首页 | 本学科首页   官方微博 | 高级检索  
     

基于二值化计算鬼成像的盲水印方法
引用本文:袁胜,王真,周昕,邴丕彬. 基于二值化计算鬼成像的盲水印方法[J]. 光子学报, 2020, 49(2): 179-187. DOI: 10.3788/gzxb20204902.0210003
作者姓名:袁胜  王真  周昕  邴丕彬
作者单位:华北水利水电大学 物理与电子学院,郑州 45004,四川大学 电子信息学院,成都,610065
基金项目:国 家 自 然 科 学 基 金;河 南 省 科 技 攻 关 计 划;河南省高等学校重点研发计划
摘    要:提出了一种基于二值化计算鬼成像的盲水印方法.首先将水印图像经计算关联成像加密系统加密,并将加密数据二值化,然后将其隐藏到宿主图像的离散余弦变换域,实现水印信息的嵌入.水印信息的提取和重建是隐藏和加密的逆过程,分别借助提取密钥和解密密钥获取水印信息.仿真实验证明,该方法具有很好的隐蔽性,在嵌入因子α=10时,嵌入水印仍具有较好的不可感知性,含水印图像的峰值信噪比在38 dB以上;另外,该方法也具有一定的容错能力,提取的加密数据错误率达20%时,重建的水印信息仍能分辨和识别;与传统的计算鬼成像相比,加密数据的二值化为水印嵌入提供了方便,但是并未对重建图像带来严重恶化,其相关系数相差不足0.1;水印信息的提取无需借助原始宿主图像,是一种盲提取方法.

关 键 词:光学信息安全  光学加密  盲水印  计算鬼成像  离散余弦变换

Blind Watermarking Method Based on Binarized Computational Ghost Imaging
YUAN Sheng,WANG Zhen,ZHOU Xin,BING Pi-bin. Blind Watermarking Method Based on Binarized Computational Ghost Imaging[J]. Acta Photonica Sinica, 2020, 49(2): 179-187. DOI: 10.3788/gzxb20204902.0210003
Authors:YUAN Sheng  WANG Zhen  ZHOU Xin  BING Pi-bin
Affiliation:(College of Physics and Electronics,North China University of Water Resources and Electric Power,Zhengzhou 450046,China;College of Electronics and Information Engineering,Sichuan University,Chengdu 610065,China)
Abstract:A blind watermarking method based on binarization computational ghost imaging was proposed.In this method,a watermark image is firstly encoded by the encryption system based on computational ghost imaging,and then the ciphertext is binarized and embedded in the discrete cosine transform domain of a host image to realize watermark embedding.The process of watermark extraction and reconstruction is the inverse process of embedding and encryption.The watermark is obtained by extraction key and decryption key.Simulation results show that this watermarking technique has good imperceptibility.When α=10,the watermark is also imperceptible and the peak signal-to-niose ratio of the host image containing watermark is above 38 dB.In addition,this method also has some fault tolerance ability.When the error rate of the extracted encrypted data reaches 20%,the reconstructed watermark information can still be distinguished and recognized.Compared with the traditional computational ghost imaging,binarization for the ciphertext data brings convenience for watermark embedding,but does not bring serious deterioration to reconstructed image,and the difference of correlation coefficient is less than 0.1.In the process of watermark extraction,it is unnecessary for the original host image,so it belongs to a blind extraction method.
Keywords:Optical information security  Optical encryption  Blind watermarking  Computational ghost imaging  Discrete cosine transformation
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号