical Engineering.IEEE:Piscataway,NJ,2012:1323-1328. [12]GHAZALI N H,MANAF A A,SULONG G.High Capacity Watermarking Technique for Medical Images Using Fibonacci Decomposition[J].International Journal of Applied Engineering Research,2015,10(2):3431-3437. [13]CAI Y J,NIU Y G,SU Q T.Blind watermarking algorithm for color images based on DWT-SVD and Fibonacci transformation[J].Application Research of Computers,2012,29(8):3025-3028.(in Chinese) 蔡宜嘉,牛玉刚,苏庆堂.基于DWT-SVD和Fibonacci变换的彩色图像盲水印算法[J].计算机应用研究,2012,29(8):3025-3028. [14]DUBOLIA R,SINGH R,BHADORIA S S,et al.Digital Image Watermarking by Using Discrete Wavelet Transform and Discrete Cosine Transform and Comparison Based on PSNR[C]//International Conference on Communication Systems and Network Technologies.IEEE:Piscataway,NJ,2011:593-596. [15]YE T Y.Perfectly blind self-embedding robust quantization-based watermarking scheme in DWT-SVD domain[J].Journal of Image and Graphics,2012,17(6):45-51.(in Chinese) 叶天语.DWT-SVD域全盲自嵌入鲁棒量化水印算法[J].中国图象图形学报,2012,17(6):45-51. [16]ZHU L L,ZHANG J X,WANG B.Digital Watermarking for 3D Mesh Model Based on Roughness[J].Journal of Chongqing University of Technology (Natural Science),2014,28(2):87-91.(in Chinese) 朱利利,张建勋,汪波.基于粗糙度的三维网格模型数字水印[J].重庆理工大学学报(自然科学版),2014,28(2):87-91. |
[1] | LAI Teng-fei, ZHOU Hai-yang, YU Fei-hong. Real-time Extend Depth of Field Algorithm for Video Processing [J]. Computer Science, 2022, 49(6A): 314-318. |
[2] | SUN Jie-qi, LI Ya-feng, ZHANG Wen-bo, LIU Peng-hui. Dual-field Feature Fusion Deep Convolutional Neural Network Based on Discrete Wavelet Transformation [J]. Computer Science, 2022, 49(6A): 434-440. |
[3] | DAN Zhou-yang, LIU Fen-lin, GONG Dao-fu. Smoothing Filter Detection Algorithm Based on Middle and Tail Information of Differential Histogram [J]. Computer Science, 2021, 48(11): 234-241. |
[4] | XING Wen-bo, DU Zhi-chun. Digital Image Forensics for Copy and Paste Tampering [J]. Computer Science, 2019, 46(6A): 380-384. |
[5] | LIU Jia-hui, WANG Yu-jie, LEI Yi. CSI Gesture Recognition Method Based on LSTM [J]. Computer Science, 2019, 46(11A): 283-288. |
[6] | ZHANG Jing-xiao, XU Feng-sheng, LIU Xin-hua and ZHANG Li-hua. Outer Inverse P-sets and Double Information Camouflage-Recovery for Digital Image and its Application [J]. Computer Science, 2016, 43(2): 250-253. |
[7] | YANG Rui-da, XIA Shao-jie and TANG Yi-ping. Research on Key Technologies of 3D Fingerprint Based on Monocular Multi-view Machine Vision [J]. Computer Science, 2015, 42(Z6): 184-189. |
[8] | ZHANG Yong-hong. Algorithm of Digital Image Encrypting Based on Multi-chaotic Sequence Generated by Rational Bézier Surface [J]. Computer Science, 2015, 42(4): 136-140. |
[9] | LIU Jing and WEN Xian-bin. 3D Digital Watermarking Technology Based on Genetic Algorithm in Wavelet Domain [J]. Computer Science, 2014, 41(1): 300-302. |
[10] | DING Chang,YIN Qing-bo and LU Ming-yu. Summary of Partial Differential Equation (PDE) Method on Digital Image Processing [J]. Computer Science, 2013, 40(Z11): 341-346. |
[11] | . Study of Spatial Information Hiding Algorithm Based on MSB and HVS [J]. Computer Science, 2012, 39(9): 89-93. |
[12] | KANG Xiao-bing,WEI Sheng-min. Adaptive Threshold-based Detection Algorithm for Image Copy-move Forgery [J]. Computer Science, 2011, 38(3): 295-299. |
[13] | . License Plate Location Method Based on Image Region Segmentation [J]. Computer Science, 2011, 38(12): 281-283. |
[14] | TANG Yao,CAO Jian-zhong,LIU Bo,ZHOU Zuo-feng. FPGA Design of Wavelet Transform in Spatial Aircraft Image Compression [J]. Computer Science, 2010, 37(9): 261-263. |
[15] | . [J]. Computer Science, 2009, 36(2): 268-270. |
|