Please wait a minute...
New Technology of Library and Information Service  2007, Vol. 2 Issue (6): 24-28    DOI: 10.11925/infotech.1003-3513.2007.06.06
Current Issue | Archive | Adv Search |
Digital Water Marking for Digital Anti-forgery Applied Research
Jin Dawei1,2   Zhou Ning1   Chen Yongyue1
1(Research Center of Information Resources,Wuhan University, Wuhan 430072, China)
2(Information School Zhongnan University of Economics & Law,Wuhan 430074,China)
Download: PDF(690 KB)   HTML  
Export: BibTeX | EndNote (RIS)      
Abstract  

This paper analyzes the digital watermark rationale, contrastes several kinds of commonly used digital watermarks algorithm.The paper introduces the Arnold digital image set at chaotic and the principle of inverse transformation return to original state.The algorithm feasibility and the toughness are carried out by Matlab. Finally, this paper realizes a digital watermark model based on Inter the OpenCV class and the Arnonld transformation.

Key wordsDigital water marking      Arnold transformation      Image encryption     
Received: 10 April 2007      Published: 25 June 2007
: 

G250

 
Corresponding Authors: Jin Dawei     E-mail: jindaweiok@yahoo.com.cn
About author:: Jin Dawei,Zhou Ning,Chen Yongyue

Cite this article:

Jin Dawei,Zhou Ning,Chen Yongyue. Digital Water Marking for Digital Anti-forgery Applied Research. New Technology of Library and Information Service, 2007, 2(6): 24-28.

URL:

http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2007.06.06     OR     http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2007/V2/I6/24

1Van Schyndel R G,  Tirkel A Z, Osborne C F. A DigitalWatermark. ICIP-1994: 86-90
2Ikolaidis N N.Copyright Protection of Images using RobustDigital Signatures. ICIP1996: 2168-2171
3Cox I J, Lilian J,  Leighton T,et al. Secure Spread Spectrum Watermarking for Multimedia NEC Technical report.1995
4Cox I J, Linnartz J-P M G. Some General Methods for Tampering with Watermarks. IEEE Journal on Selected Areas in Communications, 1998,16(4): 587-593
5Cox I J, Ki Lion J, Leightou T, et al.Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans on Image Processing, 1997,6(12): 1673-1687
6Cox I J , Miller M L , BloomJ A. 王 颖,黄志蓓等译.数字水印. 北京:电子工业出版社,2003
7Petitcolas F A P,Anderson R J,  Kuhn M G. Information Hiding-A Survey. IEEE, Special Issue on Protection of Multimedia Content,1999,87(7):1062-1078
8齐东旭,邹建成,韩效宥.一类新的置乱变换及其在图像信息隐蔽中的应用.中国科学(E辑),2000,30 (5):440-447
9张静,张春田.二值图像数字水印技术综述.计算机工程,2005,31(3):1-3,25
10尹浩,林闯,邱锋等.数字水印技术综述.计算机研究与发展.2005,42(7):1093-1099
11Zhang T, Ping X. A NewApproach to Reliable Detection of LSB Steganography in Natural Images. Signal Processing, Elsevier  Science,2003,83(10):2085-2093
12Zhou J C,Tang X H,Li G F.Mapping Transforms and Periodicity of Digital Watermarking.Transaction of North Industry University,2000,12(13):13-16
13陈铭,平西建. 基于Arnold变换的图像信息伪装算法. 计算机应用研究.2006,23(1):235-259

[1] Hao Shibo, Zhu Xuefang. An Image Zero-Watermarking Algorithm Using Block Compressive Sensing for Libraries, Museums and Archives[J]. 现代图书情报技术, 2014, 30(6): 87-93.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn