期刊文献+
共找到17篇文章
< 1 >
每页显示 20 50 100
Secure and Robust Digital Watermarking: A Survey
1
作者 Chun-Lin Song Le Yang Xin Wang 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第4期343-354,共12页
A digital watermarking technique is a multi-scientific discipline which is developed rapidly in last several years for digital content protection, such as copyright protection, authentication protection, source tracin... A digital watermarking technique is a multi-scientific discipline which is developed rapidly in last several years for digital content protection, such as copyright protection, authentication protection, source tracing, etc. However, in realistic scenarios, the digital watermarking system faces significant secure issues, for example, the attackers want to remove, detect, or embed illegal watermark signals. Therefore, the aim of this contribution is to illustrate recent results of robust and secure watermarking to the signal processing community, and highlight both benefits and still open issues. Specifically, this paper is intended to introduce the concept of secure and robust digital watermarking system, and provide with problems and their countermeasures. First of all, the classic watermark model and cryptosystem will be reviewed and then, the concept of secure and robust digital watermarking system will be described. Next, the watermark attack will be classified and described. Finally, some countermeasures that can help to improve secure and robustness are considered. 展开更多
关键词 Terms--Countermeasures digital watermarking system robust SECURITY watermark attacks.
在线阅读 下载PDF
Music Protection Based on Digital Watermarking and Encryption
2
作者 徐常凯 王耀才 《Journal of China University of Mining and Technology》 2003年第1期60-65,共6页
Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is em... Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is embedded in partially uncompressed domain and the embedding scheme is closely related to music content. For MIDI, the watermark is embedded in virtual notes that are generated and randomly hide among the MIDI notes. This paper also presents a method for controlling usage and protecting against copying of digital music contents and their associated players. The digital music contents and their players installed in one computer cannot be used if they are copied to another computer. Even in the same computer, the duplicated digital music contents are not usable. The usage associated to the music content will restrict the running time and times. Also the music can be played and it will be automatically updated after each playing. The digital music cannot be accessible if its permitted usage expires. 展开更多
关键词 digital watermarking ENCRYPTION copy protection usage control security key digital music
在线阅读 下载PDF
Object-Oriented Wavelet-Layered Digital Watermarking Technique
3
作者 刘晓云 虞厥邦 李明玉 《Journal of Electronic Science and Technology of China》 2005年第2期116-119,共4页
In this paper, an object-oriented digital watermarking technique is proposed in the wavelet domain for still images. According to the difference of recognition degree of the human eye to the different region of the im... In this paper, an object-oriented digital watermarking technique is proposed in the wavelet domain for still images. According to the difference of recognition degree of the human eye to the different region of the image, the image is divided into the interested region and uninterested region of human eye vision in this scheme. Using the relativity of position and the difference to ocular sensitivity of the multiresolution wavelet among each subband, the image is processed with layered watermarking append technique. Experimental results show that the proposed technique successfully survives image processing operations, additive noise and JPEG compression. 展开更多
关键词 digital watermarking OBJECT-ORIENTED wavelet transformation ocular masking
在线阅读 下载PDF
DWT-Based Watermarking Scheme for Digital Images 被引量:2
4
作者 何泉 苏广川 《Journal of Beijing Institute of Technology》 EI CAS 2003年第2期134-137,共4页
A watermarking scheme for digital images is introduced. This method is based on discrete wavelet transform and spread spectrum technique. A discrete wavelet transformed binary signature image is expanded by an m ... A watermarking scheme for digital images is introduced. This method is based on discrete wavelet transform and spread spectrum technique. A discrete wavelet transformed binary signature image is expanded by an m sequence and added to the large wavelet coefficients of a host image with a scale factor. Good balance between transparency and robustness is achieved by the selection of the scale factor. In addition, the spread spectrum technique is adopted to increase the robustness of this watermarking scheme. The experimental results show that the proposed method is of good performance and robustness for common image operations such as JPEG lossy compression, etc. 展开更多
关键词 digital watermarking discrete wavelet transform spread spectrum
在线阅读 下载PDF
Robust digital image watermarking against shearing based on Haar orthogonal function system 被引量:1
5
作者 DENGMing-hui HAOYan-ling SHENDong-hui 《Journal of Marine Science and Application》 2004年第1期75-80,共6页
In this paper, a robust digital watermarking method against shearing based on Haar orthogonal function system was introduced. The proposed method adopted the complete generalized orthogonal properties of Haar ortbogon... In this paper, a robust digital watermarking method against shearing based on Haar orthogonal function system was introduced. The proposed method adopted the complete generalized orthogonal properties of Haar ortbogonal function system to achieve the piece-based orthogonal transform on the image. The significant middle frequency coefficients in the transformation matrix are picked up, based on characteristics of the image visual system and the Haar orthogonal transform. The watermark is adoptively weighed to the middle frequency matrix. The method improves the validity of watermarking and shows excellent advantage against shearing attack. Experimental results show that the Haar orthogonal function system based watermark approach can provide an excellent protection under geometric attacks. 展开更多
关键词 digital watermarking Haar orthogonal function system shearing attack
在线阅读 下载PDF
Connectivity-Based Watermarking Robust to Geometrical Attacks 被引量:1
6
作者 王宏霞 罗键 《Journal of Southwest Jiaotong University(English Edition)》 2006年第1期1-6,共6页
A novel robust watermarking scheme based on image connectivity is proposed. In the scheme, the connected objects are obtained according to selected connectivity pattern, and the gravity centers are calculated in sever... A novel robust watermarking scheme based on image connectivity is proposed. In the scheme, the connected objects are obtained according to selected connectivity pattern, and the gravity centers are calculated in several bigger objects as the reference points for watermark embedding. Based on these reference points and the center of the whole image, several sectors are formed, and the same version of watermarks is embedded into these sectors and their opposites. Thanks to the very stable gravity center of the connected objects, watermark detection is synchronized successfully. Simulation results show that the watermark can survive under both local and global geometrical distortions. 展开更多
关键词 CONNECTIVITY digital watermarking ROBUSTNESS Geometrical distortion
在线阅读 下载PDF
Novel attribute-based framework for halftone watermarking
7
作者 谢琨 郑海红 +2 位作者 曾平 王泉 郭涛 《Journal of Beijing Institute of Technology》 EI CAS 2015年第2期246-253,共8页
A novel attribute-based framework is proposed to tackle the problem of halftone water- marking in combination of the spatial/transformation domain. The challenge is that the host image is continuous, while the waterma... A novel attribute-based framework is proposed to tackle the problem of halftone water- marking in combination of the spatial/transformation domain. The challenge is that the host image is continuous, while the watermarked halftone is bi-level. To search for a solution, an attribute image is defined as a good connection between the original grayscale image and its halftone image. When the attribute image is used as a watermark carrier, it helps to fred the watermarked halftone efficiently by solving a constrained modified direct binary search problem. Experimental results demonstrate that the proposed scheme in comparison with other similar methods maintains high watermark capacity with good image quality, high robustness, processing efficiency and easy decoding. Especially it has a good performance in printing application. 展开更多
关键词 digital halftoning digital watermarking attribute image transformation domain
在线阅读 下载PDF
Image Betrayal Checking Based on the Digital Fingerprint of Images on the Internet
8
作者 余永升 陈晓苏 《Journal of Southwest Jiaotong University(English Edition)》 2010年第2期149-159,共11页
In the Internet environment, documents are easily leaked, and divulged files spread rapidly. Therefore, it is important for privacy institutions to actively check the documents on the Internet to find out whether some... In the Internet environment, documents are easily leaked, and divulged files spread rapidly. Therefore, it is important for privacy institutions to actively check the documents on the Internet to find out whether some private files have been leaked. In this paper, we put forward a scheme for active image betrayal checking on the Intemet based on the digital fingerprint, which embeds fingerprints into privacy documents, extracts codes from the Intemet images, and then fmds out the divulged files by matching two groups of codes. Due to so many documents on the Internet, the number of times of code comparison is huge, which leads to a large running time. To overcome the deficiency in practical application, we optimized the process by accurate matching methods and approximate matching method. Then a method was proposed to group objects by locality sensitive hashing (LSH) process before code comparison, in order to eliminate the vast majority of unrelated pairs. Experiments prove that this method could operate with less running time and less memory. 展开更多
关键词 Betrayal checking digital watermarking digital fingerprint Locality sensitive hashing (LSH)
在线阅读 下载PDF
A Secure Watermarking Algorithm Based on Coupled Map Lattice
9
作者 易翔 王蔚然 《Journal of Electronic Science and Technology of China》 2005年第1期27-29,56,共4页
Based on the nonlinear theory, a secure watermarking algorithm using wavelet transform and coupled map lattice is presented. The chaos is sensitive to initial conditions and has a good non-relevant correlation propert... Based on the nonlinear theory, a secure watermarking algorithm using wavelet transform and coupled map lattice is presented. The chaos is sensitive to initial conditions and has a good non-relevant correlation property, but the finite precision effect limits its application in practical digital watermarking system. To overcome the undesirable short period of chaos mapping and improve the security level of watermarking, the hyper-chaotic sequence is adopted in this algorithm. The watermark is mixed with the hyper-chaotic sequence and embedded in the wavelet domain of the host image. Experimental results and analysis are given to demonstrate that the proposed watermarking algorithm is transparent, robust and secure. 展开更多
关键词 digital watermarking coupled map lattice secure watermarking wavelet transform
在线阅读 下载PDF
Content Authentication Based on JPEG-to-JPEG Watermarking
10
作者 Hong-Xia Wang Jie Hou Ke Ding 《Journal of Electronic Science and Technology of China》 2009年第2期125-128,共4页
A content authentication technique based on JPEG-to-JPEG watermarking is proposed in this paper. In this technique, each 8x8 block in a JPEG compressed image is first processed by entropy decoding, and then the quanti... A content authentication technique based on JPEG-to-JPEG watermarking is proposed in this paper. In this technique, each 8x8 block in a JPEG compressed image is first processed by entropy decoding, and then the quantized discrete cosine transform (DCT) is applied to generate DCT coefficients: one DC coefficient and 63 AC coefficients in frequency coefficients. The DCT AC coefficients are used to form zero planes in which the watermark is embedded by a chaotic map. In this way, the watermark information is embedded into JPEG compressed domain, and the output watermarked image is still a JPEG format. The proposed method is especially applicable to content authentication of JPEG image since the quantized coefficients are modified for embedding the watermark and the chaotic system possesses an important property with the high sensitivity on initial values. Experimental results show that the tamper regions are localized accurately when the watermarked JPEG image is maliciously tampered. 展开更多
关键词 Index Terms-Chaotic map compressed domain content authentication digital watermarking.
在线阅读 下载PDF
Image-Moment Based Affine Invariant Watermarking Scheme Utilizing Neural Networks 被引量:1
11
作者 吴健珍 谢剑英 杨煜普 《Journal of Beijing Institute of Technology》 EI CAS 2006年第1期71-75,共5页
A new image watermarking scheme is proposed to resist rotation, scaling and translation (RST) attacks. Six combined low order image moments are utilized to represent image information on rotation, scaling and transl... A new image watermarking scheme is proposed to resist rotation, scaling and translation (RST) attacks. Six combined low order image moments are utilized to represent image information on rotation, scaling and translation. Affine transform parameters are registered by feedforward neural networks. Watermark is adaptively embedded in discrete wavelet transform (DWT) domain while watermark extraction is carried out without original image after attacked watermarked image has been synchronized by making inverse transform through parameters learned by neural networks. Experimental results show that the proposed scheme can effectively register affine transform parameters, embed watermark more robustly and resist geometric attacks as well as JPEG2000 compression. 展开更多
关键词 digital watermark affine transform geometric attacks image moment neural networks
在线阅读 下载PDF
DWT-Based Robust Color Image Watermarking Scheme 被引量:1
12
作者 刘连山 李人厚 高琦 《Journal of Southwest Jiaotong University(English Edition)》 2005年第2期130-134,共5页
A scheme of embedding an encrypted watermark into the green component of a color image is proposed. The embedding process is implemented in the discrete wavelet transformation (DWT) domain, The original binary water... A scheme of embedding an encrypted watermark into the green component of a color image is proposed. The embedding process is implemented in the discrete wavelet transformation (DWT) domain, The original binary watermark image is firstly encrypted through scrambling technique, and then spread with two orthogonal pseudo-random sequences whose mean values are equal to zero, and finally embedded into the DWT low frequency sub-band of green components, The coefficients whose energies are larger than the others are selected to hide watermark, and the hidden watermark strength is determined by the energy ratio between the selected coefficients energies and the mean energy of the subband. The experiment results demonstrate that the proposed watermarking scheme is very robust against the attacks such as additive noise, low-pass filtering, scaling, cropping image, row (or column ) deleting, and }PEG compression. 展开更多
关键词 digital watermark Discrete wavelet transformation Color image Copyright protection
在线阅读 下载PDF
Robust Wavelet-Based Facial Image Watermarking Against Geometric Attacks Using Coordinate System Recovery
13
作者 赵培东 谢剑英 《Journal of Beijing Institute of Technology》 EI CAS 2008年第1期46-50,共5页
A coordinate system of the original image is established using a facial feature point localization technique. After the original image transformed into a new image with the standard coordinate system, a redundant wate... A coordinate system of the original image is established using a facial feature point localization technique. After the original image transformed into a new image with the standard coordinate system, a redundant watermark is adaptively embedded in the discrete wavelet transform(DWT) domain based on the statistical characteristics of the wavelet coefficient block. The coordinate system of watermarked image is reestablished as a calibration system. Regardless of the host image rotated, scaled, or translated(RST), all the geometric attacks are eliminated while the watermarked image is transformed into the standard coordinate system. The proposed watermark detection is a blind detection. Experimental results demonstrate the proposed scheme is robust against common and geometric image processing attacks, particularly its robustness against joint geometric attacks. 展开更多
关键词 digital watermark geometric attacks coordinate system statistical characteristics
在线阅读 下载PDF
A Novel Algorithm for Robust Audio Watermarking in Wavelet Domain
14
作者 傅瑜 王宝宝 《Journal of Electronic Science and Technology of China》 2004年第2期70-72,78,共4页
A novel algorithm for digital audio watermarking in wavelet domain is proposed. First, an original audio signal is decomposed by discrete wavelet transform at three levels. Then, a discrete watermark is embedded into ... A novel algorithm for digital audio watermarking in wavelet domain is proposed. First, an original audio signal is decomposed by discrete wavelet transform at three levels. Then, a discrete watermark is embedded into the coefficients of its intermediate frequencies. Finally, the watermarked audio signal is obtained by wavelet reconstruction. The proposed algorithm makes good use of the multiresolution characteristics of wavelet transform. The original audio signal is not needed when detecting the watermark correlatively. Simulation results show that the algorithm is inaudible and robust to noise, filtering and resampling. 展开更多
关键词 discrete wavelet transform intermediate frequencies digital audio watermark
在线阅读 下载PDF
NEW APPROACH TO COPYRIGHT PROTECTION OF IMAGE AGAINST GEOMETRICAL ATTACKS
15
作者 郝红杰 吴一全 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2007年第4期335-342,共8页
To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in ... To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in which features are drawn out from the image as the watermarking. The main steps of the method are presented. Firstly, some low-order moment invariants of the image are extracted. Secondly, the moment invariants and the key are registered to a fair third party to gain the timestamp. Finally, the timestamp can be used to prove who the real owner is. The processing method is simple, only with a few low-order moment invariants to be computed. Experimental results are obtained and compared with those of the method based on geometric moment invariants. Results show that the scheme can well withstand such geometrical attacks as rotating, scaling, cropping, combined attack, translating, removing lines, filtering, and JPEG lossy compression. 展开更多
关键词 image copyright protection digital watermarking geometrical attack Krawtchouk moment invariant
在线阅读 下载PDF
Game Theory Based False Negative Probability of Embedded Watermark Under Unintentional and Steganalysis Attacks 被引量:1
16
作者 HU Ziquan SHE Kun +1 位作者 WANG Jianghua TANG Jianguo 《China Communications》 SCIE CSCD 2014年第5期114-123,共10页
Steganalysis attack is to statistically estimate the embedded watermark in the watermarked multimedia,and the estimated watermark may be destroyed by the attacker.The existing methods of false negative probability,how... Steganalysis attack is to statistically estimate the embedded watermark in the watermarked multimedia,and the estimated watermark may be destroyed by the attacker.The existing methods of false negative probability,however,do not consider the influence of steganalysis attack.This paper proposed the game theory based false negative probability to estimate the impacts of steganalysis attack,as well as unintentional attack.Specifically,game theory was used to model the collision between the embedment and steganalysis attack,and derive the optimal building embedding/attacking strategy.Such optimal playing strategies devote to calculating the attacker destructed watermark,used for calculation of the game theory based false negative probability.The experimental results show that watermark detection reliability measured using our proposed method,in comparison,can better reflect the real scenario in which the embedded watermark undergoes unintentional attack and the attacker using steganalysis attack.This paper provides a foundation for investigating countermeasures of digital watermarking community against steganalysis attack. 展开更多
关键词 digital watermarking false negative probability game theory watermark capacity steganalysis attack.
在线阅读 下载PDF
Using the Wavelet as the Private Key for Encrypting the Watermark
17
作者 何小帆 《Journal of Chongqing University》 CAS 2002年第1期16-20,共5页
Watermarking is an effective approach to the copyright protection of digital media such as audio, image, and video. By inspiration from cryptography and considering the immensity of the set of all possible wavelets, i... Watermarking is an effective approach to the copyright protection of digital media such as audio, image, and video. By inspiration from cryptography and considering the immensity of the set of all possible wavelets, it is presented that in wavelet domain watermarking, the associated wavelet can be considered as the private key for encrypting the watermark so as to enhance the security of the embedded mark. This idea is partly supported by the fact that from computational complexity viewpoint, it is very time-consuming to search over the immense set of all candidate wavelets for the right one if no a priori knowledge is known about it. To verify our proposal, the standard image 'Lena' is first watermarked in a specific wavelet domain, the watermark recovery experiments are then conducted in the wavelet domain for a set of wavelets with the one used for mark embedded in it,separately. It follows from the experimental results that the mark can be recovered only in the right wavelet domain, which justifies the suggestion. 展开更多
关键词 digital watermark watermarking CRYPTOGRAPHY Private key cryptographic system WAVELET Daubechies wavelet
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部