期刊文献+

基于形殊点和NSCT的抗几何攻击物流标签水印防伪技术

Study on Geometric Attack-resistent Logistics Label Watermark Anti-counterfeiting Technology Based on RPE and NSCT
下载PDF
导出
摘要 为了提高物流防伪标签数字水印抵抗几何攻击性能,设计了一种基于形殊点和非下采样Contourlet变换的的鲁棒数字水印算法。首先利用Canny算子提取图像边缘信息,其次将物流标签图像边缘分块并计算分块子图的形殊点坐标,最后水印信息自适应量化嵌入特征区域的非下采样Contourlet变换的低频变换系数中。检测水印时利用随机抽样一致性算法估计几何攻击前后图像的仿射变换参数。大量仿真实验结果证明,本文算法不仅具有良好的不可见性,同时对常见物流标签图像处理攻击和几何攻击均具有较强的鲁棒性。 In this paper, in order to improve the geometric attack resistance of the watermarks of the logistics anti-counterfeiting labels, we designed a robust algorithm for the digital watermarks based on reference points extraction(RPE) and non-sampling Contourlet transformation(NSCT). Next we introduced the working process of the algorithm and then through a large quantity of simulation experiments, demonstrated that the algorithm was of good invisibility and was robust to the common attacks and geometric attacks in logistics label image processing.
作者 巩振全
出处 《物流技术》 北大核心 2014年第3期445-448,共4页 Logistics Technology
基金 泰安市科技发展计划"泰山历史文化资源信息化管理查询系统"(20102065)
关键词 物流标签 非采样CONTOURLET变换 几何攻击 数字水印 logistics label non-sampling Contourlet transformation geometric attack digital watermark
  • 相关文献

参考文献14

  • 1李昌利,卢朝阳.数字水印的去同步攻击及其对策[J].中国图象图形学报(A辑),2005,10(4):403-409. 被引量:15
  • 2Hongxia Jin,H Lotspiech. Hybrid Traitor Tracing[A].2006 IEEE Inter- national Conference[C].2006.
  • 3A Z Tirkel,et a|.Electronic WatermarklJ].Digital Image Computing Techno|ogy and Applications. 1993,(l):666-673,.
  • 4J Cox,et al.Secure Spread Spectrum Watermarking fir Multimedia [R]. NEC Research Institute Princeton, 1995.
  • 5Dong Zheng,Yan Liu,Jiying Zhao.A Survey of RST lnvariant Image Watermarking Algorithms[AI.Canadian Conference on Electrical and Computer Engineering[C].2006.
  • 6Chuhnng Fei,Kundur, D R H Kwong.Analysis and Design nf Secure Watermark-based Authentication Systems[J].lEEE Transactions on In- formation Forensics and Security,2006,1 ( 1):43 -55.
  • 7O Ahun,G Sharrna,U Celik,F Boeko.A Set Theoretic Framework for Watermarking and Its Appliealion to Semifi'agile Tamper Detection[J]. [EEE Transactions on lnformatic, n Forensics and Security,2006,1(4): 479-492.
  • 8S Voloshynovskiy,F Deguillaume,T Pun.Maltibit Watermarking Robust against Local Nonlinear Cometrical Distortions[A].lnternational Con- ference on Image Processing[C].2001.
  • 9金聪,叶俊民,许凯华,张清国.具有抗几何攻击能力的盲数字图像水印算法[J].计算机学报,2007,30(3):474-482. 被引量:18
  • 10Mitiche A, Aggarwal J K.Contour Registration by Shape Specific Points for Shape Matching[Jl.Cmputer VisiCm, Graphics, and Image Processing, 1983,22(3): 396-408.

二级参考文献61

共引文献47

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部