期刊文献+

一种强稳健性的抗几何攻击图像水印算法 被引量:2

Geometrical Attack Resistant Algorithm of Digital Image Watermarking with Strong Robustness
下载PDF
导出
摘要 数字图像水印的抗几何攻击能力一直是研究的热点和难点。提出了一种基于奇异值分解的抗几何攻击图像水印算法,算法利用了奇异值良好的稳定特性,通过对宿主载体和水印图像的奇异值进行混合运算嵌入水印,同时引入了FastICA算法,在满足算法强稳健性和透明性的同时,保证了快速的收敛性和盲提取要求,属于新观点创新。实验结果表明,算法能很好地抵抗高斯低通滤波、维纳滤波、中值滤波、椒盐加噪、高斯加噪、JPEG有损压缩等多种攻击,对旋转、剪切、缩放、平移、错切几何攻击具有优于传统小波算法无法比拟的强鲁棒性,提取水印与原水印相关系数NC(Normalized Cross-Correlation)平均优于小波算法43.35%,显示了算法的独特优势。 The resist to geometrical attack of digital images watermarking is always the hot and difficult issues. A blind watermarking algorithm was proposed based on the singular values decomposition for its favorable stability. This algorithm embedded a small disturbance watermarking in the image's singular values to achieve strong robustness and transparency, and introduced the FastlCA algorithm to ensure fast astringency and blind extraction. The experiment shows that this algorithm has the strong robustness to Gaussian low pass filter, wiener filter, median filter, adding salt & pepper noise, adding Gaussian noise, JPEG compression, etc. The algorithm can also resist the geometrical attack, such as rotation, shearing, shrink & magnify, shifting, cropping. NC (Normalized Cross-Correlation) of the original watermark and extraction watermark is superior to the traditional wavelet algorithm average 43.35% .It shows the unique superiority great advantage.
出处 《系统仿真学报》 EI CAS CSCD 北大核心 2008年第24期6613-6616,共4页 Journal of System Simulation
基金 陕西省科技攻关项目(2007K04-13) 西安市应用发展研究项目(YF07017)
关键词 版权保护 数字水印 几何变换 水印攻击 copyright protection digital watermarking geometrical translate watermarking attack
  • 相关文献

参考文献10

  • 1刘红梅,黄继武,肖自美.一种小波变换域的自适应视频水印算法[J].电子学报,2001,29(12):1656-1660. 被引量:23
  • 2Chandra D V S. Digital Image Watermarking Using Singular Value Decomposition [C]// Proceedings of 45th Midwest Symposium on Circuits and Systems (MWSCAS02). Tulsa, OK, 2002: 264-267.
  • 3Ganic E, Eskicioglu A M. Robust Embedding of Visual Watermarks Using DWT-SVD [J]. IEEE Trans on Image Processing, 2004, 4(8): 1141-1146
  • 4Liu R, Tan T. An SVD-Based Watermarking Scheme for Protecting Rightful Ownership [J]. IEEE Transactions on Multimedia (S1070- 986X), 2002, 4(1): 121-128.
  • 5Quan L, Qingsong A. A Combination of DCT-Based and SVD-Based Watermarking Scheme [C]// Proceedings of 7th International Conference on Signal Processing (ICSP04). Istanbul, Turkey, 2004, 8: 873-876.
  • 6Sverdlov A, Dexter S, Eskicioglu A M. Robust DCT SVD Domain Image Watermarking for Copyright Protection: Embedding Data in All Frequency [C]// 13th European Signal Processing Conference (EUSIPCO '05), Antalya, Turkey. 2005: 425-431.
  • 7周波,陈健.基于奇异值分解的、抗几何失真的数字水印算法[J].中国图象图形学报(A辑),2004,9(4):506-512. 被引量:96
  • 8刘瑞祯,谭铁牛.基于奇异值分解的数字图像水印方法[J].电子学报,2001,29(2):168-171. 被引量:217
  • 9张建伟,鲍政,王顺凤.图像小波域分块奇异值分解的自适应水印方案[J].中国图象图形学报,2007,12(5):811-818. 被引量:16
  • 10El-Khamy S E, Lofty M, Sadek R A. A block based wavelet watermarking technique for copyright protection and authentication [C]// Proceedings of the 46th IEEE International Midwest Symposium (MWSCAS '03). USA: IEEE, 2003: 90-93.

二级参考文献31

  • 1Petitcolas F A P, Anderson R J, Kuhn M G. Attacks on copyright marking systems [A]. In: Proceedings of Workshop Information Hiding[C]. Portland, OR, USA, 1998: 218-238.
  • 2Herley C. Why watermarking is nonsense [J]. IEEE Signal Processing Magazine, 2002, 19(5) : 10-11.
  • 3Braudaway G W, Minter F. Automatic recovery of invisible image watermarks from geometrically distorted image[A]. In:Proceedings of SPIE Security and Watermarking of Multimedia Contents Ⅱ [C]. San Jose, CA, USA, 2000:74-81.
  • 4Ruanaidh J J. K. O. , Pun T. Rotation, scale and translation invariant spread spectrum digital image watermarking[J]. Signal Processing, 1998, 66(3): 303-317.
  • 5Andrews H, Patterson C. Singular value decomposition(SVD)image coding[J]. IEEE Transactions on Communications, 1976,24(4) : 425-432.
  • 6Liu R, Tan T. An SVD-based watermarking scheme for protecting rightful ownership [J]. IEEE Transactions on Multimedia, 2002,4(1) : 121-128.
  • 7Leon S J. Linear Algebra with Applications [M]. New York:Macmillan, 1986: 343-356.
  • 8Horn R A, Johnson C R. Matrix Analysis [M]. Cambridge:Cambridge University, 1985 : 431-432.
  • 9Miller M L, Bloom J A. Computing the probability of false watermark detection [A]. In: Proceedings of 3rd International Workshop Information Hiding [C], Dresden, Germany, 1999:146-158.
  • 10Hsuand J C T,IEEE Trans Image Processing,1999年,8卷,1期,58页

共引文献319

同被引文献22

  • 1张建伟,鲍政,王顺凤.图像小波域分块奇异值分解的自适应水印方案[J].中国图象图形学报,2007,12(5):811-818. 被引量:16
  • 2LIU RUI - ZHEN, TAN TIE - NIU. An SVD - based watermarking scheme for protecting rightful ownership[ J]. IEEE Transactions on Multimedia, 2002, 4(1) : 121 - 128.
  • 3CHANDRA D V S. Digital image watermarking using singular value decomposition[ C]// MWSCAS02: Proceedings of 45th Midwest Symposium on Circuits and Systems. Tulsa: IEEE, 2002:264 - 267.
  • 4LIU QUAN , AI QINGSONG . A combination of DCT - based and SVD-based watermarking scheme[ C]//ICSP04: Proceedings of 7th International Conference on Signal Processing. Istanbul: IEEE, 2004, 8:873-876.
  • 5SVERDLOV A, DEXTER S, ESKICIOGLU A M. Robust DCT-SVD domain image watermarking for copyright protection: Embedding data in all frequency [ C]//EUSIPCO'05: 13th European Signal Processing Conference. Antalya: IEEE, 2005:425-431.
  • 6GANIC E, ESKICIOGLU A M. Robust embedding of visual watermarks using DWT-SVD [ J]. IEEE Transactions on Image Processing, 2004, 4(8): 1141-1146.
  • 7PETITCOLAS F A P. Watermarking schemes evaluation[ J]. IEEE Transactions on Signal Processing, 2000, 17(5): 58 -64.
  • 8Stirmark[ EB/OL]. [ 2009 - 08 - 10]. http://www, petitcolas, net/ fabien/software/StirMarkBenchmark 4-0-129. zip.
  • 9Schyndel Rg, Tirkel A, Osborne C. A Digital Watermark. ICIP94 [C]//[S. 1.]: [s. n.], 1994: 86- 90.
  • 10Wolfgang RB, Delp EJ. A Watermark for Digital Images. ICIP96 [C]//[S. 1.]: [s. n.], 1996, 3: 219-222.

引证文献2

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部