Chinese Journal of Network and Information Security ›› 2023, Vol. 9 ›› Issue (3): 135-149.doi: 10.11959/j.issn.2096-109x.2023045
• Papers • Previous Articles Next Articles
Xiaomeng LI1, Daidou GUO1, Xunfang ZHUO2, Heng YAO1, Chuan QIN1
Revised:
2023-04-23
Online:
2023-06-25
Published:
2023-06-01
Supported by:
CLC Number:
Xiaomeng LI, Daidou GUO, Xunfang ZHUO, Heng YAO, Chuan QIN. Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition[J]. Chinese Journal of Network and Information Security, 2023, 9(3): 135-149.
"
攻击类型 | 攻击强度 | 本文算法 | |
4/5 | 97.15% | 96.12% | |
3/4 | 97.15% | 95.15% | |
缩放攻击 | 3/5 | 97.18% | 97.09% |
(缩放比例) | 1/2 | 97.00% | 94.17% |
2/5 | 96.70% | 94.17% | |
1/4 | 96.42% | 93.20% | |
1/5 | 95.55% | 89.47% | |
13 | 97.03% | 96.12% | |
高斯模糊 | 15 | 96.54% | 96.12% |
(高斯核大小) | 17 | 95.18% | 92.23% |
19 | 93.05% | 80.58% | |
21 | 90.96% | 67.96% | |
40 | 96.30% | 90.29% | |
50 | 96.63% | 94.17% | |
JPEG压缩 | 60 | 96.75% | 96.12% |
(质量因子大小) | 70 | 96.69% | 96.12% |
80 | 96.91% | 95.15% | |
90 | 96.88% | 97.09% | |
20 × 20 | 97.09% | 97.09% | |
40 × 40 | 96.94% | 94.17% | |
裁剪攻击 | 60 × 60 | 97.21% | 98.06% |
(裁剪区域尺寸) | 80 × 80 | 96.91% | 97.09% |
100 × 100 | 96.18% | 97.09% | |
120 × 120 | 94.45% | 93.20% | |
10 pt | 95.93% | 90.29% | |
边缘遮盖 | 20 pt | 95.27% | 87.38% |
(遮盖宽度) | 30 pt | 95.33% | 90.29% |
40 pt | 94.66% | 89.32% | |
50 pt | 94.57% | 82.52% |
"
拍摄角度 | |||||||||
Kang等[ | Pramila等[ | Nakamura等[ | StegaStamp[ | 本文算法 | |||||
+45° | 58.89% | 55.28% | 83.69% | 99.22% | 100.00% | 97.19% | 100.00% | ||
+30° | 72.17% | 57.00% | 86.81% | 99.22% | 100.00% | 97.19% | 100.00% | ||
+15° | 80.47% | 54.88% | 77.73% | 99.48% | 100.00% | 97.19% | 100.00% | ||
0° | 67.50% | 55.95% | 84.56% | 99.74% | 100.00% | 96.56% | 100.00% | ||
-15° | 74.31% | 64.03% | 86.13% | 99.74% | 100.00% | 98.13% | 100.00% | ||
-30° | 73.52% | 63.48% | 83.69% | 99.74% | 100.00% | 98.13% | 100.00% | ||
-45° | 80.08% | 71.39% | 84.17% | 98.69% | 100.00% | 97.19% | 100.00% |
[17] | RONNEBERGER O , FISCHER P , BROX T . U-net:convolutional networks for biomedical image segmentation[C]// 18th International Conference on Medical Image Computing and Computer-Assisted Intervention-MICCAI 2015. 2015: 234-241. |
[18] | TANCIK M , MILDENHALL B , NG R . Stegastamp:invisible hyperlinks in physical photographs[C]// Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2020: 2117-2126. |
[19] | JADERBERG M , SIMONYAN K , ZISSERMAN A . Spatial transformer networks[C]// Advances in Neural Information Processing Systems. 2015:28. |
[20] | WENGROWSKI , ERIC KRISTIN DANA . Light field messaging with deep photographic steganography[C]// Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2019: 1515-1524. |
[21] | FANG HAN , DONGDONG CHEN , QIDONG HUANG ,et al. Deep template-based watermarking[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2020,31(4): 1436-1451. |
[22] | BORACCHI G , FOI A . Modeling the performance of image restoration from motion blur[J]. IEEE Transactions on Image Processing, 2012,21(8): 3502-3517. |
[23] | KUPYN O , BUDZAN V , MYKHAILYCH M ,et al. Deblurgan:blind motion deblurring using conditional adversarial networks[C]// Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 2018: 8183-8192. |
[24] | KIM W , LEE S H , SEO Y . Image fingerprinting scheme for print-and-capture model[C]// Advances in Multimedia Information Processing-PCM 2006. 2006: 106-113. |
[25] | NUUTINEN M , OITTINEN P . Simulation of printing and image capture for linking applications[J]. Graphic Arts in Finland, 2009,38(1): 1-13. |
[26] | SHIN R , SONG D . Jpeg-resistant adversarial images[C]// NIPS 2017 Workshop on Machine Learning and Computer Security. 2017: 1-8. |
[27] | ARJOVSKY M , CHINTALA S , BOTTOU L . Wasserstein generative adversarial networks[C]// International Conference on Machine Learning (PMLR). 2017: 214-223. |
[28] | LIN T Y , MAIRE M , BELONGIE S ,et al. Microsoft coco:common objects in context[C]// 13th European Conference on Computer Vision–ECCV 2014. 2014: 740-755. |
[29] | SUN Y , YU Y , WANG W . Moiré photo restoration using multiresolution convolutional neural networks[J]. IEEE Transactions on Image Processing, 2018,27(8): 4160-4172. |
[30] | KANG X , HUANG J , ZENG W . Efficient general print-scanning resilient data hiding based on uniform log-polar mapping[J]. IEEE Transactions on Information Forensics and Security, 2010,5(1): 1-12. |
[1] | 李凤华 . 信息技术与网络空间安全发展趋势[J]. 网络与信息安全学报, 2015,1(1): 8-17. |
LI F H . Development trends of the information technology and cyberspace security[J]. Chinese Journal of Network and Information Security, 2015,1(1): 8-17. | |
[2] | 靳玉红 . 大数据环境下互联网金融信息安全防范与保障体系研究[J]. 情报科学, 2018,36(12): 134-138. |
JIN Y H . Internet financial information security and protection systems in big data environment[J]. Information Science, 2018,36(2): 134-138. | |
[3] | 王馨雅, 华光, 江昊 ,等. 深度学习模型的版权保护研究综述[J]. 网络与信息安全学报, 2022,8(2): 1-14. |
WANG X Y , HUA G , JIANG H ,et al. Survey on intellectual property protection for deep learning model[J]. Chinese Journal of Network and Information Security, 2022,8(2): 1-14. | |
[4] | NAKAMURA T , KATAYAMA A , YAMAMURO M ,et al. Fast watermark detection scheme for camera-equipped cellular phone[C]// Proceedings of the 3rd International Conference on Mobile and Ubiquitous Multimedia. 2004: 101-108. |
[5] | PRAMILA A , KESKINARKAUS A , SEPP?NEN T . Increasing the capturing angle in print-cam robust watermarking[J]. Journal of Systems and Software, 2018,135: 205-215. |
[6] | CHOU C H , LI Y C . A perceptually tuned subband image coder based on the measure of just-noticeable-distortion profile[J]. IEEE Transactions on Circuits and Systems for Video Technology, 1995,5(6): 467-476. |
[7] | FANG H , ZHANG W , ZHOU H ,et al. Screen-shooting resilient watermarking[J]. IEEE Transactions on Information Forensics and Security, 2018,14(6): 1403-1418. |
[8] | FANG H , ZHANG W , MA Z ,et al. A camera shooting resilient watermarking scheme for underpainting documents[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2019,30(11): 4075-4089. |
[9] | CUI H , BIAN H , ZHANG W ,et al. Unseencode:Invisible on-screen barcode with image-based extraction[C]// IEEE INFOCOM 2019-IEEE Conference on Computer Communications. 2019: 1315-1323. |
[10] | BALUJA S . Hiding images in plain sight:deep steganography[C]// Advances in Neural Information Processing Systems, 2017,30. |
[11] | BADRINARAYANAN V , KENDALL A , CIPOLLA R . SegNet:a deep convolutional encoder-decoder architecture for image segmentation[J]. IEEE Transactions on Pattern Analysis & Machine Intelligence, 2017,(1). |
[12] | TANG W , TAN S , LI B ,et al. Automatic steganographic distortion learning using a generative adversarial network[J]. IEEE Signal Processing Letters, 2017,24(10): 1547-1551. |
[13] | HU D H , WANG L , JIANG W J ,et al. A novel image steganography method via deep convolutional generative adversarial networks[J]. IEEE Access, 2018,6. |
[14] | VOLKHONSKIY D , NAZAROV I , BURNAEV E . Steganographic generative adversarial networks[C]// Twelfth International Conference on Machine Vision (ICMV 2019). 11433: 991-1005. |
[15] | ZHU J , KAPLAN R , JOHNSON J ,et al. Hidden:Hiding data with deep networks[C]// Proceedings of the European Conference on Computer Vision (ECCV). 2018: 657-672. |
[31] | PRAMILA A , KESKINARKAUS A , SEPP?NEN T . Toward an interactive poster using digital watermarking and a mobile phone camera[J]. Signal,Image and Video Processing , 2012(6): 211-222. |
[16] | LIU Y , GUO M , ZHANG J ,et al. A novel two-stage separable deep learning framework for practical blind watermarking[C]// The 27th ACM International Conference. 2019. |
[1] | Xuejing GUO, Yixiang FANG, Yi ZHAO, Tianzhu ZHANG, Wenchao ZENG, Junxiang WANG. Traditional guidance mechanism based deep robust watermarking [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 175-183. |
[2] | Rongna XIE, Zhuhong MA, Zongyu LI, Ye TIAN. Encrypted traffic classification method based on convolutional neural network [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 84-91. |
[3] | Dengyong ZHANG, Huang WEN, Feng LI, Peng CAO, Lingyun XIANG, Gaobo YANG, Xiangling DING. Image inpainting forensics method based on dual branch network [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 110-122. |
[4] | Jiaying LIN, Wenbo ZHOU, Weiming ZHANG, Nenghai YU. Lip forgery detection via spatial-frequency domain combination [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 146-155. |
[5] | Jinyin CHEN, Changan WU, Haibin ZHENG. Novel defense based on softmax activation transformation [J]. Chinese Journal of Network and Information Security, 2022, 8(2): 48-63. |
[6] | Baolin QIU, Ping YI. Adversarial examples defense method based on multi-dimensional feature maps knowledge distillation [J]. Chinese Journal of Network and Information Security, 2022, 8(2): 88-99. |
[7] | Lijuan LI, Man LI, Hongjun BI, Huachun ZHOU. Multi-type low-rate DDoS attack detection method based on hybrid deep learning [J]. Chinese Journal of Network and Information Security, 2022, 8(1): 73-85. |
[8] | Zhongyuan QIN, Zhaoxiang HE, Tao LI, Liquan CHEN. Adversarial example defense algorithm for MNIST based on image reconstruction [J]. Chinese Journal of Network and Information Security, 2022, 8(1): 86-94. |
[9] | Deqing ZOU, Xiang LI, Minhuan HUANG, Xiang SONG, Hao LI, Weiming LI. Intelligent vulnerability detection system based on graph structured source code slice [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 113-122. |
[10] | Zhenglong WANG, Baowen ZHANG. Survey of generative adversarial network [J]. Chinese Journal of Network and Information Security, 2021, 7(4): 68-85. |
[11] | Binglong LI, Jinlong TONG, Yu ZHANG, Yifeng SUN, Qingxian WANG, Chaowen CHANG. Auto forensic detecting algorithms of malicious code fragment based on TensorFlow [J]. Chinese Journal of Network and Information Security, 2021, 7(4): 154-163. |
[12] | Qingyin TAN, Yingming ZENG, Ye HAN, Yijing LIU, Zheli LIU. Survey on backdoor attacks targeted on neural network [J]. Chinese Journal of Network and Information Security, 2021, 7(3): 46-58. |
[13] | Luhui YANG,Huiwen BAI,Guangjie LIU,Yuewei DAI. Lightweight malicious domain name detection model based on separable convolution [J]. Chinese Journal of Network and Information Security, 2020, 6(6): 112-120. |
[14] | Ximeng LIU,Lehui XIE,Yaopeng WANG,Xuru LI. Adversarial attacks and defenses in deep learning [J]. Chinese Journal of Network and Information Security, 2020, 6(5): 36-53. |
[15] | Sijia DU,Haining YU,Hongli ZHANG. Survey of text classification methods based on deep learning [J]. Chinese Journal of Network and Information Security, 2020, 6(4): 1-13. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|