期刊文献+

基于傅立叶–梅林变换的零水印算法 被引量:2

Zero-watermark algorithm based on Fourier-Millin transforming
下载PDF
导出
摘要 为了提高抗几何攻击性能,同时保证不可见性,提出了一种结合傅立叶-梅林变换和零水印概念的图像水印算法。该算法通过对图像进行傅立叶-梅林变换找到几何不变域,在此域中提取图像特征构并加入水印密钥构成零水印。由待检测图像以相同的方法得到伪水印,通过比较零水印和伪水印的相关性判定图像版权。该算法在判定图像版权是不需要原始图像,仅需零水印。实验结果表明,该算法有较强的抗几何攻击性能,对压缩、加噪等常见的图像处理攻击同样具有良好的鲁棒性。 In order to improve performance of resistance to the geometrical attack while keep invisible, a zero-watermark algorithm for digital image based on Fourier-Millin transforming is proposed. In this algorithm, the geometrical-invariant domain is gotten by Fourier- Millin transforming (FMT) to the image, and the zero-watermark is constructed by image feature which is extracted from this domain and encrypted by secret key. A fake watermark is constructed in the same way from the detected image, and the decision of the copyright is made by comparing the correlativity of the zero-watermark and the fake watermark. The judgment is made by zero-watermark not referring the original image. Experimental results show the algorithm is robust to compression, add-in noise as well as geometrical attacks.
出处 《计算机工程与设计》 CSCD 北大核心 2009年第10期2566-2569,共4页 Computer Engineering and Design
关键词 版权保护 图像特征 零水印 傅立叶-梅林变换 几何攻击 copyright protection image feature zero-watermarking FMT geometrical attack
  • 相关文献

参考文献8

二级参考文献33

  • 1[1]Swanson M D, Kobayashi M, Tewfik A H. Multimedia data embedding and watermarking techniques. Proc. IEEE, 1998, 86(6): 1064-1087.
  • 2[2]Cox I J, Kilian J, Leighton T, Shamoon T. Secure spread spectrum watermarking for multimedia.IEEE Trans. on Image Processing, 1997, 6(12): 1673-1687.
  • 3[3]Bas P, Chassery J-M, Macq B. Geometrically invariant watermarking using feature point. IEEE Trans. on Image Processing, 2002, 11(9): 1014-1028.
  • 4[4]Oruanaidh J, Pun T. Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Processing, 1998, 66(3): 303-317.
  • 5[5]Lin C Y, Bloom J A, Cox I J, Miller M L, Lui Y M. Rotation, scale, and translation resilient watermarking for images. IEEE Trans. on Image Processing, 2001, 10(5): 767-782.
  • 6[6]Pereira S, Ruanaidh J, Deguillaume F, Cscurka G, Pun T. Template based recovery of Fourierbased watermarks using log-polar and log-log maps. Proc. Int. Conference on Multimedia Computing and Systems, Florence, Italy. June 1999, (1): 870-874.
  • 7[7]Kutter M. Watermarking resisting to translation, rotation and scaling. Proc. SPIE Int. Symp.on Voice, Video, and Data Communication, November 1998, 3528: 423-431.
  • 8[8]Voloshynovskiy S, Deguillaume F, Pun T. Content adaptive watermarking based on a stochastic multiresolution image modeling. EUSIPCO2000, European Signal Processing Conference, Tampere, Finland, September 2000.
  • 9[9]Voloshynovskiy S, Herrigel A, Baumgaertner N, Pun T. A stochastic approach to content adaptive digital image watermarking, in Third International Workshop on Information Hiding, Dresden,Germany, September 29-October 1st, 1999, LNCS 1768; 270-285.
  • 10[10]E fstratiadis S, Katsaggelos A. Adaptive iterative image restoration with reduced computational load. Optical Engineering, 1990, 29(12): 1458-1468.

共引文献586

同被引文献12

引证文献2

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部