期刊文献+

基于Contourlet域特征点的抗几何攻击水印方法 被引量:19

Feature Point Based Image Watermarking Scheme in Contourlet Domain Against Geometrical Attacks
在线阅读 下载PDF
导出
摘要 有效抵抗几何攻击的水印算法是目前水印技术研究的难点之一,很小的几何变形就可能使大多数水印算法失效.对图像Contourlet变换和Harris-Affine算子的特性进行了分析和讨论,在此基础上提出了一种以仿射不变特征点的基于Contourlet的抗几何攻击水印算法.首先,用Contourlet变换提取出多尺度、多方向的纹理信息;再用Harris-Affine检测算子从变换域的中、低频方向子带中提取出仿射不变特征点,结合自适应局部结构的特征尺度确定特征区域,并用U变换对其归一化处理,水印就自适应地嵌入到归一化后的区域中;水印嵌入采纳矢量量化的策略,将水印信息重复嵌入到不同方向子带、多个不相交的局部仿射不变特征区域.检测时,利用特征点实现水印的重同步,采用"多数原则"来提取水印的位信息,无需求助于原始图像.仿真结果表明,算法不仅具有较好的透明性。 Image watermarking resistant to geometrical attacks is the hotspot and challenging task in the state-of-the-art research on watermarking. Even an invisible affine transformation can invalidate most existing watermarking algorithms. This the authors analyse and discuss the characteristic of contourlet transform and Harris-Affine detector,and on this basis,propose a novel contourlet-domain watermarking algorithm against geometric attacks based on the affine-invariant feature points and characteristics of regions. First,the proposed scheme uses contourlet transform to extract multidirectional and multiscale texture information,and then obtains the feature points invariant to the affine transformation from the low and middle directional subbands by Harris-Affine detector. Second,the feature regions are adaptively computed by the feature scale of the local structure and normalized by U transform. The watermarking is emdedded adaptively in those characteristic regions which are normalized. Finally,by vector quantization,several copies of the watermark are embedded into the no overlapped local feature regions in different directional subbands. During detection,the resynchronization is achieved through feature points. And the embedded sequence can be extracted by "majority principles" without resorting to the original host image. Experimental results show that the proposed algorithm has good transparency and is very robust to common image processing and geometric attacks.
作者 楼偶俊
出处 《计算机研究与发展》 EI CSCD 北大核心 2010年第1期113-120,共8页 Journal of Computer Research and Development
关键词 几何攻击 CONTOURLET Harris-Affine检测算子 特征点 自适应 geometrical attack Contourlet Harris-Affine detector feature points adaptive
作者简介 楼偶俊,1976年生,博士,主要研究方向为图像处理及多媒体数字水印技术.
  • 相关文献

参考文献15

  • 1Yuan W G, Ling H F, Lu Z D, et al. Image content-based watermarking resistant against geometrical distortions [C]//Proc of the 8th Int Conf on Signal Processing. Piseataway, NJ: IEEE, 2006:2632-2635.
  • 2Shi L, Hong F, Cui G H. A quantization-based digital watermarking robust to geometrical transformations [C] // Proc of 2003 Int Conf on Machine Learning and Cybernetics. Los Alamitos, CA: IEEE Computer Society, 2003:2826-2830.
  • 3Kim B S, Choi J G, Park C H, et al. Robust digital image watermarking method against geometrical attacks [J]. Real- Time Imaging, 2003, 9(2): 139-149.
  • 4Kim B S, Choi I G, Park K H. RST-resistant image watermarking using invariant centroid and reordered Fourier Mellin transform [C] //LNCS2939: Proc of the 2nd Int Workshop on Digital Watermarking. Berlin: Springer, 2004: 370-381.
  • 5Zheng D, Zhao J. A rotation invariant feature and image normalization based image watermarking algorithm [C] // Proc of IEEE Int Conf on Multimedia and Expo. Piscataway, NJ: IEEE Signal Processing, 2007:2098-2101.
  • 6Alghoniemy M, Tewfik A H. Geometric invariance in image watermarking [C]//Proc of 2006 IEEE Int Conf on Image Processing. Piscataway, NJ: IEEE Signal Processing, 2006: 1401-1404.
  • 7Tokar T, Levicky D. Robust watermarking of gray scale images by using synchronization templates [C]//Proc of the 17th Int Conf Radioelektronika. Piscataway, NJ: IEEE, 2007 : 396-399.
  • 8楼偶俊,王相海,王钲旋.抗几何攻击的量化鲁棒视频水印技术研究[J].计算机研究与发展,2007,44(7):1211-1218. 被引量:8
  • 9Li L D, Guo B L, Pan J S. Robustimagewatermarking using feature based local invariant regions [J]. International Journal of Innovative Computing Information and Control, 2008, 4(8): 1977-1986.
  • 10Wang Xiangyang, Hou Limin, Wu Jun. A feature-based robust digital image watermarking against geometric attacks [J]. Image and Vision Computing, 2008, 26(7): 980-989.

二级参考文献100

共引文献51

同被引文献177

引证文献19

二级引证文献109

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部