期刊文献+

一种抵抗强剪切攻击的鲁棒性数字水印算法 被引量:6

Strong anti-robust watermarking algorithm
下载PDF
导出
摘要 为了增强水印的抗几何攻击能力,提出了一种能够抵抗强剪切攻击的鲁棒性水印算法,即把水印嵌入在代表宿主载体基本特征的基矩阵中.理论分析表明:这种算法可以获得智能特征以抵抗强剪切攻击;可对水印进行加密扩频调制以增强隐蔽性;通过比较合成图像与原始图像的峰值信噪比,可自适应调整水印嵌入强度;引入改进的PCA(Principal Component Analysis)方法,加强了矩阵元素之间的联系,提高了算法的效率.实验表明,当图像剪切程度达到87.50%时,水印检测正确率为100%,同时算法对有损压缩、滤波、噪声等常规攻击同样具有良好的鲁棒性;算法嵌入容量大,宿主载体可为图像、音频等多种形式,是一个具有普适性的盲水印方案. A digital watermarking algorithm that can resist the strong shear attack is proposed. The embedded strategies include: the watermark is embedded into the basis matrix on behalf of the basic characteristics of the host carrier for the first time, and the theoretical analytical result shows that the algorithm may obtain intelligence and resist shear; the watermark is encrypted spread spectrum modulation to enhance the hidden features; the watermark embedding intensity is adaptively adjusted by a comparison in the PSNR (Power Signal- to-Noise Ratio) between the original image and the synthetie image; the improved PCA(Principal Component Analysis) method is introduced, which strengthens the link between the matrix elements, to improve the algorithm's convergence speed. Experimental results show that the algorithm is robust to compression, filtering, noise as well as strong shear attacks, and confirm the validity of the theoretical result. The algorithm's embedding capacity is large and host vector may be an image, audio or others. The algorithm is of general applicability and is a blind watermark schem.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2009年第1期22-27,共6页 Journal of Xidian University
基金 陕西省工业攻关项目资助(2007K04-13) 西安市应用发展研究项目资助(YF07017)
关键词 非负矩阵分解 数字水印 剪切攻击 PCA方法 non-negative matrix faetorization digital watermarking shear attack principal component analysis
  • 相关文献

参考文献11

  • 1Licks V, Jordan R. Geometric Attacks on Image Watermarking Systems[J]. IEEE Multimedia, 2005, 12(3): 68-79.
  • 2Wang Xiangyang, Wu Jun, Niu Panpan. A New Digital Image Watermarking Algorithm Resilient to Desynchronization Attacks[J]. IEEE Trans on Information Forensics and Security, 2007, 2(4): 655-663.
  • 3Xiang Shijun, Kim H J, Huang Jiwu. Invariant Image Watermarking Based on Statistical Features in the Low-Frequency Domain[J]. IEEE Trans on Circuits and Systems for Video Technology, 2008, 18(6) : 777-790.
  • 4Alghoniemy M, Tewfik A H. Geometric Invariance in image watermarking[J]. IEEE Trans on Image Processing, 2004, 13(2) : 145-153.
  • 5李雷达,郭宝龙.基于伪Zernike矩的图像自适应RST不变水印[J].西安电子科技大学学报,2007,34(1):38-42. 被引量:4
  • 6Lin Chuang, Pan Jeng-Shyang, Liao Bin-Yih. Parity Modulation Based Watermarking Resisting to Cropping[C]//Proc of ICICIC 2007. Kumamoto: IEEE, 2007: 294-294.
  • 7Zhang Taiping, Fang Bin, Tang Yuanyan, et al. Topology Preserving Non-negative Matrix Factorization for Face Recognition[J]. IEEE Trans on Image Processing, 2008, 17(4): 574-584.
  • 8Monga V, Mihcak M. Robust and Secure Image Hashing via Non-Negative Matrix Factorizations[J]. IEEE Trans on Information Forensics and Security, 2007, 2(3): 376-390.
  • 9Holzapfel A, Stylianou Y. Musical Genre Classification Using Nonnegative Matrix Factorization-Based Features [J]. IEEE Trans on Audio, Speech, and Language Processing, 2008, 16(2): 424-434.
  • 10Virtanen T. Monaural Sound Source Separation by Nonnegative Matrix Factorization With Temporal Continuity and Sparseness Criteria [J]. IEEE Trans on Audio, Speech and Language Processing, 2007,15(3): 1066-1074.

二级参考文献3

共引文献24

同被引文献48

引证文献6

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部