期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
LKAW: A Robust Watermarking Method Based on Large Kernel Convolution and Adaptive Weight Assignment
1
作者 Xiaorui Zhang Rui Jiang +3 位作者 Wei Sun Aiguo Song Xindong Wei Ruohan Meng 《Computers, Materials & Continua》 SCIE EI 2023年第4期1-17,共17页
Robust watermarking requires finding invariant features under multiple attacks to ensure correct extraction.Deep learning has extremely powerful in extracting features,and watermarking algorithms based on deep learnin... Robust watermarking requires finding invariant features under multiple attacks to ensure correct extraction.Deep learning has extremely powerful in extracting features,and watermarking algorithms based on deep learning have attracted widespread attention.Most existing methods use 3×3 small kernel convolution to extract image features and embed the watermarking.However,the effective perception fields for small kernel convolution are extremely confined,so the pixels that each watermarking can affect are restricted,thus limiting the performance of the watermarking.To address these problems,we propose a watermarking network based on large kernel convolution and adaptive weight assignment for loss functions.It uses large-kernel depth-wise convolution to extract features for learning large-scale image information and subsequently projects the watermarking into a highdimensional space by 1×1 convolution to achieve adaptability in the channel dimension.Subsequently,the modification of the embedded watermarking on the cover image is extended to more pixels.Because the magnitude and convergence rates of each loss function are different,an adaptive loss weight assignment strategy is proposed to make theweights participate in the network training together and adjust theweight dynamically.Further,a high-frequency wavelet loss is proposed,by which the watermarking is restricted to only the low-frequency wavelet sub-bands,thereby enhancing the robustness of watermarking against image compression.The experimental results show that the peak signal-to-noise ratio(PSNR)of the encoded image reaches 40.12,the structural similarity(SSIM)reaches 0.9721,and the watermarking has good robustness against various types of noise. 展开更多
关键词 robust watermarking large kernel convolution adaptive loss weights high-frequency wavelet loss deep learning
下载PDF
Robust Watermarking of Screen-Photography Based on JND
2
作者 Siyu Gu JinHan +1 位作者 Xingming Sun Yi Cao 《Computers, Materials & Continua》 SCIE EI 2022年第6期4819-4833,共15页
With the popularity of smartphones,it is often easy to maliciously leak important information by taking pictures of the phone.Robust watermarking that can resist screen photography can achieve the protection of inform... With the popularity of smartphones,it is often easy to maliciously leak important information by taking pictures of the phone.Robust watermarking that can resist screen photography can achieve the protection of information.Since the screen photo process can cause some irreversible distortion,the currently available screen photo watermarks do not consider the image content well and the visual quality is not very high.Therefore,this paper proposes a new screen-photography robust watermark.In terms of embedding region selection,the intensity-based Scale-invariant feature transform(SIFT)algorithm used for the construction of feature regions based on the density of feature points,which can make it more focused on the key content of the image;in terms of embedding strength,the Just noticeable difference(JND)model is applied to limit the intensity of the watermark embedding according to the luminance and texture of the picture to balance robustness and invisibility;after embedding watermark,the coefficients in the neighborhood are again adjusted with optimal constraints to improve the accuracy of watermark extraction.After experiments,it is shown that the method we proposed can improve the correct rate of watermark extraction,the quality of the visual aspect of the watermarked picture is also improved. 展开更多
关键词 Screen photography robust watermarking SIFT JND
下载PDF
An Error-Correcting Code-Based Robust Watermarking Scheme for Stereolithographic Files
3
作者 Zhuorong Li Huawei Tian +2 位作者 Yanhui Xiao Yunqi Tang Anhong Wang 《Computer Systems Science & Engineering》 SCIE EI 2021年第5期247-263,共17页
Stereolithographic(STL)files have been extensively used in rapid prototyping industries as well as many other fields as watermarking algorithms to secure intellectual property and protect three-dimensional models from... Stereolithographic(STL)files have been extensively used in rapid prototyping industries as well as many other fields as watermarking algorithms to secure intellectual property and protect three-dimensional models from theft.However,to the best of our knowledge,few studies have looked at how watermarking can resist attacks that involve vertex-reordering.Here,we present a lossless and robust watermarking scheme for STL files to protect against vertexreordering attacks.Specifically,we designed a novel error-correcting code(ECC)that can correct the error of any one-bit in a bitstream by inserting several check digits.In addition,ECC is designed to make use of redundant information according to the characteristics of STL files,which introduces further robustness for defense against attacks.No modifications are made to the geometric information of the three-dimensional model,which respects the requirements of a highprecision model.The experimental results show that the proposed watermarking scheme can survive numerous kinds of attack,including rotation,scaling and translation(RST),facet reordering,and vertex-reordering attacks. 展开更多
关键词 Three-dimensional watermarking stereolithographic file robust watermarking error-correcting code
下载PDF
Robust Image Watermarking Using Local Invariant Features and Independent Component Analysis 被引量:2
4
作者 ZHANG Hanling LIU Jie 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1931-1934,共4页
This paper proposes a novel robust image watermarking scheme for digital images using local invariant features and Independent Component Analysis (ICA). Most present watermarking algorithms are unable to resist geom... This paper proposes a novel robust image watermarking scheme for digital images using local invariant features and Independent Component Analysis (ICA). Most present watermarking algorithms are unable to resist geometric distortions that desynchronize the location. The method we propose here is robust to geometric attacks. In order to resist geometric distortions, we use a local invariant feature of the image called the scale invariant feature transform, which is invariant to translation and scaling distortions. The watermark is inserted into the circular patches generated by scale-invariant key point extractor. Rotation invariance is achieved using the translation property of the polar-mapped circular patches. Our method belongs to the blind watermark category, because we use Independent Component Analysis for detection that does not need the original image during detection. Experimental results show that our method is robust against geometric distortion attacks as well as signal-processing attacks. 展开更多
关键词 robust watermarking geometrical attack watermark synchronization local invariant features
下载PDF
A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data Protection 被引量:1
5
作者 Xiaorui Zhang Wenfang Zhang +2 位作者 Wei Sun Xingming Sun Sunil Kumar Jha 《Computer Systems Science & Engineering》 SCIE EI 2022年第6期1043-1056,共14页
In a telemedicine diagnosis system,the emergence of 3D imaging enables doctors to make clearer judgments,and its accuracy also directly affects doctors’diagnosis of the disease.In order to ensure the safe transmissio... In a telemedicine diagnosis system,the emergence of 3D imaging enables doctors to make clearer judgments,and its accuracy also directly affects doctors’diagnosis of the disease.In order to ensure the safe transmission and storage of medical data,a 3D medical watermarking algorithm based on wavelet transform is proposed in this paper.The proposed algorithm employs the principal component analysis(PCA)transform to reduce the data dimension,which can minimize the error between the extracted components and the original data in the mean square sense.Especially,this algorithm helps to create a bacterial foraging model based on particle swarm optimization(BF-PSO),by which the optimal wavelet coefficient is found for embedding and is used as the absolute feature of watermark embedding,thereby achieving the optimal balance between embedding capacity and imperceptibility.A series of experimental results from MATLAB software based on the standard MRI brain volume dataset demonstrate that the proposed algorithm has strong robustness and make the 3D model have small deformation after embedding the watermark. 展开更多
关键词 3-D medical watermarking robust watermarking PCA BF-PSO
下载PDF
Robust watermarking of databases in order-preserving encrypted domain
6
作者 Shijun XIANG Guanqi RUAN +1 位作者 Hao LI Jiayong HE 《Frontiers of Computer Science》 SCIE EI CSCD 2022年第2期160-168,共9页
Security of databases has always been a hot topic in the field of information security.Privacy protection can be realized by encrypting data,while data copyright can be protected by using digital watermarking technolo... Security of databases has always been a hot topic in the field of information security.Privacy protection can be realized by encrypting data,while data copyright can be protected by using digital watermarking technology.By combining these two technologies,a database’s copyright and privacy problems in the cloud can be effectively solved.Based on order-preserving encryption scheme(OPES),circular histogram and digital watermarking technology,this paper proposes a new robust watermarking scheme for protection of databases in the encrypted domain.Firstly,the OPES is used to encrypt data to avoid exposing the data in the cloud.Then,the encrypted data are grouped and modified by the use of a circular histogram for embedding a digital watermark.The common data query operations in database are available for the encrypted watermarking database.In receivers,the digital watermark and the original data can be restored through a secret key and a key table.Experimental results have shown that the proposed algorithm is robust against common database attacks in the encrypted domain. 展开更多
关键词 database copyright robust watermarking orderpreserving encryption circular histogram
原文传递
Robust Image Watermarking Based on Generative Adversarial Network 被引量:1
7
作者 Kangli Hao Guorui Feng Xinpeng Zhang 《China Communications》 SCIE CSCD 2020年第11期131-140,共10页
Digital watermark embeds information bits into digital cover such as images and videos to prove the creator’s ownership of his work.In this paper,we propose a robust image watermark algorithm based on a generative ad... Digital watermark embeds information bits into digital cover such as images and videos to prove the creator’s ownership of his work.In this paper,we propose a robust image watermark algorithm based on a generative adversarial network.This model includes two modules,generator and adversary.Generator is mainly used to generate images embedded with watermark,and decode the image damaged by noise to obtain the watermark.Adversary is used to discriminate whether the image is embedded with watermark and damage the image by noise.Based on the model Hidden(hiding data with deep networks),we add a high-pass filter in front of the discriminator,making the watermark tend to be embedded in the mid-frequency region of the image.Since the human visual system pays more attention to the central area of the image,we give a higher weight to the image center region,and a lower weight to the edge region when calculating the loss between cover and embedded image.The watermarked image obtained by this scheme has a better visual performance.Experimental results show that the proposed architecture is more robust against noise interference compared with the state-of-art schemes. 展开更多
关键词 robust image watermark deep learning generative adversarial network convolutional neural network
下载PDF
Robust Reversible Audio Watermarking Scheme for Telemedicine and Privacy Protection
8
作者 Xiaorui Zhang Xun Sun +2 位作者 Xingming Sun Wei Sun Sunil Kumar Jha 《Computers, Materials & Continua》 SCIE EI 2022年第5期3035-3050,共16页
The leakage of medical audio data in telemedicine seriously violates the privacy of patients.In order to avoid the leakage of patient information in telemedicine,a two-stage reversible robust audio watermarking algori... The leakage of medical audio data in telemedicine seriously violates the privacy of patients.In order to avoid the leakage of patient information in telemedicine,a two-stage reversible robust audio watermarking algorithm is proposed to protect medical audio data.The scheme decomposes the medical audio into two independent embedding domains,embeds the robust watermark and the reversible watermark into the two domains respectively.In order to ensure the audio quality,the Hurst exponent is used to find a suitable position for watermark embedding.Due to the independence of the two embedding domains,the embedding of the second-stage reversible watermark will not affect the first-stage watermark,so the robustness of the first-stage watermark can be well maintained.In the second stage,the correlation between the sampling points in the medical audio is used to modify the hidden bits of the histogram to reduce the modification of the medical audio and reduce the distortion caused by reversible embedding.Simulation experiments show that this scheme has strong robustness against signal processing operations such as MP3 compression of 48 db,additive white Gaussian noise(AWGN)of 20 db,low-pass filtering,resampling,re-quantization and other attacks,and has good imperceptibility. 展开更多
关键词 TELEMEDICINE privacy protection audio watermarking robust reversible watermarking two-stage embedding
下载PDF
A robust tensor watermarking algorithm for diffusion-tensor images
9
作者 Chengmeng LIU Zhi LI +1 位作者 Guomei WANG Long ZHENG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2024年第3期384-397,共14页
Watermarking algorithms that use convolution neural networks have exhibited good robustness in studies of deep learning networks.However,after embedding watermark signals by convolution,the feature fusion eficiency of... Watermarking algorithms that use convolution neural networks have exhibited good robustness in studies of deep learning networks.However,after embedding watermark signals by convolution,the feature fusion eficiency of convolution is relatively low;this can easily lead to distortion in the embedded image.When distortion occurs in medical images,especially in diffusion tensor images(DTIs),the clinical value of the DTI is lost.To address this issue,a robust watermarking algorithm for DTIs implemented by fusing convolution with a Transformer is proposed to ensure the robustness of the watermark and the consistency of sampling distance,which enhances the quality of the reconstructed image of the watermarked DTIs after embedding the watermark signals.In the watermark-embedding network,Ti-weighted(Tlw)images are used as prior knowledge.The correlation between T1w images and the original DTI is proposed to calculate the most significant features from the T1w images by using the Transformer mechanism.The maximum of the correlation is used as the most significant feature weight to improve the quality of the reconstructed DTI.In the watermark extraction network,the most significant watermark features from the watermarked DTI are adequately learned by the Transformer to robustly extract the watermark signals from the watermark features.Experimental results show that the average peak signal-to-noise ratio of the watermarked DTI reaches 50.47 dB,the diffusion characteristics such as mean diffusivity and fractional anisotropy remain unchanged,and the main axis deflection angleαAc is close to 1.Our proposed algorithm can effectively protect the copyright of the DTI and barely affects the clinical diagnosis. 展开更多
关键词 robust watermarking algorithm Transformer Image reconstruction Diffusion tensor images Soft attention Hard attention Tl-weighted images
原文传递
A robust color image watermarking algorithm against rotation attacks
10
作者 韩绍程 杨金锋 +1 位作者 王蕊 贾桂敏 《Optoelectronics Letters》 EI 2018年第1期61-66,共6页
A robust digital watermarking algorithm is proposed based on quaternion wavelet transform(QWT) and discrete cosine transform(DCT) for copyright protection of color images. The luminance component Y of a host color ima... A robust digital watermarking algorithm is proposed based on quaternion wavelet transform(QWT) and discrete cosine transform(DCT) for copyright protection of color images. The luminance component Y of a host color image in YIQ space is decomposed by QWT, and then the coefficients of four low-frequency subbands are transformed by DCT. An original binary watermark scrambled by Arnold map and iterated sine chaotic system is embedded into the mid-frequency DCT coefficients of the subbands. In order to improve the performance of the proposed algorithm against rotation attacks, a rotation detection scheme is implemented before watermark extracting. The experimental results demonstrate that the proposed watermarking scheme shows strong robustness not only against common image processing attacks but also against arbitrary rotation attacks. 展开更多
关键词 QWT DCT A robust color image watermarking algorithm against rotation attacks YIQ
原文传递
Watermarking through image geometry change tracking
11
作者 Ratnakirti Roy Tauheed Ahmed Suvamoy Changder 《Visual Informatics》 EI 2018年第2期125-135,共11页
Most of the digital image watermarking techniques are susceptible to geometric attacks such as cropping,rotation and scaling.These attacks are the easiest yet most successful in rendering the survival of watermark dif... Most of the digital image watermarking techniques are susceptible to geometric attacks such as cropping,rotation and scaling.These attacks are the easiest yet most successful in rendering the survival of watermark difficult.Such geometric operations alter the pixel orientation in the cover thereby rendering the watermark difficult to locate and extract.However,if the alterations produced by the geometric attacks such as scaling,cropping and rotation can be modeled in terms of the change in the image geometry,it is possible to relocate the watermark even after the original cover has suffered an attack.This paper contributes to the state of the art by proposing an image watermarking technique that attempts to model the attacks like cropping,scaling and rotation in terms of the image geometry.The proposed scheme is acceptably resistant to common geometric attacks and common image processing attacks.The watermark embedding is also done efficiently to offer resistance to image processing attacks.The watermark detection procedure is blind and key based,also not requiring the original cover work for watermark extraction.Efforts have been given to ensure that the proposed scheme conforms to robustness against attacks and exhibits high visual fidelity of the watermarked cover. 展开更多
关键词 watermarking Geometric attacks robust watermarking Image geometry FIDELITY
原文传递
Data Hiding in the Division Domain:Simultaneously Achieving Robustness to Scaling and Additive Attacks
12
作者 Shu Yu Junren Qin +2 位作者 Jiarui Deng Shanxiang Lyu Fagang Li 《国际计算机前沿大会会议论文集》 2022年第2期47-58,共12页
Data hiding plays an important role in privacy protection and authentication,but most data hiding methods fail to achieve satisfactory performance in resisting scaling attacks and additive attacks.To this end,this pap... Data hiding plays an important role in privacy protection and authentication,but most data hiding methods fail to achieve satisfactory performance in resisting scaling attacks and additive attacks.To this end,this paper proposes a new quantization index modulation(QIM)variant based on division domains(D-QIM).It can not only resist the above two attacks well,but also adjust the performance trade-offs by controlling the parameters.Simulation results confirm the performance gain of D-QIM in terms of the bit error rate(BER). 展开更多
关键词 Data hiding robust watermarking Quantization index modulation(QIM)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部