通信学报 ›› 2014, Vol. 35 ›› Issue (12): 153-161.doi: 10.3969/j.issn.1000-436x.2014.12.018

• 学术论文 • 上一篇    下一篇

基于奇偶校验的块误差分散半调水印算法

谢琨1,郑海红1,曾平1,2,郭涛1   

  1. 1 西安电子科技大学 计算机学院,陕西 西安 710071
    2 西安石油大学 计算机学院,陕西 西安 710065
  • 出版日期:2014-12-25 发布日期:2017-06-17
  • 基金资助:
    国家自然科学基金资助项目;国家“十二五”预研基金资助项目

Halftone image watermarking with block-directed parity-matched error diffusion

Kun XIE1,Hai-hong ZHENG1,Ping ZENG1,2,Tao GUO1   

  1. 1 School of Computer and Science,Xidian University,Xi'an 710071,China
    2 College of Computer Science,Xi'an Shiyou University,Xi'an 710065,China
  • Online:2014-12-25 Published:2017-06-17
  • Supported by:
    The National Natural Science Foundation of China;The National 12th Five-Year Plan of China

摘要:

提出了一种顽健的半调水印算法。算法通过比较像素块的均值和一个图像自相关阈值的大小确定像素块的奇偶性,利用噪声平衡块误差分散方法调整像素块的奇偶性实现水印嵌入。通过像素块的奇偶性和投票策略来实现水印的盲提取。实验结果表明,与同类算法相比,提出算法能够获得较高且灵活的水印率,并能从被攻击的嵌水印图像直接提取水印,无需将其先转化成半调图,同时能够很好地抵抗各种常见攻击以及不同型号设备的打印—扫描攻击。

关键词: 半调图像, 水印, 奇偶校验, 块误差分散

Abstract:

A robust halftone image watermarking method was proposed.The method was developed in parity domain based on pixel block.Especially,the parity sum of a pixel block was defined by comparing the average of the pixel block with an image-dependent threshold.By altering the pixel block's parity based on noise-balanced block error diffusion,watermark was spread into the host image.Watermark was retrieved by employing each pixel block's parity and majority voting strategy,not referring to the original image.Compared with the state-of-the-art method in parity domain,the re-sults indicate that the proposed method has high watermark rate and watermark rate flexibility.Moreover,it is capable of extracting watermark directly from the attacked watermarked image without quantizing it into a halftone image.And it can achieve high robustness against common attacks and print-and-scan attack of different types of printers and scanners.

Key words: halftone image, watermarking, parity-match, block error diffusion

[1] 彭绍亮,李姗姗,彭宇行,廖湘科,肖 侬. 无线传感器网络中一种实时高效的数据存储和查询方法[J]. 通信学报, 2008, 29(11): 17 -138 .
[2] 何欣,桂小林. 基于概率感知覆盖的无线传感器网络节点优化部署方案[J]. 通信学报, 2010, 31(9A): 1 -8 .
[3] 陈永锐,杨扬,易卫东. 用于无线传感网的协作分集跨层设计方法[J]. 通信学报, 2010, 31(9A): 2 -15 .
[4] 陆奕奕. 破坏性创新:云计算产品的市场定位与推进策略[J]. 电信科学, 2012, 28(3): 116 -121 .
[5] 黄 飞,许 辉,吴诗其. 低轨卫星通信中基于公平性的信道借用策略[J]. 通信学报, 2006, 27(8): 2 -17 .
[6] 于亦舟,欧海文. “串行检验”比较于传统的随机性检验方法的优越性[J]. 通信学报, 2007, 28(6): 4 -23 .
[7] 徐 宁,杨 庚. 基于身份加密机制的光学加密密钥系统[J]. 通信学报, 2012, 33(4): 17 -128 .
[8] 夏 楠,邱天爽. 基于改进粒子滤波的PSK信号时延和码元联合估计算法[J]. 通信学报, 2012, 33(4): 18 -135 .
[9] 鲍 煦,宋铁成,沈连丰. 基于协作认知网络的虚拟MIMO信号及干扰分布特性研究[J]. 通信学报, 2012, 33(5): 11 -90 .
[10] 陶建喜1,3,4,周立2,周舟1,4,杨威1,4,刘庆云1,4,杨嵘1,4. 非对称路由环境下SYN flood攻击防御方法[J]. 通信学报, 2013, 34(Z1): 38 -291 .