网络与信息安全学报 ›› 2016, Vol. 2 ›› Issue (5): 50-55.doi: 10.11959/j.issn.2096-109x.2016.00052
崔晨,王莘,李琼
修回日期:
2016-04-27
出版日期:
2016-05-15
发布日期:
2020-03-26
作者简介:
崔晨(1983-),男,黑龙江牡丹江人,哈尔滨工业大学博士生,主要研究方向为信息安全、信息隐藏、感知散列。|王莘(1980-),男,黑龙江哈尔滨人,博士,哈尔滨工业大学讲师,主要研究方向为信息对抗、量子计算、多媒体安全。|李琼(1976-),女,湖南桂阳人,博士,哈尔滨工业大学副教授、博士生导师,主要研究方向为量子保密通信后处理、生物信息识别及安全、多媒体安全。
基金资助:
Chen CUI,Shen WANG,Qiong LI
Revised:
2016-04-27
Online:
2016-05-15
Published:
2020-03-26
Supported by:
摘要:
摘 要:由于基于深度图绘制的虚拟视点技术具有的独特优势,越来越多的3D产品版权保护问题受到极大的夫注。不同于传统 2D 图像的水印技术,在基于深度图绘制的 3D 图像里,不仅需要通过嵌入水印来保护中间图像,而且需要保护左右眼虚拟图像。通过对中间图像进行3层小波变换后,利用奇偶量化方式来修改每个子分块的小波系数,实现了中间图像的水印信息嵌入。嵌入的水印可以从中间图像以及左右眼虚拟图像中提取出来。实验表明,所提水印算法对常见的信号失真攻击具有良好的顽健性。
中图分类号:
崔晨,王莘,李琼. 基于深度图绘制3D图像的水印技术[J]. 网络与信息安全学报, 2016, 2(5): 50-55.
Chen CUI,Shen WANG,Qiong LI. Novel watermarking based on DIBR 3D image[J]. Chinese Journal of Network and Information Security, 2016, 2(5): 50-55.
[1] | CHAN S C , SHUM H Y , NG K T . Image-based rendering and synthesis[J]. IEEE Signal Processing Magazine, 2007,24(6): 22-33. |
[2] | FUJII T , TANIMOTO M . Free-viewpoint TV system based on ray-space representation[J]. Proceedings of SPIE, 2002,4864: 175-189. |
[3] | FEHN C , PASTOOR S . Interactive 3-DTV-concepts and key technologies[J]. Proceedings of the IEEE, 2006,94(3): 524-538. |
[4] | ALGHONIEMY M , TEWFIK A . Geometric invariance in image watermarking[J]. IEEE Transactions on Image Processing, 2010,13(2): 145-153. |
[5] | BAS P , CHASSERY J M , MACQ B . Geometrically invariant watermarking using feature points[J]. IEEE Transactions on Image Processing, 2002,11(9): 1014-1028. |
[6] | LOUKHAOUKHA K , CHOUINARD J Y , TSAI M H . Optimal image watermarking algorithm based on LWT-SVD via multi-objective ant colony optimization[J]. Journal of Information Hiding and Multimedia Signal Processing, 2011,4(2): 303-319. |
[7] | DUGELAY J L , ROCHE S , REY C ,et al. Still-image watermarking robust to local geometric distortions[J]. IEEE Transactions on Image Processing, 2006,15(9): 2831-2842. |
[8] | XIANG S , KIM H J , HUANG J . Invariant image watermarking based on statistical features in the low-frequency domain[J]. IEEE Transactions on Circuits & Systems for Video Technology, 2008,18(6): 777-790. |
[9] | ZHENG D , WANG S ZHAO J . RST invariant image watermarking algorithm with mathematical modeling and analysis of the watermarking processes[J]. IEEE Transactions on Image Processing, 2009,18(5): 1055-1068. |
[10] | DENG C , GAO X , LI X ,et al. A local tchebichef moments-based robust image watermarking[J]. Signal Processing, 2009,89(8): 1531-1539. |
[11] | HALICI E , ALATAN A A . Watermarking for depth-image-based rendering[C]// The 16th IEEE international conference on Image processing. c2009: 4217-4220. |
[12] | BAE K H , KIM E S . Stereo image watermarking scheme based on discrete wavelet transform and adaptive disparity estimation[C]// International Society for Optical Engineering. c2004: 196-205. |
[13] | LEE M J , LEE J W , LEE H K . Perceptual watermarking for 3D stereoscopic video using depth information[C]// International Conference on Intelligent Information Hiding & Multimedia Signal Processing,IEEE. c2011: 81-84. |
[14] | LIN Y H , WU J L . A digital blind watermarking for depth-imagebased rendering 3D images[J]. IEEE Transactions on Broadcasting, 2011,57(2): 602-611. |
[15] | KIM H D , LEE J W , OH T W ,et al. Robust DT-CWT watermarking for DIBR 3D images[J]. IEEE Transactions on Broadcasting, 2012,58(4): 533-543. |
[16] | FEHN C , . Depth-image-based rendering (DIBR),compression and transmission for a new approach on 3D-TV[C]// SPIE-The International Society for Optical Engineering. c2004: 93-104. |
[17] | ZHANG L , TAM W J . Stereoscopic image generation based on depth images for 3D TV[J]. IEEE Transactions on Broadcasting, 51(2): 191-199. |
[18] | LI L D . Spatial domain image watermarking scheme robust to geometric attacks based on odd-even quantization[J]. Journal of Electronics & Information Technology, 2009,31(1): 134-138. |
[19] | SCHARSTEIN D , PAL C . Learning conditional random fields for stereo[C]// IEEE Conference on Computer Vision & Pattern Recognition. c2007: 1-8. |
[20] | SCHARSTEIN D , SZELISKI R . High-accuracy stereo depth maps using structured light[C]// IEEE Conference on Computer Vision &Pattern Recognition. c2003: 195-202. |
[21] | HIRSCHMULLER H , SCHARSTEIN D . Evaluation of cost functions for stereo matching[C]// IEEE Computer Society Conference on Computer Vision & Pattern Recognition. c2007: 1-8. |
[22] | ZITNICK C L , KANG S B , UYTTENDAELE M ,et al. High-quality video view interpolation using a layered representation[J]. ACM Transactions on Graphics, 2004,23(3): 600-608. |
[23] | WANG Z , BOVIK A C , SHEIKH H R ,et al. Image quality assessment:from error visibility to structural similarity[J]. IEEE Transactions on Image Processing, 2004,13(4): 600-612. |
[24] | Stirmark benchmark 4.0 may 2004[EB/OL]. . |
[1] | 任奎, 孟泉润, 闫守琨, 秦湛. 人工智能模型数据泄露的攻击与防御研究综述[J]. 网络与信息安全学报, 2021, 7(1): 1-10. |
[2] | 张青青, 汤红波, 游伟, 李英乐. 基于免疫算法的网络功能异构冗余部署方法[J]. 网络与信息安全学报, 2021, 7(1): 46-56. |
[3] | 张涛, 伍前红, 唐宗勋. 基于比特币区块链的隐蔽信息传输研究[J]. 网络与信息安全学报, 2021, 7(1): 84-92. |
[4] | 王滨, 陈靓, 钱亚冠, 郭艳凯, 邵琦琦, 王佳敏. 面向对抗样本攻击的移动目标防御[J]. 网络与信息安全学报, 2021, 7(1): 113-120. |
[5] | 苗春雨, 范渊, 李晖, 葛凯强, 张小孟. 基于移动Sink的WSN安全数据收集方法[J]. 网络与信息安全学报, 2021, 7(1): 121-129. |
[6] | 陈璐, 汤红波, 游伟, 柏溢. 移动边缘计算安全防御研究[J]. 网络与信息安全学报, 2021, 7(1): 130-142. |
[7] | 孙澄, 胡浩, 杨英杰, 张红旗. 融合宏观与微观的双层威胁分析模型[J]. 网络与信息安全学报, 2021, 7(1): 143-156. |
[8] | 张颖君,刘尚奇,杨牧,张海霞,黄克振. 基于日志的异常检测技术综述[J]. 网络与信息安全学报, 2020, 6(6): 1-12. |
[9] | 熊小兵,舒辉,康绯. 基于融合编译的软件多样化保护方法[J]. 网络与信息安全学报, 2020, 6(6): 13-24. |
[10] | 张鑫,羌卫中,吴月明,邹德清,金海. 基于卷积神经网络恶意安卓应用行为模式挖掘[J]. 网络与信息安全学报, 2020, 6(6): 35-44. |
[11] | 周天昱,申文博,杨男子,李金库,秦承刚,喻望. Docker组件间标准输入输出复制的DoS攻击分析[J]. 网络与信息安全学报, 2020, 6(6): 45-56. |
[12] | 尚菁菁,朱宇佳,刘庆云. 电子邮件安全扩展协议应用分析[J]. 网络与信息安全学报, 2020, 6(6): 69-79. |
[13] | 王标,刘兴洋,许卡,刘汪洋,王克楠,夏宇清. 政府开放数据的国家安全风险评估模型研究[J]. 网络与信息安全学报, 2020, 6(6): 80-87. |
[14] | 熊钢,葛雨玮,褚衍杰,曹卫权. 基于跨域协同的网络空间威胁预警模式[J]. 网络与信息安全学报, 2020, 6(6): 88-96. |
[15] | 吴奇,陈鸿昶. 低故障恢复开销的软件定义网络控制器布局算法[J]. 网络与信息安全学报, 2020, 6(6): 97-104. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|