• Article
  • | |
  • Metrics
  • |
  • Reference [18]
  • |
  • Related [20]
  • |
  • Cited by [28]
  • | |
  • Comments
    Abstract:

    In this paper, a robust image watermarking algorithm is proposed, which adopts the Hilbert scanning, and uses JND (just noticeable distortion) matrix based on HVS (human visual system) characteristics to mask the watermarking signal when embeds the watermark. And the strength of the watermark can be self adapting. Auto Rectification can also be added, which greatly improves the accuracy of watermark detection. Based on the description of the algorithm, experimental results and attack analysis are given. The experimental results show that this algorthm is transparent and robust.The detection results are faithful and the computational cost is low.

    Reference
    [1] Anderson, R.J. Information Hiding: 1st International Worksh op. Vol.1174 of Lecture Notes in Computer Science, Berlin: Springer-Verlag, 199 6.
    [2] Bender, W., Gruhl, D., Morimoto, N. Techniques for data hiding. IBM System Journal, 1996,35(3&4):313~316.
    [3] Hartung, F., Girod, B. Watermarking of MPEG-2 encoded video withou t decoding and re-encoding. In: Freeman, M., Jardetzky, P., Vin, H.M., eds. Pro ceedings of the SPIE Conference on Multimedia Computing and Networking 1997, Vol 3020. Bellingham: SPIE Press, 1997. 264~273.
    [4] Podilchuk, C.I., Zeng, Wen-jun. Digital image watermarking using v isual models. In: Rogowitz, B.E., Pappas, T.N., eds. Proceedings of the SPIE Con ference on Human Vision and Electronic Imaging ⅠⅠ, Vol 3016. Bellingham: S PIE Press, 1997. 100~111.
    [5] Cox, I.J., Kilian, J., Leighton, T., et al. Secure spread spect rum watermarking for multimedia. IEEE Transactions on Image Processing, 1997,6(1 2):1673~1687.
    [6] Fridrich, J., Baldoza, A.C., Simard, R.J. Robust digital watermarki ng based on key-dependent basis functions. In: Aucsmith, D., ed. Information Hi ding: 2nd International Workshop. Berlin: Springer-Verlag, 1998. 143~157.
    [7] Kankanhalli, M.S., Rajmohan, Ramakrishnan, K.R. Content based water marking of images. In: Effelsberg, W., ed. ACM Multimedia 98-Electronic Pro ceedings, the 6th ACM International Multimedia Conference. New York: ACM Press, 1998.
    [8] Memon, N., Wong, P.W. Protecting digital media content. Communicati ons of the ACM, 1998,41(7):35~43.
    [9] Zhao, Jian, Koch, E., Luo, Cheng-hui. In business today and tomorr ow. Communications of the ACM, 1998,41(7):67~72.
    [10] Yin, Kang-kang, Xiang, Hui, Shi, Jiao-ying. Multimedia watermarking systems and their attack analysis. Computer Science, 1999,26(10):44~48 (in Chinese). 尹康康,向辉,石教英.多媒体数据数字水印系统及其攻击分析.计算机科学,1 999,26(10):44~48.
    [11] Xiang Hui. Multimedia data compression based on information recordering and multimedia data security [Ph.D. Thesis]. Hangzhou: Zhejiang University, 1999 (in Chinese).
    [11]向辉.基于信息重组思想的多媒体数据压缩与多媒体数据安全技术研究[博士学位论文].杭州:浙江大学,1999.
    [12] Griffiths, J.G. Table-Driven algorithms for generating space filling cu rves. Computer Aided Design, 1985,17(1):37~41.
    [13] Takeshi, Agui, Takanori, Nagae, Masayuki, Nakajima. Generalized Peano sc ans for arbitrarily-sized arrays. IEICE Transactions, 1991,E74(5):1337~1342.
    [14] Lu, Kai-cheng. Computer Cryptography. Beijing: Qinghua University Press, 1998. 185~196 (in Chinese).卢开澄.计算机密码学.北京:清华大学出版社,1998.
    [15] Press, W.H., Teulkolsky, S.A., Vetterling, W.T., et al. Flannery. N umerical Recipes in C. 2nd ed, London: Cambridge University Press, 1996. 636~63 9.
    [16] Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G. Attacks on copyright mark ing systems. In: Aucsmith, D., ed. Information Hiding: 2nd International Worksho p. Berlin: Springer-Verlag, 1998. 218~238.
    [17] Yang Pin, Zhong Yuzhuo, Cai Lianhong, translated. MPEG coding standards of moving pictures (ISO/IEC 11172). Beijing: Machine Industry Press, 1995. 125~129 (in Chinese).杨品,钟玉琢,蔡莲红,译.MPEG运动图像压缩编码标准(ISO/IEC 11172).北京:机械工业出版社,1995.125~129.
    Comments
    Comments
    分享到微博
    Submit
Get Citation

尹康康,石教英,潘志庚.一种鲁棒性好的图像水印算法.软件学报,2001,12(5):668-676

Copy
Share
Article Metrics
  • Abstract:4206
  • PDF: 4793
  • HTML: 0
  • Cited by: 0
History
  • Received:September 27,1999
  • Revised:March 07,2000
You are the first2032798Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063