期刊文献+

基于奇异值分解的抗几何攻击鲁棒性盲水印算法 被引量:1

A Robust Blind Watermarking Algorithm Resisting to Geometric Transform based on SVD
在线阅读 下载PDF
导出
摘要 现有的大多数基于奇异值分解的图像水印算法,对于宿主图像施加轻微扰动时其奇异值不会发生明显的改变,然而当宿主图像发生几何变换,例如旋转和缩放之后其奇异值也发生了相应的改变,所以现有的算法缺乏抵抗几何攻击的能力。最主要的原因是目前大部分奇异值分解的水印算法都是基于笛卡尔坐标系下的,而笛卡尔坐标系下宿主图像缺乏对旋转和缩放的不变性,这样就会使得水印的嵌入和检测失去同步。为了解决笛卡尔坐标系下水印不同步问题,文章提出了一种对数极坐标系下的使用SVD抗几何信号变换的图像水印算法。实验结果表明,该算法能有效抵抗旋转、缩放等几何变换处理,对于一些压缩、滤波等常规信号处理,也显示出较好的鲁棒性。 The most existing image watermarking algorithms based on svd are robust for host image changed little. However, the singular value would be changed when host image is rotated and scaled ,so the existing watermarking algorithms based on svd is insufficient for reisisting to geometric transform abilities. The most important reason is the existing watermarking algorithms are based on Cartesian coordinate, which is insufficient to rotation and scaling transform. Therefore, watermark embedding and extracting would not be synchronized. In order to solve the watermark non-synchronization on Cartesian coordinate, this paper proposes a robust watermarking algorithm resisting to geometric transform based on SVD in logarithm polar coordinate. The simulation experiment results demonstrate the proposed method is robust enough to rotation and scaling geometric degradation. Meanwhile, it is also robust for commonplace signal processing such as:adding noise, filtering and JPEG compression etc.
作者 何冰 朱志平
出处 《信息网络安全》 2012年第11期71-73,共3页 Netinfo Security
关键词 笛卡尔坐标 对数极坐标 鲁棒性 奇异值分解 cartesian coordinate logarithm polar coordinate robusmess SVD
  • 相关文献

参考文献9

二级参考文献67

  • 1何冰,王晅,赵杰,赵雪青,张小景.基于Contourlet变换的抗旋转攻击零水印算法[J].计算机应用,2009,29(3):801-804. 被引量:11
  • 2LEE D D,SEUNG H S.Learning the parts of objects by non-negative matrix factorization[J].Nature,1999,401(6755):788-791.
  • 3SUN Wei,LU Wei.Blind image watermarking analysis using DWT and non-negative matrix factorization[C]//Proc of CCPR'08.Beijing:[s.n.]2008:1-5.
  • 4DO M,LI M V.The Contourlet transform:an efficient directional multiresolution image representation[J].IEEE Trans on Image Processing,2005,14(12):2091-2106.
  • 5LEE D D,SEUNG H S.Algorithms for non-negative matrix factorization[C]//Proc of Neural Information Processing Systems Comference.2001:556-562.
  • 6AASE S O,HUSOY J H,WALDEMAR P.A critique of SVD-based image coding systems[C]//Proc of IEEE International Symposium on Circuits and Systems VISL.1999:13-16.
  • 7LIU Rui-zhen,TAN Tie-niu.An SVD based watermarking scheme for protecting rightful ownership[J].IEEE Trans on Multimedia,2002,4(1):121-128.
  • 8WANG Zhou,BOVIK A C,SHEIKH H R,et al.Image quality assessment:from error visibility to structural similarity[J].IEEE Trans on Image Processing,2004,13(4):600-612.
  • 9Y. Zheng. Digital signcryption or how to achieve cost (signature & encryption). Cost (signature)+ cost (encryption) [C]Advances in Cryptology-CRYPTO' 97, LNCS 1294, Springer-Verlag, 1997. 165-179.
  • 10H. Petersen, M. Michels. Cryptanalysis and improvement of signcryption schemes[J]. IEE Proceedings-Computers and Digital Techniques, 1998, vol. 145, no. 2:149-151.

共引文献265

同被引文献11

  • 1Pereira A,Pun T. Robust template matching for affine resistant image watermarks [J]. IEEE Transactions on Image Proces- sing, 2000,9(6) : 1123-1129.
  • 2Candes E J, Wakin M B. An introduction to compressive sam- pling[J]. IEEE Signal Processing Magazine, 2008,25 (2) :21-30.
  • 3Baraniuk R, Davenport M, Devore R, et al. A simple proof of the restricted isometry property for random matrices[J]. Construc- tive Approximation,2008, 28( 3 ) :253-263.
  • 4Dossal C, Reyre G, Fadili J. A numerical exploration of com- pressed sampling recovery[J]. Linear algebra and Its Applica- tions, 2010,432 (7) : 1663-1679.
  • 5Low D G. Object recognition from local scale-invariant features [C] // International Conference on Computer Vision. Cor{u, Greece, 1999(9) : 1150-1157.
  • 6Lowe D G. Distinctive image features from scal-invariant key points[J]. Internatonal Journal on computer Vision, 2004, 60 (2):91-110.
  • 7张翼,唐向宏.基于图像归一化的抗几何攻击水印技术[J].电路与系统学报,2009,14(6):53-58. 被引量:7
  • 8夏建平,周激流,何坤,刘昶,王东方.基于小波变换和Tucker分解的彩色图像数字水印[J].计算机应用研究,2010,27(2):798-800. 被引量:10
  • 9楼偶俊.基于Contourlet域特征点的抗几何攻击水印方法[J].计算机研究与发展,2010,47(1):113-120. 被引量:19
  • 10陈利利,王向阳.基于SIFT的椭圆区域鲁棒数字水印方案[J].计算机工程与应用,2012,48(1):98-101. 被引量:5

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部