一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復。謝謝您的支持!

姓名
郵箱
手機號碼
標題
留言內容
驗證碼

圖像水印抗幾何攻擊研究綜述

劉九芬 黃達人 黃繼武

劉九芬, 黃達人, 黃繼武. 圖像水印抗幾何攻擊研究綜述[J]. 電子與信息學報, 2004, 26(9): 1495-1503.
引用本文: 劉九芬, 黃達人, 黃繼武. 圖像水印抗幾何攻擊研究綜述[J]. 電子與信息學報, 2004, 26(9): 1495-1503.
Liu Jiu-fen, Huang Da-ren, Huang Ji-wu. Survey on Watermarking Against Geometric Attack[J]. Journal of Electronics & Information Technology, 2004, 26(9): 1495-1503.
Citation: Liu Jiu-fen, Huang Da-ren, Huang Ji-wu. Survey on Watermarking Against Geometric Attack[J]. Journal of Electronics & Information Technology, 2004, 26(9): 1495-1503.

圖像水印抗幾何攻擊研究綜述

Survey on Watermarking Against Geometric Attack

  • 摘要: 穩(wěn)健性是數(shù)字水印技術的一個核心問題。數(shù)字水印技術發(fā)展到今天,已有大量不同的算法,它們廣泛提出了穩(wěn)健性的聲明。然而,絕大多數(shù)算法所強調的穩(wěn)健性只不過是水印對抗一般信號處理的穩(wěn)健性,它們不能抵抗甚至是微小的幾何攻擊。本文分析總結了當前圖像水印抗幾何攻擊的各種方法,提出了下一步可能的發(fā)展方向,對改進和設計水印算法具有一定的指導作用。
  • Crave S, Yeo B L, Yeung M. Technical trials and legal tribulations. Communications of the ACM,1998, 41(7): 45-54. [2]Petitcolas F A P, Anderson R J, Kuhn M G. Attacks on copyright marking system. In Proc. 2nd Int. Workshop Information Hiding, Portland, OR, Apr. 14-17, 1998: 218-238. [3]Unzign. http:∥www.altern.org/watermark. [4]Cox I J, Linnartz J. Public watermarks and resistance tampering. In Proc of ICIP97, Washington,DC, 1997: 26-29. [5]Cox I J, Linnartz J. Some general methods for tampering with watermarks. IEEE J. on Selected Areas in Communications, 1998, 16(4): 587-593. [6]Brown L G. A survey of image registration techniques. ACM Computing Surveys, 1992, 24(4):325-376. [7]Thvenaz P, Ruttimann U E, Unser M. A pyramid approach to subpixel registration based on intensity. IEEE Trans. on Image Processing, 1998, 7(1): 27-41. [8]劉九芬,王振武,黃達人.抗幾何攻擊的小波變換域圖像水印算法.浙江大學學報(工學版),2003,37(4):386-392. [9]Davoine F. Watermarking et rsistance aux deformation gomtriques. In Cinquiemes journes dtudes et dchanges sur la compression et la representation des signaux audiovisuals (CORESA99), Centre de Recherch et Dveloppement de France Tlcom (Cnet), EURECOM,Conseil Gnral des Alpes-Maritimes and Tlcom Valley, Sophia-Antipolis, France, Jun. 1999:14-15.[10]Johnson N F, Duric Z, Jajodia S. Recovery of watermarks form distorted images. In Proc. 3rd Int. Information Hiding Workshop, Dresden, Germany, 1999: 361-375. [11]Braudaway G W, Minter F. Automatic recovery of invisible image watermarks from geometrically distorted images. In Proc. SPIE Security and Watermarking of Multimedia Contents I, CA, USA,2000, Vol.3971: 74-81. [12]Kang X G, Huang J W, Shi Y Q. An image watermarking algorithm robust to geometric distortion.Lecture Notes in Computers Science: Proc. of IWDW 2002, Spinger-Verlag, 2002, Vol. 2613:212-213. [13]劉瑞禎,譚鐵牛.基于奇異值分解的數(shù)字圖像水印方法.電子學報,2001,29(2):168-171. [14]ORuanaidh J J K, Pun T. Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Processing, 1998, 66(3): 303-317. [15]Wu M, Miller L M, Bloom J A, et al.. A Rotation, scale, and translation resilient public watermark. In Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing 1999(ICASSP99),Phoenix, AZ, 1999. http:∥www.assuredigit.com/tech_doc/more/Cox_Rotation_ scaling_translation_resilient_public_watermark. PDF.[16]Lin C Y, Wu M, Bloom J A, et al.. Rotation, scale, and translation resilient watermarking for images. IEEE Trans. on Image Processing, 2001, 10(5): 765-782. [17]Lin C Y. Public watermarking surviving general scaling and cropping: An application for printand-scan process. Multimedia and Security Workshop at ACM Multimedia 99, Orlando, FL,USA, Oct. 1999. http:∥citeseer.ist.psu.edu/lin99public.html [18]Solachidis V, Pitas I. Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP99), Phoenix, 1999, Vol. 6:3469-3472. [19]Licks V, Jordan R. On digital image watermarking robust to geometric transformations. IEEE Int. Conference on Image Processing, Vancounver, Canada, 2000: 690-693. [20]Lin C Y, Chang S F. Distortion modeling and invariant extraction for digital image print-and-scan process. International Symposium on Multimedia Information Processing (ISMIP 99), Taipei,Taiwan, Dec. 1999. http:∥www.ctr.columbia.edu/papers_advent/99/cylin-modelscan.pdf [21]Hayes M H. The reconstruction of a multidimensional sequence from the phase or magnitude of the FFT. IEEE Trans. on Acoustics, Speech and Signal Processing, 1992, (4): 140-154. [22]Fleet D J, Heger D J. Embedding invisible information in color images. In Proc. IEEE Int. Conf.on Image Processing (ICIP-97), Santa Barbara, October 1997, 1: 532-535. [23]Gruhl D, Bender W. Affine invariance. http:∥nif. www.media.mit.edu/DataHiding/affine/affine.html, 1995. [24]Kutter M. Watermarking resistance to translation, rotation, and scaling. In Proc. SPIE Multimedia Systems Applications, 1998, Vol. 3528: 423-431. [25]Honsinger C, Rabbani M. Data embedding using phase dispersion. In PICS 2000: Image Quality,Image Capture, Systems Conf., 2000, 3: 264-268. [26]Honsinger C W, Daly S J. Method for detecting rotation and magnification in image. U.S.Patent, 5835639, 1998.[27]Voloshynovskiy S, Deguillaume F, Pun T. Content adaptive watermarking based on a stochastic multiresolution image modeling. In EUSIPCO 2000, Tampere, Finland, September, 2000.http:∥citeseer.ist.psu.edu/380994.html [28]Pereira S, ORuanaidh J J K, Pun T. Secure robust digital watermarking using the lapped orthogonal transform. In IST/SPIE Electronic Image99, Session: Security and Watermarking of Multimedia Contents, San Jose, CA, USA, January 1999. http:∥citeseer.ist.psu.edu/pereira99-secure.html [29]Kang X G, Huang J W, Shi Y Q, et al.. A DWT-DFT composite watermarking scheme robust to both affine and JPEG compression. IEEE Trans. on Circuits and Systems for Video Technology,2003, 13(8): 776-786. [30]ORuanaidh J J K, Pereira S. A secure robust digital image watermark. In Electronic Imaging: Processing, Printing and Publishing in Colour, SPIE Proceedings, Ziirich, Switzerland,May 1998. (SPIE/IST/Europto Symposium on Advanced Imaging and Network Technologies).http:∥citeseer.ist.psu.edu/181609.html [31]Pereira S, ORuanaidh J J K, Deguillaume F, et al.. Template based recovery of Fourier-based watermarks using log-polar and log-log maps. IEEE Int. Conf on Multimedia Computing and Systems (ICMCS99), Florence, Italy, June 1999. http:∥citeseer.ist.psu.edu/pereira99template.html [32]Pereira S, Pun T. Fast robust template matching for affine resistant image watermarks. In Proc.3rd Int. Information Hiding Workshop, Dresden, Germany, 1999: 207-218. [33]Csurka G, Deguillaume F, ORuanaidh J J K, et al.. A Bayesian approach to affine transformation resistant image and video watermarking. In Proc. 3rd Int. Information Hiding Workshop,Dresden, Germany, 1999: 315-330. [34]Deguillaume F, Csurka G, ORuanaidh J J K, et al.. Robust 3D DFT video watermarking. In IST/SPIE Electronic Imaging99, Session: Security and Watermarking of Multimedia Contents,San Jose, CA, USA, January 1999, Vol.3657: 113-124. [35]Digimarc Corporation, Photographic Products and Methods Employing Embedded Information,US patent 5822436, 1999.[36]Piva A. Improving DFT watermarking robustness through optimum detection and synchronization, Multimedia and Security Workshop at ACM Multimedia99, GMD, Department of Electronic Engineering, University of Florence, Italy: Report 85.[37]Voloshynovskiy S, Pereira S, Iquise V, et al.. Attack modeling: Towards a second generation watermarking benchmark. Signal processing, 2001, 81(6): 1177-1214. [38]Herrigel A, Voloshynovskiy S, Rytsar Y. The watermark template attack. In Security and Watermarking of Multimedia Contents Ⅲ, Wong P W, Delp E J, Eds. SPIE Photonics West, Electronic Imaging 2001, San Jose, CA, USA, Jan. 2001, Vol.4314: 394-405. [39]Kutter M, Bhattacharjee S K, Ebrhimi T. Towards second generation watermarking schemes.ICIP99, Kobe, Japan, October 25-28, 1999, Vol. 3: 320-323. [40]Celik M U, Saber E, Sharma G, et al.. Analysis of feature-based geometry invariant watermarking.In Proceedings of SPIE: Security and Watermarking of Multimedia Contents Ⅲ, Jan. 2001, Vol.4314: 261-268. [41]Bas P, Chassery J M, Macq B. Robust watermarking based on the warping of pre-defined triangular patterns. In Proceedings of SPIE: Security and Watermarking of Multimedia Contents Ⅱ,San Jose, CA, USA, Jan. 2000, Vol. 3971: 99-109. [42]Kaewkamnerd N, Rao K R. Wavelet based watermarking detection using multiresolution image registration. TENCON 2000, Kaula Lumpur, Malaysia, Sept. 2000. http:∥www-ee.uta.edu/dip/paper/tencon_water.pdf.
  • 加載中
計量
  • 文章訪問數(shù):  4437
  • HTML全文瀏覽量:  186
  • PDF下載量:  1293
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2003-10-09
  • 修回日期:  2004-04-05
  • 刊出日期:  2004-09-19

目錄

    /

    返回文章
    返回