期刊文献+

一种基于DWT抗几何攻击数字水印鲁棒算法 被引量:20

A DWT-based Watermarking Algorithm Robust to Geometric Attacks
下载PDF
导出
摘要 针对大部分数字水印算法抗几何攻击能力差这一难题,提出了一种基于小波变换可抗击几何攻击算法。在水印嵌入部分:首先对宿主图像进行小波分解、嵌入水印,再通过余弦变换求得该水印图像的一个特征向量,利用该特征向量和水印信息通过HASH函数生成一个二值逻辑系列,将该序列作为密钥;水印提取部分为:对待测的图像进行小波变换,再通过余弦变换求得待测图像的一个特征向量,利用该特征向量和密钥通过HASH函数提取出水印。文章最后对水印图像进行了旋转、缩放和扭曲等几何攻击试验。试验表明,该算法有理想的抗几何攻击能力。旋转攻击的旋转角度可达40°,缩放攻击的缩放比例可达0.2,旋转扭曲攻击的扭曲角度可达100°。 Most watermarking algorithms are not robust to geometric attacks. This paper presents an algorithm based on the discrete wavelet transform (DWT) to embed and extract watermarks. A watermarking is embedded in four stages. First, the original image is decomposed using DWT. Secondly, the watermarking is embedded into the approaching sub - band image in DWT domain. Thirdly, a characteristic vector of the image is acquired using a discrete cosine transform (DCT). Finally, a binary logic sequence, or secret key, is produced using the characteristic vector and the watermarking. The watermarking can then be extracted in three stages. First, the test image is decomposed using DWT. Secondly, a characteristic vector is obtained in the DCT domain. Finally, the watermarking is extracted using the secret key and the characteristic vector. The algorithm uses the characteristic vector with a HASH function to embed or extract the watermarking. Results show that the algorithm is robust to rotation, scaling, translation, and bending of images. Robustness against rotation is demonstrated up to 40° and against scaling down to 20% of the images's original size. Furthermore, robustness against whidy bend is demonstrated for angles up to 100°.
出处 《计算机仿真》 CSCD 2007年第3期303-306,共4页 Computer Simulation
基金 海南省教育厅资助项目(HJKJ200607) 海南省自然科学基金(80635)
关键词 数字水印 小波变换 余弦变换 几何攻击 鲁棒性 Digital watermarking DWT DCT Geometric attack Robustness
  • 相关文献

参考文献9

  • 1C I Podilchuk,E J Delp.Digital watermarking algorithms and applications[J].IEEE Signal Processing Magazine,2001,18(4):33-46.
  • 2I J Cox,M L Miller.The first 50 years of electronic watermarking[J].Journal of Applied Signal Processing,2002,(2):126-132.
  • 3F A P Petitcolas,R J Anderson,M G Kuhn.Attacks on copyright marking system[C].In Proc.2nd Int.Workshop Information Hiding,Portland,OR,Apr.14-17,1998.218-238.
  • 4J J K O'Ruanaidh,T Pun.Rotation scale and translation invariant spread spectrum digital image watermarking[J].Signal Processing,1998,66(3):303-317.
  • 5X G Kang,et al..A DWT-DFT Composite watermarking scheme robust to both affine and JPEG compression[J].IEEE Trans.on Circuits and Systems for Video Technology,2003,13(8):776-786.
  • 6V Solachidis,I Pitas.Circularly symmetric watermark embedding in 2-D DFT domain[J].IEEE Transactions on Image Processing,2001,10(11):1741-1753.
  • 7S Voloshynovskiy,F Deguillaume,T Pun.Multibit watermarking robust against local nonlinear geometrical distortions[C].In:Proceedings of International Conference on Image Processing 2001,Thessaloniki,Greece,2001.999-1002.
  • 8M Kutter,S K Bhattacharjee,T Ebrhimi.Towards second generation watermarking schemes[C].ICIP'99,Kobe,Japan,October 25-28,1999,3:320-323.
  • 9P Jeng-Shyang,H Hsiang-cheh,W Feng.A VQ-Based Multi-Watermarking Algorithm[C].In:Proceedings of IEEE TENCON,2002.117~120.

同被引文献126

引证文献20

二级引证文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部