Journal on Communications ›› 2018, Vol. 39 ›› Issue (7): 50-58.doi: 10.11959/j.issn.1000-436x.2018125
• Papers • Previous Articles Next Articles
Xi YIN1,2,Weiqing HUANG1
Revised:
2018-04-24
Online:
2018-07-01
Published:
2018-08-08
Supported by:
CLC Number:
Xi YIN,Weiqing HUANG. Research on color QR code watermarking technology based on chaos theory[J]. Journal on Communications, 2018, 39(7): 50-58.
[1] | ZHANG G Y , KOU L , SUN J G ,et al. A new digital watermarking method for data integrity protection in the perception layer of IoT[J]. Security and Communication Networks, 2017: 1-12. |
[2] | 谢琨, 郑海红, 曾平 ,等. 基于奇偶校验的块误差分散半调水印算法[J]. 通信学报, 2014,35(12): 153-161. |
XIE K , ZHENG H H , ZENG P . Halftone image watermarking with block-directed parity-matched error diffusion[J]. Journal of Communications, 2014,35(12): 153-161. | |
[3] | 王向阳, 杨红颖, 牛盼盼 ,等. 基于四元数指数矩的顽健彩色图像水印算法[J]. 计算机研究与发展, 2016,53(3): 651-665. |
WANG X Y , YANG H Y , NIU P P . Quaternion exponent moments based robust color image watermarking[J]. Computer Research and Development, 2016,53(3): 651-665. | |
[4] | REDDY V P , VARADARAJAN S . Human visual system sentient imperceptible and efficient wavelet-based watermarking scheme for copyright protection of digital images[J]. International Journal of Computer Science & Network Security, 2009(4). |
[5] | 马玲, 张晓辉 . 基于内积空间非空子空间变换关系的含水印彩色图像特征分析[J]. 计算机学报, 2017,40(5): 1203-1217. |
MA L , ZHANG X . Feature analysis of hydrography color image based on non-empty subspace transformation relation of inner product space[J]. Chinese Journal of Computers, 2017,40(5): 1203-1217. | |
[6] | 叶天语 . 基于子块区域分割和自嵌入技术的全盲多功能图像水印算法[J]. 通信学报, 2013,34(03): 148-156. |
YE T . Full blind multi-functional image watermarking algorithm based on sub-block region segmentation and self-embedding technology[J]. Journal on Communications, 2013,34(03): 148-156. | |
[7] | 霍耀冉, 和红杰, 陈帆 . 基于邻域比较的 JPEG 脆弱水印算法及性能分析[J]. 软件学报, 2012,23(9): 002510-2521. |
HUO Y R , HE H J , CHEN F . JPEG fragile watermarking algorithm and performance analysis based on neighborhood comparison[J]. Journal of Software, 2012,23(9): 2510-2521. | |
[8] | CHANG C C , TSAI P , LIN C C . SVD-based digital image watermarking scheme[M]. Elsevier Science Inc. 2005. |
[9] | LAI C C . An improved SVD-based watermarking scheme using human visual characteristics[J]. Optics Communications, 2011,284(4): 938-944. |
[10] | KUMAR M , POWDURI P , REDDY A . An RGB image encryption using diffusion process associated with chaotic map[J]. Journal of Information Security & Applications, 2015,21(C): 20-30. |
[11] | 龚岩琳 . 基于混沌加密的DWT域数字水印算法[J]. 信息通信技术, 2010,4(3): 53-57. |
Gong Y L . DWT digital watermarking algorithm based on chaotic encryption[J]. Information and Communications Technology, 2010,4(3): 53-57. | |
[12] | 文昌辞, 王沁, 刘向宏 ,等. 基于仿射和复合混沌的图像加密新算法[J]. 计算机研究与发展, 2013,50(2): 319-324. |
WEN C C , WANG W , LIU X H ,et al. Image encryption algorithm based on affine and compound chaos[J]. Journal of Computer Research and Development, 2013,50(2): 319-324. | |
[13] | 邓晓衡, 廖春龙, 朱从旭 . 像素位置与比特双重置乱的图像混沌加密算法[J]. 通信学报, 2014,35(3): 216-223. |
DENG X , LIAO C , ZHU C . Image chaos encryption algorithm for pixel position and bit double-reset chaos[J]. Journal of Communications, 2014,35(3): 216-223. | |
[14] | GU Z F , LI G F , YANG Z X . Study on digital image watermark algorithm based on chaos mapping and DWT[C]// International Conference on Advanced Mechatronic Systems. 2012: 160-164. |
[15] | MAITY S P , KUNDU M K . DHT domain digital watermarking with low loss in image informations[J]. AEU-International Journal of Electronics and Communications, 2010,64(3): 243-257. |
[16] | QUAN L , AI Q . A combination of DCT-based and SVD-based watermarking scheme[C]// International Conference on Signal Processing. 2004: 873-876. |
[17] | SAITO M , KINO M , WADA S . HVS based wavelet watermarking with bit data embedded in color images[C]// The International Conference on Communication Systems. 2002: 485-488. |
[18] | SEDDIK H , BEN BRAIEK E . Image securing based chaotic encryption coupled with DCT robust watermarking[C]// International Conference on Electrical Engineering and Software Applications. 2013: 1-6. |
[1] | Weiyu CHEN, Junshan LUO, Fanggang WANG, Haiyang DING, Shilian WANG, Guojiang XIA. Survey of capacity limits and implementation techniques in wireless covert communication [J]. Journal on Communications, 2022, 43(8): 203-218. |
[2] | Deyang WU, Sen HU, Miaomiao WANG, Haibo JIN, Changbo QU, Yong TANG. Discriminative zero-watermarking algorithm based on region XOR and ternary quantization [J]. Journal on Communications, 2022, 43(2): 208-222. |
[3] | Han ZHANG,Yongjin HU,Yuanbo GUO,Jicheng CHEN. Research on coreference resolution technology of entity in information security [J]. Journal on Communications, 2020, 41(2): 165-175. |
[4] | Wenxian JIANG,Zhenxing ZHANG,Jingjing WU. Reversible digital watermarking-based protocol for data integrity in wireless sensor network [J]. Journal on Communications, 2018, 39(3): 118-127. |
[5] | Qin WANG,Jianming ZHU. Research on the game of information security investment based on the Gordon-Loeb model [J]. Journal on Communications, 2018, 39(2): 174-182. |
[6] | Tao FENG,Ye LU,Jun-li FANG. Research on vulnerability and security technology of industrial Ethernet protocol [J]. Journal on Communications, 2017, 38(Z2): 185-196. |
[7] | Guang-ming TANG,Yi SUN,Xiao-yu XU,Yu WANG. Adaptive JPEG steganography based on distortion cost updating [J]. Journal on Communications, 2017, 38(9): 1-8. |
[8] | Mu-zhou LIU,Jian-shu QIU,Yun-yong ZHANG,Bin-feng YAN,Si-yao ZHANG,Ya-fei TANG. Certificate integration management platform based on identity key [J]. Journal on Communications, 2016, 37(Z1): 197-203. |
[9] | Feng XU,Jia-nan LI,Jian-guo SUN. Research of composite safety protection for digital maps [J]. Journal on Communications, 2016, 37(2): 174-179. |
[10] | Ming-zhu LAI,Li-guo ZHANG,Wei-miao FENG,Yuan-yuan WANG,Yong WANG,Shou-zheng LI. Study on authority watermark of the electronic chart based on the semantics characteristics [J]. Journal on Communications, 2016, 37(11): 137-145. |
[11] | Tao WEN,Yu-qing ZHANG,Qi-xu LIU,Gang YANG. UVDA:design and implementation of automation fusion framework of heterogeneous security vulnerability database [J]. Journal on Communications, 2015, 36(10): 235-244. |
[12] | Yu-qing ZHANG,Qian-ru WU,Qi-xu LIU,Ying DONG. Research on security of third-party tracking [J]. Journal on Communications, 2014, 35(9): 1-11. |
[13] | . Predicting users’ profiles in social network based on semi-supervised learning [J]. Journal on Communications, 2014, 35(8): 3-22. |
[14] | . Survey on security and privacy preserving for mobile internet service [J]. Journal on Communications, 2014, 35(11): 1-8. |
[15] | . Image watermarking algorithm against attacks based on SIFT feature point and cross-ratio value [J]. Journal on Communications, 2014, 35(11): 20-180. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|