To address the challenges of video copyright protection and ensure the perfect recovery of original video,we propose a dual-domain watermarking scheme for digital video,inspired by Robust Reversible Watermarking(RRW)t...To address the challenges of video copyright protection and ensure the perfect recovery of original video,we propose a dual-domain watermarking scheme for digital video,inspired by Robust Reversible Watermarking(RRW)technology used in digital images.Our approach introduces a parameter optimization strategy that incre-mentally adjusts scheme parameters through attack simulation fitting,allowing for adaptive tuning of experimental parameters.In this scheme,the low-frequency Polar Harmonic Transform(PHT)moment is utilized as the embedding domain for robust watermarking,enhancing stability against simulation attacks while implementing the parameter optimization strategy.Through extensive attack simulations across various digital videos,we identify the optimal low-frequency PHT moment using adaptive normalization.Subsequently,the embedding parameters for robust watermarking are adaptively adjusted to maximize robustness.To address computational efficiency and practical requirements,the unnormalized high-frequency PHT moment is selected as the embedding domain for reversible watermarking.We optimize the traditional single-stage extended transform dithering modulation(STDM)to facilitate multi-stage embedding in the dual-domain watermarking process.In practice,the video embedded with a robust watermark serves as the candidate video.This candidate video undergoes simulation according to the parameter optimization strategy to balance robustness and embedding capacity,with adaptive determination of embedding strength.The reversible watermarking is formed by combining errors and other information,utilizing recursive coding technology to ensure reversibility without attacks.Comprehensive analyses of multiple performance indicators demonstrate that our scheme exhibits strong robustness against Common Signal Processing(CSP)and Geometric Deformation(GD)attacks,outperforming other advanced video watermarking algorithms under similar conditions of invisibility,reversibility,and embedding capacity.This underscores the effectiveness and feasibility of our attack simulation fitting strategy.展开更多
The proposed method inserts a watermark into the spectral components of the data using techniques analogous to spread spectrum communications, hiding a narrow band signal in a wideband channel. The watermark is diffic...The proposed method inserts a watermark into the spectral components of the data using techniques analogous to spread spectrum communications, hiding a narrow band signal in a wideband channel. The watermark is difficult for an attacker to remove. It is also robust to common signal and geometric distortion such as JPEG compression, cropping and scaling. In addition, the watermark can be extracted accurately without source host image at the receiver. Key words digital watermark - spread spectrum techniques - wavelet transform CLC number TN 911.73 - X 913. 2 Foundation item: Supported by Wuhan University Innovation Foundation (904270072)Biography: Shao Hai-mei (1975-), female, lecturer, research direction: wavelet application, image process, digital watermark.展开更多
Traditional lapped transform domain excision techniques obtain good performance at the expense of increased processing delay. Extension of transform domain filtering techniques to the lapped biorthogonal transform dom...Traditional lapped transform domain excision techniques obtain good performance at the expense of increased processing delay. Extension of transform domain filtering techniques to the lapped biorthogonal transform domain can help solve the problem. By incorporating biorthogonality into the lapped transforms, more flexibility is obtained in the design of windows. Thus transform bases with better stopband attenuation can be generated by designing windows, but not by increasing the overlapping factor. In this paper, a new modulated lapped biorthogonal transform (MLBT) with optimized windows is introduced for efficient compression of multi-tone interfering signal energy. The bit error rate (BER) performance of the receiver employing the proposed MLBT excision technique is analyzed and compared with that of the lapped transform domain excision-based receivers. Simulation results demonstrate the improved performance and increased robustness of the proposed technique.展开更多
A novel communication receiver which uses lapped transform(LT) incorporating modified median filter(MMF) algorithm was designed for narrow band interference(NBI) excision.Comparing to traditional Fourier Transform,LT ...A novel communication receiver which uses lapped transform(LT) incorporating modified median filter(MMF) algorithm was designed for narrow band interference(NBI) excision.Comparing to traditional Fourier Transform,LT has longer basis vectors,less spectral leakage,thus better frequency resolution.The LT domain MMF algorithm takes full advantages of the direct sequence spread spectrum signal,as well as the characteristics of LT,performs the transform domain filtering twice.The first filtering locates the position of interference and mitigates most of them.The second filtering is performed in a small neighborhood of the located interference.So LT domain MMF algorithm can completely mitigate the interference without distorting the desired signal.The simulation results demonstrate the improved BER(Bit Error Rate)performance and increased robustness of our receiver.展开更多
An approach based on discrete Karhunen-Loeve transformation of the DS/SS signals is proposed to estimate PN sequence in lower S/N ratio DS/SS signals. Characteristics of self-organization and principle components extr...An approach based on discrete Karhunen-Loeve transformation of the DS/SS signals is proposed to estimate PN sequence in lower S/N ratio DS/SS signals. Characteristics of self-organization and principle components extraction of unsupervised neural networks are exploited adequately. Theoretical analysis and experimental results are provided to show that this approach can work well on the lower S/N ratio input signals.展开更多
This paper presents a secure spread-spectrum watermarking algorithm for digital images in discrete wavelet transform (DWT) domain. The algorithm is applied for embedding watermarks like patient identification /source ...This paper presents a secure spread-spectrum watermarking algorithm for digital images in discrete wavelet transform (DWT) domain. The algorithm is applied for embedding watermarks like patient identification /source identification or doctors signature in binary image format into host digital radiological image for potential telemedicine applications. Performance of the algorithm is analysed by varying the gain factor, subband decomposition levels, size of watermark, wavelet filters and medical image modalities. Simulation results show that the proposed method achieves higher security and robustness against various attacks.展开更多
In this paper the relations between two spreads, between two group delays, and between one spread and one group delay in fractional Fourier transform (FRFT) domains, are presented and three theorems on the uncertain...In this paper the relations between two spreads, between two group delays, and between one spread and one group delay in fractional Fourier transform (FRFT) domains, are presented and three theorems on the uncertainty principle in FRFT domains are also developed. Theorem 1 gives the bounds of two spreads in two FRFT domains. Theorem 2 shows the uncertainty relation between two group delays in two FRFT domains. Theorem 3 presents the crossed uncertainty relation between one group delay and one spread in two FRFT domains. The novelty of their results lies in connecting the products of different physical measures and giving their physical interpretations. The existing uncertainty principle in the FRFT domain is only a special ease of theorem 1, and the conventional uncertainty principle in time-frequency domains is a special case of their results. Therefore, three theorems develop the relations of two spreads in time-frequency domains into the relations between two spreads, between two group delays, and between one spread and one group delay in FRFT domains.展开更多
A new method for the rejection of linear frequency modulation (LFM) interference in direct sequence spread spectrum (DSSS) system based on the fractional Fourier transform is proposed, and the configuration of the rec...A new method for the rejection of linear frequency modulation (LFM) interference in direct sequence spread spectrum (DSSS) system based on the fractional Fourier transform is proposed, and the configuration of the receiver with an interference exciser is also presented. Based on the property that the fractional Fourier transform of a signal is equivalent to rotating the signal in the time-frequency plane, the received signal is transform into a certain fractional Fourier domain, this transform will result in the least spectrum overlap between the signal and interference. Then, a narrowband filter is exploited to extract most of the interference energy. The performance analyses show that remarkable improvements in signal-to-noise ratio (SNR) and bit-error-ratio (BER) are obtained.展开更多
Beyond-5G(B5G)aims to meet the growing demands of mobile traffic and expand the communication space.Considering that intelligent applications to B5G wireless communications will involve security issues regarding user ...Beyond-5G(B5G)aims to meet the growing demands of mobile traffic and expand the communication space.Considering that intelligent applications to B5G wireless communications will involve security issues regarding user data and operational data,this paper analyzes the maximum capacity of the multi-watermarking method for multimedia signal hiding as a means of alleviating the information security problem of B5G.The multiwatermarking process employs spread transform dither modulation.During the watermarking procedure,Gram-Schmidt orthogonalization is used to obtain the multiple spreading vectors.Consequently,multiple watermarks can be simultaneously embedded into the same position of a multimedia signal.Moreover,the multiple watermarks can be extracted without affecting one another during the extraction process.We analyze the effect of the size of the spreading vector on the unit maximum capacity,and consequently derive the theoretical relationship between the size of the spreading vector and the unit maximum capacity.A number of experiments are conducted to determine the optimal parameter values for maximum robustness on the premise of high capacity and good imperceptibility.展开更多
基金supported in part by the National Natural Science Foundation of China under Grant 62202496,62272478the Basic Frontier Innovation Project of Engineering University of People Armed Police under Grant WJY202314,WJY202221.
文摘To address the challenges of video copyright protection and ensure the perfect recovery of original video,we propose a dual-domain watermarking scheme for digital video,inspired by Robust Reversible Watermarking(RRW)technology used in digital images.Our approach introduces a parameter optimization strategy that incre-mentally adjusts scheme parameters through attack simulation fitting,allowing for adaptive tuning of experimental parameters.In this scheme,the low-frequency Polar Harmonic Transform(PHT)moment is utilized as the embedding domain for robust watermarking,enhancing stability against simulation attacks while implementing the parameter optimization strategy.Through extensive attack simulations across various digital videos,we identify the optimal low-frequency PHT moment using adaptive normalization.Subsequently,the embedding parameters for robust watermarking are adaptively adjusted to maximize robustness.To address computational efficiency and practical requirements,the unnormalized high-frequency PHT moment is selected as the embedding domain for reversible watermarking.We optimize the traditional single-stage extended transform dithering modulation(STDM)to facilitate multi-stage embedding in the dual-domain watermarking process.In practice,the video embedded with a robust watermark serves as the candidate video.This candidate video undergoes simulation according to the parameter optimization strategy to balance robustness and embedding capacity,with adaptive determination of embedding strength.The reversible watermarking is formed by combining errors and other information,utilizing recursive coding technology to ensure reversibility without attacks.Comprehensive analyses of multiple performance indicators demonstrate that our scheme exhibits strong robustness against Common Signal Processing(CSP)and Geometric Deformation(GD)attacks,outperforming other advanced video watermarking algorithms under similar conditions of invisibility,reversibility,and embedding capacity.This underscores the effectiveness and feasibility of our attack simulation fitting strategy.
文摘The proposed method inserts a watermark into the spectral components of the data using techniques analogous to spread spectrum communications, hiding a narrow band signal in a wideband channel. The watermark is difficult for an attacker to remove. It is also robust to common signal and geometric distortion such as JPEG compression, cropping and scaling. In addition, the watermark can be extracted accurately without source host image at the receiver. Key words digital watermark - spread spectrum techniques - wavelet transform CLC number TN 911.73 - X 913. 2 Foundation item: Supported by Wuhan University Innovation Foundation (904270072)Biography: Shao Hai-mei (1975-), female, lecturer, research direction: wavelet application, image process, digital watermark.
文摘Traditional lapped transform domain excision techniques obtain good performance at the expense of increased processing delay. Extension of transform domain filtering techniques to the lapped biorthogonal transform domain can help solve the problem. By incorporating biorthogonality into the lapped transforms, more flexibility is obtained in the design of windows. Thus transform bases with better stopband attenuation can be generated by designing windows, but not by increasing the overlapping factor. In this paper, a new modulated lapped biorthogonal transform (MLBT) with optimized windows is introduced for efficient compression of multi-tone interfering signal energy. The bit error rate (BER) performance of the receiver employing the proposed MLBT excision technique is analyzed and compared with that of the lapped transform domain excision-based receivers. Simulation results demonstrate the improved performance and increased robustness of the proposed technique.
文摘A novel communication receiver which uses lapped transform(LT) incorporating modified median filter(MMF) algorithm was designed for narrow band interference(NBI) excision.Comparing to traditional Fourier Transform,LT has longer basis vectors,less spectral leakage,thus better frequency resolution.The LT domain MMF algorithm takes full advantages of the direct sequence spread spectrum signal,as well as the characteristics of LT,performs the transform domain filtering twice.The first filtering locates the position of interference and mitigates most of them.The second filtering is performed in a small neighborhood of the located interference.So LT domain MMF algorithm can completely mitigate the interference without distorting the desired signal.The simulation results demonstrate the improved BER(Bit Error Rate)performance and increased robustness of our receiver.
文摘An approach based on discrete Karhunen-Loeve transformation of the DS/SS signals is proposed to estimate PN sequence in lower S/N ratio DS/SS signals. Characteristics of self-organization and principle components extraction of unsupervised neural networks are exploited adequately. Theoretical analysis and experimental results are provided to show that this approach can work well on the lower S/N ratio input signals.
文摘This paper presents a secure spread-spectrum watermarking algorithm for digital images in discrete wavelet transform (DWT) domain. The algorithm is applied for embedding watermarks like patient identification /source identification or doctors signature in binary image format into host digital radiological image for potential telemedicine applications. Performance of the algorithm is analysed by varying the gain factor, subband decomposition levels, size of watermark, wavelet filters and medical image modalities. Simulation results show that the proposed method achieves higher security and robustness against various attacks.
基金Project supported by the National Natural Science Foundation of China (Grant No. 60473141)the Natural Science Foundation of Liaoning Province of China (Grant No. 20062191)
文摘In this paper the relations between two spreads, between two group delays, and between one spread and one group delay in fractional Fourier transform (FRFT) domains, are presented and three theorems on the uncertainty principle in FRFT domains are also developed. Theorem 1 gives the bounds of two spreads in two FRFT domains. Theorem 2 shows the uncertainty relation between two group delays in two FRFT domains. Theorem 3 presents the crossed uncertainty relation between one group delay and one spread in two FRFT domains. The novelty of their results lies in connecting the products of different physical measures and giving their physical interpretations. The existing uncertainty principle in the FRFT domain is only a special ease of theorem 1, and the conventional uncertainty principle in time-frequency domains is a special case of their results. Therefore, three theorems develop the relations of two spreads in time-frequency domains into the relations between two spreads, between two group delays, and between one spread and one group delay in FRFT domains.
文摘A new method for the rejection of linear frequency modulation (LFM) interference in direct sequence spread spectrum (DSSS) system based on the fractional Fourier transform is proposed, and the configuration of the receiver with an interference exciser is also presented. Based on the property that the fractional Fourier transform of a signal is equivalent to rotating the signal in the time-frequency plane, the received signal is transform into a certain fractional Fourier domain, this transform will result in the least spectrum overlap between the signal and interference. Then, a narrowband filter is exploited to extract most of the interference energy. The performance analyses show that remarkable improvements in signal-to-noise ratio (SNR) and bit-error-ratio (BER) are obtained.
基金funded by The National Natural Science Foundation of China under Grant(No.62273108,62306081)The Youth Project of Guangdong Artificial Intelligence and Digital Economy Laboratory(Guangzhou)(PZL2022KF0006)+3 种基金The National Key Research and Development Program of China(2022YFB3604502)Special Fund Project of GuangzhouScience and Technology Innovation Development(202201011307)Guangdong Province Industrial Internet Identity Analysis and Construction Guidance Fund Secondary Node Project(1746312)Special Projects in Key Fields of General Colleges and Universities in Guangdong Province(2021ZDZX1016).
文摘Beyond-5G(B5G)aims to meet the growing demands of mobile traffic and expand the communication space.Considering that intelligent applications to B5G wireless communications will involve security issues regarding user data and operational data,this paper analyzes the maximum capacity of the multi-watermarking method for multimedia signal hiding as a means of alleviating the information security problem of B5G.The multiwatermarking process employs spread transform dither modulation.During the watermarking procedure,Gram-Schmidt orthogonalization is used to obtain the multiple spreading vectors.Consequently,multiple watermarks can be simultaneously embedded into the same position of a multimedia signal.Moreover,the multiple watermarks can be extracted without affecting one another during the extraction process.We analyze the effect of the size of the spreading vector on the unit maximum capacity,and consequently derive the theoretical relationship between the size of the spreading vector and the unit maximum capacity.A number of experiments are conducted to determine the optimal parameter values for maximum robustness on the premise of high capacity and good imperceptibility.