Journal on Communications ›› 2013, Vol. 34 ›› Issue (3): 148-156.doi: 10.3969/j.issn.1000-436x.2013.03.019
• Technical Report • Previous Articles Next Articles
Tian-yu YE
Online:
2013-03-25
Published:
2017-07-20
Supported by:
Tian-yu YE. Perfectly blind image watermarking scheme with multi-purpose based on region segment for sub-block and self-embedding technology[J]. Journal on Communications, 2013, 34(3): 148-156.
"
算法 | 实验项目 | 平滑 | 添加噪声 | JPEG压缩 | |||||||||
高斯滤波窗口大小为(3×3,s=1) | 中值滤波(窗口大小为3×3) | 高斯噪声 | 椒盐噪声 | 质量因子 | |||||||||
均值为方差为0, 0.0001 | 均值为方差为0, 0.0003 | 噪声密度为0.001 | 噪声密度为0.003 | 80 | 60 | 40 | |||||||
0.9212 | 0.9159 | 0.9874 | 0.9825 | 0.9778 | 0.9676 | 0.9625 | 0.9615 | 0.9623 | |||||
本文算法 | W和 | 0.9515 | 0.9638 | 0.9874 | 0.9825 | 0.9841 | 0.9796 | 0.9625 | 0.9615 | 0.9623 | |||
W和 | 0.9652 | 0.9449 | 1.0000 | 1.0000 | 0.9933 | 0.9848 | 1.0000 | 1.0000 | 1.0000 | ||||
TAF | 0.0859 | 0.0916 | 0.0137 | 0.0190 | 0.0242 | 0.0354 | 0.0410 | 0.0420 | 0.0410 | ||||
篡改类型 | 无意 | 无意 | 无意 | 无意 | 无意 | 无意 | 无意 | 无意 | 无意 | ||||
算法 | NC | 0.6666 | 0.7415 | 0.9270 | 0.9364 | 0.9264 | 0.9175 | 0.9059 | 0.8436 | 0.7740 | |||
算法 | 实验项目 | 剪切 | 重采样 | 随机删除列 | 混合攻击 | ||||||||
左上角1/16 | 左上角1/8 | 先缩小到0.5倍再放大到2倍 | 1列 | 2列 | JPEG 70+中心剪切1/16 | JPEG 70+随机删除1列 | |||||||
0.9727 | 0.9446 | 0.9470 | 0.9672 | 0.9294 | 0.9289 | 0.9405 | |||||||
本文算法 | W和 | 0.9734 | 0.9487 | 0.9530 | 0.9699 | 0.9429 | 0.9260 | 0.9429 | |||||
W和 | 0.9756 | 0.9489 | 0.9926 | 0.9964 | 0.9796 | 0.9708 | 0.9971 | ||||||
TAF | 0.0293 | 0.0591 | 0.0579 | 0.0356 | 0.0769 | 0.0752 | 0.0649 | ||||||
篡改类型 | 无意 | 无意 | 无意 | 无意 | 无意 | 无意 | 无意 | ||||||
算法 | NC | 0.9020 | 0.8776 | 0.8037 | 0.9251 | 0.9200 | 0.8429 | 0.8816 |
"
算法 | 实验项目 | 平滑 | 添加噪声 | JPEG压缩 | |||||||||
高斯滤波窗口大小为(3×3,s=1) | 中值滤波(窗口大小为3×3) | 高斯噪声 | 椒盐噪声 | 质量因子 | |||||||||
均值为方差为0, 0.0001 | 均值为方差为0, 0.0003 | 噪声密度为0.001 | 噪声密度为0.003 | 80 | 60 | 40 | |||||||
0.9325 | 0.9397 | 0.9842 | 0.9727 | 0.9728 | 0.9624 | 0.9441 | 0.9395 | 0.9341 | |||||
本文算法 | W和 | 0.9518 | 0.9603 | 0.9842 | 0.9727 | 0.9770 | 0.9701 | 0.9444 | 0.9397 | 0.9345 | |||
W和 | 0.9743 | 0.9764 | 0.9996 | 0.9996 | 0.9949 | 0.9894 | 0.9994 | 0.9994 | 0.9992 | ||||
TAF | 0.0784 | 0.0701 | 0.018 | 0.0315 | 0.0315 | 0.0432 | 0.0654 | 0.0703 | 0.0767 | ||||
篡改类型 | 无意 | 无意 | 无意 | 无意 | 无意 | 无意 | 无意 | 无意 | 无意 | ||||
算法 | NC | 0.7447 | 0.7694 | 0.8849 | 0.8981 | 0.8856 | 0.8869 | 0.8655 | 0.8139 | 0.7747 | |||
算法 | 实验项目 | 剪切 | 重采样 | 随机删除列 | 混合攻击 | ||||||||
左上角1/16 | 左上角1/8 | 先缩小到0.5倍再放大到2倍 | 1列 | 2列 | JPEG 70+中心剪切1/16 | JPEG 70+随机删除1列 | |||||||
0.9740 | 0.9447 | 0.9096 | 0.9501 | 0.9099 | 0.9099 | 0.9155 | |||||||
本文算法 | W和 | 0.9676 | 0.9213 | 0.9127 | 0.9514 | 0.9137 | 0.9033 | 0.9185 | |||||
W和 | 0.9735 | 0.9445 | 0.9956 | 0.9987 | 0.9920 | 0.9741 | 0.9970 | ||||||
TAF | 0.0293 | 0.0591 | 0.1047 | 0.0579 | 0.1047 | 0.1008 | 0.0994 | ||||||
篡改类型 | 无意 | 无意 | 无意 | 无意 | 无意 | 无意 | 无意 | ||||||
算法 | NC | 0.8655 | 0.8526 | 0.8387 | 0.8803 | 0.8796 | 0.8175 | 0.8359 |
"
算法 | 实验项目 | 平滑 | 添加噪声 | JPEG压缩 | |||||||||
高斯滤波(窗口大小为3×3,s=1) | 中值滤波窗口大小为3×3) | 高斯噪声 | 椒盐噪声 | 质量因子 | |||||||||
均值为0,方差为0.0001 | 均值为0,方差为0.0003 | 噪声密度为0.001 | 噪声密度为0.003 | 80 | 60 | 40 | |||||||
0.9196 | 0.9170 | 0.9805 | 0.9744 | 0.9710 | 0.9482 | 0.9609 | 0.9562 | 0.9629 | |||||
本文算法 | W和 | 0.9532 | 0.9688 | 0.9844 | 0.9793 | 0.9818 | 0.9704 | 0.9624 | 0.9582 | 0.9648 | |||
W和 | 0.9594 | 0.9399 | 0.9961 | 0.9951 | 0.9857 | 0.9675 | 0.9924 | 0.9916 | 0.9920 | ||||
TAF | 0.1003 | 0.1033 | 0.0244 | 0.0320 | 0.0361 | 0.0640 | 0.0486 | 0.0544 | 0.0461 | ||||
篡改类型 | 无意 | 无意 | 无意 | 无意 | 无意 | 无意 | 无意 | 无意 | 无意 | ||||
算法 | NC | 0.7478 | 0.7942 | 0.9314 | 0.9452 | 0.9264 | 0.9314 | 0.9052 | 0.8648 | 0.8088 | |||
算法 | 实验项目 | 剪切 | 重采样 | 随机删除列 | 混合攻击 | ||||||||
左上角1/16 | 左上角1/8 | 先缩小到0.5倍再放大到2倍 | 1列 | 2列 | JPEG 70+中心剪切1/16 | JPEG 70+随机删除1列 | |||||||
0.9760 | 0.9496 | 0.9323 | 0.9672 | 0.9262 | 0.9274 | 0.9360 | |||||||
本文算法 | W和 | 0.9699 | 0.9310 | 0.9499 | 0.9720 | 0.9444 | 0.9216 | 0.9412 | |||||
W和 | 0.9768 | 0.9514 | 0.9717 | 0.9940 | 0.9773 | 0.9609 | 0.9867 | ||||||
TAF | 0.0293 | 0.0591 | 0.0840 | 0.0413 | 0.0918 | 0.0872 | 0.0798 | ||||||
篡改类型 | 无意 | 无意 | 无意 | 无意 | 无意 | 无意 | 无意 | ||||||
算法 | NC | 0.9026 | 0.8902 | 0.8225 | 0.9200 | 0.9270 | 0.8546 | 0.8823 |
[1] | WANGX Y , HOUL M , WUJ . A feature-based robust digital image watermarking against geometric attacks[J]. Image and Vision Compu-ting, 2008,26(7): 980-989. |
[2] | 李旭东 . 抗几何攻击的空间域图像数字水印算法[J]. 自动化学报, 2008,34(7): 832-837. LIX D . Geometric attack resistant image watermarking n spatial do-main[J]. Acta Automatica Sinica, 2008,34(7): 832-837. |
[3] | 李旭东 . 基于小波变换和相对量化的图像数字水印算法[J]. 光电子.激光, 2010,21(9): 1378-1382. LIX D , . Image digital watermarking algorithm based on wavelet transform and relative quantization[J]. Journal of Optoelectronics Laser, 2010,21(9): 1378-1382. |
[4] | CHANGC C , LINP Y , YEHJ S . Preserving robustness and remova-bility for digital watermarks using subsampling and difference correla-tion[J]. Information Sciences, 2009,179(13): 2283-2293. |
[5] | WUX Y , GUANZ H . A novel digital watermark algorithm based on chaotic maps[J]. Physics Letters A, 2007,365(5-6): 403-406. |
[6] | WANGX Y , CUIC Y . A novel image watermarking scheme against desynchronization attacks by SVR revision[J]. Journal of Visual Communication and Image Representation, 2008,19(5): 334-342. |
[8] | LIL D , QIANJ S , PANJ S . Characteristic region based watermark embedding with RST invariance and high capacity[J]. International Journal of Electronics and Communications, 2011,65(5): 435-442. |
[9] | 张鸿宾, 杨成 . 图像的自嵌入及窜改的检测和恢复算法[J]. 电子学报, 2004,32(2): 196-199. ZHANGH B , YANGC . Tamper detection and self-recovery of im-ages using self-embedding[J]. Acta Electronica Sinica, 2004,32(2): 196-199. |
[10] | 张宪海, 杨永田 . 基于脆弱水印的图像认证算法研究[J]. 电子学报, 2007,35(1): 34-39. ZHANGH B , YANGY T . Image authentication scheme research based on fragile watermarking[J]. Acta Electronica Sinica, 2007,35(1): 34-39. |
[11] | 和红杰, 张家树 . 对水印信息篡改顽健的自嵌入水印算法[J]. 软件学报, 2009,20(2): 437-450. HEH J , ZHANGJ S . Self-embedding watermarking algorithm with robustness against watermark information alterations[J]. Journal of Soft-ware, 2009,20(2): 437-450. |
[12] | SCHLAUWEGM , PROFROCKD , PALFNERT , et al. Quantization-based semi-fragile public-key watermarking for secure image authen-tication[A]. Proc of SPIE[C]. San Diego, California, USA, 2005. 41-51. |
[13] | 李春, 黄继武 . 一种抗 JPEG 压缩的半脆弱图像水印算法[J]. 软件学报, 2006,17(2): 315-324. LIC , HUANGJ W . A semi-fragile image watermarking resisting to JPEG[J]. Journal of Software, 2006,17(2): 315-324. |
[7] | BEIY L , SANS J , . Color digital watermarking based on amplitude mod-ulation and SVR[J]. Journal of Communication and Computer, 2010,7(2): 37-42. |
[14] | 叶天语, 钮心忻, 杨义先 . 多功能双水印算法[J]. 电子与信息学报, 2009,31(3): 546-551. YET Y , NIUX X , YANGY X . A multi-purpose dual watermark al-gorithm[J]. Journal of Electronics & Information Technology, 2009,31(3): 546-551. |
[1] | Deyang WU, Sen HU, Miaomiao WANG, Haibo JIN, Changbo QU, Yong TANG. Discriminative zero-watermarking algorithm based on region XOR and ternary quantization [J]. Journal on Communications, 2022, 43(2): 208-222. |
[2] | Xi YIN,Weiqing HUANG. Research on color QR code watermarking technology based on chaos theory [J]. Journal on Communications, 2018, 39(7): 50-58. |
[3] | Wenxian JIANG,Zhenxing ZHANG,Jingjing WU. Reversible digital watermarking-based protocol for data integrity in wireless sensor network [J]. Journal on Communications, 2018, 39(3): 118-127. |
[4] | Feng XU,Jia-nan LI,Jian-guo SUN. Research of composite safety protection for digital maps [J]. Journal on Communications, 2016, 37(2): 174-179. |
[5] | Ming-zhu LAI,Li-guo ZHANG,Wei-miao FENG,Yuan-yuan WANG,Yong WANG,Shou-zheng LI. Study on authority watermark of the electronic chart based on the semantics characteristics [J]. Journal on Communications, 2016, 37(11): 137-145. |
[6] | . Image watermarking algorithm against attacks based on SIFT feature point and cross-ratio value [J]. Journal on Communications, 2014, 35(11): 20-180. |
[7] | Tian-yu YE. Self-embedding robust digital watermarking algorithm with perfectly blind detection [J]. Journal on Communications, 2012, 33(10): 7-15. |
[8] | Jian-guo SUN,Guo-yin ZHANG,Jun-peng WU,Ai-hong YAO. Performance verification of the digital watermarking for vector map based on SPA [J]. Journal on Communications, 2010, 31(9A): 239-244. |
[9] | Jian-guo SUN,Chao-guang MEN,Chun-guang MA,Cheng-ming LI. Authentication-based double images fractal watermarking model of vector maps [J]. Journal on Communications, 2009, 30(9): 24-28. |
[10] | Li LIU,Dai-yuan PENG,Xiao-ju LI. Secure video watermarking scheme for broadcast monitoring [J]. Journal on Communications, 2009, 30(8): 51-55. |
[11] | Hong-mei YANG,Yong-quan LIANG,Lian-shan LIU,Shu-juan JI. HVS-based imperceptibility measure of watermark in watermarked color image [J]. Journal on Communications, 2008, 29(2): 95-100. |
[12] | Quan WEN,Shu-xun WANG,Gang GUO,Yu-fei WNAG. Using Duffing equation chaotic phase change to detect digital watermarking [J]. Journal on Communications, 2008, 29(11A): 144-148. |
[13] | Wen-fa QI,Xiao-long LI,Bin YANG,Dao-fang CHENG. Document watermarking scheme for information tracking [J]. Journal on Communications, 2008, 29(10): 183-190. |
[14] | Xiang-yang WANG,Hong-ying YANG,Pan-pan NIU. Novel blind audio watermarking algorithm in the hybrid domain [J]. Journal on Communications, 2007, 28(2): 109-114. |
[15] | Hong-mei YANG,Yong-quan LIANG,Wen-xue WEI,Xiao-dong WANG. HVS-based imperceptibility evaluation of watermark in watermarked gray image [J]. Journal on Communications, 2007, 28(11A): 28-33. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|