Chinese Journal of Network and Information Security ›› 2016, Vol. 2 ›› Issue (5): 50-55.doi: 10.11959/j.issn.2096-109x.2016.00052
• Papers • Previous Articles Next Articles
Chen CUI,Shen WANG,Qiong LI
Revised:
2016-04-27
Online:
2016-05-15
Published:
2020-03-26
Supported by:
CLC Number:
Chen CUI,Shen WANG,Qiong LI. Novel watermarking based on DIBR 3D image[J]. Chinese Journal of Network and Information Security, 2016, 2(5): 50-55.
[1] | CHAN S C , SHUM H Y , NG K T . Image-based rendering and synthesis[J]. IEEE Signal Processing Magazine, 2007,24(6): 22-33. |
[2] | FUJII T , TANIMOTO M . Free-viewpoint TV system based on ray-space representation[J]. Proceedings of SPIE, 2002,4864: 175-189. |
[3] | FEHN C , PASTOOR S . Interactive 3-DTV-concepts and key technologies[J]. Proceedings of the IEEE, 2006,94(3): 524-538. |
[4] | ALGHONIEMY M , TEWFIK A . Geometric invariance in image watermarking[J]. IEEE Transactions on Image Processing, 2010,13(2): 145-153. |
[5] | BAS P , CHASSERY J M , MACQ B . Geometrically invariant watermarking using feature points[J]. IEEE Transactions on Image Processing, 2002,11(9): 1014-1028. |
[6] | LOUKHAOUKHA K , CHOUINARD J Y , TSAI M H . Optimal image watermarking algorithm based on LWT-SVD via multi-objective ant colony optimization[J]. Journal of Information Hiding and Multimedia Signal Processing, 2011,4(2): 303-319. |
[7] | DUGELAY J L , ROCHE S , REY C ,et al. Still-image watermarking robust to local geometric distortions[J]. IEEE Transactions on Image Processing, 2006,15(9): 2831-2842. |
[8] | XIANG S , KIM H J , HUANG J . Invariant image watermarking based on statistical features in the low-frequency domain[J]. IEEE Transactions on Circuits & Systems for Video Technology, 2008,18(6): 777-790. |
[9] | ZHENG D , WANG S ZHAO J . RST invariant image watermarking algorithm with mathematical modeling and analysis of the watermarking processes[J]. IEEE Transactions on Image Processing, 2009,18(5): 1055-1068. |
[10] | DENG C , GAO X , LI X ,et al. A local tchebichef moments-based robust image watermarking[J]. Signal Processing, 2009,89(8): 1531-1539. |
[11] | HALICI E , ALATAN A A . Watermarking for depth-image-based rendering[C]// The 16th IEEE international conference on Image processing. c2009: 4217-4220. |
[12] | BAE K H , KIM E S . Stereo image watermarking scheme based on discrete wavelet transform and adaptive disparity estimation[C]// International Society for Optical Engineering. c2004: 196-205. |
[13] | LEE M J , LEE J W , LEE H K . Perceptual watermarking for 3D stereoscopic video using depth information[C]// International Conference on Intelligent Information Hiding & Multimedia Signal Processing,IEEE. c2011: 81-84. |
[14] | LIN Y H , WU J L . A digital blind watermarking for depth-imagebased rendering 3D images[J]. IEEE Transactions on Broadcasting, 2011,57(2): 602-611. |
[15] | KIM H D , LEE J W , OH T W ,et al. Robust DT-CWT watermarking for DIBR 3D images[J]. IEEE Transactions on Broadcasting, 2012,58(4): 533-543. |
[16] | FEHN C , . Depth-image-based rendering (DIBR),compression and transmission for a new approach on 3D-TV[C]// SPIE-The International Society for Optical Engineering. c2004: 93-104. |
[17] | ZHANG L , TAM W J . Stereoscopic image generation based on depth images for 3D TV[J]. IEEE Transactions on Broadcasting, 51(2): 191-199. |
[18] | LI L D . Spatial domain image watermarking scheme robust to geometric attacks based on odd-even quantization[J]. Journal of Electronics & Information Technology, 2009,31(1): 134-138. |
[19] | SCHARSTEIN D , PAL C . Learning conditional random fields for stereo[C]// IEEE Conference on Computer Vision & Pattern Recognition. c2007: 1-8. |
[20] | SCHARSTEIN D , SZELISKI R . High-accuracy stereo depth maps using structured light[C]// IEEE Conference on Computer Vision &Pattern Recognition. c2003: 195-202. |
[21] | HIRSCHMULLER H , SCHARSTEIN D . Evaluation of cost functions for stereo matching[C]// IEEE Computer Society Conference on Computer Vision & Pattern Recognition. c2007: 1-8. |
[22] | ZITNICK C L , KANG S B , UYTTENDAELE M ,et al. High-quality video view interpolation using a layered representation[J]. ACM Transactions on Graphics, 2004,23(3): 600-608. |
[23] | WANG Z , BOVIK A C , SHEIKH H R ,et al. Image quality assessment:from error visibility to structural similarity[J]. IEEE Transactions on Image Processing, 2004,13(4): 600-612. |
[24] | Stirmark benchmark 4.0 may 2004[EB/OL]. . |
[1] | Xianyi CHEN, Jun GU, Kai YAN, Dong JIANG, Linfeng XU, Zhangjie FU. Double adversarial attack against license plate recognition system [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 16-27. |
[2] | Tianpeng YE, Xiang LIN, Jianhua LI, Xuankai ZHANG, Liwen XU. Personalized lightweight distributed network intrusion detection system in fog computing [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 28-37. |
[3] | Lijun ZU, Yalin CAO, Xiaohua MEN, Zhihui LYU, Jiawei YE, Hongyi LI, Liang ZHANG. Adaptive selection method of desensitization algorithm based on privacy risk assessment [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 49-59. |
[4] | Ruiqi XIA, Manman LI, Shaozhen CHEN. Identification on the structures of block ciphers using machine learning [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 79-89. |
[5] | Jingyi YUAN, Zichuan LI, Guojun PENG. EN-Bypass: a security assessment method on e-mail user interface notification [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 90-101. |
[6] | Feng YU, Qingxin LIN, Hui LIN, Xiaoding WANG. Privacy-enhanced federated learning scheme based on generative adversarial networks [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 113-122. |
[7] | Chuntao ZHU, Chengxi YIN, Bolin ZHANG, Qilin YIN, Wei LU. Forgery face detection method based on multi-domain temporal features mining [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 123-134. |
[8] | Xiaomeng LI, Daidou GUO, Xunfang ZHUO, Heng YAO, Chuan QIN. Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 135-149. |
[9] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[10] | Yan PAN, Wei LIN, Yuefei ZHU. Progressive active inference method of protocol state machine [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 81-93. |
[11] | Pan YANG, Fei KANG, Hui SHU, Yuyao HUANG, Xiaoshao LYU. Binary program taint analysis optimization method based on function summary [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 115-131. |
[12] | Tian XIAO, Zhihao JIANG, Peng TANG, Zheng HUANG, Jie GUO, Weidong QIU. High-performance directional fuzzing scheme based on deep reinforcement learning [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 132-142. |
[13] | Chenghao YUAN, Yong LI, Shuang REN. Dynamic multi-keyword searchable encryption scheme [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 143-153. |
[14] | Zezhou HOU, Jiongjiong REN, Shaozhen CHEN. Security evaluation for parameters of SIMON-like cipher based on neural network distinguisher [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 154-163. |
[15] | Xuejing GUO, Yixiang FANG, Yi ZHAO, Tianzhu ZHANG, Wenchao ZENG, Junxiang WANG. Traditional guidance mechanism based deep robust watermarking [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 175-183. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|