期刊文献+

基于ICA的抗拷贝攻击的数字水印方案 被引量:5

An ICA-Based Watermarking Scheme Resistant to Copy Attack
下载PDF
导出
摘要 该文提出了一种基于独立分量分析(Independent Component Analysis,ICA)的能有效抵抗拷贝攻击的数字水印方案。该方案将能够唯一描述原始图像的图像签名与数字水印一同嵌入到原始图像中,并采用ICA技术进行检测。通过验证签名,可以判断待测图像是否合法,从而实现抗拷贝攻击的目的。计算机仿真结果证明了该方案的有效性和鲁棒性。 A digital watermarking scheme is proposed in this paper, which is based on Independent Component Analysis (ICA) and able to resist copy attack effectively. In this algorithm, both the image signature describing the original image uniquely and the watermark are embedded into the original image synchronously and extracted through ICA techniques. By comparing the re-calculated signature of the marked image according to the image signature algorithm with the extracted one, the legality of the marked image can be determined and the purpose of resistance to copy attack can also be realized. Simulation results demonstrate the robustness and validity of this proposed method.
出处 《电子与信息学报》 EI CSCD 北大核心 2005年第7期1035-1038,共4页 Journal of Electronics & Information Technology
基金 山东省优秀中青年科学家科研奖励基金(01BS04)资助课题
关键词 数字水印 独立分量分析 拷贝攻击 Digital watermarking, Independent Component Analysis (ICA), Copy attack
  • 相关文献

参考文献9

  • 1Kutter Martin, Voloshynovskiy Sviatoslav, Herrigel Alexander.The watermark copy attack. Proc. of the SPIE, Security and Watermarking of Multimedia Contents Ⅱ, San Jose, CA, 2000,3971:371 - 380.
  • 2Barr John, Bradley Brett, Hannigan Brett T. Using digital watermarks with image signatures to mitigate the threat of the copy attack. ICASSP03, 2003 IEEE International Conference,Hong Kong, 2003, 3:69 - 72.
  • 3CoxIngemarJ MillerMatthewL BloomJeffreyA著 王颖 黄志蓓译.数字水印:第9章[M].北京:电子工业出版社,2003..
  • 4Turk M, Pentland A. Eigenfaces for recognition. Journal of Cognitive Neuroscience, 1991, 3(1): 71 - 86.
  • 5Yu Dan, Sattar Farook, Ma Kai-Kuang. Watermark detection and extraction using independent component analysis method. EURASIP Journal on Applied Signal Processing, 2002, 1: 92 -104.
  • 6Shen Minfen, Zhang Xinjung, Sun Lisha, Beadle P J, Chan FHY.A method for digital image watermarking using ICA. ICA 2003,Nara, Japan, 2003:209 -214.
  • 7Liu Ju, Nie Kaibao, He Zhenya. Blind separation by redundancy reduction in a recurrent neural network. Chinese Journal of Electronics, 2001, 10(3): 415 -419.
  • 8He Zhenya, Liu Ju, Yang Luxi. Blind separation of images using Edgeworth expansion based ICA algorithm. Chinese Journal of Electronics, 1999, 8(3): 278 -282.
  • 9周亚训,叶庆卫,徐铁峰.基于小波和余弦变换组合的图像水印方案[J].电子学报,2001,29(12):1693-1695. 被引量:29

二级参考文献9

  • 1[1]G Voyatzis,I Pitas.The use of watermarks in the protection of digital multimedia products [C].Proceedings of the IEEE,1999,87(7):1197-1207.
  • 2[2]R G Van Schyndel,A Z Tirkel,C F Osborne. A digital watermarks [A].In: IEEE Int.Conf.on Image Processing [C],1994,2:86-90.
  • 3[3]D J Fleet. Embedding invisible information in color images [A].In: IEEE Int.Conf.on Image Processing [C],1997,1:532-535.
  • 4[4]I J Cox,J Kilian,F T Leighton,et al.Secure spread spectrum watermarking for multimedia[C].IEEE Trans.on Image Processing,1997,6(12):1673-1687.
  • 5[5]M D Swanson,M Kobayashi,A H Tewfik. Multiresolution data embedding and watermarking technologies [C].Proceedings of the IEEE,1998,86(6):1064-1087.
  • 6[6]A Piva,M Barni,F Bartolini,et al. DCT-based watermark recovering without resorting to the uncorrupted original image[C].In:IEEE Int.Conf.on Image Processing,1997,1:520-523.
  • 7[7]M Barni,F Bartolini,V Cappellini,et al. A DCT-domain system for robust image watermarking [J].Signal Processing,1998,66(3):357-372.
  • 8[8]J Johnston,N Jayant,R Safranek. Signal compression based on models of human perception [C].Proceedings of the IEEE,1993,81(10):518-526.
  • 9[9]L Torres,M Kunt. Video Coding,The Second Generation Approach [M].Kluwer Academic Publishers,1995.

共引文献28

同被引文献21

引证文献5

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部