Chinese Journal of Network and Information Security ›› 2023, Vol. 9 ›› Issue (5): 150-165.doi: 10.11959/j.issn.2096-109x.2023065
• Papers • Previous Articles
Tianqi WANG1,2,3, Yingzhou ZHANG1,2,3, Yunlong DI1,2,3, Dingwen LI1,2,3, Linlin ZHU1,2,3
Revised:
2022-11-21
Online:
2023-10-01
Published:
2023-10-01
CLC Number:
Tianqi WANG, Yingzhou ZHANG, Yunlong DI, Dingwen LI, Linlin ZHU. Research on strong robustness watermarking algorithm based on dynamic difference expansion[J]. Chinese Journal of Network and Information Security, 2023, 9(5): 150-165.
"
小波变换 | QR码像素为64×64 | QR码像素为128×128 | QR码像素为256×256 | |||||
压缩率 | 绝对最大差异 | 压缩率 | 绝对最大差异 | 压缩率 | 绝对最大差异 | |||
Haar | 70.7 001 953 | 7.3 896 444 | ||||||
Daubechies | 68.8 720 703 | 1.0 516 032 | 74.2 797 851 | 1.2 221 335 | 82.588 195 | 1.4 687 962 | ||
Coiflet | 1.4 861 683 | 75.8 422 851 | 7.6 738 615 | 84.6 649 169 | 1.8 301 996 | |||
Symlet | 69.2 626 953 | 1.0 461 462 | 74.1 210 937 | 84.1 064 453 | 2.1 753 364 |
"
小波变换 | QR码像素为64×64 | QR码像素为128×128 | QR码像素为256×256 | |||||
压缩率 | 绝对最大差异 | 压缩率 | 绝对最大差异 | 压缩率 | 绝对最大差异 | |||
Haar | 5.9 685 589 | 7.3 896 444 | ||||||
Daubechies | 67.8 955 071 | 77.1 911 621 | 1.1 937 117 | 81.054 687 | 1.4 164 767 | |||
Coiflet | 68.2 617 187 | 1.3 672 206 | 79.461 669 | 1.4 278 214 | 81.561 279 | 1.938 388 | ||
Symlet | 68.2 617 187 | 5.6 616 581 | 77.746 582 | 81.381 225 | 2.1 638 108 |
"
属性 | 原始数据库 | ADE-DDEW算法 | GADEW算法 | RF-GADEW算法 | GAHSW算法 | RF-GAHSW算法 | |||||||||||
Mean | Std | Mean | Std | Mean | Std | Mean | Std | Mean | Std | Mean | Std | ||||||
T9 | 19.483 | 2.015 | 19.476 | 2.009 | 19.082 | 2.382 | 19.575 | 2.133 | 19.453 | 2.035 | |||||||
RH_9 | 41.548 | 4.151 | 41.383 | 4.601 | 41.476 | 4.285 | 41.572 | 4.139 | 41.563 | 4.148 | |||||||
T_out | 7.4 | 5.317 | 7.201 | 5.528 | 7.523 | 5.203 | 7.443 | 5.348 | 7.432 | 5.329 | |||||||
Press_mm_hg | 79.769 | 7.399 | 79.757 | 7.405 | 79.829 | 7.021 | 79.892 | 7.256 | 79.737 | 7.371 | |||||||
RH_out | 755.523 | 14.901 | 755.401 | 14.710 | 755.437 | 14.834 | 755.556 | 14.850 | 755.549 | 14.924 | |||||||
Windspeed | 4.041 | 2.451 | 4.284 | 2.649 | 4.184 | 2.392 | 4.086 | 2.411 | 4.067 | 2.428 | |||||||
Visibility | 38.342 | 11.794 | 38.742 | 11.620 | 38.492 | 11.630 | 38.393 | 11.756 | 38.361 | 11.775 | |||||||
Tdewpoint | 3.753 | 4.195 | 3.932 | 4.348 | 3.629 | 4.275 | 3.702 | 4.264 | 3.737 | 4.218 | |||||||
rv1 | 24.986 | 14.496 | 24.847 | 14.730 | 24.816 | 14.583 | 24.932 | 14.558 | 24.971 | 14.526 |
"
属性 | ADE-DDEW算法 | GADEW算法 | RF-GADEW算法 | GAHSW算法 | RF-GAHSW算法 | |||||||||
DM | DS | DM | DS | DM | DS | DM | DS | DM | DS | |||||
T9 | 0.001 | 0.002 | 0.023 | 0.063 | 0.002 | 0.192 | 0.003 | 0.045 | ||||||
RH_9 | 0.019 | 0.320 | 0.187 | 0.073 | 0.006 | 0.072 | 0.084 | 0.065 | ||||||
T_out | 0.380 | 0.754 | 0.003 | 0.018 | 0.038 | 0.047 | 0.026 | 0.194 | ||||||
Press_mm_hg | 0.002 | 0.006 | 0.049 | 0.128 | 0.218 | 0.007 | 0.014 | 0.005 | ||||||
RH_out | 0.020 | 0.870 | 0.010 | 0.501 | 0.106 | 0.023 | 0.008 | 0.073 | ||||||
Windspeed | 0.076 | 0.018 | 0.009 | 0.129 | 0.080 | 0.007 | 0.017 | 0.072 | ||||||
Visibility | 0.890 | 0.342 | 0.227 | 0.284 | 0.004 | 0.039 | 0.080 | 0.160 | ||||||
Tdewpoint | 0.017 | 0.050 | 0.001 | 0.547 | 0.072 | 0.216 | 0.021 | 0.015 | ||||||
rv1 | 0.430 | 0.081 | 0.039 | 0.028 | 0.193 | 0.074 | 0.047 | 0.007 | ||||||
MAE | 2.914 | 1.315 | 0.852 | 0.516 |
[1] | HOLT L , MAUFE B G , WIENER A . Encoded marking of a recording signal[P]. U L Patent GB2196167A, 1988. |
[2] | HIMANSHU A , FAROOQ H . Development of payload capacity enhanced robust video watermarking scheme based on symmetry of circle using lifting wavelet transform and SURF[J]. Journal of Information Security and Applications, 2021,59. |
[3] | SHOHIDULISLAM M , NAQVI N , ABBASI A T ,et al. Robust dual domain twofold encrypted image-in-audio watermarking based on SVD[J]. Circuits,Systems,and Signal Processing, 2021 (prepublish). |
[4] | 赵春雨 . 提高嵌入容量的水印算法研究[D]. 郑州:郑州大学, 2011. |
ZHAO C Y . Research on algorithm for improving the capacity of digital watermarking[D]. Zhengzhou:Zhengzhou University, 2011. | |
[5] | ZHANG Y , YANG B , NIU X M . Reversible watermarking for relational database authentication[J]. Journal of Computers, 2006,17(2): 59-66. |
[6] | HU D , ZHAO D , ZHENG S . A new robust approach for reversible database watermarking with distortion control[J]. IEEE Transactions on Knowledge and Data Engineering, 2018,31(6): 1024-1037. |
[7] | GUPTA G , PIEPRZYK J . Reversible and blind database watermarking using difference expansion[J]. International Journal of Digital Crime and Forensics, 2009,1(2): 42-54. |
[8] | JAWAD K , KHAN A . Genetic algorithm and difference expansion based reversible watermarking for relational databases[J]. Journal of Systems and Software, 2013,86(11): 2742-2753. |
[9] | 邱升红 . 面向关系数据库的可逆水印方法研究[D]. 西安:西安电子科技大学, 2018. |
QIU S H . Research on reversible watermarking methods for relational databases[D]. Xi'an:Xi'an University of Electronic Science and Technology, 2018. | |
[10] | 宋岩, 沈泉江, 杨洪山 . 基于布谷鸟算法的可逆数据库水印方案[J]. 计算机应用与软件, 2021,38(12): 304-313. |
SONG Y , SHEN Q H , YANG H S . A reversible database watermarking scheme based on cuckoo algorithm[J]. Computer Application and Software, 2021,38(12): 304-313. | |
[11] | 孔嘉琪, 王利明, 葛晓雪 . 基于模拟退火和粒子群混合改进算法的数据库水印技术[J]. 信息网络安全, 2022,22(5): 37-45. |
KONG J Q , WANG L M , GE X X . Database watermarking technique based on simulated annealing and particle swarm hybrid improvement algorithm[J]. Information Network Security, 2022,22(5): 37-45. | |
[12] | SHI Y , LI X , ZHANG X ,et al. Reversible data hiding:advances in the past two decades[J]. IEEE Access, 2016,4(10): 3210-3237. |
[13] | GE C , SUN J , SUN Y ,et al. Reversible database watermarking based on random forest and genetic algorithm[C]// 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). 2020. |
[14] | 陈青, 夏兰婷, 卜莹 . 基于两级奇异值分解的鲁棒水印算法[J]. 应用科学学报, 2020,38(6): 966-975. |
CHEN Q , XIA L T , BU Y . Robust watermarking algorithm based on two-level singular value decomposition[J]. Journal of Applied Sciences, 2020,38(6): 966-975. | |
[15] | 关虎, 张桂煊, 张树武 ,等. 基于二维码的鲁棒图像水印技术及应用研究[J]. 有线电视技术, 2018(10): 20-26. |
GUAN H , ZHANG G X , ZHANG S W ,et al. Research on robust image watermarking technology and application based on QR code[J]. Cable TV Technology, 2018(10): 20-26. | |
[16] | KLEMA V , LAUB A . The singular value decomposition:its computation and some applications[J]. Automatic Control IEEE Transactions on, 1980,25(2): 164-176. |
[17] | STORNR P K . Differential evolution:a simple and efficient adaptive scheme for global optimization over continuous spaces[R]. 1995. |
[18] | TIAN J . Reversible data embedding using a difference expansion[J]. IEEE Transactions on Circuits & Systems for Video Technology, 2003,13(8): 890-896. |
[1] | Yuran ZHAO, Tang XUE, Gongshen LIU. Research on the robustness of neural machine translation systems in word order perturbation [J]. Chinese Journal of Network and Information Security, 2023, 9(5): 138-149. |
[2] | Xinxin XING, Qingya ZUO, Jianwei LIU. 5G-based smart airport network security scheme design and security analysis [J]. Chinese Journal of Network and Information Security, 2023, 9(5): 116-126. |
[3] | Wenting GE, Weihai LI, Nenghai YU. Block level cloud data deduplication scheme based on attribute encryption [J]. Chinese Journal of Network and Information Security, 2023, 9(5): 106-115. |
[4] | Qingfeng WANG, Hao LIANG, Yawen WANG, Genlin XIE, Benwei HE. Constructing method of opaque predicate based on type conversion and operation of floating point numbers [J]. Chinese Journal of Network and Information Security, 2023, 9(5): 48-58. |
[5] | Shiyu HUANG, Feng YE, Tianqiang HUANG, Wei LI, Liqing HUANG, Haifeng LUO. Survey on adversarial attacks and defense of face forgery and detection [J]. Chinese Journal of Network and Information Security, 2023, 9(4): 1-15. |
[6] | Weicheng QIU, Xiuzhen CHEN, Yinghua MA, Jin MA, Zhihong ZHOU. Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network [J]. Chinese Journal of Network and Information Security, 2023, 9(4): 40-52. |
[7] | Yue YU, Xianzheng LIN, Weihai LI, Nenghai YU. Privacy-preserving data compression scheme for k-anonymity model based on Huffman coding [J]. Chinese Journal of Network and Information Security, 2023, 9(4): 64-73. |
[8] | Wenqian XIAO, Gaobo YANG, Dewang WANG, Ming XIA. Reversible data hiding in encrypted images based on additive homomorphic encryption and multi-MSB embedding [J]. Chinese Journal of Network and Information Security, 2023, 9(4): 121-133. |
[9] | Guopeng GAO, Yaodong FANG, Yanfang HAN, Zhenxing QIAN, Chuan QIN. Construction of multi-modal social media dataset for fake news detection [J]. Chinese Journal of Network and Information Security, 2023, 9(4): 144-154. |
[10] | Bolin ZHANG, Chuntao ZHU, Qilin YIN, Jingqiao FU, Lingyi LIU, Jiarui LIU, Hongmei LIU, Wei LU. Noise-attention-based forgery face detection method [J]. Chinese Journal of Network and Information Security, 2023, 9(4): 155-165. |
[11] | Ziyang ZHOU, Yun TAN, Jiaohua QIN, Xuyu XIANG. JPEG reversible data hiding method based on optimal DCT frequency embedding [J]. Chinese Journal of Network and Information Security, 2023, 9(4): 166-177. |
[12] | Qian ZHOU, Haiping HUANG, Le WANG, Yanchun ZHANG, Fu XIAO. Connotation and practice of the integration of academic field based on Bourdieu’s theory——taking the cultivation of cyberspace security talents as an example [J]. Chinese Journal of Network and Information Security, 2023, 9(4): 178-187. |
[13] | Xianyi CHEN, Jun GU, Kai YAN, Dong JIANG, Linfeng XU, Zhangjie FU. Double adversarial attack against license plate recognition system [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 16-27. |
[14] | Tianpeng YE, Xiang LIN, Jianhua LI, Xuankai ZHANG, Liwen XU. Personalized lightweight distributed network intrusion detection system in fog computing [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 28-37. |
[15] | Lijun ZU, Yalin CAO, Xiaohua MEN, Zhihui LYU, Jiawei YE, Hongyi LI, Liang ZHANG. Adaptive selection method of desensitization algorithm based on privacy risk assessment [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 49-59. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|