期刊文献+

一种抗几何攻击盲数字水印方法 被引量:2

Blind digital watermarking method against geometric attack
下载PDF
导出
摘要 提出了一种抵抗几何攻击的数字图像水印方案,主要针对的是缩放攻击和剪切攻击。通过采用在每个分片上重复嵌入水印,并在载体图像上确定抗缩放攻击网格来抵抗剪切攻击和缩放攻击。实验证明,该方法能较好地恢复图像、提取水印信息,能够有效地抵抗剪切攻击和缩放攻击。 A digital watermarking method to resist geometric attack, mainly the scaling attack and the cropping attack, was presented. We used the method of embedding the watermarking to every block and the method of fixing a resisting scaling grid to be against the scaling attack and the cropping attack. The experiment proves that this method can recover the image, and can detect the watermark, and can effectively resist the scaling and the cropping attack.
出处 《计算机应用》 CSCD 北大核心 2008年第9期2249-2251,共3页 journal of Computer Applications
关键词 数字水印 几何攻击 同步字段 差分 digital watermark geometric attack synchronization word difference
  • 相关文献

参考文献7

二级参考文献28

  • 1[1]I. J. Cox and M. L. Miller, "The First 50 Years of Electronic Watermarking",EURASIP Joumal of Applied Signal Processing,2002,2,126 ~ 132,2002.
  • 2[2]J.J.K. O Ruanaidh and Thierry Pun, "Rotation, Scale and Translation Invariant Digital Image Watermarking", Signal Processing, 66,3,303 ~ 31,May1998.
  • 3[3]Ching-Yung Lin,Min Wu,J.A.Bloom,M.L. Miller,I.J Cox and Y.M.Lui,"Rotation, Scale and Translation Resilient Watermarking for Images", in IEEE Trans. on Image Processing, Vol. 10,No.5,767 ~ 782,2001.
  • 4[4]Alexander D.Poularikas,"The Transforms and Applications Handlook,2nd Edition", CRC Press, LLC, 2000.
  • 5[5]G. Voyatzis and I. Pitas,"Chaotic Watermarks for Embedding in the Spatial Digital Image Domain", IEEE ICIP98, Chicago, IIIinois, USA,4 ~ 7 October1998.
  • 6[6]Peter Toft,"The Radon Tramsform-Theory and Implementation",Ph. D Thesis, Technical University of Denmark.
  • 7[1]Swanson M D, Kobayashi M, Tewfik A H. Multimedia data embedding and watermarking techniques. Proc. IEEE, 1998, 86(6): 1064-1087.
  • 8[2]Cox I J, Kilian J, Leighton T, Shamoon T. Secure spread spectrum watermarking for multimedia.IEEE Trans. on Image Processing, 1997, 6(12): 1673-1687.
  • 9[3]Bas P, Chassery J-M, Macq B. Geometrically invariant watermarking using feature point. IEEE Trans. on Image Processing, 2002, 11(9): 1014-1028.
  • 10[4]Oruanaidh J, Pun T. Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Processing, 1998, 66(3): 303-317.

共引文献15

同被引文献18

  • 1王淑琴,耿瑞平.基于ROC曲线的水印算法可靠性分析[J].微计算机信息,2008(12):147-149. 被引量:3
  • 2刘九芬,黄达人,黄继武.图像水印抗几何攻击研究综述[J].电子与信息学报,2004,26(9):1495-1503. 被引量:43
  • 3陈灿,胡峰松,周海燕.基于尺度不变特征点的抗几何攻击水印算法[J].计算机工程,2007,33(11):157-159. 被引量:5
  • 4Lie Wennung, Chang Lichun. Robust and high-quality time domain audio watermarking based on low-frequency amplitude modification[J]. IEEE Transactions on Multimedia, 2006, 8(1): 46-59.
  • 5Ehsan Tavakoli, Bijan Vosoughi Vahdat, et al. Audio watermarking for covert communication through telephone system[C]//IEEE Signal Processing Society and IEEE Computer. Vancouver: IEEE, 2006: 955- 959.
  • 6Godefroid P, Wolper P. A partial approach to model checking[M]. IEEE Symposium on Logic in Computer Science. Orlando: Academic Press, 1994.
  • 7Petitcolas F A P, et al. Information hiding-a survey [C]//Proceedings of the IEEE, 1999, 87(7) :1 062- 1 078.
  • 8van Schyndel R G. A digital watermark[C] // IEEE Infl Conf on Image Processing. [s. l. ]: ICIP, 1994, 2 : 86-90.
  • 9Yu P T, Tsai H H, Lin J S. Digital watermarking based on neural networks for color images[J]. Signal Processing, 2001, 81(5): 663-671.
  • 10BAS P, CHASSERY J M, MACQ B. Geometrically invariant watermarkingusing feature points [J]. IEEE Transactions on Image Processing, 2002, 11 (8) : 1014 - 1028.

引证文献2

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部