期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
An Image Steganography Algorithm Based on Quantization Index Modulation Resisting Scaling Attacks and Statistical Detection 被引量:1
1
作者 Yue Zhang Dengpan Ye +2 位作者 Junjun Gan Zhenyu Li Qingfeng Cheng 《Computers, Materials & Continua》 SCIE EI 2018年第7期151-167,共17页
In view of the fact that the current adaptive steganography algorithms are difficult to resist scaling attacks and that a method resisting scaling attack is only for the nearest neighbor interpolation method,this pape... In view of the fact that the current adaptive steganography algorithms are difficult to resist scaling attacks and that a method resisting scaling attack is only for the nearest neighbor interpolation method,this paper proposes an image steganography algorithm based on quantization index modulation resisting both scaling attacks and statistical detection.For the spatial image,this paper uses the watermarking algorithm based on quantization index modulation to extract the embedded domain.Then construct the embedding distortion function of the new embedded domain based on S-UNIWARD steganography,and use the minimum distortion coding to realize the embedding of the secret messages.Finally,according to the embedding modification amplitude of secret messages in the new embedded domain,the quantization index modulation algorithm is applied to realize the final embedding of secret messages in the original embedded domain.The experimental results show that the algorithm proposed is robust to the three common interpolation attacks including the nearest neighbor interpolation,the bilinear interpolation and the bicubic interpolation.And the average correct extraction rate of embedded messages increases from 50%to over 93% after 0.5 times-fold scaling attack using the bicubic interpolation method,compared with the classical steganography algorithm S-UNIWARD.Also the algorithm proposed has higher detection resistance than the original watermarking algorithm based on quantization index modulation. 展开更多
关键词 Image steganography anti-scaling attack anti-statistical detection quantization index modulation
下载PDF
Detection of quantization index modulation steganography in G.723.1 bit stream based on quantization index sequence analysis 被引量:12
2
作者 Song-bin LI Huai-zhou TAO Yong-feng HUANG 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2012年第8期624-634,共11页
This paper presents a method to detect the quantization index modulation(QIM) steganography in G.723.1 bit stream.We show that the distribution of each quantization index(codeword) in the quantization index sequence h... This paper presents a method to detect the quantization index modulation(QIM) steganography in G.723.1 bit stream.We show that the distribution of each quantization index(codeword) in the quantization index sequence has unbalanced and correlated characteristics.We present the designs of statistical models to extract the quantitative feature vectors of these characteristics.Combining the extracted vectors with the support vector machine,we build the classifier for detecting the QIM steganography in G.723.1 bit stream.The experiment shows that the method has far better performance than the existing blind detection method which extracts the feature vector in an uncompressed domain.The recall and precision of our method are all more than 90% even for a compressed bit stream duration as low as 3.6 s. 展开更多
关键词 STEGANALYSIS quantization index modulation (QIM) G.723.1 Codeword distribution characteristics
原文传递
A robust watermarking algorithm based on QR factorization and DCT using quantization index modulation technique 被引量:1
3
作者 Hong-yuan CHEN Yue-sheng ZHU 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2012年第8期573-584,共12页
We propose a robust digital watermarking algorithm for copyright protection.A stable feature is obtained by utilizing QR factorization and discrete cosine transform(DCT) techniques,and a meaningful watermark image is ... We propose a robust digital watermarking algorithm for copyright protection.A stable feature is obtained by utilizing QR factorization and discrete cosine transform(DCT) techniques,and a meaningful watermark image is embedded into an image by modifying the stable feature with a quantization index modulation(QIM) method.The combination of QR factorization,DCT,and QIM techniques guarantees the robustness of the algorithm.Furthermore,an embedding location selection method is exploited to select blocks with small modifications as the embedding locations.This can minimize the embedding distortion and greatly improve the imperceptibility of our scheme.Several standard images were tested and the experimental results were compared with those of other published schemes.The results demonstrate that our proposed scheme can achieve not only better imperceptibility,but also stronger robustness against common signal processing operations and lossy compressions,such as filtering,noise addition,scaling,sharpening,rotation,cropping,and JPEG/JPEG2000 compression. 展开更多
关键词 Digital watermarking QR factorization quantization index modulation (QIM) Discrete cosine transform (DCT)
原文传递
QIM digital watermarkingbased on LDPC code and messagepassingunder scalingattacks
4
作者 崔鑫 颜斌 +1 位作者 贾霞 王亚菲 《Journal of Measurement Science and Instrumentation》 CAS 2014年第1期37-40,共4页
Watermarking system based on quantization index modulation (QIM) is increasingly popular in high payload applications,but it is inherently fragile against amplitude scaling attacks.In order to resist desynchronizati... Watermarking system based on quantization index modulation (QIM) is increasingly popular in high payload applications,but it is inherently fragile against amplitude scaling attacks.In order to resist desynchronization attacks of QIM digital watermarking,a low density parity check (LDPC) code-aided QIM watermarking algorithm is proposed,and the performance of QIM watermarking system can be improved by incorporating LDPC code with message passing estimation/detection framework.Using the theory of iterative estimation and decoding,the watermark signal is decoded by the proposed algorithm through iterative estimation of amplitude scaling parameters and decoding of watermark.The performance of the proposed algorithm is closer to the dirty paper Shannon limit than that of repetition code aided algorithm when the algorithm is attacked by the additive white Gaussian noise.For constant amplitude scaling attacks,the proposed algorithm can obtain the accurate estimation of amplitude scaling parameters.The simulation result shows that the algorithm can obtain similar performance compared to the algorithm without desynchronization. 展开更多
关键词 digital watermarking quantization index modulation (QIM) message passing algorithm based on factor graph low density parity check (LDPC) code amplitude scaling attack
下载PDF
DCT based multipurpose watermarking technique for image copyright notification and protection 被引量:2
5
作者 姜守达 陆哲明 吴昊天 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2004年第3期237-239,共3页
A multipurpose image watermarking technique based on DCT is proposed to notify and protect the copyright of digital products. In order to achieve this objective, the DCT coefficients of each image block are divided in... A multipurpose image watermarking technique based on DCT is proposed to notify and protect the copyright of digital products. In order to achieve this objective, the DCT coefficients of each image block are divided into two parts for embedding the visible and invisible watermarks. The visible watermark is embedded in each DC DCT coefficient and most of the AC DCT coefficients of every block, and the invisible watermark in the rest. Based on the characteristics of Human Visual System (HVS), the embedding strength of the visible watermark is varied in accordance with the underlying content of the host image. The invisible watermark is embedded in a quaternity of midrange frequencies. Experimental results show that the visible watermark is hard to remove and the invisible watermark is robust to common digital signal processing operations. 展开更多
关键词 copyright notification visible watermark HVS quantization index modulation
下载PDF
Quantization Based Watermarking Methods Against Valumetric Distortions
6
作者 Zai-Ran Wang Jing Dong Wei Wang 《International Journal of Automation and computing》 EI CSCD 2017年第6期672-685,共14页
Most of the quantization based watermarking algorithms are very sensitive to valumetric distortions, while these distortions are regarded as common processing in audio/video analysis. In recent years, watermarking met... Most of the quantization based watermarking algorithms are very sensitive to valumetric distortions, while these distortions are regarded as common processing in audio/video analysis. In recent years, watermarking methods which can resist this kind of distortions have attracted a lot of interests. But still many proposed methods can only deal with one certain kind of valumetric distortion such as amplitude scaling attack, and fail in other kinds of valumetric distortions like constant change attack, gamma correction or contrast stretching. In this paper, we propose a simple but effective method to tackle all the three kinds of valumetric distortions. This algorithm constructs an invariant domain first by spread transform which satisfies certain constraints. Then an amplitude scale invariant watermarking scheme is applied on the constructed domain. The validity of the approach has been confirmed by applying the watermarking scheme to Gaussian host data and real images. Experimental results confirm its intrinsic invariance against amplitude scaling, constant change attack and robustness improvement against nonlinear valumetric distortions. 展开更多
关键词 quantization index modulation(QIM) watermarking valumetric distortions amplitude scaling constant change attack
原文传递
一种稳健的BIM数据盲水印算法 被引量:1
7
作者 蒋美容 张黎明 陈金萍 《测绘地理信息》 CSCD 2021年第S01期165-169,共5页
为了对BIM模型在遭受攻击后进行快速有效的版权保护,提出一种稳健的BIM数据盲水印算法。首先,以原数据中的多面网格要素为单位,提取多面网格对象的所有网格顶点构造复数序列,对复数序列做DFT变换得到幅度系数和相位系数;其次,利用QIM方... 为了对BIM模型在遭受攻击后进行快速有效的版权保护,提出一种稳健的BIM数据盲水印算法。首先,以原数据中的多面网格要素为单位,提取多面网格对象的所有网格顶点构造复数序列,对复数序列做DFT变换得到幅度系数和相位系数;其次,利用QIM方法,将经过Logistic映射置乱得到的水印信息,嵌入到DFT变换域的幅度系数中;最后,运用离散傅里叶逆变换(inverse discrete fourier transform,IDFT)得到含水印信息的BIM数据。在水印提取中,通过投票原则提取水印,无需原始数据参与,是一种盲水印算法。在实际应用中,因BIM模型中顶点坐标的相同值较多,被用来嵌入水印的有效载体较少,为解决这一问题,在误差容许范围内对原始坐标数据加入了随机噪声,以嵌入不同的水印,间接地增加了水印嵌入容量。实验表明,该算法能够很好的控制水印嵌入引起的数据误差,嵌入水印对BIM数据的精度影响小,且对BIM数据常见的随机删除实体、旋转、平移攻击和特殊攻击具有较好的稳健性,可为BIM数据的所有权提供切实可行的依据。 展开更多
关键词 建筑信息模型(building information modeling BIM) 离散傅里叶模型(discrete fourier transform DFT) 幅度 量化索引调制(quantization index modulation QIM) 稳健性
原文传递
Data Hiding in the Division Domain:Simultaneously Achieving Robustness to Scaling and Additive Attacks
8
作者 Shu Yu Junren Qin +2 位作者 Jiarui Deng Shanxiang Lyu Fagang Li 《国际计算机前沿大会会议论文集》 2022年第2期47-58,共12页
Data hiding plays an important role in privacy protection and authentication,but most data hiding methods fail to achieve satisfactory performance in resisting scaling attacks and additive attacks.To this end,this pap... Data hiding plays an important role in privacy protection and authentication,but most data hiding methods fail to achieve satisfactory performance in resisting scaling attacks and additive attacks.To this end,this paper proposes a new quantization index modulation(QIM)variant based on division domains(D-QIM).It can not only resist the above two attacks well,but also adjust the performance trade-offs by controlling the parameters.Simulation results confirm the performance gain of D-QIM in terms of the bit error rate(BER). 展开更多
关键词 Data hiding Robust watermarking quantization index modulation(QIM)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部