期刊文献+

DWT域抗几何攻击水印算法研究 被引量:8

Image Watermarking Scheme in Wavelet Domain against Geometrical Attacks
下载PDF
导出
摘要 鲁棒水印面临的最大问题就是几何攻击。小波变换域不具有几何不变性,一个微弱不可察觉的几何攻击就能使小波域水印算法失效。提出了一种新的以特征点作为模板、有效抵抗几何攻击的图像水印算法。它包括:(1)根据小波变换空间各子带呈树形结构的特性,选择每棵小波树中纹理最强的方向子树的树根作为水印嵌入点;(2)根据嵌入点在低频对应位置的能量和该方向子树高频叶子结点的纹理信息确定一种自适应嵌入水印策略;(3)利用Har-ris-Laplace算子从含有水印的图像中提取出具有几何形变鲁棒性的特征点,将其作为模板;(4)水印检测时,先利用特征点模板通过线性变换恢复几何形变的图像,然后通过统计图像的相关性来验证水印的存在,无需原始图像。仿真实验表明,所提出的水印算法不仅具有很好的透明性,而且对常见的图像处理和几何变换具有很好的鲁棒性。 The toughest challenge facing the robust watermarking is the geometrical attacks. A slight even intangible geometrical attack can fail the watermark in wavelet domain due to the shift-variance of wavelet. Based on the feature points, this paper proposed an image watermarking scheme against the geometrical attacks. First, according to the tree structure of the wavelet coefficients, the proposed scheme selected the root of the directional subtree with the highest texture as the embedded points from each wavelet tree. Second, this paper proposed an adaptive embedding strategy according to the energy of the low frequency coefficient corresponding to the embedded point and the texture characteristics of the highest frequency coefficients of the subtree. Finally, the proposed scheme used the Harris-Laplace operator to extract the feature points robust to the geometrical attacks, and form a template of feature points. During detection, the proposed scheme restored the attacked image by linear transformation using the feature template, and then verified the watermarking through statistical correlation. The detection process does not need the original host image. Experi- mental results show that the proposed algorithm has good transparency and is very robust to common image processing and geometric attacks.
出处 《计算机科学》 CSCD 北大核心 2009年第12期251-256,共6页 Computer Science
基金 辽宁省高等学校优秀人才支持计划(RC-04-11)资助
关键词 数字水印 几何攻击 小波树 特征点 模板 Digital watermarking, Geometrical attacks, Wavelet tree, Geature points, Template
  • 相关文献

参考文献13

二级参考文献57

  • 1[1]BORS A, PITAS I. Image watermarking using DCT domain constraints[A]. Proc IEEE ICIP' 96[C]. 1996,231 - 234.
  • 2[2]SCHYNDEL R,TIRKEL A,OSBORNE C.A digital watermark[A] .Proc ICIP'94[C]. 1994,86-90.
  • 3[3]COX I, KILIAN J,SHAMOON T. Secure spread spectrum watermarking for multimedia[J]. IEEE Trans on Image Processing, 19976(12): 1673 - 1687.
  • 4[4]OHNISHI J,MATSUI K. Embedding a seal into a picture under orthogonal wavelet transform[A]. Proc ICMCS'96[C]. 1996,514 -521.
  • 5[5]SHAPIRO J. Embedded image coding using zerotrees of wavelet coefficients[J]. IEEE Trans on Signal Processing, 1993,41 (12):3445- 3462.
  • 6[1]Stefan K, Fabien A P. Information Hiding Techniques for Steganography and Digital Watermarking. London: Artech House, INC, 2000
  • 7[2]Miller M L, Cox I J, Bloom J A. Informed embedding exploiting image and detector information during watermark insertion. In: Proc IEEE International Conference on Image Processing,2000, 3:1-4
  • 8[3]Piva A, Barni M, Bartolini F. DCT-based watermark recovering without restoring to the uncorrupted original image. In :Proc ICIP'97, Atlanta, USA, 1997,I:520-523
  • 9[4]Shapiro J M. Embedded image coding using zerotrees of wavelwt coefficients. IEEE Trans Signal Processing, 1993, 41 (12) :3445-3462
  • 10[5]Watson A B, Yang G Y. Visibility of wavelet quantization noise. IEEE Trans Image Processing, 1997,6(8):1164-1174

共引文献71

同被引文献72

引证文献8

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部