期刊文献+

基于频谱特征的图像旋转角度盲检测算法 被引量:2

Image Rotation Angle Blind Detecting Algorithm Based Spectrum Character
下载PDF
导出
摘要 抗几何攻击的盲检测数字水印的难点是图像旋转角度的盲检测.通过对图像频谱的分析,发现了图像边界蕴藏在幅度中的特征谱脊,设计出实际可行的频谱特征提取滤波器,其中特征锐化可以消除非轴线谱脊的干扰,最后对提取的二值特征图像采用霍夫变换测算谱脊的角度,即图像旋转角度模90°的余值.实验证明,角度测算不需要原始图像,具有计算量小、精度高的特点,对同时遭受几何攻击和滤波、加噪、有损压缩等处理都能有效测算出图像模90°的旋转角度. It's difficult to detect blindly the image rotation angle in blind watermarking under geometry attack. By analyzing image spectrum, the character of spectrum amplitude ridge contained in image borderline is discovered. The practical distinguishing character filter is designed while character sharp filter can avoid the interfere whose amplitude ridge isn't axial. The angle of spectrum amplitude ridge in black-white character image can be calculated by Hough transform, that is the value of image rotation angle model π/2. The experiment result proves the proposed algorithm has light computational load and high precision without original image. It can endure the attacks of geometry attack, low-pass filter, noise additional, lossy compression at the same time.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2006年第3期22-26,共5页 Journal of Beijing University of Posts and Telecommunications
关键词 数字水印 几何攻击 频谱特征 霍夫变换 digital watermark geometry attack spectrum character Hough transform
  • 相关文献

参考文献11

二级参考文献65

  • 1[1]Barni M,Bartolini F, De Rosa A, et al. Capacity of full frame DCT image watermarks[J]. IEEE Transactions on Image Processing, 2000, 9(8): 1450-1455.
  • 2[2]Moulin P, O 'Sullivan J A. Information-theoretic analysis of watermarking [A]. 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing[C]. 2000. 3630-3633.
  • 3[3]Cohen A S, Lapidoth A. The Gaussian watermarking game [J]. IEEE Transactions on Information Theory,2002, 48 (6): 1639-1667.
  • 4[4]Somekh-Baruch A, Merhav N. On the capacity game of public watermarking systems [J]. IEEE International Symposium on Information Theory, 2002, 223.
  • 5[5]Cohen A, Lapidoth A. Generalized writing on dirty paper [J]. IEEE International Symposium on Information Theory, 2002, 227.
  • 6[6]Moulin P, Mihcak K M. A framework for evaluating the data-hiding capacity of image sources [J]. IEEE Transactions on Image Processing, 2002,11 (9): 1029-104.
  • 7[7]Moulin P, O' Sullivan J A. Information-theoretic analysis of information hiding [J]. IEEE Transactions on Information Theory, 2003,49 (3): 563-593.
  • 8[8]Wong P H W, Au O C. A capacity estimation technique for JPEG-to-JPEG image watermarking [J].IEEE Transactions on Circuits and Systems for Video Technology, 2003, 13 (8): 746-752.
  • 9[9]Wong P H W, Yeung G Y M, Au O C. Capacity for jpeg2000-to-jpeg2000 images watermarking[A]. 2003International Conference on Multimedia and Expo [C].2003. 485-488.
  • 10[10]Cachin C. An information-theoretic model for steganography [A]. Proceedings of 2nd Workshop on Information Hiding, Lecture Notes in Computer Science [C].1998.

共引文献48

同被引文献10

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部