期刊文献+

Geometrically robust image watermarking based on Jacobi-Fourier moments 被引量:3

Geometrically robust image watermarking based on Jacobi-Fourier moments
原文传递
导出
摘要 Rotation,scaling and translation (RST) attacks can desynchronize the watermark detection so that many water-mark systems failed. A geometrically robust image watermarking strategy based on Jacobi-Fourier moments (JFMs) is proposed. The Jacobi moments of the original image are first extracted as original moments; then the watermark image is embedded into the global or local area of the original image,and the Jacobi moments of the area are extracted. When the watermarked image is not attacked,the watermark can be retrieved by using the margin of the original moments and the moments of the embedded area. When it is attacked,the watermark can also be got in that way,and the original moments need to be transformed. It can be concluded that Jacobi-Fourier moments perform better than Zernike moments (ZMs) for small images. Meanwhile,the watermark is also robust to scaling and rotation as well as regular attacks such as added noises. Rotation, scaling and translation (RST) attacks can desynehronize the watermark detection so that many watermark systems failed. A geometrically robust image watermarking strategy based on Jacobi-Fourier moments (JFMs) is proposed. The Jacobi moments of the original image are first extracted as original moments; then the watermark image is embedded into the global or local area of the original image, and the Jacobi moments of the area are extracted. When the watermarked image is not attacked, the watermark can be retrieved by using the margin of the original moments and the moments of the embedded area. When it is attacked, the watermark can also be got in that way, and the original moments need to be transformed. It can be concluded that Jacobi- Fourier moments perform better than Zemike moments (ZMs) for small images. Meanwhile, the watermark is also robust to scaling and rotation as well as regular attacks such as added noises.
出处 《Optoelectronics Letters》 EI 2009年第5期387-390,共4页 光电子快报(英文版)
  • 相关文献

参考文献4

  • 1任海萍,平子良,博午日亘,盛云龙,陈盛祖,吴文凯.用雅可比-傅里叶矩进行图像描述[J].光学学报,2004,24(1):5-10. 被引量:9
  • 2LI Lei-da,GUO Bao-long,SUN Lei. Journal of Optoelect- ronics.Laser . 2007
  • 3Hyung Shin Kim,Heung-Kyu Lee.Invariant Image Watermark Using Zernike Moments[].IEEE Transactions on Circuits and Systems for Video Technology.2003
  • 4Chen Q,,Yang X L,Zhao J Y.Robust image watermarking with Zernike moments[].Proceedings of Canadian Conference on Electrical and Computer Engineering.2005

二级参考文献7

  • 1Prokop R J, Reeves A P. A survey of moment-based techniques for unoccluded object representation and recognition. Graphical Models and Image Processing,1992, 54(5) :438-460.
  • 2Hu M K. Visual pattern recognition by moment invariants.IEEE Trans Inf Theory, 1962, IT-8(2) :179-187.
  • 3Teague M R. Image analysis via the general theory of moments. J. Opt. Soc. Am. , 1980, 70(8):920-930.
  • 4Sheng Y L, Shen L X. Orthogonal Fourier-Mellin moments for invariant pattern recognition. J. Opt. Soc.Am. (A), 1994, 11(6):1748-1757.
  • 5Ping Z L, Wu R G, Sheng Y L. Image description with Chebyshev-Fourier moments. J. Opt. Soc. Am. (A),2002, 19(8) :1748-1754.
  • 6The C H, Chin R T. On image analysis by the methods of moments. IEEE Trans Pattern Anal Mach Intell, 1988,10(4) :496-513.
  • 7Liao S X, Pawlak M. On image analysis by moments. IEEE Trans Pattern Anal Mach Intell , 1996, 18(3):254-266.

共引文献8

同被引文献42

  • 1尹浩,林闯,邱锋,丁嵘.数字水印技术综述[J].计算机研究与发展,2005,42(7):1093-1099. 被引量:136
  • 2陈永强,胡汉平,李新天.基于协同神经网络的图像数字水印算法[J].中国图象图形学报,2005,10(7):894-899. 被引量:5
  • 3李春花,卢正鼎.一种基于支持向量机的图像数字水印算法[J].中国图象图形学报,2006,11(9):1322-1326. 被引量:23
  • 4张力,肖薇薇,钱恭斌,纪震.基于Krawtchouk不变矩的仿射攻击不变性局部水印算法[J].电子学报,2007,35(7):1403-1408. 被引量:11
  • 5Vapnik V N. An overview of statistical learning theory [J]. IEEE Transactions on Neural Networks, 1999, 10 (5) :988-999.
  • 6Shen R M,Fu Y G,Lu H T. A novel watermarking scheme based on support vector regression[J]. Journal of Sys- tems and Software, 2005,78 ( 1 ) : 1-8.
  • 7Do M N,Vetterii M. The contouriet transform: an efficient directional multiresolution image representation[J]. IEEE Transactions on Image Processing, 2005,14( 12 ) : 2091- 2106.
  • 8Prasad R M,Koliwad S. A comprehensive survey of con- temporary researches in watermarking for copyright pro- tection of digital images[J], International Journal of Com-purer Science and Network Security,2009,9(4):91-107.
  • 9SONG Hao-hao,YU Song-yu,YANG Xiao-kang,et al. Con- tourlet based image adaptive watermarking [J]. Signal Processing: Image Communication, 2008,23(3) : 162-178.
  • 10Asifullah K, Syed F T, Abdul M, et al. Machine learning based adaptive watermark decoding in view of anticipa- ted attack [ J]. Pattern Recognition, 2008,41 ( 8 ) : 2594- 2610.

引证文献3

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部