期刊文献+

基于DFT-SVD域抗几何攻击图像水印算法 被引量:9

A Geometric Distortion Resilient Image Watermark Algorithm Based on DFT-SVD
在线阅读 下载PDF
导出
摘要 抗几何攻击水印算法是版权保护领域的一个重要的研究方向。根据离散傅立叶变换幅度谱矩阵的性质,以及矩阵奇异值分解对旋转、缩放和平移等几何攻击具有稳定性的特点,提出了一种基于离散傅立叶变换和奇异值分解的抗几何攻击图像水印算法。实验结果表明该算法有较大的嵌入容量,对常规攻击和几何攻击都具有较强的鲁棒性。 The algorithm resilient geometric distortion is an important research direction in copyright protection. This paper proposes an image watermark algorithm based on discrete Fourier transform (DFT) and singular value decomposition (SVD) because of the good property of DFT amplitude matrix and the characteristic of SVD that it is stabilization to geometric distortion such as rotation, scale and translation. Experimental results show that the algorithm has more embedding capacity and robust to common atracks and geometric distortion.
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第18期120-121,132,共3页 Computer Engineering
关键词 水印 离散傅立叶变换 奇异值分解 几何攻击 Watermark Discrete Fourier transform (DFT) Singular value decom position (SVD) Geometric distortion
  • 相关文献

参考文献5

  • 1Lin CY,Wu M.Rotation Scale and Translation Resilient Watermarking for Images[J].IEEE Transactions on Image Processing,2001,10(5):765-782.
  • 2Kim B S,Choi J G.Robust Digital Image Watermarking Method Against Geometrical Attacks[J].Real Time Imaging,2003,9(2):139-149.
  • 3周波,陈健.基于奇异值分解的、抗几何失真的数字水印算法[J].中国图象图形学报(A辑),2004,9(4):506-512. 被引量:96
  • 4Bergman C,Davidson J.Unitary Embedding for Data Hiding with the SVD[C].Proc.of SPIE on Security Steganography and Watermarking of Multimedia (Contents Ⅶ),San Jose,CA,2005-01:5681.
  • 5石磊,钟铭,洪帆.抵抗几何变换的基于量化的水印技术[J].计算机辅助设计与图形学学报,2004,16(6):850-855. 被引量:18

二级参考文献16

  • 1Petitcolas F A P, Anderson R J, Kuhn M G. Attacks on copyright marking systems [A]. In: Proceedings of Workshop Information Hiding[C]. Portland, OR, USA, 1998: 218-238.
  • 2Herley C. Why watermarking is nonsense [J]. IEEE Signal Processing Magazine, 2002, 19(5) : 10-11.
  • 3Braudaway G W, Minter F. Automatic recovery of invisible image watermarks from geometrically distorted image[A]. In:Proceedings of SPIE Security and Watermarking of Multimedia Contents Ⅱ [C]. San Jose, CA, USA, 2000:74-81.
  • 4Ruanaidh J J. K. O. , Pun T. Rotation, scale and translation invariant spread spectrum digital image watermarking[J]. Signal Processing, 1998, 66(3): 303-317.
  • 5Andrews H, Patterson C. Singular value decomposition(SVD)image coding[J]. IEEE Transactions on Communications, 1976,24(4) : 425-432.
  • 6Liu R, Tan T. An SVD-based watermarking scheme for protecting rightful ownership [J]. IEEE Transactions on Multimedia, 2002,4(1) : 121-128.
  • 7Leon S J. Linear Algebra with Applications [M]. New York:Macmillan, 1986: 343-356.
  • 8Horn R A, Johnson C R. Matrix Analysis [M]. Cambridge:Cambridge University, 1985 : 431-432.
  • 9Miller M L, Bloom J A. Computing the probability of false watermark detection [A]. In: Proceedings of 3rd International Workshop Information Hiding [C], Dresden, Germany, 1999:146-158.
  • 10Vassilios Solachidis, Pitas I. Circularly symmetric watermark embedding in 2-D DFT domain[J]. IEEE Transactions on Image Processing, 2001, 10(11): 1741~1753

共引文献112

同被引文献74

引证文献9

二级引证文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部