期刊文献+

基于分形编码的数字水印攻击算法 被引量:1

An Algorithm for Digital Watermarking Based on Fractal Coding
下载PDF
导出
摘要 本文提出了一种新的数字水印攻击算法。该算法对嵌入水印的图像运用分形编码,使含有特定水印信息的图像块被压缩映射后的其他块代替,压缩映射后的块和被代替块中的水印信息具有弱相关性。我们对一种基于多分辨率分解的数字水印嵌入方案进行了攻击实验,分析了攻击对图像质量的影响。结果表明,该算法使水印提取算子的相关性检测结果显著下降。 This paper presents a new attacking scheme on digital watermarking systems based on fractal coding. In this scheme, the image blocks marked with particular watermarking information are substituted by the other parts of image in the form of contracted mapping. The watermarking information in the contracted mapping has little correlation with that in the original blocks. An attack experiment on a multiresolution decomposition based watermarking algorithm is given, and the in ffluence on image quality is analyzed. Experimental results show that the extracted correlation decreases remarkably after the attack.
出处 《计算机工程与科学》 CSCD 2005年第3期108-110,共3页 Computer Engineering & Science
基金 湖南省自然科学基金资助项目(02JJY3049)
关键词 图像编码 分形编码 数字水印攻击算法 水印嵌入技术 digital watermarking watermarking attack fractal coding
  • 相关文献

参考文献9

  • 1I J Cox, J P M G Linnartz. Some General Methods for Tampering with Watermarks[J]. IEEE Journal on Selected Areas in Communication, 1998, 16(4) : 587-593.
  • 2D Kundur, D Hatzinakos. Diversity and Attack Characterization for Improved Robust Watermarking[J]. IEEE Trans Signal Processing, 2001, 49(10) : 2383-2396.
  • 3S Craver, N Memon, B L Yeo, et al. Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications[J]. IEEE Journal Selected Areas in Communication, 1998, 16(4): 573-586.
  • 4D C Popescu, A Dimca, Y Hong. A Nonlinear Model for Fractal Image Coding[J]. IEEE Trans Image Processing, 1997, 6(3): 373 -382.
  • 5W W Zhu, Z X Xiong, Y Q Zhang, Multiresolution Watermarking for Images and Video[J]. IEEE Trans Circuits Systm Video Technology, 1999, 9(4) : 545 -550.
  • 6M Peter, U Andreas. A Survey of Wavelet-Domain Watermarking Algorithms[A]. Proc SPIE, Security and Watermarking of Multimedia Contents III[C]. 2001.
  • 7M F Barnsley, A D Sloan. A Better Way to Compress Image[J]. BYTE, 1988(1): 215-223.
  • 8A E Jacquin. Image Coding Based on a Fractal Theory of Iterated Contractive Image Transformations[J]. IEEE Trans Image Processing, 1992, 1(1) : 18-30.
  • 9许斌,王润生.基于小波变换的双水印算法[J].计算机工程与科学,2005,27(1):24-26. 被引量:6

二级参考文献8

  • 1I J Cox,Joe Kilian,F Thomson. Secure Spread Sprctrum Watermarking for Multimedia[J]. IEEE Trans on Image Pocessing, 1997,18(2):1673-1687.
  • 2S Craver,N Memon,B L Yeo, et al. Can Invisible Watermark Resolve Rightful Ownerships[R]. Technical Report,IBM Research Report RC20509,1996.
  • 3Saraju P Mohanty,K R Ramarkrishnan,Mohan S Kankanhalli. A Dual Watermarking Technique for Images[J]. ACM Mulitimedia,1999,(2):49-51.
  • 4H Inoue,A Miyazaki,T Katsura. An Image Watermarking Method Based on the Wavelet-Transform[A]. Proc of ICIP. Vol 3[C].1999.296-300.
  • 5Shipeng Li,Weiping Li,Hongqiao Sun,et al. Shape Adaptive Wavelet Coding[J]. Proc of IEEE,1998,281-284.
  • 6R G van Schyndel,A Z Tirkel,C F Osborne. A Digital Watermark[J]. Proc 1994 IEEE Int'l Conf on Image Proc. vol.2[C].1994.86-90.
  • 7D Kirovski,H S Malvar,Y Yacobi. A Dual Watermarking and Fingerprinting System[A]. IEEE Int'l Symp on Information Theory[C]. 2002.
  • 8I Pitas,T H Kaskalis. Applying Signatures on Digital Image[A]. Proc of IEEE Workshop Nonlinear Image and Signal Processing[C]. 1995.460-463.

共引文献5

同被引文献11

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部