期刊文献+
共找到57篇文章
< 1 2 3 >
每页显示 20 50 100
Digital Watermarking Algorithm Based on Wavelet Transform and Neural Network 被引量:4
1
作者 WANG Zhenfei ZHAI Guangqun WANG Nengchao 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1667-1670,共4页
An effective blind digital watermarking algorithm based on neural networks in the wavelet domain is presented. Firstly, the host image is decomposed through wavelet transform. The significant coefficients of wavelet a... An effective blind digital watermarking algorithm based on neural networks in the wavelet domain is presented. Firstly, the host image is decomposed through wavelet transform. The significant coefficients of wavelet are selected according to the human visual system (HVS) characteristics. Watermark bits are added to them. And then effectively cooperates neural networks to learn the characteristics of the embedded watermark related to them. Because of the learning and adaptive capabilities of neural networks, the trained neural networks almost exactly recover the watermark from the watermarked image. Experimental results and comparisons with other techniques prove the effectiveness of the new algorithm. 展开更多
关键词 digital watermarking neural networks wavelet transform human visual system
下载PDF
Secure and Robust Digital Watermarking: A Survey
2
作者 Chun-Lin Song Le Yang Xin Wang 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第4期343-354,共12页
A digital watermarking technique is a multi-scientific discipline which is developed rapidly in last several years for digital content protection, such as copyright protection, authentication protection, source tracin... A digital watermarking technique is a multi-scientific discipline which is developed rapidly in last several years for digital content protection, such as copyright protection, authentication protection, source tracing, etc. However, in realistic scenarios, the digital watermarking system faces significant secure issues, for example, the attackers want to remove, detect, or embed illegal watermark signals. Therefore, the aim of this contribution is to illustrate recent results of robust and secure watermarking to the signal processing community, and highlight both benefits and still open issues. Specifically, this paper is intended to introduce the concept of secure and robust digital watermarking system, and provide with problems and their countermeasures. First of all, the classic watermark model and cryptosystem will be reviewed and then, the concept of secure and robust digital watermarking system will be described. Next, the watermark attack will be classified and described. Finally, some countermeasures that can help to improve secure and robustness are considered. 展开更多
关键词 Terms--Countermeasures digital watermarking system robust SECURITY watermark attacks.
下载PDF
A Novel Video Data-Source Authentication Model Based on Digital Watermarking and MAC in Multicast
3
作者 ZHAO Anjun LU Xiangli GUO Lei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1257-1261,共5页
A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper, The digital watermarking which composes of the MAC o... A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper, The digital watermarking which composes of the MAC of the significant vid eo content, the key and instant authentication data is embedded into the insignificant video component by the MLUT (modified look-up table) video watermarking technology. We explain a method that does not require storage of each data packet for a time, thus making receiver not vulnerable to DOS (denial of service) attack. So the video packets can be authenticated instantly without large volume buffer in the receivers. TESLA (timed efficient stream loss tolerant authentication) does not explain how to select the suitable value for d, which is an important parameter in multicast source authentication. So we give a method to calculate the key disclosure delay (number of intervals). Simulation results show that the proposed algorithms improve the performance of data source authentication in multicast. 展开更多
关键词 video data authentication MULTICAST MAC(message authentication code) digital watermarking MLUT(modifled look-up table)
下载PDF
A Geometrical Transformations Resistant Digital Watermarking Based on Quantization
4
作者 SHILei HONGFan +2 位作者 LIUWei-qun HUYu-ping CHENZhuo 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期319-323,共5页
A geometrical transformations resistant digital image watermarking based on quantization is described. Taking advantage of the rotation, scale and translation invariants of discrete Fourier transform (DFT), each water... A geometrical transformations resistant digital image watermarking based on quantization is described. Taking advantage of the rotation, scale and translation invariants of discrete Fourier transform (DFT), each watermark bit is embedded into each homocentric circles around the zero frequency term in DFT domain by quantizing the magnitude vector of Fourier spectrum. The embedded sequence can be extracted by “majority principles” without restoring to the original unmarked image. The experimental results show that the watermark is invisible and robust to any combination of geometrical transformations or common image processing techniques. 展开更多
关键词 Key words digital watermarking QUANTIZATION geometrical transformation Fourier transform
下载PDF
Digital Watermarking Scheme for Securing Textual Database Using Histogram Shifting Model
5
作者 Khalid A.El Drandaly Walid Khedr +1 位作者 Islam S.Mohamed Ayman Mohamed Mostafa 《Computers, Materials & Continua》 SCIE EI 2022年第6期5253-5270,共18页
Information security is one of the most important methods of protecting the confidentiality and privacy of internet users.The greater the volume of data,the more the need to increase the security methods for protectin... Information security is one of the most important methods of protecting the confidentiality and privacy of internet users.The greater the volume of data,the more the need to increase the security methods for protecting data from intruders.This task can be challenging for researchers in terms of managing enormous data and maintaining their safety and effectiveness.Protection of digital content is a major issue in maintaining the privacy and secrecy of data.Toward this end,digital watermarking is based on the concept of information security through the insertion and detection of an embedded watermark in an efficient manner.Recent methodologies in the research on digital watermarking result in data distortion after embedding the watermark.This scenario can reduce the efficiency of detecting watermarks as well as violate data confidentiality.This study adapts a robust reversible histogram shifting(HS)technique for textual data in relational databases.Furthermore,the study presents a digital watermarking scheme intended for document copyright protection and proof of ownership.The major advantage of the proposed watermarking scheme is that it can protect digital data and preserve data quality.To the best of our knowledge,this research methodology is promising for use in the HS expansion model for watermarking data on nonnumeric databases.In addition,the results showed that despite exposing the database to an insertion attacks at 50%and 75%of the watermark,the proposed algorithm can recovermore than half of the embedded watermark in all addition and alteration attacks cases.As a result,the watermark information can be retained and restored completely. 展开更多
关键词 Information security digital watermarking information hiding histogram shifting technique
下载PDF
A Robust Digital Watermarking Algorithm Based on Finite-Set Discrete Radon Transform Tight Frame
6
作者 Jiangui Zhang Huibin Qi 《Journal of Computer and Communications》 2020年第12期123-133,共11页
<div style="text-align:justify;"> Digital watermarking technology plays a powerful role in the effective protection of digital media copyright, image authentication, image sharing, image information tr... <div style="text-align:justify;"> Digital watermarking technology plays a powerful role in the effective protection of digital media copyright, image authentication, image sharing, image information transmission and other fields. Driven by strong demand, digital image watermarking technology has aroused widespread research interest and has gradually developed into one of the most active research directions in information science. In this paper, we present a novel robust digital watermarking algorithm based on discrete radon transform tight frame in finite-set (FDRT). FDRT of the zero mean image is a tight frame, the frame boundary <em><strong>A</strong></em> = <em><strong>B</strong></em> = 1, the dual of the frame is itself. The decomposition and reconstruction of the FDRT tight frame will not cause the phenomenon of image distortion. The embedding of hidden watermark is to add a weak signal to the strong background of the original image. Watermark extraction is to effectively identify the embedded weak signal. The feasibility of the watermarking algorithm is analyzed from two aspects of information hiding and robustness. We select the independent Gaussian random vector as the watermark series, and the peak signal-to-noise ratio (PSNR) as the visual degradation criterion of the watermark image. Basing the FDRT compact stand dual operator, we derived the relationship among the strength parameter, square sum of watermark series, the PSNR. Using Checkmark system, the simulation results show that the algorithm is robust enough to some very important image processing attacks such as lossy compression, MAP, filtering, segmentation, edge enhancement, jitter, quadratic modulation and general geometric attack (scaling, rotation, shearing), etc. </div> 展开更多
关键词 digital watermarking Data Mining Discrete Radon Transform Tight Frame Copyright Protection Information Hiding Finite-Set
下载PDF
Object-Oriented Wavelet-Layered Digital Watermarking Technique
7
作者 刘晓云 虞厥邦 李明玉 《Journal of Electronic Science and Technology of China》 2005年第2期116-119,共4页
In this paper, an object-oriented digital watermarking technique is proposed in the wavelet domain for still images. According to the difference of recognition degree of the human eye to the different region of the im... In this paper, an object-oriented digital watermarking technique is proposed in the wavelet domain for still images. According to the difference of recognition degree of the human eye to the different region of the image, the image is divided into the interested region and uninterested region of human eye vision in this scheme. Using the relativity of position and the difference to ocular sensitivity of the multiresolution wavelet among each subband, the image is processed with layered watermarking append technique. Experimental results show that the proposed technique successfully survives image processing operations, additive noise and JPEG compression. 展开更多
关键词 digital watermarking OBJECT-ORIENTED wavelet transformation ocular masking
下载PDF
DWT-Based Watermarking Scheme for Digital Images 被引量:2
8
作者 何泉 苏广川 《Journal of Beijing Institute of Technology》 EI CAS 2003年第2期134-137,共4页
A watermarking scheme for digital images is introduced. This method is based on discrete wavelet transform and spread spectrum technique. A discrete wavelet transformed binary signature image is expanded by an m ... A watermarking scheme for digital images is introduced. This method is based on discrete wavelet transform and spread spectrum technique. A discrete wavelet transformed binary signature image is expanded by an m sequence and added to the large wavelet coefficients of a host image with a scale factor. Good balance between transparency and robustness is achieved by the selection of the scale factor. In addition, the spread spectrum technique is adopted to increase the robustness of this watermarking scheme. The experimental results show that the proposed method is of good performance and robustness for common image operations such as JPEG lossy compression, etc. 展开更多
关键词 digital watermarking discrete wavelet transform spread spectrum
下载PDF
Wavelet-based gray-level digital image watermarking
9
作者 牛夏牧 孙圣和 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2001年第2期111-115,共5页
The watermarking technique has been proposed as a method by hiding secret information into the image to protect the copyright of multimedia data. But most previous work focuses on the algorithms of embedding one dimen... The watermarking technique has been proposed as a method by hiding secret information into the image to protect the copyright of multimedia data. But most previous work focuses on the algorithms of embedding one dimensional watermarks or two dimensional binary digital watermarks. In this paper, a wavelet based method for embedding a gray level digital watermark into an image is proposed. By still image decomposition technique, a gray level digital watermark is decompounded into a series of bitplanes. By discrete wavelet transform ( DWT ), the host image is decomposed into multiresolution representations with hierarchical structure. The different bitplanes of the gray level watermark is embedded into the corresponding resolution of the decomposed host image. The experimental results show that the proposed techniques can successfully survive image processing operations and the lossy compression techniques such as Joint Photographic Experts Group (JPEG). 展开更多
关键词 digital watermarking discrete wavelet transform JPEG compression digital image processing
下载PDF
Data Secure Transmission Model Based on Compressed Sensing and Digital Watermarking Technology
10
作者 WANG Chundong BAI Yi MO Xiuliang 《Wuhan University Journal of Natural Sciences》 CAS 2014年第6期505-511,共7页
Since the Internet of Things(IoT) secret information is easy to leak in data transfer,a data secure transmission model based on compressed sensing(CS) and digital watermarking technology is proposed here. Firstly,... Since the Internet of Things(IoT) secret information is easy to leak in data transfer,a data secure transmission model based on compressed sensing(CS) and digital watermarking technology is proposed here. Firstly, for node coding end, the digital watermarking technology is used to embed secret information in the conventional data carrier. Secondly, these data are reused to build the target transfer data by the CS algorithm which are called observed signals. Thirdly, these signals are transmitted to the base station through the wireless channel. After obtaining these observed signals, the decoder reconstructs the data carrier containing privacy information. Finally, the privacy information is obtained by digital watermark extraction algorithm to achieve the secret transmission of signals. By adopting the watermarking and compression sensing to hide secret information in the end of node code, the algorithm complexity and energy consumption are reduced. Meanwhile, the security of secret information is increased.The simulation results show that the method is able to accurately reconstruct the original signal and the energy consumption of the sensor node is also reduced significantly in consideration of the packet loss. 展开更多
关键词 the Internet of Things(IoT) data security com pressed sensing(CS) digital watermarking information privacy
原文传递
A New Image Watermarking Scheme Using Genetic Algorithm and Residual Numbers with Discrete Wavelet Transform
11
作者 Peter Awonnatemi Agbedemnab Mohammed Akolgo Moses Apambila Agebure 《Journal of Information Security》 2023年第4期422-436,共15页
Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presen... Transmission of data over the internet has become a critical issue as a result of the advancement in technology, since it is possible for pirates to steal the intellectual property of content owners. This paper presents a new digital watermarking scheme that combines some operators of the Genetic Algorithm (GA) and the Residue Number (RN) System (RNS) to perform encryption on an image, which is embedded into a cover image for the purposes of watermarking. Thus, an image watermarking scheme uses an encrypted image. The secret image is embedded in decomposed frames of the cover image achieved by applying a three-level Discrete Wavelet Transform (DWT). This is to ensure that the secret information is not exposed even when there is a successful attack on the cover information. Content creators can prove ownership of the multimedia content by unveiling the secret information in a court of law. The proposed scheme was tested with sample data using MATLAB2022 and the results of the simulation show a great deal of imperceptibility and robustness as compared to similar existing schemes. 展开更多
关键词 Discrete Wavelet Transform (DWT) digital watermarking ENCRYPTION Genetic Algorithm (GA) Residue Number System (RNS) GARN
下载PDF
A Novel Digital Audio Watermarking Scheme in the Wavelet Domain 被引量:2
12
作者 WANGXiang-yang YANGHong-ying ZHAOHong 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期311-314,共4页
We present a novel quantization-based digital audio walermarking scheme inwavelet domain. By quantizing a host audio's wavelet coefficients (Integer Lifting WaveletTransform) and utilizing the characteristics of h... We present a novel quantization-based digital audio walermarking scheme inwavelet domain. By quantizing a host audio's wavelet coefficients (Integer Lifting WaveletTransform) and utilizing the characteristics of human auditory system (HAS), the grayimage isembedded using our watermarking method. Experimental results show that the proposed watermarkingscheme is inaudible and robust against various signal processing such as noising adding, lossycompression, low pass filtering, re-sampling, and re-quantifying. 展开更多
关键词 digital audio watermarking lifting wavelet transform human auditory system chaotic sequence QUANTIZATION
下载PDF
Efficient gray-level digital image watermarking based on vector quantization
13
作者 牛夏牧 孙圣和 陆哲明 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2001年第2期101-107,共7页
Digital watermarking has been presented as a new method for copyright protection by embedding a secret signal in a digital image or video sequence. Common digital image watermarking techniques are based on the concept... Digital watermarking has been presented as a new method for copyright protection by embedding a secret signal in a digital image or video sequence. Common digital image watermarking techniques are based on the concept of spread spectrum communications, which can be classified in two catalogues: spatial domain and transform domain based. Most of transform domain watermarking methods are based on discrete cosine transforms (DCT) and robust to JPEG lossy compression. Recently, digital image watermarking based on another important lossy compression technique, vector quantization (VQ), has been presented, which carries watermark information by codeword indices. It is secret and efficient, and is robust to VQ compression with the same codebook. However, the embedded information is less and the extraction process requires the original image. This paper presents a more efficient VQ based image watermarking method, which can embed a large gray level watermark into the original image with less extra distortion and perform the watermark extraction without the original image. In addition, the proposed watermarking algorithm is very secret because two keys are required for watermark extraction. Experimental results demonstrate the effectiveness of the proposed technique. 展开更多
关键词 Image processing vector quantization digital image watermarking
下载PDF
New Fragile Watermarking Technique to Identify Inserted Video Objects Using H.264 and Color Features
14
作者 Raheem Ogla Eman Shakar Mahmood +1 位作者 Rasha I.Ahmed Abdul Monem S.Rahma 《Computers, Materials & Continua》 SCIE EI 2023年第9期3075-3096,共22页
The transmission of video content over a network raises various issues relating to copyright authenticity,ethics,legality,and privacy.The protection of copyrighted video content is a significant issue in the video ind... The transmission of video content over a network raises various issues relating to copyright authenticity,ethics,legality,and privacy.The protection of copyrighted video content is a significant issue in the video industry,and it is essential to find effective solutions to prevent tampering and modification of digital video content during its transmission through digital media.However,there are stillmany unresolved challenges.This paper aims to address those challenges by proposing a new technique for detectingmoving objects in digital videos,which can help prove the credibility of video content by detecting any fake objects inserted by hackers.The proposed technique involves using two methods,the H.264 and the extraction color features methods,to embed and extract watermarks in video frames.The study tested the performance of the system against various attacks and found it to be robust.The evaluation was done using different metrics such as Peak-Signal-to-Noise Ratio(PSNR),Mean Squared Error(MSE),Structural Similarity Index Measure(SSIM),Bit Correction Ratio(BCR),and Normalized Correlation.The accuracy of identifying moving objects was high,ranging from 96.3%to 98.7%.The system was also able to embed a fragile watermark with a success rate of over 93.65%and had an average capacity of hiding of 78.67.The reconstructed video frames had high quality with a PSNR of at least 65.45 dB and SSIMof over 0.97,making them imperceptible to the human eye.The system also had an acceptable average time difference(T=1.227/s)compared with other state-of-the-art methods. 展开更多
关键词 Video watermarking fragile digital watermark copyright protection moving objects color image features H.264
下载PDF
A Robust Watermarking Scheme Based on ROI and IWT for Remote Consultation of COVID-19 被引量:4
15
作者 Xiaorui Zhang Wenfang Zhang +2 位作者 Wei Sun Tong Xu Sunil Kumar Jha 《Computers, Materials & Continua》 SCIE EI 2020年第9期1435-1452,共18页
In the current dire situation of the corona virus COVID-19,remote consultations were proposed to avoid cross-infection and regional differences in medical resources.However,the safety of digital medical imaging in rem... In the current dire situation of the corona virus COVID-19,remote consultations were proposed to avoid cross-infection and regional differences in medical resources.However,the safety of digital medical imaging in remote consultations has also attracted more and more attention from the medical industry.To ensure the integrity and security of medical images,this paper proposes a robust watermarking algorithm to authenticate and recover from the distorted medical images based on regions of interest(ROI)and integer wavelet transform(IWT).First,the medical image is divided into two different parts,regions of interest and non-interest regions.Then the integrity of ROI is verified using the hash algorithm,and the recovery data of the ROI region is calculated at the same time.Also,binary images with the basic information of patients are processed by logistic chaotic map encryption,and then the synthetic watermark is embedded in the medical carrier image using IWT transform.The performance of the proposed algorithm is tested by the simulation experiments based on the MATLAB program in CT images of the lungs.Experimental results show that the algorithm can precisely locate the distorted areas of an image and recover the original ROI on the basis of verifying image reliability.The maximum peak signal to noise ratio(PSNR)value of 51.24 has been achieved,which proves that the watermark is invisible and has strong robustness against noise,compression,and filtering attacks. 展开更多
关键词 digital watermarking LOGISTIC hash algorithm ROI IWT
下载PDF
Novel copyright protection scheme for digital content 被引量:3
16
作者 Fan Kefeng Wang Meihua +1 位作者 Mo Wei Zhao Xinhua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第2期423-429,共7页
A novel copyright protection scheme for digital content is presented, which is a private watermarking scheme based on the watermark embedding in the DCT domain and watermark extraction Using independent component anal... A novel copyright protection scheme for digital content is presented, which is a private watermarking scheme based on the watermark embedding in the DCT domain and watermark extraction Using independent component analysis (ICA). The system includes the key for watermark extraction and the host image. The algorithm splits the original image into blocks and classifies these blocks based on visual masking, that is, noise visibility function (NVF). Watermark components with different strength are inserted into chosen direct current components of DCT coefficients according to the classifier. The watermark extraction is based on the characteristic of the statistic independence of the host image, watermark and key. Principle component analysis (PCA) whitening process and FastICA techniques are introduced to ensure a blind watermark extraction without requiring the original image. Experirnental results show the proposed technique is robust under attacks such as image filtering and adding noise, cropping and resizing. In addition, the proposed private watermarking system can be improved to the application of the DTV content protection system. 展开更多
关键词 digital content copyright protection digital watermarking noise visibility function independent component analysis.
下载PDF
Robust Audio Blind Watermarking Algorithm Based on Haar Transform 被引量:3
17
作者 Bao-Yuan Chen Yi-Qiang Zhu +2 位作者 Lei-Lei Tian Ying-Ying Li Ya-Qiong Lan 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2013年第3期104-108,共5页
To solve the problem of low capacity of audio watermarking information and poor robustness of impact resistance,a digital audio watermark algorithm based on wavelet transform is presented in this paper. In this algori... To solve the problem of low capacity of audio watermarking information and poor robustness of impact resistance,a digital audio watermark algorithm based on wavelet transform is presented in this paper. In this algorithm,the fine and approximate components are obtained when the Haar wavelet base is used to convert each frame of the audio signal to its discrete transform. Then the HAS algorithm is applied to the fine component embedded with watermark to realize encryption process. The original audio carrier signal is not needed in extraction,as long as the signal is embedded after the frame is divided. The first two sections of each frame are implemented in Haar transform respectively to get the fine and approximate component. The watermark images are obtained from the former two fine components of the energy watermark sequence after calculating,comparing and extracting. The simulation results show that there is a certain transparency for the algorithm,a good robustness against the resampling and low pass filtering attack. 展开更多
关键词 wavelet transform digital watermarking blind extraction
下载PDF
Local Features-Based Watermarking for Image Security in Social Media 被引量:1
18
作者 Shady Y.El-mashad Amani M.Yassen +1 位作者 Abdulwahab K.Alsammak Basem M.Elhalawany 《Computers, Materials & Continua》 SCIE EI 2021年第12期3857-3870,共14页
The last decade shows an explosion of using social media,which raises several challenges related to the security of personal files including images.These challenges include modifying,illegal copying,identity fraud,cop... The last decade shows an explosion of using social media,which raises several challenges related to the security of personal files including images.These challenges include modifying,illegal copying,identity fraud,copyright protection and ownership of images.Traditional digital watermarking techniques embed digital information inside another digital information without affecting the visual quality for security purposes.In this paper,we propose a hybrid digital watermarking and image processing approach to improve the image security level.Specifically,variants of the widely used Least-Significant Bit(LSB)watermarking technique are merged with a blob detection algorithm to embed information into the boundary pixels of the largest blob of a digital image.The proposed algorithms are tested using several experiments and techniques,which are followed by uploading the watermarked images into a social media site to evaluate the probability of extracting the embedding watermarks.The results show that the proposed approaches outperform the traditional LSB algorithm in terms of time,evaluation criteria and the percentage of pixels that have changed. 展开更多
关键词 digital watermarking LSB social media blob detection image security
下载PDF
Fragile Watermarking Based on Robust Hidden Information 被引量:1
19
作者 张新鹏 王朔中 《Journal of Shanghai University(English Edition)》 CAS 2003年第3期261-264,共4页
Block-wise fragile watermarks can be used to reveal maliciously tampered areas in multimedia products. However a forged content containing a cloned fragile watermark can be constructed by using a series of watermarked... Block-wise fragile watermarks can be used to reveal maliciously tampered areas in multimedia products. However a forged content containing a cloned fragile watermark can be constructed by using a series of watermarked data. To defeat this type of counterfeit attack, a novel fragile watermarking technique is proposed in which different pseudo-random data are selected for different host products, and the generated fragile watermark is dependent upon the selected information. While inserting the fragile watermark, the pseudo-random information is also robustly embedded into the host data. Because of the difference between the selected information, different watermarked data cannot be used to forge illegal contents containing a valid fragile watermark. 展开更多
关键词 digital watermarking information hiding fragile robust.
下载PDF
Connectivity-Based Watermarking Robust to Geometrical Attacks 被引量:1
20
作者 王宏霞 罗键 《Journal of Southwest Jiaotong University(English Edition)》 2006年第1期1-6,共6页
A novel robust watermarking scheme based on image connectivity is proposed. In the scheme, the connected objects are obtained according to selected connectivity pattern, and the gravity centers are calculated in sever... A novel robust watermarking scheme based on image connectivity is proposed. In the scheme, the connected objects are obtained according to selected connectivity pattern, and the gravity centers are calculated in several bigger objects as the reference points for watermark embedding. Based on these reference points and the center of the whole image, several sectors are formed, and the same version of watermarks is embedded into these sectors and their opposites. Thanks to the very stable gravity center of the connected objects, watermark detection is synchronized successfully. Simulation results show that the watermark can survive under both local and global geometrical distortions. 展开更多
关键词 CONNECTIVITY digital watermarking ROBUSTNESS Geometrical distortion
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部