|Table of Contents|

New Watermarking Scheme Based on the Feature Points(PDF)

南京师范大学学报(工程技术版)[ISSN:1006-6977/CN:61-1281/TN]

Issue:
2005年01期
Page:
50-52
Research Field:
Publishing date:

Info

Title:
New Watermarking Scheme Based on the Feature Points
Author(s):
ZHENG Aibin ZHANG Ming
School of Mathematics and Computer Science, Nanjing Normal University, Jiangsu Nanjing 210097, China
Keywords:
feature po int chaos IBM attack double wa term arks
PACS:
TP309
DOI:
-
Abstract:
Th is paper presents a new w aterma rking schem e o f d ig ita l images based on the fea ture po ints. In th is schem e, the or ig ina lw aterm ark can be converted into two w aterm arks interrelated w ith dig ital im ag e and then be embedded into the circum jacent area of fea ture po ints through chaos sequence. W hen checking, two w aterm a rks are checked at the sam e tim e, and the or ig ina l wa term ark can be resum ed. Exper imenta l results and theo re tic ana lyses show that the schem e can stand aga inst severa l attacks, such as im ag e com pression, g eom etr ic attack, IBM a ttack, etc.

References:

[ 1] 王丽娜, 于戈, 王国仁. 基于混沌特性改进的小波数字水印算法[ J]. 电子学报, 2001, 29 ( 10 ): 1424- 1426.
[ 2] 管业鹏, 顾伟康. 二维图像特征点自主提取算法研究 [ J] . 传感技术学报, 2004, ( 3) : 70-73.
[ 3] 黄先胜, 石青云. 局部化数字水印算法[ J]. 中国图形图像学报, 2001, 6A( 7): 642-647.
[ 4] 孙鑫, 易开洋, 费敏锐. 一种基于图像特征区域的数字水印系统[ J]. 计算机工程与应用, 2002, ( 23) : 88- 89.
[ 5] Bas P, Chassery J M, M acq B. Robust w aterm arking based on the w arp ing o f pre-defined triangu lar patte rns [ J]. IEEE Transactions on Im age Processing, 2004, ( 1): 90-103.
[ 6] 喻志强, 叶豪盛, 赵荣椿, 等. 稳健的三角形网格数字水印技术[ J]. 计算机应用, 2002, 22( 9): 94-96.
[ 7] Adas A. T ra fic m ode ls in broadband netw ork[ J]. IEEE CommunicationsM agazine, 1997, ( 7): 82-89.
[ 8] M asoud A lghon iem y, Ahmed H Tew fik. Geome tric inv ar-i ance in im age w ate rm ark ing [ J]. IEEE T ransactions on Im age Pro cessing, 2004, ( 2): 88-91.
[ 9] 杨文学, 赵耀. 抵抗仿射变换攻击的多比特图像水印 [ J]. 信号处理, 2004, 20( 6) : 245-250.

Memo

Memo:
-
Last Update: 2013-04-29