CN101159059B - Self-adapting attack method for discrete cosine transform domain digital watermarking system - Google Patents

Self-adapting attack method for discrete cosine transform domain digital watermarking system Download PDF

Info

Publication number
CN101159059B
CN101159059B CN2007101780890A CN200710178089A CN101159059B CN 101159059 B CN101159059 B CN 101159059B CN 2007101780890 A CN2007101780890 A CN 2007101780890A CN 200710178089 A CN200710178089 A CN 200710178089A CN 101159059 B CN101159059 B CN 101159059B
Authority
CN
China
Prior art keywords
sub
piece
attack
digital watermarking
discrete cosine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2007101780890A
Other languages
Chinese (zh)
Other versions
CN101159059A (en
Inventor
王道顺
张涛
梁敬弘
罗平
戴一奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tsinghua University
Original Assignee
Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tsinghua University filed Critical Tsinghua University
Priority to CN2007101780890A priority Critical patent/CN101159059B/en
Publication of CN101159059A publication Critical patent/CN101159059A/en
Application granted granted Critical
Publication of CN101159059B publication Critical patent/CN101159059B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a self-adaptable attack method for a discrete cosine transform domain digital watermarking system and belongs to the technical field of digital watermarking. The method includes: acquiring a digital watermarking image; dividing the digital watermarking image into a plurality of sub-blocks each having n multiplied by n pixels, and acquiring human viral system classificationresults on the sub-blocks to obtain superposition strength of watermarking components; performing one attack on each sub-block with a periodical transformation matrix to obtain the attacked sub-blocks matrix; calculating signal-to-noise ratio of the peak value, and performing a second attack or outputting the image. The periodical transformation matrix should satisfy the two following formulas: (1) Phi<m>(Xn)=A<m>Xn(modN), wherein A is a periodical transformation matrix, A=(aij)n multiplied by n, aij is an integer, Phi<m>(Xn) and Xn are original divided sub-blocks matrixes, Xn=(x1 to xn)<T>, Xn'=(x1' to xn')<T>, x1 to xn belong to {0, 1, ellipsis, N-1}, and N is the transformation order; and (2) A<mN>(modN)=En, wherein mN is the period for transformation of Xn'=Phi(Xn) and En is an n-ordered identity matrix. The inventive method can detect robustness of the present watermarking system, and as the same method is adopted for attack and recovery, calculation is simple and effective. The invention can promote development of the digital watermarking system.

Description

A kind of self-adapting attack method to the discrete cosine transform domain digital watermarking system
Technical field
The present invention relates to digital watermarking (Digital Watermarking) technical field, particularly a kind of self-adapting attack method to discrete cosine transform (DCT) territory digital watermarking system.
Background technology
Digital watermarking system can be embedded into watermark in the image, and image is carried out copyright protection; Can also extract watermark information to the image that contains watermark after attacking simultaneously, thereby be used for detection attack method.The direct purpose of attacking watermark is to remove watermark, can stop the correct extraction of watermark, perhaps can't correctly read the watermark information that is embedded in the image.By attacking watermark, every performance index of digital watermarking system can also be tested, thereby the development of digital watermarking system technology can be promoted, design the optional network specific digit watermaking system that can effectively resist some attack.
In the watermark attacking system, how to guarantee the mass conservation of hidden carrier (being the image of embed watermark), this is that people are seeking the technical matters that solves always.Because, if after attacking, bigger change has taken place in the quality of hidden carrier, can influence the use of hidden carrier, and can make people recognize that hidden carrier has been subjected to attack.Whether change the quality of hidden carrier according to attacking digital watermarking system, existing digital watermarking system attack method is divided into two big classes: first kind attack method, by the quality of the hidden carrier of remarkable change, digital watermarking system is attacked.The representative of this class is geometric attack method and image processing method; The second class attack method, carrying out watermark by the quality of the hidden carrier of trickle change attacks, to such an extent as to this change is not by under the prerequisite of human visual system's perception, the representative of this class is that mosaic is attacked, and these class methods are not had very high accuracy by the digital watermarking system of people's visually-perceptible for the quality change of the hidden carrier of test.
But the mosaic attack method still has some shortcomings.For example, the principle that mosaic is attacked is that image is cut into many enough little pieces, if the fritter that is cut into will make detection method malfunctioning less than the piece of the minimum of detection algorithm needs; And through re-assemblying, just can recover original image fully after attacking; Though attacking, mosaic do not change hidden carrier quality, but the carrier after attacking comprises the complete watermark that digital watermarking system can not be discerned, digital watermarking system can be verified the existence of watermark, therefore, mosaic is attacked can not prove the validity that complete hidden carrier is attacked, and promptly attacks to be detected easily or to be found.In addition, although attacking, mosaic can stop attacking the detection of the hidden carrier in back, but if will from the hidden carrier after attacking, recover watermark, also need to carry out inverse transformation, need the participation of a lot of additional informations just can finish, and be not the process of finishing automatically, recover the poor visual effect of back image.
Therefore, the attack method of existing digital watermarking system is detected easily and finds, the picture quality poor visual effect, and attack the back and recover the water mark method complexity, can not finish automatically.
Summary of the invention
For the validity that can prove that hidden carrier is attacked, the invention provides a kind of self-adapting attack method to DCT territory digital watermarking system.Described technical scheme is as follows:
A kind of self-adapting attack method to the discrete cosine transform domain digital watermarking system, described method comprises:
Step a: obtain digital watermarking image;
Step b: described digital watermarking image is divided into the sub-piece of several n * n pixel, calculates entropy, mean square deviation and the illumination of each described sub-piece respectively by following formula,
Entropy:
Figure GSB00000145287600021
Wherein L represents gray level, p iRepresenting gray-scale value is the pixel and the ratio of all putting of i;
Mean square deviation:
Figure GSB00000145287600022
X wherein IjDenotation coordination is (i, the pixel value of sub-piece j);
Illumination:
Figure GSB00000145287600023
According to entropy, mean square deviation and the illumination of each described sub-piece,, obtain human visual system's classification results of each described sub-piece again in conjunction with threshold value, the threshold value of mean square deviation and the threshold value of illumination of the entropy of each described sub-piece; Obtain the intensity subregion result of the watermark component of each described sub-piece superposition according to human visual system's classification results of each described sub-piece, wherein, described n is a natural number;
Step c: according to the intensity subregion result of the watermark component of each described sub-piece superposition, adopt periodically transformation matrix that each described sub-piece is once attacked, obtain sub-block matrix through attacking;
Described periodicity transformation matrix satisfies following two formulas:
(1).
Figure GSB00000145287600024
Wherein, A is the periodicity transformation matrix, A=(a Ij) N * n, a IjBe integer,
Figure GSB00000145287600025
X nBe the sub-block matrix of original piecemeal, X n=(x 1..., x n) T, X n'=(x ' 1..., x ' n) T, x 1..., x n∈ 0,1 ..., N-1}, N are the exponent numbers of conversion;
(2).
Figure GSB00000145287600026
Wherein, m NBe conversion Cycle, E nBe n rank unit matrix;
Steps d: calculate the Y-PSNR of each described sub-block matrix, select to attack once more or output image.
According to the intensity subregion result of the watermark component of each described sub-piece superposition, adopt periodically transformation matrix that each described sub-piece is once attacked among the described step c, specifically comprise:
Steps A: each described sub-piece is carried out discrete cosine transform;
Step B: each is carried out discrete cosine transform coefficient through the sub-piece after the discrete cosine transform attack;
Step C: the sub-piece after each process discrete cosine transform coefficient attack is carried out inverse discrete cosine transform, obtain new sub-piece;
Step D: according to the intensity subregion result of the watermark component of each described sub-piece superposition, selected point is once attacked in each described new sub-piece.
According to described Y-PSNR, select specifically to comprise in attack once more or the output image in the described steps d:
If described Y-PSNR 〉=28 and do not reach predetermined number of times of attack are changeed step c and are once attacked, if described Y-PSNR<28 or reach predetermined number of times of attack halt attacks output image.
The present invention is also by testing new periodicity digital watermarking attack method on digital picture spatial domain and dct transform domain thereof.Experimental result shows that the new attack method effectively stops the detection and the extraction of digital watermarking, has attack effect preferably; Attack method has periodically simultaneously, and digital watermarking image has good visual effect quality after recovering.
Description of drawings
Fig. 1 is the self-adapting attack method overview flow chart of the digital digital watermarking system in the embodiment of the invention;
Fig. 2 is the process flow diagram of once attacking that the digital watermarking in the embodiment of the invention is attacked;
Fig. 3 is testing process figure after the attack of attacking of the digital watermarking in the embodiment of the invention;
Fig. 4 is testing process figure after the recovery of attacking of the digital watermarking in the embodiment of the invention.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, embodiment of the present invention is described further in detail below in conjunction with accompanying drawing.
The embodiment of the invention changes under the not perceived situation in the quality of carrier, utilizes the cyclical theory of matrixing, carries out self-adapting attack, through after repeatedly attacking fully reconstruct attack preceding hidden carrier, thereby prove the validity of attack method automatically.
As shown in Figure 1, the concrete steps of the embodiment of the invention are as follows:
Step 101: obtain digital watermarking image, this image is gray scale or coloured image, and form can be bmp, png, jpg etc.
Step 102: according to the digital watermarking image in the step 101, this digital watermarking image is divided into the experimental process piece, obtain human visual system (HVS) classification results of each height piece of digital watermarking image, obtaining each height piece needs the intensity subregion result of the watermark component of superposition, and concrete steps comprise:
A: digital watermarking image is divided into the sub-piece of some n * n pixel, is designated as X n, n is a natural number; Be divided into 8 * 8 pixels with digital watermarking image in the present embodiment, promptly n=8 is an example;
B: obtain the HVS classification of each height piece, the method for obtaining the HVS classification has a lot, adopts entropy, mean square deviation and the illumination of calculating each 8 * 8 sub-block of pixels in the present embodiment, is determined by following formula respectively:
Entropy:
Figure GSB00000145287600041
Wherein L represents gray level, equals 256 in gray-scale map,
p iRepresenting gray-scale value is the pixel and whole somes ground ratio of i;
Variance:
Figure GSB00000145287600042
N=8 wherein;
Illumination:
Figure GSB00000145287600043
Digital watermarking image entropy h is the assembly average of its each gray level bit number of expression, and the less piece of entropy should be a smooth region, and the bigger zone of entropy may be texture or edge, and the texture corresponding variance is less, and the edge corresponding variance is bigger.Illumination susceptibility has been described human eye can be discovered the noise figure that in a certain gray scale background size, and brightness has different noise susceptibilities to human eye to different background, and is the most responsive when emphasis brightness (gray-scale value 128) usually.Therefore, according to entropy, mean square deviation and the illumination of each height piece,, thereby obtained the HVS sorting result again in conjunction with the threshold value of entropy, mean square deviation and illumination parameter.
According to above-mentioned HVS sorting result, sub-pieces all in the digital watermarking image is divided into four class zones, as table 1, the value of the threshold value of parameter for measuring and determine in the experiment;
Table 1
Figure GSB00000145287600044
The 1st regional illumination is lower, and texture is simple, and HVS is comparatively responsive to the change of pixel value wherein, and the intensity of the watermark component of superposition should be minimum; The 2nd regional illumination is higher, the texture complexity, and be the edge, the intensity of the watermark component of superposition should be less; The 4th regional illumination is higher, texture complexity, and be not the edge, and HVS is the most weak to the change susceptibility of pixel value wherein, and the intensity of the watermark component of superposition should be maximum; All the other are the 3rd zone, and the intensity of the watermark component of superposition should be less.The threshold value of classification is determined by experiment.
C: the intensity subregion result who obtains each regional watermark component of digital picture: it is minimum that the 1st zone needs the intensity of the watermark component of superposition to answer, and it is maximum that the 4th zone needs the intensity of the watermark component of superposition to answer.The 2nd the zone and the 3rd zone need superposition the watermark component intensity between the 1st the zone and the 4th zone between.
Step 103:, adopt the periodicity transformation matrix that each height piece is once attacked according to the four class zones that obtain in the step 102.
In above-mentioned four class zones, can choose any amount point array mode above-mentioned four class zones are attacked respectively.As preferred embodiment, because the intensity of the watermark component of the 4th regional superposition should be maximum, so choosing more point in the sub-piece corresponding to the 4th zone attacks, because the intensity of the watermark component of the 1st regional superposition should be minimum, chooses less point and attack in the sub-piece corresponding to the 1st zone; For the 2nd zone and the 3rd zone, can choose quantity and attack between the point in the 1st zone and the 4th zone.
Once the process flow diagram of Gong Jiing as shown in Figure 2, concrete steps comprise:
1. the sub-piece to 8 * 8 pixels carries out dct transform;
2. attack carrying out the DCT coefficient again through each the height piece in the digital watermarking image behind the dct transform;
3. carry out the DCT inverse transformation then, obtain the sub-piece of 8 * 8 new pixels;
4. once attack according to intensity selected point in each sub-piece of the watermark component of superposition, the quantity of selected point is according to mentioned above principle.
Periodically matrixing is defined as follows:
Make X n=(x 1..., x n) T, X n'=(x ' 1..., x ' n) T, x 1..., x n∈ 0,1 ..., N-1},
Note conversion X ' n=AX n(modN) (A=(a wherein Ij) N * n, a IjBe integer) be
Figure GSB00000145287600051
And note
Figure GSB00000145287600052
Figure GSB00000145287600053
(wherein m ∈ 2 ..., N-1}); The matrix norm computing is meant carries out modular arithmetic to each unit in the matrix, promptly to any matrix A=(a Ij) N * n, A (modN)=(a is arranged Ij(modN)) N * n
If there is m N∈ 2 ..., N-1} makes
Figure GSB00000145287600054
And to arbitrarily
Figure GSB00000145287600055
M is arranged N≤ m then claims conversion
Figure GSB00000145287600056
Have periodically, and the cycle is m N
Can obtain conversion from above-mentioned
Figure GSB00000145287600057
Have following character:
Character 1:
Figure GSB00000145287600058
Character 2: if conversion
Figure GSB00000145287600059
Cycle be m N, then
Figure GSB000001452876000510
And to any A m(modN)=E nM is arranged N≤ m, E here nBe n rank unit matrix;
Conversion
Figure GSB000001452876000511
Having periodic sufficient and necessary condition is | A| and N are coprime, here | A| is the determinant of matrix A;
Can obtain the transformation period of A with following method: matrix A is carried out the multiplying of some apotype N, know to obtain unit matrix, have several A to multiply each other, how many attack cycles is exactly.At the situation of 2 peacekeeping N=2, provide the concrete computation process of transformation period below.
Get matrix:
A 2 = 2 3 3 4 mod ( A 2 * A 2 , 2 ) = mod ( 13 18 18 13 , 2 ) = 1 0 0 1
According to character 2, the cycle is 2.
After once attacking, obtain new sub-block matrix: X ' n=AX n(modN), X ' wherein nBe 8 * 8 sub-block matrix after once attacking, A is the periodicity transformation matrix, X nBe 8 * 8 sub-block matrix of original piecemeal, N is the exponent number of conversion;
Step 104: calculate the Y-PSNR (PSNR) of each height piece, select to continue to attack or output image.
Can select to continue to attack or output image according to PSNR value and number of times of attack, as preferred embodiment, if PSNR 〉=28 and do not reach predetermined number of times of attack, forwarding step 103 to further attacks, otherwise, if PSNR<28 or reach predetermined number of times of attack then halt attacks, the image after output is attacked.
The separation of PSNR=28 for whether continuing to attack is the value of measuring in experiment, also can be provided with PSNR for other values as separation.
Predetermined number of times of attack can realize by the following method: calculate the period m of attacking used matrix N, number of times of attack is 1 to m NBetween a random number.
After attacking digital watermarking image in the embodiment of the invention, by digital watermarking system detect and recover after reached good effect.
Be illustrated in figure 3 as testing process figure after the attack that digital watermarking attacks: we attack the image that existing watermaking system generates, and obtain new image, and this image uses original watermaking system to detect, and detect the existence less than watermark.
Be illustrated in figure 4 as testing process figure after the recovery that digital watermarking attacks: we obtain image after carrying out the several times conversion to attack, can revert to the image before attacking fully, thereby this image can be detected the existence of watermark by original watermaking system.
The method that present embodiment provides has restorability when guaranteeing good attack effect.
Present embodiment employing n dimension (n=2,3 ..., 8), the periodicity matrixing of mould N (value of N can be adjusted according to the pixel value of input picture), the sub-piece of preceding n * n that the periodicity matrixing is got A in the step 103 according to dimension n obtains its period m NCan obtain by table 2.As number of times of attack m<m NThe time, can't detect watermark information; When m is m NIntegral multiple the time, can detect and extract and attack before identical watermark information, and the Y-PSNR of image be the infinity, this shows that image reverts to original state fully.The variation of PSNR was as shown in table 2 when 2 dimensions were attacked different number of times, when 3 dimensions are attacked different number of times the variation of PSNR as shown in table 3, it is as shown in table 4 that 2 dimensions are attacked Y-PSNRs (PSNR), the degree of correlation (CF) and similarity.
Table 2
Number of times of attack 1 2 3 4 5
PSNR(dB) 43.37 43.17 43.22 43.02 43.34
Number of times of attack 8 10 15 20
PSNR(dB) 43.28 42.92 43.23
Table 3
Number of times of attack 1 2 3 4 5
PSNR(dB) 42.36 42.19 42.27 42.11 42.29
Number of times of attack 30 40 50 70
PSNR(dB) 42.45 42.18 42.25
Table 4
PSNR CF Similarity
The relative Lena original graph of Cox watermark figure 31.9949 0.9979 29.8207
1 the relative Cox watermark of cycle attack graph figure 43.37 6.3804e-005 0.2384
Recover the relative Cox watermark figure of figure INF 1 1
As can be seen, all more than 40, effect can be satisfactory with respect to the Y-PSNR of original graph for attack graph from table 2 and 3; Simultaneously, when number of times of attack equaled to attack the cycle, Y-PSNR was infinitely great, shows that image recovers fully.As can be seen from Table 4, after the attack once, the degree of correlation that we obtain and similarity are very low, can think that image and original image are uncorrelated, dissmilarity; And the Y-PSNR of recovery figure, the degree of correlation shows all that with similar tripe image recovers fully.
The present invention has the matrixing of periodic feature by employing, and the self-adaptive digital watermark system that utilizes human visual system's characteristic is attacked, and makes digital watermarking system can't correctly extract watermark.Image graph picture before periodic transformation can nondestructively be resumed the attack through limited number of time can correctly extract watermark, thereby the proof of success attack is provided to the copyright owner.
With regard to success attack whether, can whether quality change, directly detect whether watermark, attack pattern can prove automatically, hidden carrier aspects the such as whether algorithm of the hidden carrier by the proof of successful attack, before accurately reconstruct is attacked and attack and reconstruct consistent, attack method and existing typical attack method that the present invention proposes compare, and see Table 5.
Table 5
Success attack Whether quality changes Can directly detect watermark Whether attack pattern can prove automatically Whether hidden carrier is by the proof of successful attack Hidden carrier before accurately reconstruct is attacked Attack whether consistent with the algorithm of reconstruct
Geometric attack Be Change big Not Not Be Uncertain Not
Mosaic attacks Be Not Be Be Be Be Not
Success attack Whether quality changes Can directly detect watermark Whether attack pattern can prove automatically Whether hidden carrier is by the proof of successful attack Hidden carrier before accurately reconstruct is attacked Attack whether consistent with the algorithm of reconstruct
Masterplate is attacked and self-adapting attack Be Change little Not Not Be Uncertain Not
Method of the present invention Be Change little Not Be Be Be Be
The above only is preferred embodiment of the present invention, and is in order to restriction the present invention, within the spirit and principles in the present invention not all, any modification of being done, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (3)

1. the self-adapting attack method to the discrete cosine transform domain digital watermarking system is characterized in that, described method comprises:
Step a: obtain digital watermarking image;
Step b: described digital watermarking image is divided into the sub-piece of several n * n pixel, calculates entropy, mean square deviation and the illumination of each described sub-piece respectively by following formula,
Entropy: Wherein L represents gray level, p iRepresenting gray-scale value is the pixel and the ratio of all putting of i;
Mean square deviation:
Figure FSB00000145287500012
X wherein IjDenotation coordination is (i, the pixel value of sub-piece j);
Illumination: x &OverBar; = &Sigma; i , j = 1 . . n X ij / n 2 ;
According to entropy, mean square deviation and the illumination of each described sub-piece,, obtain human visual system's classification results of each described sub-piece again in conjunction with threshold value, the threshold value of mean square deviation and the threshold value of illumination of the entropy of each described sub-piece; Obtain the intensity subregion result of the watermark component of each described sub-piece superposition according to human visual system's classification results of each described sub-piece, wherein, described n is a natural number;
Step c: according to the intensity subregion result of the watermark component of each described sub-piece superposition, adopt periodically transformation matrix that each described sub-piece is once attacked, obtain sub-block matrix through attacking;
Described periodicity transformation matrix satisfies following two formulas:
(1).
Figure FSB00000145287500014
Wherein, A is the periodicity transformation matrix, A=(a Ij) N * n, a IjBe integer, X nBe the sub-block matrix of original piecemeal, X n=(x 1..., x n) T, X n'=(x ' 1..., x ' n) T, x 1..., x n∈ 0,1 ..., N-1}, N are the exponent numbers of conversion;
(2).
Figure FSB00000145287500016
Wherein, m NBe conversion
Figure FSB00000145287500017
Cycle, E nBe n rank unit matrix;
Steps d: calculate the Y-PSNR of each described sub-block matrix, select to attack once more or output image.
2. the self-adapting attack method to the discrete cosine transform domain digital watermarking system as claimed in claim 1, it is characterized in that, among the described step c according to the intensity subregion result of the watermark component of each described sub-piece superposition, adopt the periodicity transformation matrix that each described sub-piece is once attacked, specifically comprise:
Steps A: each described sub-piece is carried out discrete cosine transform;
Step B: each is carried out discrete cosine transform coefficient through the sub-piece after the discrete cosine transform attack;
Step C: the sub-piece after each process discrete cosine transform coefficient attack is carried out inverse discrete cosine transform, obtain new sub-piece;
Step D: according to the intensity subregion result of the watermark component of each described sub-piece superposition, selected point is once attacked in each described new sub-piece.
3. the self-adapting attack method to the discrete cosine transform domain digital watermarking system as claimed in claim 1 is characterized in that, according to described Y-PSNR, selects specifically to comprise in attack once more or the output image in the described steps d:
If described Y-PSNR 〉=28 and do not reach predetermined number of times of attack are changeed step c and are once attacked, if described Y-PSNR<28 or reach predetermined number of times of attack halt attacks output image.
CN2007101780890A 2007-11-26 2007-11-26 Self-adapting attack method for discrete cosine transform domain digital watermarking system Expired - Fee Related CN101159059B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2007101780890A CN101159059B (en) 2007-11-26 2007-11-26 Self-adapting attack method for discrete cosine transform domain digital watermarking system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2007101780890A CN101159059B (en) 2007-11-26 2007-11-26 Self-adapting attack method for discrete cosine transform domain digital watermarking system

Publications (2)

Publication Number Publication Date
CN101159059A CN101159059A (en) 2008-04-09
CN101159059B true CN101159059B (en) 2010-09-29

Family

ID=39307144

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007101780890A Expired - Fee Related CN101159059B (en) 2007-11-26 2007-11-26 Self-adapting attack method for discrete cosine transform domain digital watermarking system

Country Status (1)

Country Link
CN (1) CN101159059B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103793874B (en) * 2014-02-14 2017-02-08 中北大学 Novel digital watermarking method capable of maintaining fidelity and robustness

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1656501A (en) * 2000-10-18 2005-08-17 松下电器产业株式会社 Human visual model for data hiding
CN1750041A (en) * 2005-10-20 2006-03-22 李京兵 Digital watermark method capable of resisting geometric attack and conventional attack
CN101064847A (en) * 2007-05-15 2007-10-31 浙江大学 Visible sensation characteristic based video watermark process

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1656501A (en) * 2000-10-18 2005-08-17 松下电器产业株式会社 Human visual model for data hiding
CN1750041A (en) * 2005-10-20 2006-03-22 李京兵 Digital watermark method capable of resisting geometric attack and conventional attack
CN101064847A (en) * 2007-05-15 2007-10-31 浙江大学 Visible sensation characteristic based video watermark process

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
刘桂明,刘晓云.基于人类视觉掩蔽特性的自适应数字水印.福建电脑4 2006.2006,4(2006),6-7.
刘桂明,刘晓云.基于人类视觉掩蔽特性的自适应数字水印.福建电脑4 2006.2006,4(2006),6-7. *
曹永刚.新的数字水印攻击分类和算法研究.中国优秀硕士学位论文全文数据库(电子期刊)6 2007.2007,6(2007),38-40,51-62.
曹永刚.新的数字水印攻击分类和算法研究.中国优秀硕士学位论文全文数据库(电子期刊)6 2007.2007,6(2007),38-40,51-62. *
柏均.基于人眼视觉特性的自适应图像水印算法研究.中国优秀硕士学位论文全文数据库(电子期刊)6 2005.2005,6(2005),18-20,40-41.
柏均.基于人眼视觉特性的自适应图像水印算法研究.中国优秀硕士学位论文全文数据库(电子期刊)6 2005.2005,6(2005),18-20,40-41. *

Also Published As

Publication number Publication date
CN101159059A (en) 2008-04-09

Similar Documents

Publication Publication Date Title
CN102750660B (en) A kind of method and apparatus embedding and extract digital watermarking
CN101533506B (en) Robust image double-watermarking method
CN102917227B (en) Compressive sensing-based adaptive video information hiding method
CN104053074B (en) Video watermarking method based on depth image and Otsu segmentation
Lin et al. Application of grey-relational analysis to find the most suitable watermarking scheme
CN107067363A (en) A kind of non-blind robust Spatial Domain Image Watermark method constant based on pixel order relation
CN105120294A (en) JPEG format image source identification method
CN103366332B (en) A kind of image watermark method based on depth information
CN100547609C (en) A kind of bittorrent Robust digital figure watermark embedding and detection method and device
Agarwal et al. A novel image watermarking technique using fuzzy-BP network
CN1251140C (en) Encrypting orthogonal transformation method for digital watermark
CN101159059B (en) Self-adapting attack method for discrete cosine transform domain digital watermarking system
Bhattacharyya et al. DCT difference modulation (DCTDM) image steganography
CN102013100A (en) Image quality discrimination method based on remote sensing image phase correlation
CN101504759A (en) Digital image watermark extraction method based on DCT algorithm
CN101222620A (en) Blind video watermark method based on wavelet domain and independent main composition analysis
CN102510492A (en) Method for embedding multiple watermarks in video based on three-dimensional DWT (Discrete Wavelet Transform) and DFT (Discrete Fourier Transform)
Meng et al. A novel blind image watermarking scheme based on support vector machine in DCT domain
CN104021516A (en) Image watermarking method based on DCT direct-current coefficients of Weibull model
Sha et al. A novel optimized watermark embedding scheme for digital images
CN104143173A (en) Image self-adaption blind watermarking algorithm based on DWT-DCT
CN103984932A (en) Anti-light face recognition method based on transform domain robust watermark under big data
Surekha et al. Performance comparison of optimization techniques on robust digital-image watermarking, against attacks
Nazari et al. Cover selection steganography via run length matrix and human visual system
Bultheel Digital watermarking of images in the fractional Fourier domain

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100929

Termination date: 20131126