期刊文献+

基于IFS理论的数字水印算法

A Digital Watermark Scheme Based on IFS Theory
下载PDF
导出
摘要 为了使数字水印算法具有更好的鲁棒性,首先阐述了迭代函数系(iterated function system,IFS)理论,并给出了构造IFS吸引子的随机迭代算法;然后从理论分析了IFS吸引子抗几何失真的特性,并提出了一种非对称数字水印算法;接着利用三点法将数字水印信息转化为IFS码,并由重构的分形水印图像与原始图像进行相关性处理得到索引集;最后版权者和第3信任方用私钥将索引集进行数字签名和加盖时间戳。水印检测时,只需利用第3信任方和版权者的公钥,而不需要原始图像参与。实验结果表明,该算法对噪声、滤波、压缩、旋转等图像处理方法具有较好的鲁棒性。 In this paper, in order to obtain more robust digital watermark scheme, firstly the theory of iterated function system(IFS) and the stochastic algorithm by which IFS attractor is constructed are proposed. Secondly, by analyzing the robust character against geometric distortion of IFS attractor theoretically, a new scheme is provided,which is a asymmetric digital watermark one. Thlrdly,using tri-point method, the paper translates the information of digital watermarking into IFS code,and the indices set can be attained by reconstructing the image of fractal watermarking and manipulating the original image relatively. Finally the index set is signed and time-stamped by the owner and trusted third party's private keys. Using the owner and trusted third party's private keys ,the watermark can be detected without the original image. The experimental results show that the watermark scheme is robust against image manipulations, such as noise adding, filtering, compression and rotation.
出处 《中国图象图形学报》 CSCD 北大核心 2008年第3期419-427,共9页 Journal of Image and Graphics
基金 国家自然科学基金项目(60573172) 高等学校博士学科点专项科研基金项目(20070141014)
关键词 数字水印 IFS吸引子 数字签名 时间戳 图像处理 digital watermark,IFS attractor,digital signing,timestamping,image manipulation
  • 相关文献

参考文献15

  • 1Lee W B, Chen T H. A public verifiable copy protection technique for still images [J]. The Journal of Systems and software,2002,62(3 ) : 195 - 204.
  • 2Cox I J, Killian J, Leighton F T, et al. Secure spread spectrum watermarking for multimedia [ J ]. IEEE Transactions on Image Processing, 1997,6(12) :1673 - 1687.
  • 3Hsu C T, Wu J L. Muhiresolution watermarking for digital images [ J ]. IEEE Transactions on Circuits and System II:Analog and Digital Signal Processing, 1998,45 ( 8 ) : 1097 - 1101.
  • 4Hsu C T,Wu J L. Hidden digital watermarks in images [ J]. IEEE Transactions on Image Processing,1999,8( 1 ) :58 - 68.
  • 5Niu X M,Lu Z M,Sun S H. Digital watermarking of still images with gray-level digital watermarks [ J]. IEEE Transactions on Consumer Electronics,2000,46( 1 ) :137 - 145.
  • 6Hutchinson J. Fractals and self-similarity [ J ]. University Journal Mathematical, 1981,30 ( 5 ) :713 - 747.
  • 7Barnsley M F. Fractals Everywhere [ M ]. Boston, MA, USA: Academic Press Professional, 1993:29 - 64.
  • 8王兴元,刘波.一类NMIFS吸引子的递归计算构造及特性分析[J].自然科学进展,2004,14(9):1039-1046. 被引量:4
  • 9Vrscay E R,Roehrig C J. Iterated function systems and the inverse problem of fractal construction using moments [ A ]. In : Pickover C A, et al Eds: Computers and Mathematics [ C ]. New York, USA : Springer-Verlag, 1989:250 - 259.
  • 10邹北骥,龚理,孙家广.一种利用分形IFS编码的水印攻击新算法[J].系统仿真学报,2005,17(4):965-967. 被引量:2

二级参考文献30

  • 1Cox I J, Linnartz J P MG. Some general methods for tampering with watermarks [J]. IEEE Journal on Selected Areas in Communications, 1998, 16(4): 587-593.
  • 2Voloshynovskiy S, Pereira S, Pun T, Eggers J J, Su J K. Attacks on digital watermarks: classification, estimation based attacks, and benchmarks [J]. IEEE Communications Magazine, 2001, 39(8): 118-126.
  • 3Kundur D, Hatzinakos D. Diversity and attack characterization for improved robust watermarking [J]. IEEE Transactions on Signal Processing, 2001, 49(10): 2383-2396.
  • 4Cox I J, Kilian J, Leighton T, Shamoon T. Secure spread spectrum watermarking for multimedia [J]. IEEE Transactions on Image Processing, 1997, 6(12): 1673-1687.
  • 5Wenwu Zhu, Zixiang Xiong, Ya-Qin Zhang. Multiresolution watermarking for images and video [J]. IEEE Trans. on Circuits and Systems for Video Technology, 1999, 9(4): 545 -550.
  • 6Peter Meerwald, Andreas Uhl. A survey of wavelet-domain watermarking algorithms [A]. In Proceedings of SPIE, Security and Watermarking of Multimedia Contents III, volume 4314, San Jose, CA, USA, January 2001.
  • 7Barnsley M F, Sloan A D. A better way to compress image [J]. BYTE, Jan., 1988, 215-223.
  • 8Jacquin A E. Image coding based on a fractal theory of iterated contractive image transformations [J]. IEEE Transactions on Image Processing, 1992, 1(1): 18-30.
  • 9Popescu D C, Dimca A, Hong Yan. A nonlinear model for fractal image coding [J]. IEEE Transactions on Image Processing, 1997, 6(3): 373-382.
  • 10Hutchinson J. Fractals and self-similarity [J]. Indiana Univ. J. Math. 30, 1981, 713-747.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部