• 中国期刊全文数据库
  • 中国学术期刊综合评价数据库
  • 中国科技论文与引文数据库
  • 中国核心期刊(遴选)数据库
杜万鑫, 曹新玉, 潘明华. 基于DNA-DWT-FRFT的彩色图像水印算法[J]. 桂林电子科技大学学报, 2023, 43(3): 239-245.
引用本文: 杜万鑫, 曹新玉, 潘明华. 基于DNA-DWT-FRFT的彩色图像水印算法[J]. 桂林电子科技大学学报, 2023, 43(3): 239-245.
DU Wanxin, CAO Xinyu, PAN Minghua. Color image watermarking algorithm based on DNA-DWT-FRFT[J]. Journal of Guilin University of Electronic Technology, 2023, 43(3): 239-245.
Citation: DU Wanxin, CAO Xinyu, PAN Minghua. Color image watermarking algorithm based on DNA-DWT-FRFT[J]. Journal of Guilin University of Electronic Technology, 2023, 43(3): 239-245.

基于DNA-DWT-FRFT的彩色图像水印算法

Color image watermarking algorithm based on DNA-DWT-FRFT

  • 摘要: 在数字水印算法中通常存在水印不可见性与鲁棒性难以权衡的问题,为解决该问题,提出一种基于DNA-DWT-FRFT的数字水印算法。利用DNA编码实现水印图像的置乱加密,得到水印密文序列;对载体图像进行8×8分块处理,然后对每个子块做一级离散小波变换(DWT),之后选择低频子带的系数并求出特征向量组,最后进行分数阶傅里叶变换(FRFT),将特征向量组由时域表示转换为频域表示;通过改进的DWT变换和定义的随机因子F1F2,根据水印密文序列更新F1F2,再利用F1F2确定水印嵌入位置,并对载体图像的特征向量组进行更新,最后利用FRFT逆变换和DWT逆变换,将含水印的载体图像的特征向量组由频域表示恢复为时域表示,完成水印嵌入。实验结果表明,本算法具有高不可见性,且在常见的噪声攻击、旋转、剪切、JPEG压缩等攻击下,表现出较强的鲁棒性。

     

    Abstract: It is difficult to balance the invisibility and the robustness of watermarks in digital watermarking algorithms. Therefore, a digital watermarking algorithm combining DNA-DWT-FRFT is proposed. The watermark image is scrambled and encrypted using DNA coding, and a watermark ciphertext sequence is obtained. Divide the carrier image into 8× 8 Block, then perform the discrete wavelet transform (DWT) on each sub-block; select the coefficients of the low-frequency sub-band and calculate their eigenvectors; finally, fractional Fourier transform (FRFT) is used to transform the eigenvectors from time domain representation to frequency domain representation. An improved DWT transform is proposed. It defines the random factors F1 and F2, updated according to the watermark ciphertext sequence. Then determine the watermark embedding position and update the eigenvectors of the carrier image by F1 and F2. Using the inverse FRFT transform and the inverse DWT transform, the eigenvectors of the carrier image containing the watermark represented are recovered back to the time domain from the frequency domain. The watermark embedding is completed. The experimental results show that the watermarking algorithm has high invisibility and strong robustness in common attack tests, such as noise attacks, rotation attacks, cutting attacks, JPEG compression attacks, etc.

     

/

返回文章
返回