高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于奇偶量化的空域抗几何攻击图像水印算法

李雷达 郭宝龙 表金峰

李雷达, 郭宝龙, 表金峰. 基于奇偶量化的空域抗几何攻击图像水印算法[J]. 电子与信息学报, 2009, 31(1): 134-138. doi: 10.3724/SP.J.1146.2007.01043
引用本文: 李雷达, 郭宝龙, 表金峰. 基于奇偶量化的空域抗几何攻击图像水印算法[J]. 电子与信息学报, 2009, 31(1): 134-138. doi: 10.3724/SP.J.1146.2007.01043
Li Lei-da, Guo Bao-long, Biao Jin-feng. Spatial Domain Image Watermarking Scheme Robust to Geometric Attacks Based on Odd-Even Quantization[J]. Journal of Electronics & Information Technology, 2009, 31(1): 134-138. doi: 10.3724/SP.J.1146.2007.01043
Citation: Li Lei-da, Guo Bao-long, Biao Jin-feng. Spatial Domain Image Watermarking Scheme Robust to Geometric Attacks Based on Odd-Even Quantization[J]. Journal of Electronics & Information Technology, 2009, 31(1): 134-138. doi: 10.3724/SP.J.1146.2007.01043

基于奇偶量化的空域抗几何攻击图像水印算法

doi: 10.3724/SP.J.1146.2007.01043
基金项目: 

国家863计划项目(2006AA01Z127),国家自然科学基金(60572152)和教育部博士点基金(20060701004)资助课题

Spatial Domain Image Watermarking Scheme Robust to Geometric Attacks Based on Odd-Even Quantization

  • 摘要: 数字水印对几何攻击的鲁棒性问题一直没有得到很好的解决,该文提出了一种能够抵抗RST(旋转、缩放、平移)攻击,局部剪切以及常规信号处理攻击的多比特图像水印算法。该文利用尺度不变特征变换(SIFT)进行水印信号的同步;设计了一种圆环形的水印模式,并在空域采用奇偶量化嵌入水印;并设计了一种奇偶检测器提取水印。实验结果表明该算法能获得很好的图像质量,且能十分有效地抵抗各种几何攻击以及常规的压缩,滤波等攻击。
  • Cox I J and Miller M L. The first 50 years of electronicwatermarking. EURASIP Journal on Applied SignalProcessing, 2002, 9(2): 126-132.[2]Licks V and Jordan R. Geometric attacks on imagewatermarking systems[J].IEEE Multimedia.2005, 12(3):68-78[3]Oruanaidh J J K and Pun T. Rotation, scale and translationinvariant spread spectrum digital image watermarking[J].Signal Processing.1998, 66(3):303-317[4]桑茂栋, 赵耀. 基于几何矩的抵抗RST 攻击的数字图像水印.电子与信息学报, 2007, 29(4): 76-80.Sang Mao-dong and Zhao Yao. Moment based multibitdigital image watermarking resisting to RST attacks. Journalof Electronics Information Technology, 2007, 29(4): 76-80.[5]Zhang L, Qian G B, and Xiao W W, et al.. Geometricinvariant blind image watermarking by invariant Tchebichefmoments[J].Optical Express.2007, 15(5):2251-2261[6]Pereira S and Pun T. Robust template matching for affineresistant image watermarks. IEEE Trans. on ImageProcessing, 2000, 9(6): 1123-1129.[7]Bas P, Chassery J M, and Macq B. Geometrically invariantwatermarking using feature points. IEEE Trans. on ImageProcessing, 2002, 11(9): 1014-1028.[8]Tang C W and Hang H M. A feature-based robust digitalimage watermarking scheme[J].IEEE Trans. on SignalProcessing.2003, 51(4):950-959[9]Li L D, Guo B L, and Shao K. Geometrically robust imagewatermarking using scale-invariant feature transform andZernike moments. Chinese Optics Letters, 2007, 5(6):332-335.[10]Lowe D G. Distinctive image features from scale-invariantkeypoints[J].International Journal of Computer Vision.2004,60(2):91-110[11]Kundur D and Hatzinakos D. Digital watermarking fortelltale tamper proofing and Authentication[J].Proc. IEEE.1999, 87(7):1167-1180[12]Yu G J, Lu C S, and Liao H Y M. Mean-quantization-basedfragile watermarking for image authentication. OpticalEngineering, 2001, 40(7): 1396-1408.
  • 加载中
计量
  • 文章访问数:  3278
  • HTML全文浏览量:  92
  • PDF下载量:  1322
  • 被引次数: 0
出版历程
  • 收稿日期:  2007-06-25
  • 修回日期:  2007-10-31
  • 刊出日期:  2009-01-19

目录

    /

    返回文章
    返回