期刊文献+

基于第一主成分方向稳定性的图像零水印 被引量:5

Image zero-watermark based on direction stability of first principal component vector
原文传递
导出
摘要 针对灰度值攻击如亮度值的绝对修改、对比度改变、参数直方图均衡化,以及组合攻击破坏数字图像水印,利用第一主成分向量方向的稳定性,提出了一种适应性很强的零水印方法,解决了水印的不可见性与鲁棒性的矛盾。首先分析了第一主成分方向的稳定性,接着通过实验测试它在空域与变换域的表现。在此基础上对输入图像执行多级DT-CWT分解,选择它的两个低频子带并分别进行分块,计算各子块的第一主成分向量;然后分别计算它们与一个秘密参考向量的夹角;最后比较两个低频子带对应子块的夹角关系抽取图像特征。此外对所提出的方案进行了安全性与鲁棒性分析。通过对6幅图像的20种单项攻击以及50种组合攻击进行实验,结果表明所提出的方案在鲁棒性、经受攻击的广泛性、实用性3方面综合性能优越。 Image gray or intensity value attacks, including the absolute modification of gray values, contrast adjustment, parameter histogram equalization, and combined attacks can make many kinds of watermark detection approaches unsuccessful. Addressing these problems in this paper, a robust zero-watermark algorithm using the direction stability of the first principal component vector is proposed, which can effectively solve the conflict between invisibility and robustness. The direction stability of the first principal component vector is mathematically analyzed, and experiments are performed to observe the difference of the stability in the spatial domain and the frequency domain. On this basis, the input image is decomposed by the dual-tree complex wavelet transform (DT-CWT) and the output of the two low frequency bands is segmented into non-overlapping sub-blocks, respectively. After computing the first principal component vector for each sub-block, some vector angles between that of each sub-block and a secret reference vector can be obtained. By comparing the angles from two sub-blocks with the same position in the left and fight low frequency bands, zero-watermark feature extraction is accom- plished. In addition, we analyze the security and robustness for the proposed scheme. Sufficient experiments with six tested images, twenty kinds of common attacks and fifty kinds of combination attacks are carried out. Simulation results show the proposed scheme is superior in the comprehensive performance composed of robustness, withstanding diversity attack and practical application.
作者 付剑晶 王珂
出处 《中国图象图形学报》 CSCD 北大核心 2012年第7期756-769,共14页 Journal of Image and Graphics
基金 国家自然科学基金项目(30800703) 国家高技术研究发展计划(863)项目(2006AA10Z204)
关键词 图像水印 灰度值攻击 组合攻击 DT—CWT变换 零水印 image watermark gray value attack combination attack DT-CWT transform zero watermark
  • 相关文献

参考文献4

二级参考文献30

  • 1Dong P, Brankov J G, Galatsanos N P, et al. Digital Watermarking Robust to Geometric Distortions [J]. IEEE Trans. on Image Processing(S1057-7149), 2005, 14(12): 2140-2150.
  • 2Okman O E, Akar G B. Quantization index modulation-based image watermarking using digital holography [J]. Opt. Soc. Am. A(S1084-7529), 2007, 24(1): 243-253.
  • 3Takai N, Mifune Y. Digital watermarking by a holographic technique [J]. Appl. Opt(S0003-6935), 2002, 41(5), 865-873.
  • 4Kishk S, Javidi B. Watermarking of three-dimensional objects by digital holography [J]. Opt. Lett(S0146-9592), 2003, 28(3): 167-169.
  • 5Chang H, Tsan C. Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain [J]. Appl. Opt(S0003-6935), 2005, 44(29): 6211-6219.
  • 6Liu M, Yang G L, Xie H Y, et al. Computer-generated hologram watermarking resilient to rotation and scaling [J]. Opt. Eng (S0091-3286), 2007, 46(6): 060501.
  • 7Li J Z, Zhang X S, Liu S, et al. Adaptive watermarking scheme using a gray-level computer generated hologram [J]. Appl. Opt (S0003-6935), 2009, 48(26): 4858-4865.
  • 8Liu R, Tan T. An SVD-based watermarking scheme for protecting rightful ownership [J]. IEEE Trans. on Multimedia (S1520-9210), 2002, 4: 121-128.
  • 9Khotanzad A, Hong Y H. Invariant image recognition by Zernike moments [J]. IEEE Trans. on Pattern Analysis and Machine Intelligence (S0162-8828), 1990, 12: 489-497.
  • 10Kim B S, Choi J G, Park C H, et al. Robust digital image watermarking method against geometrical attacks [J]. Real Time Imaging(S1077-2014), 2003, 9: 139-149.

共引文献292

同被引文献46

  • 1叶天语.抗JPEG压缩和几何攻击的鲁棒零水印算法[J].光子学报,2012,41(2):210-217. 被引量:9
  • 2叶天语.自嵌入双功能图像水印算法[J].光子学报,2012,41(7):859-867. 被引量:5
  • 3楼偶俊,王相海,王钲旋.抗几何攻击的量化鲁棒视频水印技术研究[J].计算机研究与发展,2007,44(7):1211-1218. 被引量:8
  • 4马建湖,何甲兴.基于小波变换的零水印算法[J].中国图象图形学报,2007,12(4):581-585. 被引量:37
  • 5Mohamed T M, Elmahdy H N, Onsi H M. Efficient Watermark Detection by Using the Longest Common Substring Technique [J]. Egyptian Informatics Journal, 2011, 12(2): 115-123.
  • 6Ahmada J J, Li S, Thavot R, et al. Secure Computing with the MPEG RVC Framework [J]. Signal Processing: Image Communication, 2013, 28(10): 1315-1334.
  • 7Wang S, Sang J, Song X, et al. Least Significant Qubit (LSQb) Information Hiding Algorithm for Quantum Image [J]. Measurement, 2015, 73(5): 352-359.
  • 8Jia S L. A Novel Blind Color Images Watermarking Based on SVD[J]. Optik-International Journal for Light and Electron Optics, 2014, 125(12): 2868-2874.
  • 9Tsai H H, Lai Y S, Lo S C. A Zero-watermark Scheme with Geometrical Invariants Using SVM and PSO Against Geometrical Attacks for Image Protection [J]. Journal of Systems and Software, 2013, 86(2): 335-348.
  • 10Gao G Y, Jiang G P. A Lossless Copyright Authentication Scheme Based on Bessel-Fourier Moment and Extreme Learning Machine in Curvature-feature Domain [J]. Journal of Systems and Software, 2013, 86(1): 222-232.

引证文献5

二级引证文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部