期刊文献+

鲁棒性数字图像水印技术 被引量:4

Robust Digital Image Watermarking Technique
下载PDF
导出
摘要 数字水印技术作为版权保护的重要手段已经成为了研究的热点,但是实用的鲁棒性数字水印技术不多,特别是抗几何攻击的水印算法不多.文中利用Krawtchouk不变矩对平移、旋转和缩放的不变性以及Krawtchouk矩良好的局部特性和重构性能,根据水印的容量自适应地改变某些相对稳定的低阶矩来嵌入水印,并用Rijndael加密和Arnold置乱等技术以及构造的图像特征不变矩阵生成相关的二值逻辑表来进行版权认证.实验证明,该算法不仅对JPEG压缩、裁剪、噪声等常见攻击有较强的免疫力,而且对平移、旋转、缩放等几何攻击也具有较强的免疫力. As a main method for copyright protection, the watermarking technique has been a hot topic for research. But there are few methods of practical robust digital watermarking, especially in the case of geometrically robust watermarking. Using translation, rota- tion, scaling invariant property, good local characteristics and excellent reconstruct ability of Krawtchouk moments, the robustness to the cropping of lower Krawtchouk moments are combined to obtain the watermarked image by modifying some selected moments ac- cording to the length of the watermark bits. With Rijndael encryption, Arnold transformation and the constructed invariant feature ma- trix, a related binary logical table is produced for copyright protection. The experimental results show that the embedded watermarking is effectively robust to the common attacks such as JPEG compression, cropping and added noise, as well as the geometric attacks such as translation, rotation and scaling.
出处 《小型微型计算机系统》 CSCD 北大核心 2011年第2期356-360,共5页 Journal of Chinese Computer Systems
关键词 KRAWTCHOUK矩 特征不变矩阵 矩重构 Rijndael加密 ARNOLD置乱 krawtchouk moments invariant feature matrix moments reconstruction Rijndael encryption arnold transformation
  • 相关文献

参考文献10

  • 1Licks V, Jordan R. Geometric attacks on image watermarking systems[ J]. IEEE Multimedia, 2005, 12(3) :68-78.
  • 2Pereira S, Pun T. Robust template matching for affine resistant image watermarks [ J ]. IEEE Transactions on Image Processing, 2000, 9(6) :1123-1129.
  • 3Dong P, Galatsanos N P. Affinc transform resistant watermarking based on image normalization[ C]. In: Proceedings of IEEE International Conference on Image Processing, New York, USA: IEEE, 2002,489-492.
  • 4O' Ruanaidh J J K, Pun T Rotation. Scale and translation invariant spread spectrum digital image watermarking [J]. Signal Processing, 1998, 66(3) :303-317.
  • 5Kim H S, Lee H K. Invadant image watermark using zemike moments[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2003, 13 (8) :766 -775.
  • 6Yap P, Paramesran R, Ong S. Krawtchouk moments as a new set of discrete orthogonal moments for image reconstruction [ C ]. In: Proceedings of International Joint Conference on Neural Network, Honolulu, Hawaii, USA: IEEE, 2002, 908-912.
  • 7Yap P, Paramcsran R, Ong S. Image analysis by krawtchouk moments[J]. IEEE Transactions on Image Processing, 2003, 12 (11) : 1367-1377.
  • 8Kundu A, He Y, Bahl P. Recognition of handwritten word: first and second order hidden rnarkov model based approach[ J]. Pattern Recognition, 1989,22 ( 3 ) : 283 -297.
  • 9Jamil T. The rijndael algorithm [ J ]. IEEE Potentials, 2004, 23 (2) :36-38.
  • 10Wang Bing-xi. The digital watermarking technique[M]. Xi' an, Xidian University Press, 2003.

同被引文献45

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部