Advanced Search
Volume 30 Issue 5
Dec.  2010
Turn off MathJax
Article Contents
Yuan Da-yang, Xiao Jun, Wang Ying. Study on the Robustness of Digital Image Watermarking Algorithms to Geometric Attacks[J]. Journal of Electronics & Information Technology, 2008, 30(5): 1251-1256. doi: 10.3724/SP.J.1146.2006.01701
Citation: Yuan Da-yang, Xiao Jun, Wang Ying. Study on the Robustness of Digital Image Watermarking Algorithms to Geometric Attacks[J]. Journal of Electronics & Information Technology, 2008, 30(5): 1251-1256. doi: 10.3724/SP.J.1146.2006.01701

Study on the Robustness of Digital Image Watermarking Algorithms to Geometric Attacks

doi: 10.3724/SP.J.1146.2006.01701
  • Received Date: 2006-11-01
  • Rev Recd Date: 2007-04-02
  • Publish Date: 2008-05-19
  • The robustness of digital watermarking to various attacks is a focus of researchers, while geometric attacks are very common attacks in practical applications. But conventional watermarking algorithms are helpless in face of geometric attacks, so the robustness to geometric attacks is called a bottleneck of commercial digital watermarking. The existing typical watermarking algorithms robust to geometric attacks are summarized, then they are compared and analyzed from the points of theoretical analyses and experimental validations. The possible development trends are pointed out, which can instruct the development of watermarking algorithms resistant to geometric attacks.
  • loading
  • 王志雄, 王慧琴, 李人厚. 数字水印应用中的攻击和对策综述.通信学报, 2002, 23(11): 75-79.Wang Zhi-xiong, Wang Hui-qin, and Li Ren-hou. Attacks andremedies on application of digital watermarking. Journal onCommunications, 2002, 23(11): 75-79.[2]Chen B and Wornell G W. Quantization index modulationmethods for digital watermarking and informationembedding of multimedia[J].Journal of VLSI Signal ProcessingSystems.2001, 27(1):7-33[3]Cox I J, Kilian J, and Leighton T, et al.. Secure spreadspectrum watermarking for multimedia[J].IEEE Trans. onImage Processing.1997, 6(12):1673-1687[4]Hartung F, Su J K, and Girod B. Spread spectrumwatermarking: malicious attacks and counterattacks.Proceedings of the 1999 Security and Watermarking ofMultimedia Contents, San Jose, CA, USA, Jan 25-27 1999,SPIE Vol. 3657: 147-158.[5]Pereira S, ORuanaidh K J J, and Deguillaume F, et al..Template based recovery of fourier-based watermarks usinglog-polar and log-log maps. IEEE International Conferenceon Multimedia Computing and Systems, Florence, Italy, June7-11 1999, 1: 870-874.[6]康显桂, 黄继武, 林彦等. 抗仿射变换的扩频图像水印算法.电子学报, 2004, 32(1): 8-12.Kang Xian-gui, Huang Ji-wu, and Lin Yan, et al.. Spreadspectrum watermarking resists to affine transformation. ActaElectronica Sinica, 2004, 32(1): 8-12.[7]Deguillaume F, Csurka G, and ORuanaidh J J K, et al..Robust 3D DFT video watermarking. Proceedings of the1999 Security and Watermarking of Multimedia Contents,San Jose, CA, USA, Jan 25-27 1999, SPIE Vol.3657: 113-124.[8]Pereira S and Pun T. Robust template matching for affineresistant image watermarks. IEEE Trans. on ImageProcessing, 2000, 9(6): 1123-1129.[9]Kang X, Huang J, Shi Y Q, and Lin Y. A DWT-DFTcomposite watermarking scheme robust to both affinetransform and JPEG compression[J].IEEE Trans. on Circuitsand Systems for Video Technology.2003, 13(8):776-786[10]Kutter M. Watermarking resistant to translation, rotationand scaling. Proceedings of the 1998 Multimedia Systems andApplications, Boston, MA, USA, Nov 2-4 1998, SPIE Vol.3528: 423-433.[11]Honsinger C and Rabbani M. Data embedding using phasedispersion. Final Program and Proceedings: IS and TsAnnual Conference, Portland, OR, United States, May 26-292000: 264-268.[12]Honsinger C W and Daly S J. Method for detecting rotationand magnification in image.United States, patent 5835639,1998.[13]ORuanaidh J J K and Pun T. Rotation, scale andtranslation invariant spread spectrum digital imagewatermarking[J].Signal Processing.1998, 66(3):303-317[14]Lin C Y, Wu M, and Bloom J A, et al.. Rotation, scale, andtranslation resilient public watermarking for images[J].IEEETrans. on Image Processing.2001, 10(5):755-766[15]孙刚, 谢俊元. 一种基Fourier-Mellin 变换的数字水印的研究.计算机工程, 2004, 30(9): 152-153.Sun Gang and Xie Jun-yuan. Research on a watermark basedon the fourier mellin transform. Computer Engineering, 2004,30(9): 152-153.[16]Zheng D, Zhao J, and Saddik A E. RST invariant digitalimage watermarking based on log-polar mapping and phasecorrelation[J].IEEE Trans. on Circuits and System for VideoTechnology.2003, 13(8):753-765[17]Farzam M and Shirani S. A robust multimedia watermarkingtechnique using zernike transform. 2001 IEEE fourthWorkshop on Multimedia Signal Processing, Cannes, France,Oct 3-5 2001: 529-534.[18]Kim H S and Lee H K. Invariant image watermark usingZernike moments[J].IEEE Trans. on Circuits and Systems forVideo Technology.2003, 13(8):766-775[19]Xin Y Q, Liao S, and Pawlak M. A multibit geometricallyrobust image watermark based on zernike moments.Proceedings of the 17th International Conference on PatternRecognition, Cambridge, United Kingdom, Aug 23-26 2004,4: 861-864.[20]Wu M, Miller M, Bloom J, and Cox I J. A rotation, scale andtranslation resilient public watermark. Security andWatermarking of Multimedia Contents II, San Jose, CA,USA, Jan 24-26 2000, SPIE Vol.3971: 90-98.[21]Simitopoulos D, Koutsonanos D, and Strintzis M G. Robustimage watermarking based on generalized radontransformations. IEEE Trans. on Circuits and Systems forVideo Technology, 2003, 8(13): 732-745.[22]Dong P and Galatsanos N P. Affine transformation resistantwatermarking based on image normalization. InternationalConference on Image Processing, Rochester, NY, UnitedStates, Sep 22-25 2002, 3: 489-492.[23]杨文学, 赵耀. 抵抗仿射变换攻击的多比特图像水印. 信号处理, 2004, 20(3): 245-250.Yang Wen-xue and Zhao Yao. Multi-bits image watermarkingresistantto afine transformations based on normalization.Signal Processing, 2004, 20(3): 245-250.[24]Dong P, Brankov J G, Galatsanos N P, Yang Y, and DavoineF. Digital watermarking robust to geometric distortions[J].IEEE Trans. on Image Process.2005, 14(12):2140-2150[25]Celik M U, Saber E, Sharma G, and Tekalp A M. Analysis offeature-based geometry invariant watermarking. Security andWatermarking of Multimedia Contents III, San Jose, CA, Jan22-25 2001, SPIE Vol.4314: 261-268.[26]Chotikakamthorn N, Pantuwong N, and Yawai W. Projectiveinvariant digital image watermarking technique using fourCo-Planar feature points. IEEE International Conference onImage Processing 2005, Genova, Italy, Sep 11-14 2005, 1:1005-1008.[27]Tang C W and Hang H M. A feature-based robust digitalimage watermarking scheme[J].IEEE Trans. on SignalProcessing.2003, 51(4):950-959[28]Bas P, Chassery J M, and Macq B. Geometrically invariantwatermarking using feature points. IEEE Trans. on ImageProcessing, 2002, 11(9): 1014-1028.[29]Petitcloas F A P and Anderson R J. Evaluation of copyrightmarking systems. Proceedings of the 1999 6th InternationalConference on Multimedia Computing and Systems, Florence,Italy, Jun 7-11 1999, 1: 574-579.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3936) PDF downloads(1985) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return