高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

数字图像水印算法抗几何攻击鲁棒性研究

袁大洋 肖俊 王颖

袁大洋, 肖俊, 王颖. 数字图像水印算法抗几何攻击鲁棒性研究[J]. 电子与信息学报, 2008, 30(5): 1251-1256. doi: 10.3724/SP.J.1146.2006.01701
引用本文: 袁大洋, 肖俊, 王颖. 数字图像水印算法抗几何攻击鲁棒性研究[J]. 电子与信息学报, 2008, 30(5): 1251-1256. doi: 10.3724/SP.J.1146.2006.01701
Yuan Da-yang, Xiao Jun, Wang Ying. Study on the Robustness of Digital Image Watermarking Algorithms to Geometric Attacks[J]. Journal of Electronics & Information Technology, 2008, 30(5): 1251-1256. doi: 10.3724/SP.J.1146.2006.01701
Citation: Yuan Da-yang, Xiao Jun, Wang Ying. Study on the Robustness of Digital Image Watermarking Algorithms to Geometric Attacks[J]. Journal of Electronics & Information Technology, 2008, 30(5): 1251-1256. doi: 10.3724/SP.J.1146.2006.01701

数字图像水印算法抗几何攻击鲁棒性研究

doi: 10.3724/SP.J.1146.2006.01701
基金项目: 

国家高技术计划(2003AA144080)资助课题

Study on the Robustness of Digital Image Watermarking Algorithms to Geometric Attacks

  • 摘要: 数字水印对抗各种攻击的鲁棒性一直是水印研究者所关注的一个焦点,其中几何攻击是实际应用中经常出现的一种攻击方式,而常规的水印算法对几何攻击却无能为力,因此水印算法对几何攻击的鲁棒性被认为是数字水印技术走上商用的一个关键点。该文总结了已有的典型抗几何攻击数字水印算法,从理论分析和实验验证两个角度对他们进行了比较和分析,并指出了下一步可能的发展方向,对抵抗几何攻击水印算法的发展具有一定的指导作用。
  • 王志雄, 王慧琴, 李人厚. 数字水印应用中的攻击和对策综述.通信学报, 2002, 23(11): 75-79.Wang Zhi-xiong, Wang Hui-qin, and Li Ren-hou. Attacks andremedies on application of digital watermarking. Journal onCommunications, 2002, 23(11): 75-79.[2]Chen B and Wornell G W. Quantization index modulationmethods for digital watermarking and informationembedding of multimedia[J].Journal of VLSI Signal ProcessingSystems.2001, 27(1):7-33[3]Cox I J, Kilian J, and Leighton T, et al.. Secure spreadspectrum watermarking for multimedia[J].IEEE Trans. onImage Processing.1997, 6(12):1673-1687[4]Hartung F, Su J K, and Girod B. Spread spectrumwatermarking: malicious attacks and counterattacks.Proceedings of the 1999 Security and Watermarking ofMultimedia Contents, San Jose, CA, USA, Jan 25-27 1999,SPIE Vol. 3657: 147-158.[5]Pereira S, ORuanaidh K J J, and Deguillaume F, et al..Template based recovery of fourier-based watermarks usinglog-polar and log-log maps. IEEE International Conferenceon Multimedia Computing and Systems, Florence, Italy, June7-11 1999, 1: 870-874.[6]康显桂, 黄继武, 林彦等. 抗仿射变换的扩频图像水印算法.电子学报, 2004, 32(1): 8-12.Kang Xian-gui, Huang Ji-wu, and Lin Yan, et al.. Spreadspectrum watermarking resists to affine transformation. ActaElectronica Sinica, 2004, 32(1): 8-12.[7]Deguillaume F, Csurka G, and ORuanaidh J J K, et al..Robust 3D DFT video watermarking. Proceedings of the1999 Security and Watermarking of Multimedia Contents,San Jose, CA, USA, Jan 25-27 1999, SPIE Vol.3657: 113-124.[8]Pereira S and Pun T. Robust template matching for affineresistant image watermarks. IEEE Trans. on ImageProcessing, 2000, 9(6): 1123-1129.[9]Kang X, Huang J, Shi Y Q, and Lin Y. A DWT-DFTcomposite watermarking scheme robust to both affinetransform and JPEG compression[J].IEEE Trans. on Circuitsand Systems for Video Technology.2003, 13(8):776-786[10]Kutter M. Watermarking resistant to translation, rotationand scaling. Proceedings of the 1998 Multimedia Systems andApplications, Boston, MA, USA, Nov 2-4 1998, SPIE Vol.3528: 423-433.[11]Honsinger C and Rabbani M. Data embedding using phasedispersion. Final Program and Proceedings: IS and TsAnnual Conference, Portland, OR, United States, May 26-292000: 264-268.[12]Honsinger C W and Daly S J. Method for detecting rotationand magnification in image.United States, patent 5835639,1998.[13]ORuanaidh J J K and Pun T. Rotation, scale andtranslation invariant spread spectrum digital imagewatermarking[J].Signal Processing.1998, 66(3):303-317[14]Lin C Y, Wu M, and Bloom J A, et al.. Rotation, scale, andtranslation resilient public watermarking for images[J].IEEETrans. on Image Processing.2001, 10(5):755-766[15]孙刚, 谢俊元. 一种基Fourier-Mellin 变换的数字水印的研究.计算机工程, 2004, 30(9): 152-153.Sun Gang and Xie Jun-yuan. Research on a watermark basedon the fourier mellin transform. Computer Engineering, 2004,30(9): 152-153.[16]Zheng D, Zhao J, and Saddik A E. RST invariant digitalimage watermarking based on log-polar mapping and phasecorrelation[J].IEEE Trans. on Circuits and System for VideoTechnology.2003, 13(8):753-765[17]Farzam M and Shirani S. A robust multimedia watermarkingtechnique using zernike transform. 2001 IEEE fourthWorkshop on Multimedia Signal Processing, Cannes, France,Oct 3-5 2001: 529-534.[18]Kim H S and Lee H K. Invariant image watermark usingZernike moments[J].IEEE Trans. on Circuits and Systems forVideo Technology.2003, 13(8):766-775[19]Xin Y Q, Liao S, and Pawlak M. A multibit geometricallyrobust image watermark based on zernike moments.Proceedings of the 17th International Conference on PatternRecognition, Cambridge, United Kingdom, Aug 23-26 2004,4: 861-864.[20]Wu M, Miller M, Bloom J, and Cox I J. A rotation, scale andtranslation resilient public watermark. Security andWatermarking of Multimedia Contents II, San Jose, CA,USA, Jan 24-26 2000, SPIE Vol.3971: 90-98.[21]Simitopoulos D, Koutsonanos D, and Strintzis M G. Robustimage watermarking based on generalized radontransformations. IEEE Trans. on Circuits and Systems forVideo Technology, 2003, 8(13): 732-745.[22]Dong P and Galatsanos N P. Affine transformation resistantwatermarking based on image normalization. InternationalConference on Image Processing, Rochester, NY, UnitedStates, Sep 22-25 2002, 3: 489-492.[23]杨文学, 赵耀. 抵抗仿射变换攻击的多比特图像水印. 信号处理, 2004, 20(3): 245-250.Yang Wen-xue and Zhao Yao. Multi-bits image watermarkingresistantto afine transformations based on normalization.Signal Processing, 2004, 20(3): 245-250.[24]Dong P, Brankov J G, Galatsanos N P, Yang Y, and DavoineF. Digital watermarking robust to geometric distortions[J].IEEE Trans. on Image Process.2005, 14(12):2140-2150[25]Celik M U, Saber E, Sharma G, and Tekalp A M. Analysis offeature-based geometry invariant watermarking. Security andWatermarking of Multimedia Contents III, San Jose, CA, Jan22-25 2001, SPIE Vol.4314: 261-268.[26]Chotikakamthorn N, Pantuwong N, and Yawai W. Projectiveinvariant digital image watermarking technique using fourCo-Planar feature points. IEEE International Conference onImage Processing 2005, Genova, Italy, Sep 11-14 2005, 1:1005-1008.[27]Tang C W and Hang H M. A feature-based robust digitalimage watermarking scheme[J].IEEE Trans. on SignalProcessing.2003, 51(4):950-959[28]Bas P, Chassery J M, and Macq B. Geometrically invariantwatermarking using feature points. IEEE Trans. on ImageProcessing, 2002, 11(9): 1014-1028.[29]Petitcloas F A P and Anderson R J. Evaluation of copyrightmarking systems. Proceedings of the 1999 6th InternationalConference on Multimedia Computing and Systems, Florence,Italy, Jun 7-11 1999, 1: 574-579.
  • 加载中
计量
  • 文章访问数:  3872
  • HTML全文浏览量:  103
  • PDF下载量:  1984
  • 被引次数: 0
出版历程
  • 收稿日期:  2006-11-01
  • 修回日期:  2007-04-02
  • 刊出日期:  2008-05-19

目录

    /

    返回文章
    返回