期刊文献+

基于共轭对称列率复数哈达玛变换的水印算法 被引量:1

Watermarking algorithm based on conjugate symmetric sequency-ordered complex hadamard transform
在线阅读 下载PDF
导出
摘要 为了提高水印的鲁棒性和计算效率,提出了一种基于共轭对称列率复数哈达玛变换的图像水印算法.该算法首先对载体图像分块并进行筛选,找到适合嵌入水印的块;在嵌入之前,根据方差将这些块分成纹理简单和纹理复杂2类,不同类的块使用不同的量化步长,以此来增强水印的鲁棒性;然后,利用量化的方法将经过置乱和扩频的二值水印嵌入到上述块的系数相位中.为了抵抗图像的去同步攻击,提出了一种根据图像变换前后几何矩之间的关系来判断仿射变换的策略,并在此基础上计算变换参数,恢复图像的同步信息.实验结果表明,在满足不可见性的前提下,经历各种攻击之后所提取出的水印仍然清晰可辨,说明该算法具有较好的鲁棒性.同时,所提出的判断策略也能准确地判定载体图像是否经历了去同步攻击以及何种方式攻击. To improve the robustness and computation efficiency of watermark,a watermarking algorithm based on conjugate symmetric sequency-ordered complex hadamard transform(CS-SCHT) is proposed.In this algorithm,the host image is decomposed into blocks which are selected to find suitable blocks for watermark.Before embedding,the selected blocks are classified into two classes,flat or textured,corresponding to different quantization step for better robustness.Finally,the binary meaningful watermark is embedded into the phases of the blocks by quantization and spread spectrum technique.In order to resist de-synchronization attacks,a strategy to judge affine transformation by relying on the relationship between geometric moments before and after attacks is put forward.The transformation parameters can be computed and then applied to restore the synchronization of the host image.Experimental results show that the extracting watermark suffered attacks is still legible,indicating that the new algorithm has good robustness when transparence is satisfied.Meanwhile,whether the host image suffers de-synchronization attacks existence and what the attacks are can be exactly judged.
作者 张悦 舒华忠
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2011年第2期312-316,共5页 Journal of Southeast University:Natural Science Edition
基金 国家自然科学基金资助项目(60873048) 江苏省自然科学基金资助项目(BK2008279)
关键词 共轭对称列率复数哈达玛变换 共轭对称 去同步攻击 仿射变换 检测阈值 conjugate symmetric sequency-ordered complex hadamard transform(CS-SCHT) conjugate symmetric de-synchronization attack affine transformation detection threshold
  • 相关文献

参考文献12

  • 1Aung A, Ng B P, Rahardja S. Sequency-ordered com- plex hadamard transform : properties, computational complexity and applications [J]. IEEE Transcations on Signal Processing, 2008, 56(8) : 3562 - 3571.
  • 2Aung A, Ng B P, Rahardja S. A robust watermarking scheme using sequency-ordered complex hadamardtransform [ J ]. Journal of Signal Processing System, 2011. (to appear).
  • 3Aung A, Ng B P, Rahardja S. Conjugate symmetric sequency-ordered complex hadamard transform [J]. 1EEE Transcations on Signal Processing, 2009, 57(7) : 2582 - 2593.
  • 4Chert W, Chert C H. A robust watermarking scheme u- sing phase shift keying with the combination of ampli- tude boost and low amplitude block selection [ J ]. Pattern Recogition, 2005, 38(4): 587-598.
  • 5Dong P, Brankov J G, Nikolas P G. Digital watermarking robust to geometric distortions [ J ]. 1EEE Transca- tions on Image Processing, 2005, 14 ( 12 ) : 2140 - 2150.
  • 6Voyatzis G, Pitas I. Applications of toral automorphism in image watermark [ C ]//Proceedings of the Interna- tional Conference on Image Processing. Lausanne, Switzerland, 1996, 2:237 - 240.
  • 7Pereia S, Pun T. Robust templete matching for affine resistant image watermarks [ J ]. IEEE Transcations on Image Processing, 2000, 9 (6) : 1123 - 1129.
  • 8Alghoniemy M, Tewfik A H. Geometric distortion correction in image watermarking [ C ]//Proceedings of SPIE 2000. San Jose, CA,USA, 2000,3971:82 -89.
  • 9Zhang L, Kwong S, Wei G. Geometric moment in im- age watermarking [ C ]//Proceedings of the International Symposium on Circuits and Systems. Hong Kong, Chi- na, 2003, 2 : 932 - 935.
  • 10Alghoniemy M, Tewfik A H. Geometric distortion correction through image normalization [ C ]//Pro- ceedings of the International Conference on Multimedi- a and Expo. New York, USA, 2000, 3 : 1291 - 1294.

二级参考文献5

  • 1Ruanaidh P S J,Deguillume F,Csurka G,et al.Template Based Recovery of Fourier-based Watermarks Using Log-polar and Log-log Maps[C]//Proc.of the IEEE International Conference on Multimedia Computing and Systems.1999-06.
  • 2Pereira S,Pun T.An Iterative Template Matching Algorithm Using the Chirp-Z Transform for Digital Image Watermarking[J].Pattern Recognition,2000,33(2):173-175.
  • 3Simitopoulos D,Koutsonanos D,Strintzis M G.Image Watermarking Resistant to Geometric Attacks Using Generalized Radon Transactions[C]//Proc.of the 14th International Conference on Digital Signal Processing.2002-07.
  • 4Simitopoulos D,Koutsonanos D E,Strintzis M G.Robust Image Watermarking Based on Generalized Radon Transformations[J].IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):732-745.
  • 5Stankovic S,Djurovic I,Pitas I.Watermarking in the Space /Spatial-frequency Domain Using Two-dimensional Radon-Wigner Distribution[J].IEEE Transactions on Image Processing,2001,10(4):650-658.

同被引文献8

  • 1Aung A, NG B P, Rahardja S. Conjugate symmetric sequency- ordered complex hadamard transform [ J ]. IEEE. Tramcafiom on Signal Processing,2009,57(7):2582- 2593.
  • 2Roland K,Peter M, AndreasN U. Lightweight detection of addi- tive watermarking in the DWT-doman [ J]. IEEE Transcafions on Image Processing,2011,20(2) :474 - 484.
  • 3Cheng Q, Huang T S. Robust optimum detection and decoding of multiplicative watermarking in DFF domain[ J]. IEEE Tran- scafions on Signal Processing,2003,51 (4) :906 - 924.
  • 4Fouad K, JianMin J. Perceptual image hashing based on virtual watemaark detection [ J]. IEEE Transcations on Image Process- in~.2010.19(4) :981 - 9q6.
  • 5University of Southern California. The USC-SIPI Image Database [ DB/OL]. http://sipi, usc. edu/database, 1996-05- 28.
  • 6Fan S H, Pang K K, Ngan K N. Classified perceptual coding ruth adaptive quaatizafion [ J]. IEEE Transcations on Circuitsand System for Video Technology, 1996,6 (4) : 375 - 388.
  • 7Wang J W,Liu G M,Dai Y W.LocaUy optimum detection for Bami' s multiplicative watermarking in DWT domain [ J]. Sig- nal Processing, 2008,88( 1 ) : 117 - 130.
  • 8Hung H T, Chi C L. Wavelet-based image watermarking with visibility range estimation based on HVS and neural networks [J]. Pattern Recognition, 2011,44(4) :751 - 763.

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部