期刊文献+

基于奇异值分解和小波变换的抗几何失真数字水印新方法 被引量:10

A NEW DIGITAL WATERMARKING METHOD AGAINST GEOMETRICAL DISTORTION BASED ON SVD AND DWT
在线阅读 下载PDF
导出
摘要 目前,大多数鲁棒图像水印所面临的最大问题就是几何攻击,而现有水印技术大都难以抵抗几何变换类攻击,如旋转、尺度变换等,由于几何攻击破坏了水印分量的同步,即使微小幅度的图像旋转或尺度变换都可能导致水印检测过程失败。提出了一种基于奇异值分解和小波变换的方法来盲提取受到几何攻击后的图像中的水印,即利用了奇异值对几何失真的稳健性,又利用了小波变换对一般攻击的稳健性。实验证明,提出的方法对几何攻击具有很好的鲁棒性。 Geometric attacks are the challenging problems that most robust image watermarking systems face today. And it is difficult for most watermarking technology to resist geometrical attacks such as rotation and scaling. Even the slightest rotation or scaling will lead to the failing of watermark detecting because the geometric attacks destroy the synchronization of watermarks. In this paper, a novel method is proposed to blind extract the watermark of attacked image. The method uses both the stability of singular value decomposition(SVD) against geometric distortion and the stability of discrete wavelet transform(DWT) against common distortion. Experiment results prove that the method proposed is characteristic of good rdoustness against geometrical attacks.
出处 《计算机应用与软件》 CSCD 北大核心 2007年第6期78-81,共4页 Computer Applications and Software
基金 国家文物局基金资助项目(20040311)
关键词 几何攻击 数字水印 奇异值分解 小波变换 Geometrical attack Digital watermark SVD DWT
  • 相关文献

参考文献11

  • 1Petitcolas F A P,Anderson R J,Kuhn M G.Attacks on copyrightmarking system.In Proc.2nd Int.Workshop Information Hiding,Portland,OR,Apr.14-17,1998:218-238.
  • 2Unzign,http://www.altern.org/watermark.
  • 3Cox IJ,Linnartz J.Public watermarks and resistance tampering.In Proc of ICIP97,Washington,DC,1997:26-29.
  • 4Cox IJ,Linnartz J.Some general methods for tampering with watermarks.IEEE J.on Selected Areas in Communications,1998,16(4):587-593.
  • 5Braudaway G W,Minter F.Automatic recovery of invisible image watermarks from geometrically distorted image[A].In:Proceedings of SPIE Security and Watermarking of Multimedia Contents[C].SanJose,CA,USA,2000:74-81.
  • 6Herley C.Why watermarking is nonsense[J].IEEE Signal Processing Magazine,2002,19(5):10-11.
  • 7Ruanaidh J J K O,Pun T Rotation.Scale and translation invariant spread spectrum digital image watermarking[J].Signal Processing,1998,66(3):303-317.
  • 8周波,陈健.基于奇异值分解的、抗几何失真的数字水印算法[J].中国图象图形学报(A辑),2004,9(4):506-512. 被引量:96
  • 9Liu R,Tan T.An SVD-based watermarking scheme for protecting rightful ownership[J].IEEE Transactions on Multimedia,2002,4(1):121-128.
  • 10Andrews H,Patterson C.Singular value decomposition(SVD)image coding[J].IEEE Transactions on Communications,1976,24(4):425-432.

二级参考文献9

  • 1Petitcolas F A P, Anderson R J, Kuhn M G. Attacks on copyright marking systems [A]. In: Proceedings of Workshop Information Hiding[C]. Portland, OR, USA, 1998: 218-238.
  • 2Herley C. Why watermarking is nonsense [J]. IEEE Signal Processing Magazine, 2002, 19(5) : 10-11.
  • 3Braudaway G W, Minter F. Automatic recovery of invisible image watermarks from geometrically distorted image[A]. In:Proceedings of SPIE Security and Watermarking of Multimedia Contents Ⅱ [C]. San Jose, CA, USA, 2000:74-81.
  • 4Ruanaidh J J. K. O. , Pun T. Rotation, scale and translation invariant spread spectrum digital image watermarking[J]. Signal Processing, 1998, 66(3): 303-317.
  • 5Andrews H, Patterson C. Singular value decomposition(SVD)image coding[J]. IEEE Transactions on Communications, 1976,24(4) : 425-432.
  • 6Liu R, Tan T. An SVD-based watermarking scheme for protecting rightful ownership [J]. IEEE Transactions on Multimedia, 2002,4(1) : 121-128.
  • 7Leon S J. Linear Algebra with Applications [M]. New York:Macmillan, 1986: 343-356.
  • 8Horn R A, Johnson C R. Matrix Analysis [M]. Cambridge:Cambridge University, 1985 : 431-432.
  • 9Miller M L, Bloom J A. Computing the probability of false watermark detection [A]. In: Proceedings of 3rd International Workshop Information Hiding [C], Dresden, Germany, 1999:146-158.

共引文献95

同被引文献73

引证文献10

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部