期刊文献+

数字图像水印算法抗几何攻击鲁棒性研究 被引量:16

Study on the Robustness of Digital Image Watermarking Algorithms to Geometric Attacks
下载PDF
导出
摘要 数字水印对抗各种攻击的鲁棒性一直是水印研究者所关注的一个焦点,其中几何攻击是实际应用中经常出现的一种攻击方式,而常规的水印算法对几何攻击却无能为力,因此水印算法对几何攻击的鲁棒性被认为是数字水印技术走上商用的一个关键点。该文总结了已有的典型抗几何攻击数字水印算法,从理论分析和实验验证两个角度对他们进行了比较和分析,并指出了下一步可能的发展方向,对抵抗几何攻击水印算法的发展具有一定的指导作用。 The robustness of digital watermarking to various attacks is a focus of researchers, while geometric attacks are very common attacks in practical applications. But conventional watermarking algorithms are helpless in face of geometric attacks, so the robustness to geometric attacks is called a bottleneck of commercial digital watermarking. The existing typical watermarking algorithms robust to geometric attacks are summarized, then they are compared and analyzed from the points of theoretical analyses and experimental validations. The possible development trends are pointed out, which can instruct the development of watermarking algorithms resistant to geometric attacks.
出处 《电子与信息学报》 EI CSCD 北大核心 2008年第5期1251-1256,共6页 Journal of Electronics & Information Technology
基金 国家高技术计划(2003AA144080)资助课题
关键词 数字水印 几何攻击 同步模板 绝对同步 不变水印 Digital watermarking Geometric attack Synchronization template Absolute synchronization Invariable watermarking
  • 相关文献

参考文献29

  • 1王志雄,王慧琴,李人厚.数字水印应用中的攻击和对策综述[J].通信学报,2002,23(11):74-79. 被引量:19
  • 2Chen B and Wornell G W. Quantization index modulation methods for digital watermarking and information embedding of multimedia. Journal of VLSI Signal Processing Systems, 2001, 27(1): 7-33.
  • 3Cox I J, Kilian J, and Leighton T, et al. Secure spread spectrum watermarking for multimedia. IEEE Trans. on Image Processing, 1997, 6(12): 1673-1687.
  • 4Hartung F, Su J K, and Girod B. Spread spectrum watermarking: malicious attacks and counterattacks. Proceedings of the 1999 Security and Watermarking of Multimedia Contents, San Jose, CA, USA, Jan 25-27 1999, SPIE Vol. 3657: 147-158.
  • 5Pereira S, O'Ruanaidh K J J, and DeguiUaume F, et al.. Template based recovery of fourier-based watermarks using log-polar and log-log maps. IEEE International Conference on Multimedia Computing and Systems, Florence, Italy, June 7-11 1999, 1: 870-874.
  • 6康显桂,黄继武,林彦,杨群生.抗仿射变换的扩频图像水印算法[J].电子学报,2004,32(1):8-12. 被引量:10
  • 7Deguillaume F, Csurka G, and O'Ruanaidh J J K, et al.. Robust 3D DFT video watermarking. Proceedings of the 1999 Security and Watermarking of Multimedia Contents, San Jose, CA, USA, Jan 25-27 1999, SPIE Vol.3657: 113-124.
  • 8Pereira S and Pun T. Robust template matching for affine resistant image watermarks. IEEE Trans. on Image Processing, 2000, 9(6): 1123-1129.
  • 9Kang X, Huang J, Shi Y Q, and Lin Y. A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans. on Circuits and Systems for Video Technology, 2003, 13(8): 776-786.
  • 10Kutter M. Watermarking resistant to translation, rotation and scaling. Proceedings of the 1998 Multimedia Systems and Applications, Boston, MA, USA, Nov 2-4 1998, SPIE Vol. 3528: 423-433.

二级参考文献33

  • 1[1]HARTUNG F, KUTTER M. Multimedia watermarking techniques[J]. Proceedings of IEEE, 1999,87(7):1079-1107.
  • 2[2]VOYATZIS G, PITAS I. The use of watermarks in the protection of digital multimedia products[J]. Proceedings of IEEE, 1999,87(7):1197-1207.
  • 3[3]BONCELET X X C, ARCE G. A multiresolution watermark for digital images[A]. Proc IEEE Int Conf Image Processing[C]. Santa Barbara, CA: Oct 1997.1097-1100.
  • 4[4]BARTOLINI M B F,CAPPELLINI V, PIVA A. A DCT-domain system for robust image watermarking[A].Signal Processing[C]. 1998.1202-1206.
  • 5[5]TAO,DICKINSON B. Adaptive watermarking in the DCT domain[A]. Proc Int Cong Image Processing (ICIP)[C]. Lausanne, Switzerland: Sept 1996.540-543.
  • 6[6]COX I J, LINNARTZ J P. Some general methods for tampering with watermarks[J]. IEEE J Selct Areas Commun (Special Issue on Copyright and Privacy Protection), 1998,16(5) :587-593.
  • 7[7]NIKOLAIDIS A,TSEKERIDOU S. A survey on watermarking application scenarios and related attacks[A]. Signal Processing[C]. 2001.991-995.
  • 8[8]STONE H S. Analyis of Attacks on Image Watermarks with Randomized Coefficients[M]. NJ: NEC RES Inst Princeton, 1996 .
  • 9[9]HARTUNG F. Difital Watermarking and Fingerprinting of Uncompressed and Compressed Video[D]. Erlangen, Germany: Telecommun Lab, Univ Erlangen-Nuremberg, 1999.
  • 10[10]KUGN M. StirMark[EB/DL]. http://www.cl.cam.ac.uk/~mgk25/stirmark/,1997-11.

共引文献41

同被引文献139

引证文献16

二级引证文献81

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部