期刊文献+

一种可抵抗局部几何攻击的多比特水印算法 被引量:4

Multi-bit Watermark Algorithm Resisting Local Geometric Attacks
下载PDF
导出
摘要 该文提出一种新的可抵抗局部几何攻击多比特水印算法,算法采用快速相关攻击技术进行解码。水印的二进制比特序列作为初态输入到线性反馈移位寄存器中,输出序列嵌入到三角形中,三角形根据尺度空间的Harris特征点检测器和Delaunay三角剖分得到。提取时依靠相关攻击强有力的纠错性能,恢复出隐藏在嵌入区域中的水印。试验表明:该算法对旋转缩放平移、剪切、甚至StirMark中的随意变形攻击以及JPEG压缩、滤波等都具有强鲁棒性。 A novel local geometrical invariant multi-bit watermark algorithm based on decoding using fast correlation attacks is proposed in this paper. The binary bit sequences of watermark as the initial state are fed into the linear feedback shift register, and the output sequence is embedded into the triangles which are obtained according to the scale-space Harris feature points and Delaunay tessellations. During the extraction, the embedded watermark is extracted according to the fast correlation attacks technique which has powerful error-correcting capacity. Simulation results show that the proposed algorithm is highly robust against various attacks including rotation scaling translation, cropping, even random bending attack in StirMark, JPEG compression and filtering and so on.
作者 王丹 陆佩忠
出处 《南京理工大学学报》 CAS CSCD 北大核心 2008年第4期406-410,共5页 Journal of Nanjing University of Science and Technology
基金 国家自然科学基金(60673082) 教育部全国优秀博士学位论文作者专项基金(200084)
关键词 水印 几何攻击 多比特 特征点 快速相关攻击 随机变形攻击 watermark geometrical attacks multi-bits feature points fast correlation attacks random bending attacks
  • 相关文献

参考文献7

  • 1Bas P, Chassery J M, Macq B. Geometrically invariant watermarking using feature points [ J ]. IEEE Trans on Image Processing, 2002, 11 (9) : 1 014 - 1 028.
  • 2Dong P, Brankov J G. Digital watermarking robust to geometric distortions [ J ]. IEEE Trans on Image Processing, 2005, 14 (12): 2 140-2 150.
  • 3Lu P Z, Wang D. A geometrical robust image data hid- ing scheme using FCA-based resynchronization [ A ]. Proc of 9th Information Hiding Workshop (IH2007) [ C ]. St-Malo: Springer-Verlag, 2007. 267 - 278.
  • 4Petitcolas F. Stirmark4.0 [ EB/OL], [ Online] : http ://www. cl. cam. ac. uk/users/fapp2/watermarking/ stirmark, 2006.
  • 5Harris C, Stephen M. A combined comer and edge detector [ A ]. Proc of the 4th Alvey Vision Conf [ C ]. Manchester: Springer-Verlag, 1988. 147 - 151.
  • 6Lowe D G. Distinctive image features from scale-invariant keypoints [ J ]. Int J Compute Vision, 2004, 60 : 99 - 110.
  • 7Siegenthaler T. Decrypting a class of stream ciphers using ciphertext only [ J ]. IEEE Trans on Comput, 1985, 34: 81 -85.

同被引文献38

引证文献4

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部