高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

图像水印抗几何攻击研究综述

刘九芬 黄达人 黄继武

刘九芬, 黄达人, 黄继武. 图像水印抗几何攻击研究综述[J]. 电子与信息学报, 2004, 26(9): 1495-1503.
引用本文: 刘九芬, 黄达人, 黄继武. 图像水印抗几何攻击研究综述[J]. 电子与信息学报, 2004, 26(9): 1495-1503.
Liu Jiu-fen, Huang Da-ren, Huang Ji-wu. Survey on Watermarking Against Geometric Attack[J]. Journal of Electronics & Information Technology, 2004, 26(9): 1495-1503.
Citation: Liu Jiu-fen, Huang Da-ren, Huang Ji-wu. Survey on Watermarking Against Geometric Attack[J]. Journal of Electronics & Information Technology, 2004, 26(9): 1495-1503.

图像水印抗几何攻击研究综述

Survey on Watermarking Against Geometric Attack

  • 摘要: 稳健性是数字水印技术的一个核心问题。数字水印技术发展到今天,已有大量不同的算法,它们广泛提出了稳健性的声明。然而,绝大多数算法所强调的稳健性只不过是水印对抗一般信号处理的稳健性,它们不能抵抗甚至是微小的几何攻击。本文分析总结了当前图像水印抗几何攻击的各种方法,提出了下一步可能的发展方向,对改进和设计水印算法具有一定的指导作用。
  • Crave S, Yeo B L, Yeung M. Technical trials and legal tribulations. Communications of the ACM,1998, 41(7): 45-54. [2]Petitcolas F A P, Anderson R J, Kuhn M G. Attacks on copyright marking system. In Proc. 2nd Int. Workshop Information Hiding, Portland, OR, Apr. 14-17, 1998: 218-238. [3]Unzign. http:∥www.altern.org/watermark. [4]Cox I J, Linnartz J. Public watermarks and resistance tampering. In Proc of ICIP97, Washington,DC, 1997: 26-29. [5]Cox I J, Linnartz J. Some general methods for tampering with watermarks. IEEE J. on Selected Areas in Communications, 1998, 16(4): 587-593. [6]Brown L G. A survey of image registration techniques. ACM Computing Surveys, 1992, 24(4):325-376. [7]Thvenaz P, Ruttimann U E, Unser M. A pyramid approach to subpixel registration based on intensity. IEEE Trans. on Image Processing, 1998, 7(1): 27-41. [8]刘九芬,王振武,黄达人.抗几何攻击的小波变换域图像水印算法.浙江大学学报(工学版),2003,37(4):386-392. [9]Davoine F. Watermarking et rsistance aux deformation gomtriques. In Cinquiemes journes dtudes et dchanges sur la compression et la representation des signaux audiovisuals (CORESA99), Centre de Recherch et Dveloppement de France Tlcom (Cnet), EURECOM,Conseil Gnral des Alpes-Maritimes and Tlcom Valley, Sophia-Antipolis, France, Jun. 1999:14-15.[10]Johnson N F, Duric Z, Jajodia S. Recovery of watermarks form distorted images. In Proc. 3rd Int. Information Hiding Workshop, Dresden, Germany, 1999: 361-375. [11]Braudaway G W, Minter F. Automatic recovery of invisible image watermarks from geometrically distorted images. In Proc. SPIE Security and Watermarking of Multimedia Contents I, CA, USA,2000, Vol.3971: 74-81. [12]Kang X G, Huang J W, Shi Y Q. An image watermarking algorithm robust to geometric distortion.Lecture Notes in Computers Science: Proc. of IWDW 2002, Spinger-Verlag, 2002, Vol. 2613:212-213. [13]刘瑞祯,谭铁牛.基于奇异值分解的数字图像水印方法.电子学报,2001,29(2):168-171. [14]ORuanaidh J J K, Pun T. Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Processing, 1998, 66(3): 303-317. [15]Wu M, Miller L M, Bloom J A, et al.. A Rotation, scale, and translation resilient public watermark. In Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing 1999(ICASSP99),Phoenix, AZ, 1999. http:∥www.assuredigit.com/tech_doc/more/Cox_Rotation_ scaling_translation_resilient_public_watermark. PDF.[16]Lin C Y, Wu M, Bloom J A, et al.. Rotation, scale, and translation resilient watermarking for images. IEEE Trans. on Image Processing, 2001, 10(5): 765-782. [17]Lin C Y. Public watermarking surviving general scaling and cropping: An application for printand-scan process. Multimedia and Security Workshop at ACM Multimedia 99, Orlando, FL,USA, Oct. 1999. http:∥citeseer.ist.psu.edu/lin99public.html [18]Solachidis V, Pitas I. Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP99), Phoenix, 1999, Vol. 6:3469-3472. [19]Licks V, Jordan R. On digital image watermarking robust to geometric transformations. IEEE Int. Conference on Image Processing, Vancounver, Canada, 2000: 690-693. [20]Lin C Y, Chang S F. Distortion modeling and invariant extraction for digital image print-and-scan process. International Symposium on Multimedia Information Processing (ISMIP 99), Taipei,Taiwan, Dec. 1999. http:∥www.ctr.columbia.edu/papers_advent/99/cylin-modelscan.pdf [21]Hayes M H. The reconstruction of a multidimensional sequence from the phase or magnitude of the FFT. IEEE Trans. on Acoustics, Speech and Signal Processing, 1992, (4): 140-154. [22]Fleet D J, Heger D J. Embedding invisible information in color images. In Proc. IEEE Int. Conf.on Image Processing (ICIP-97), Santa Barbara, October 1997, 1: 532-535. [23]Gruhl D, Bender W. Affine invariance. http:∥nif. www.media.mit.edu/DataHiding/affine/affine.html, 1995. [24]Kutter M. Watermarking resistance to translation, rotation, and scaling. In Proc. SPIE Multimedia Systems Applications, 1998, Vol. 3528: 423-431. [25]Honsinger C, Rabbani M. Data embedding using phase dispersion. In PICS 2000: Image Quality,Image Capture, Systems Conf., 2000, 3: 264-268. [26]Honsinger C W, Daly S J. Method for detecting rotation and magnification in image. U.S.Patent, 5835639, 1998.[27]Voloshynovskiy S, Deguillaume F, Pun T. Content adaptive watermarking based on a stochastic multiresolution image modeling. In EUSIPCO 2000, Tampere, Finland, September, 2000.http:∥citeseer.ist.psu.edu/380994.html [28]Pereira S, ORuanaidh J J K, Pun T. Secure robust digital watermarking using the lapped orthogonal transform. In IST/SPIE Electronic Image99, Session: Security and Watermarking of Multimedia Contents, San Jose, CA, USA, January 1999. http:∥citeseer.ist.psu.edu/pereira99-secure.html [29]Kang X G, Huang J W, Shi Y Q, et al.. A DWT-DFT composite watermarking scheme robust to both affine and JPEG compression. IEEE Trans. on Circuits and Systems for Video Technology,2003, 13(8): 776-786. [30]ORuanaidh J J K, Pereira S. A secure robust digital image watermark. In Electronic Imaging: Processing, Printing and Publishing in Colour, SPIE Proceedings, Ziirich, Switzerland,May 1998. (SPIE/IST/Europto Symposium on Advanced Imaging and Network Technologies).http:∥citeseer.ist.psu.edu/181609.html [31]Pereira S, ORuanaidh J J K, Deguillaume F, et al.. Template based recovery of Fourier-based watermarks using log-polar and log-log maps. IEEE Int. Conf on Multimedia Computing and Systems (ICMCS99), Florence, Italy, June 1999. http:∥citeseer.ist.psu.edu/pereira99template.html [32]Pereira S, Pun T. Fast robust template matching for affine resistant image watermarks. In Proc.3rd Int. Information Hiding Workshop, Dresden, Germany, 1999: 207-218. [33]Csurka G, Deguillaume F, ORuanaidh J J K, et al.. A Bayesian approach to affine transformation resistant image and video watermarking. In Proc. 3rd Int. Information Hiding Workshop,Dresden, Germany, 1999: 315-330. [34]Deguillaume F, Csurka G, ORuanaidh J J K, et al.. Robust 3D DFT video watermarking. In IST/SPIE Electronic Imaging99, Session: Security and Watermarking of Multimedia Contents,San Jose, CA, USA, January 1999, Vol.3657: 113-124. [35]Digimarc Corporation, Photographic Products and Methods Employing Embedded Information,US patent 5822436, 1999.[36]Piva A. Improving DFT watermarking robustness through optimum detection and synchronization, Multimedia and Security Workshop at ACM Multimedia99, GMD, Department of Electronic Engineering, University of Florence, Italy: Report 85.[37]Voloshynovskiy S, Pereira S, Iquise V, et al.. Attack modeling: Towards a second generation watermarking benchmark. Signal processing, 2001, 81(6): 1177-1214. [38]Herrigel A, Voloshynovskiy S, Rytsar Y. The watermark template attack. In Security and Watermarking of Multimedia Contents Ⅲ, Wong P W, Delp E J, Eds. SPIE Photonics West, Electronic Imaging 2001, San Jose, CA, USA, Jan. 2001, Vol.4314: 394-405. [39]Kutter M, Bhattacharjee S K, Ebrhimi T. Towards second generation watermarking schemes.ICIP99, Kobe, Japan, October 25-28, 1999, Vol. 3: 320-323. [40]Celik M U, Saber E, Sharma G, et al.. Analysis of feature-based geometry invariant watermarking.In Proceedings of SPIE: Security and Watermarking of Multimedia Contents Ⅲ, Jan. 2001, Vol.4314: 261-268. [41]Bas P, Chassery J M, Macq B. Robust watermarking based on the warping of pre-defined triangular patterns. In Proceedings of SPIE: Security and Watermarking of Multimedia Contents Ⅱ,San Jose, CA, USA, Jan. 2000, Vol. 3971: 99-109. [42]Kaewkamnerd N, Rao K R. Wavelet based watermarking detection using multiresolution image registration. TENCON 2000, Kaula Lumpur, Malaysia, Sept. 2000. http:∥www-ee.uta.edu/dip/paper/tencon_water.pdf.
  • 加载中
计量
  • 文章访问数:  4343
  • HTML全文浏览量:  172
  • PDF下载量:  1281
  • 被引次数: 0
出版历程
  • 收稿日期:  2003-10-09
  • 修回日期:  2004-04-05
  • 刊出日期:  2004-09-19

目录

    /

    返回文章
    返回