期刊文献+

对DCT域水印系统的周期性攻击 被引量:4

Adaptive attacks against DCT-based watermarking
原文传递
导出
摘要 为使水印攻击方法具备自我证明的特性,满足某些有特殊要求的版权保护需求,该文在分析数字图像离散余弦变换(DCT)域自适应水印嵌入原理的基础上,提出了一种水印攻击方法。该方法利用人类视觉系统(HVS)特性选择隐蔽载体(Stego-image)相应的水印嵌入区域,在载体的质量改变不被感知的情况下,利用矩阵变换的周期性理论,对选择的区域进行周期性变换(攻击)。试验结果表明,新的攻击方法在保证视觉质量要求的前提下能很有效地阻止数字水印的检测和提取,具有较好的攻击效果;同时经过多次相同变换(攻击)后,可以完全重构Stego-image,从而可向版权所有者提供攻击成功的证明。 A watermarking attack method was developed based on the adaptive watermarking embedded in the discrete cosine transform (DCT) domain to improve the ability of the watermarking method to resist attacks for improved copyright protection. The watermarking methods embeds the watermark in Stegoimage based on the characteristics of human vision systems with the attack methods using a periodic matrix transformation to attack the watermark area. Experiments show that the method can prevent detection and recovery of the watermark while ensuring the quality of the Stegoimage. The method can recover the original Stegoimage by attacking the same image in the same way many times, to verity the protection afforded the owner of the watermarking image.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2008年第10期1675-1678,共4页 Journal of Tsinghua University(Science and Technology)
基金 国家自然科学基金资助项目(90304014,60673065) 清华大学信息科学技术学院基础研究基金资助
关键词 数字水印 攻击 周期性 矩阵变换 digital watermarking attack periodicity matrix transformation
  • 相关文献

参考文献9

  • 1Petitcolas F A P, Anderson R J, Kuhn M G. Attacks on copyright marking systems[J].Portland Oregon : Springer-Verlag, 1998, 1525:219-239.
  • 2Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding-a survey[J]. Proc IEEE, 1999, 87: 1062-1078.
  • 3Petitcolas F A P. Stirmark benchmark 4.0 [OL]. (2007). http://www. petitcolas, net/fabien/watermarking/stirmark/.
  • 4WANG Daoshun, LIANG Jinghong, ZHANG Lei, et al. Evaluation based on invisible watermarking system[J]. Proc SPIE-The Int Society for Optical Eng, 2003, 5241: 202- 210.
  • 5Herrigel A, Voloshynovskiy S, Rytsar Y. The watermark template attack[J].Proceedings of SPIE-The lnt Society for Optical Eng, 2001, 4314:394-405.
  • 6Kutter M, Petitcolas F A P. Fair evaluation methods for image watermarking systems [J]. Journal of Electronic Imaging, 2000, 9:445-455.
  • 7Andrew B W. DCT quantization matrices visually optimized for individual images[C]// SPIE, Bernice ER, Editor, San Jose, USA, 1993, 1913: 202-216.
  • 8HUANG Jiwu, SHI YQ. Adaptive image watermarking scheme based on visual masking[J].Electronics Letters, 1998, 34:748-750.
  • 9QI Dongxu, WANG Daoshun, YANG Dilian. Matrix Transformation of digital image and its periodicity[J].Progress of Natural Science, 2001(6) : 1 - 8.

同被引文献30

  • 1熊志勇,蒋天发.多功能彩色图像数字水印方案[J].武汉大学学报(工学版),2004,37(6):97-100. 被引量:9
  • 2张冠男,王树勋,温泉.一种嵌入可读水印的自适应盲水印算法[J].电子学报,2005,33(2):308-312. 被引量:28
  • 3Zhi C N,Sung E,Shi Y Q.Enhancing robusmess of digital watermarking against geometric attack based on fractal transform[J].IEEE on Multimmedia and Expo,2002,30(2):1033-1036.
  • 4Ming H P,Chun H L.A novel fractal watermarking technique[J].IEEE on Acoustics,Speech and Signal Processing,2004,17(5):369-372.
  • 5Levicky D,Foris P.Some modification of fractal image coding and digital watermarking[J].IEEE on Industrial Technology,2003,10(2):946-950.
  • 6Safranek R J.Johnston J D.Perceptually tuned sub-band image coder with image dependent quantization and post-quantization data compression[C].Glasgow,UK:ICASSP-89,1998:1945-1948.
  • 7Cardinal J.Fast fractal compression of grey scale images[J].IEEE Transactions on Image Processing,2001,10(1):159-164.
  • 8Hartenstein H,Ruhl M,Saupe D.Region based fractal image compression[J].IEEE Transaction on Image Processing,2000,9 (7):1171-1184.
  • 9Li Y,Du S D.Research on wavelet domain fractal coding in digital watermarking[J].IEEE on Multimedia and Expo,2005,6(6):61-64.
  • 10章毓晋.图像工程(上册)图像处理[M].北京:清华大学出版社,2006.

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部