期刊文献+

图像水印抗几何攻击研究综述 被引量:43

Survey on Watermarking Against Geometric Attack
下载PDF
导出
摘要 稳健性是数字水印技术的一个核心问题.数字水印技术发展到今天,已有大量不同的算法,它们广泛提出了“稳健性”的声明.然而,绝大多数算法所强调的“稳健性”只不过是水印对抗一般信号处理的稳健性,它们不能抵抗甚至是微小的几何攻击.本文分析总结了当前图像水印抗几何攻击的各种方法,提出了下一步可能的发展方向,对改进和设计水印算法具有一定的指导作用. Robustness is the key issue of digital watermarking technology. Up to now, various watermarking algorithms are proposed with much emphasis on the 'robustness'. However, the 'robustness' claimed in most of algorithms is only against common signal processing operations such as compression and signal filtering. It is now clear that even very small geometric distortions can prevent the detection of a watermark. In this paper the current methods against geometric attacks are analyzed and summarized, and some probable development directions of digital watermarking at next stage are introduced which are the key issues to improve and design watermarking algorithms.
出处 《电子与信息学报》 EI CSCD 北大核心 2004年第9期1495-1503,共9页 Journal of Electronics & Information Technology
基金 国家杰出青年基金(60325208) 国家自然科学基金(30200147 60133020) 河南省高校杰出科研人才创新工程项目(2003KJCX008) 中国人民解放军信息工程大学博士启动基金资助课题
关键词 几何攻击 图像水印 水印算法 稳健性 数字水印技术 声明 信号处理 对抗 Digital watermarking, Watermarking attack, Geometric attack
  • 相关文献

参考文献42

  • 1Crave S, Yeo B L, Yeung M. Technical trials and legal tribulations. Communications of the ACM,1998, 41(7): 45-54.
  • 2Petitcolas F A P, Anderson R J, Kuhn M G. Attacks on copyright marking system. In Proc. 2nd Int. Workshop Information Hiding, Portland, OR, Apr. 14-17, 1998: 218-238.
  • 3Cox I J, Linnartz J. Public watermarks and resistance tampering. In Proc of ICIP'97, Washington,DC, 1997: 26-29.
  • 4Cox I J, Linnartz J. Some general methods for tampering with watermarks. IEEE J. on Selected Areas in Communications, 1998, 16(4): 587-593.
  • 5Brown L G. A survey of image registration techniques. ACM Computing Surveys, 1992, 24(4):325-376.
  • 6Davoine F. Watermarking et résistance aux deformation géométriques. In Cinquiemes journées d'études et d'échanges sur la compression et la representation des signaux audiovisuals (CORESA'99), Centre de Recherché et Développement de France Téléco
  • 7Johnson N F, Duric Z, Jajodia S. Recovery of watermarks form distorted images. In Proc. 3rd Int. Information Hiding Workshop, Dresden, Germany, 1999: 361-375.
  • 8Braudaway G W, Minter F. Automatic recovery of invisible image watermarks from geometrically distorted images. In Proc. SPIE Security and Watermarking of Multimedia Contents I, CA, USA,2000, Vol.3971: 74-81.
  • 9Kang X G, Huang J W, Shi Y Q. An image watermarking algorithm robust to geometric distortion.Lecture Notes in Computers Science: Proc. of IWDW 2002, Spinger-Verlag, 2002, Vol. 2613:212-213.
  • 10O'Ruanaidh J J K, Pun T. Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Processing, 1998, 66(3): 303-317.

二级参考文献19

  • 1KUTTER M, JORDAN F, BOSSEN F. Digital watermarking of color images using amplitude modulation[J]. Journal of Electronic Image, 1998, 7(2): 326--332.
  • 2KUTTER M, BHATTACHARJEE S, EBRHIMI K.Towards second generation watermarking schemes [A]. Proc 6th Int Conf On Image Processing(ICIP'99) [C]. Piscateway: IEEE, 1999. 320--323.
  • 3GONZALEZ C, WINTZ P. Digital image processing Second Edition [M]. New York: Addison-Wesley Publishing Co, 1987.
  • 4SKLAR B.Digital communications:Fundamentals and applications[M].Englewood Cliffs:Prentice-Hall Inc,1988.
  • 5BLAUM M,BRUCK J,VARDY A.Interleaving schemes for multidimensional cluster errors [J].IEEE Trans on Information Theory.1998,44(2):730—743.
  • 6TSAI Min—jen,YU Kuang—yao,CHEN Yi—zhang.Joint wavelet and spatial transformation for digital watermarking [J].IEEE trans on Consumer Electronics,2000,46(1):241.
  • 7BROWN L G.A survey of image registration techniques [J].ACM Computing Surveys,1 992,24(4):325——376.
  • 8WOLERG G,ZOKAI S.Robust image registration using log—polar transform[A].Proc IEEE Int Conf On Image Processing [C].Piscateway:IEEE,2000.493—496.
  • 9PETITCTOLAS F A P,ANDERSON R J,KUHN MG.Attacks on copyright marking system[A].Proc of2nd Int Workshop on Information Hiding[C].Berlin:Springer—Verlag,1998,1525:219—239.
  • 10PETITCTOLAS F A P,KUHN M G.StirMark [EB/OL].http://www.c1.cam.ac.uk/~fapp2/watermark—ing/benchmark/,1 999.

共引文献240

同被引文献292

引证文献43

二级引证文献144

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部