期刊文献+

基于极性调制的鲁棒水印算法 被引量:1

Robust watermarking algorithm based on polarity modulation
下载PDF
导出
摘要 为满足地理信息版权保护对裁剪、拼接等攻击的强鲁棒性要求,通过构造二值序列分别表示水印0和1,利用变换域系数极性相对稳定的特点,通过调制极性序列与二值序列的相关系数嵌入水印,提出了一种基于变换域系数极性的水印算法。基于变换域系数特殊分类的极性序列分布在整个DCT域,增强了算法抗裁剪的能力;而且水印提取策略能够抵抗图像拼接攻击。实验结果表明,该算法具有良好的不可见性,可抵抗亮度(-90^+90)、对比度(-90^+80)、放大、裁剪、拼接的单独攻击,对综合攻击也有较强的鲁棒性。 To withstand various attacks such as cropping and image mosaic in geography information copyright protection, a transform coefficient polarity based watermarking algorithm was proposed. In this algorithm binary were constructed to represent watermark bit 0 and 1 respectively. Since polarity is almost invariant, watermarking can be embedded by modulating the correlation value between polarity sequence and binary sequence. Special classification based polarity sequence distributing in whole DCT domain may increase robustness against cropping. Moreover, watermark retrieval scheme is resilient to image mosaic. Experiments show that the proposed method has good watermark imperceptibility, and resistant to light variety from -90 to 90, contrast variety from -90 to 80, scale, cropping and image mosaic, and it is robust for combined attack.
出处 《吉林大学学报(工学版)》 EI CAS CSCD 北大核心 2007年第3期681-685,共5页 Journal of Jilin University:Engineering and Technology Edition
基金 国防科技预研基金资助项目(51416050301DZ0140) 武器装备预研项目(51416050205)
关键词 信息处理技术 数字水印 地理信息 极性 DCT变换 information processing digital watermarking geography information polarity DCT transform
  • 相关文献

参考文献7

二级参考文献26

  • 1郑海红,王义峰,孔月萍,曾平.有效抑制黑灰区域噪声的逆半调算法[J].系统工程与电子技术,2006,28(2):306-309. 被引量:2
  • 2吴秋新 钮心忻 杨义先 等.信息隐藏技术-隐写术与数字水印[M].北京:人民邮电出版社,2001..
  • 3吴秋新 钮心忻 杨义先.信息隐藏技术-隐写术与数字水印[M].北京:人民邮电出版社,2001..
  • 4Cox I J, Miller M L. A review of watermarking and the importance of perceptual modeling. in Proc. SPIE Conf. Human Vision and Electronic Imaging Ⅱ, 1997, Vol. 3016: 92- 99.
  • 5Herrera-Joancomarti J, Minguillon J, Megias D. A family of image watermarking schemes based on lossy compression. ITCC 2003, Proceedings. International Conference on Information Technology: Coding and Computing [computers and Communications], Las Vegas, Nevada USA, April 28 - 30, 2003:559 - 563.
  • 6Noore A. An improved digital watermarking technique for protecting JPEG images. ICCE 2003. IEEE International Conference on Consumer Electronics, Los Angeles, California USA, June 17 - 19, 2003:222 - 223.
  • 7Li Kan, Zhang Xiao-Ping. An image watermarking method integrating with JPEG-2000 still image compression standard.CCECE 2003, IEEE Canadian Conference on Electrical and Computer Engineering, Montreal, Canada, May 4- 7, 2003.Vol.3:2051 - 2054.
  • 8Li Yuanyuan, Xu Luping. A blind watermarking of vector graphics images. ICCIMA 2003. Fifth International Conference on Computational Intelligence and Multimedia Applications,Xi'an, P.R.China, Sept 27 - 30, 2003:424 - 429.
  • 9Ohbuchi R, Ueda H, Endoh S. Watermarking 2D vector maps in the mesh-spectral domain. SMI 2003. International Conference on Shape Modeling and Applications, Seoul, Korea, May 12- 15,2003:216 - 225.
  • 10Staring M, Oostveen J, Kalker T. Optimal distortion compensation for quantization watermarking. ICIP 2003. IEEE International Conference on Image Processing, Barcelona Spain, Sept. 14 - 17, 2003, Vol. 2:727 - 730.

共引文献19

同被引文献7

  • 1Voloshynovskiy S, Herrigel A, Baumgaertner N, et al. A stochastic approach to content adaptive digital image watermarking[C]//The 3rd Int Workshop Information Hiding, Dresden, Germany, 1999: 211- 236.
  • 2Delaigle J F, Vleeschouwer C D, Macq B. Watermarking algorithm based on a human visual model [J]. Signal Process, 1998,66(5): 319-335.
  • 3Kutter M, Winkler S. A vision based masking model for spread spectrum image watermarking [J]. IEEE Trans on Image Process, 2002,11(1): 16- 25.
  • 4Langelaar G C, Setyawan I, Lagendijk R L. Watermarking digital image and video data, a state-of-theart overview[J]. IEEE Signal Process Mag, 2000, 17(9) :20-46.
  • 5Karybaliand Kostas Berberidis Irene G. Efficient spatial image watermarking via new perceptual masking and blind detection schemes [J].IEEE Transactions on Information Forensics and Security, 2006,7(1) :256-269.
  • 6Cox Ingemar J, Miller Matthew L, Bloom Jeffrey A.电子水印[M].王颖等译.北京:电子工业出版社,2003.
  • 7Depovere G, Kalker T, Linnartz J P. Improved watermark detection reliability using filtering before correlation [C]// Proceeding of the International Conference on Image Processing, 1998:430-434.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部