网络与信息安全学报 ›› 2016, Vol. 2 ›› Issue (5): 50-55.doi: 10.11959/j.issn.2096-109x.2016.00052
崔晨,王莘,李琼
修回日期:
2016-04-27
出版日期:
2016-05-15
发布日期:
2020-03-26
作者简介:
崔晨(1983-),男,黑龙江牡丹江人,哈尔滨工业大学博士生,主要研究方向为信息安全、信息隐藏、感知散列。|王莘(1980-),男,黑龙江哈尔滨人,博士,哈尔滨工业大学讲师,主要研究方向为信息对抗、量子计算、多媒体安全。|李琼(1976-),女,湖南桂阳人,博士,哈尔滨工业大学副教授、博士生导师,主要研究方向为量子保密通信后处理、生物信息识别及安全、多媒体安全。
基金资助:
Chen CUI,Shen WANG,Qiong LI
Revised:
2016-04-27
Online:
2016-05-15
Published:
2020-03-26
Supported by:
摘要:
摘 要:由于基于深度图绘制的虚拟视点技术具有的独特优势,越来越多的3D产品版权保护问题受到极大的夫注。不同于传统 2D 图像的水印技术,在基于深度图绘制的 3D 图像里,不仅需要通过嵌入水印来保护中间图像,而且需要保护左右眼虚拟图像。通过对中间图像进行3层小波变换后,利用奇偶量化方式来修改每个子分块的小波系数,实现了中间图像的水印信息嵌入。嵌入的水印可以从中间图像以及左右眼虚拟图像中提取出来。实验表明,所提水印算法对常见的信号失真攻击具有良好的顽健性。
中图分类号:
崔晨,王莘,李琼. 基于深度图绘制3D图像的水印技术[J]. 网络与信息安全学报, 2016, 2(5): 50-55.
Chen CUI,Shen WANG,Qiong LI. Novel watermarking based on DIBR 3D image[J]. Chinese Journal of Network and Information Security, 2016, 2(5): 50-55.
[1] | CHAN S C , SHUM H Y , NG K T . Image-based rendering and synthesis[J]. IEEE Signal Processing Magazine, 2007,24(6): 22-33. |
[2] | FUJII T , TANIMOTO M . Free-viewpoint TV system based on ray-space representation[J]. Proceedings of SPIE, 2002,4864: 175-189. |
[3] | FEHN C , PASTOOR S . Interactive 3-DTV-concepts and key technologies[J]. Proceedings of the IEEE, 2006,94(3): 524-538. |
[4] | ALGHONIEMY M , TEWFIK A . Geometric invariance in image watermarking[J]. IEEE Transactions on Image Processing, 2010,13(2): 145-153. |
[5] | BAS P , CHASSERY J M , MACQ B . Geometrically invariant watermarking using feature points[J]. IEEE Transactions on Image Processing, 2002,11(9): 1014-1028. |
[6] | LOUKHAOUKHA K , CHOUINARD J Y , TSAI M H . Optimal image watermarking algorithm based on LWT-SVD via multi-objective ant colony optimization[J]. Journal of Information Hiding and Multimedia Signal Processing, 2011,4(2): 303-319. |
[7] | DUGELAY J L , ROCHE S , REY C ,et al. Still-image watermarking robust to local geometric distortions[J]. IEEE Transactions on Image Processing, 2006,15(9): 2831-2842. |
[8] | XIANG S , KIM H J , HUANG J . Invariant image watermarking based on statistical features in the low-frequency domain[J]. IEEE Transactions on Circuits & Systems for Video Technology, 2008,18(6): 777-790. |
[9] | ZHENG D , WANG S ZHAO J . RST invariant image watermarking algorithm with mathematical modeling and analysis of the watermarking processes[J]. IEEE Transactions on Image Processing, 2009,18(5): 1055-1068. |
[10] | DENG C , GAO X , LI X ,et al. A local tchebichef moments-based robust image watermarking[J]. Signal Processing, 2009,89(8): 1531-1539. |
[11] | HALICI E , ALATAN A A . Watermarking for depth-image-based rendering[C]// The 16th IEEE international conference on Image processing. c2009: 4217-4220. |
[12] | BAE K H , KIM E S . Stereo image watermarking scheme based on discrete wavelet transform and adaptive disparity estimation[C]// International Society for Optical Engineering. c2004: 196-205. |
[13] | LEE M J , LEE J W , LEE H K . Perceptual watermarking for 3D stereoscopic video using depth information[C]// International Conference on Intelligent Information Hiding & Multimedia Signal Processing,IEEE. c2011: 81-84. |
[14] | LIN Y H , WU J L . A digital blind watermarking for depth-imagebased rendering 3D images[J]. IEEE Transactions on Broadcasting, 2011,57(2): 602-611. |
[15] | KIM H D , LEE J W , OH T W ,et al. Robust DT-CWT watermarking for DIBR 3D images[J]. IEEE Transactions on Broadcasting, 2012,58(4): 533-543. |
[16] | FEHN C , . Depth-image-based rendering (DIBR),compression and transmission for a new approach on 3D-TV[C]// SPIE-The International Society for Optical Engineering. c2004: 93-104. |
[17] | ZHANG L , TAM W J . Stereoscopic image generation based on depth images for 3D TV[J]. IEEE Transactions on Broadcasting, 51(2): 191-199. |
[18] | LI L D . Spatial domain image watermarking scheme robust to geometric attacks based on odd-even quantization[J]. Journal of Electronics & Information Technology, 2009,31(1): 134-138. |
[19] | SCHARSTEIN D , PAL C . Learning conditional random fields for stereo[C]// IEEE Conference on Computer Vision & Pattern Recognition. c2007: 1-8. |
[20] | SCHARSTEIN D , SZELISKI R . High-accuracy stereo depth maps using structured light[C]// IEEE Conference on Computer Vision &Pattern Recognition. c2003: 195-202. |
[21] | HIRSCHMULLER H , SCHARSTEIN D . Evaluation of cost functions for stereo matching[C]// IEEE Computer Society Conference on Computer Vision & Pattern Recognition. c2007: 1-8. |
[22] | ZITNICK C L , KANG S B , UYTTENDAELE M ,et al. High-quality video view interpolation using a layered representation[J]. ACM Transactions on Graphics, 2004,23(3): 600-608. |
[23] | WANG Z , BOVIK A C , SHEIKH H R ,et al. Image quality assessment:from error visibility to structural similarity[J]. IEEE Transactions on Image Processing, 2004,13(4): 600-612. |
[24] | Stirmark benchmark 4.0 may 2004[EB/OL]. . |
[1] | 陈先意, 顾军, 颜凯, 江栋, 许林峰, 付章杰. 针对车牌识别系统的双重对抗攻击[J]. 网络与信息安全学报, 2023, 9(3): 16-27. |
[2] | 叶天鹏, 林祥, 李建华, 张轩凯, 许力文. 面向雾计算的个性化轻量级分布式网络入侵检测系统[J]. 网络与信息安全学报, 2023, 9(3): 28-37. |
[3] | 祖立军, 曹雅琳, 门小骅, 吕智慧, 叶家炜, 李泓一, 张亮. 基于隐私风险评估的脱敏算法自适应方法[J]. 网络与信息安全学报, 2023, 9(3): 49-59. |
[4] | 夏锐琪, 李曼曼, 陈少真. 基于机器学习的分组密码结构识别[J]. 网络与信息安全学报, 2023, 9(3): 79-89. |
[5] | 袁静怡, 李子川, 彭国军. EN-Bypass:针对邮件代发提醒机制的安全评估方法[J]. 网络与信息安全学报, 2023, 9(3): 90-101. |
[6] | 余锋, 林庆新, 林晖, 汪晓丁. 基于生成对抗网络的隐私增强联邦学习方案[J]. 网络与信息安全学报, 2023, 9(3): 113-122. |
[7] | 朱春陶, 尹承禧, 张博林, 殷琪林, 卢伟. 基于多域时序特征挖掘的伪造人脸检测方法[J]. 网络与信息安全学报, 2023, 9(3): 123-134. |
[8] | 李晓萌, 郭玳豆, 卓训方, 姚恒, 秦川. 载体独立的抗屏摄信息膜叠加水印算法[J]. 网络与信息安全学报, 2023, 9(3): 135-149. |
[9] | 蔡召, 荆涛, 任爽. 以太坊钓鱼诈骗检测技术综述[J]. 网络与信息安全学报, 2023, 9(2): 21-32. |
[10] | 潘雁, 林伟, 祝跃飞. 渐进式的协议状态机主动推断方法[J]. 网络与信息安全学报, 2023, 9(2): 81-93. |
[11] | 杨盼, 康绯, 舒辉, 黄宇垚, 吕小少. 基于函数摘要的二进制程序污点分析优化方法[J]. 网络与信息安全学报, 2023, 9(2): 115-131. |
[12] | 肖天, 江智昊, 唐鹏, 黄征, 郭捷, 邱卫东. 基于深度强化学习的高性能导向性模糊测试方案[J]. 网络与信息安全学报, 2023, 9(2): 132-142. |
[13] | 袁承昊, 李勇, 任爽. 多关键词动态可搜索加密方案[J]. 网络与信息安全学报, 2023, 9(2): 143-153. |
[14] | 侯泽洲, 任炯炯, 陈少真. 基于神经网络区分器的SIMON-like算法参数安全性评估[J]. 网络与信息安全学报, 2023, 9(2): 154-163. |
[15] | 郭学镜, 方毅翔, 赵怡, 张天助, 曾文超, 王俊祥. 基于传统引导机制的深度鲁棒水印算法[J]. 网络与信息安全学报, 2023, 9(2): 175-183. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|