期刊文献+

一种基于特征点和伪Zernike矩的数字图像水印算法 被引量:1

A robust image watermark based on feature extraction and pseudo Zernike moments
下载PDF
导出
摘要 利用墨西哥帽小波尺度交互的方法提取了图像的特征点,并以特征点为圆心的圆盘中选取部分伪Zernike矩嵌入水印.仿真试验证明,这种基于图像特征点和伪Zernike矩的第二代水印算法.可以抵御剪切攻击和旋转攻击,对频域操作也具有一定鲁棒性. A robust digital image watermarking scheme that combines image feature extraction and Pseudo Zernike moments is proposed. The goal is to resist both signal processing attacks and geometric distortion attacks such as crop and rotation. We adopt a feature extraction method called Mexican Hat wavelet scale interaction. Several copies of watermark sequence are embedded in the disks which are centered at the extracted feature points. Simulation results show that the wartermark is robust against many image proceses.
出处 《山东理工大学学报(自然科学版)》 CAS 2007年第5期88-92,共5页 Journal of Shandong University of Technology:Natural Science Edition
关键词 特征点 伪ZERNIKE矩 抖动调制 小波尺度交互 feature points Pseudo Zernike moment dither modulation wavelet scale interaction
  • 相关文献

参考文献5

  • 1Kutter M, Bhattacharjee S K, Ebrahimi T. Toward second generation watermarking schemes[C]// IEEE Interntional Conference on Image Processing , 1999 : 320-323.
  • 2Bhattacharjee S, Kutter M. Compression tolerant image authentication[C]// IEEE International Conference on Image Processing, 1998: 435-439.
  • 3Liao S X, Pawlak M. On the accuracy of Zernike moments for image analysis[J]. IEEE Trans on PAMI, 1998,20(12) : 1 358-1 364.
  • 4Kim H S, Lee H K. Invariant image watermark using Zernike moments[J] . IEEE Trans Circuits and Systems for Video Tech, 2003,13 (8):766-775.
  • 5Chen B, Wornell G W. Digital Watermarking and Information Embedding Using Dither Modulation[J].IEEE Second Workshop on Multimedia Signal Processing, 1998:273-278.

同被引文献13

  • 1张红颖,张加万,孙济洲.改进Demons算法的非刚性医学图像配准[J].光学精密工程,2007,15(1):145-150. 被引量:22
  • 2Zitova B, Flusser J. Image registration methods : A survey [ J ]. Image and vision computing ,2003,21 ( 11 ) :977-1000.
  • 3David G L. Distinctive image features from scale-invariant keypoints [ J ]. International Journal of Computer Vision,2004, 60(2) :91-110.
  • 4Bay H, Tuvtellars T, Van G L. SURF : Speeded up robust fea- tures[ C]//Proeeedings of the European conference on com- puter vision. [s. 1. ] :[s. n. ] ,2006:404-417.
  • 5Manjunath B S, Shekhar C,Chellappa R. A new approach to image feature detection with applications [ J ]. Pattern recogni- tion, 1996,29 (4) :627-640.
  • 6Dobbins A, Zucker S W, Cynader M S. Endstopping and cur- vature[J]. Vision research,1989,29(10) :1371-1387.
  • 7Antoine J P, Vandergheynst P, Murenzi R. Two-dimensional directional wavelets in image processing [ J ]. International journal of imaging systems and technology, 1996,7 ( 3 ) : 152- 165.
  • 8Bhattacharjee S, Kutter M. Compression tolerant image authen- tication[ C ]//Proc of IEEE international conference on image processing. Chicago, USA: [ s. n. ], 1998:435-439.
  • 9The C H, Chin R T. On image analysis by the methods of mo- ments [ J ]. IEEE transaction on pattern analysis and machine intelligence, 1988,10 (4) :496-513.
  • 10覃凤清,何小海,陈为龙,吴炜,杨晓敏.一种图像配准的超分辨率重建[J].光学精密工程,2009,17(2):409-416. 被引量:20

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部