咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Rotation, scaling, and transla... 收藏

Rotation, scaling, and translation resilient watermarking for images

作     者:Lin, Y. -T. Huang, C. -Y. Lee, G. C. 

作者机构:Natl Chi Nan Univ Inst Curriculum Instruct & Technol Nantou City Taiwan Natl Taiwan Normal Univ Dept Comp Sci & Informat Engn Taipei Taiwan 

出 版 物:《IET IMAGE PROCESSING》 (IET Image Proc.)

年 卷 期:2011年第5卷第4期

页      面:328-340页

核心收录:

学科分类:0808[工学-电气工程] 1002[医学-临床医学] 08[工学] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:National Science Council Ministry of Education of China [NSC 98-2221-E-260-039, NSC 97-2511-S-003- 007-MY3, NSC 97-2631-S-003-003, NSC97-2631-H-003- 001, NSC97-2218-E-003-001] 

主  题:DIGITAL image watermarking SYNCHRONIZATION EMBEDDINGS (Mathematics) ROBUST control PATTERN perception ALGORITHMS COMPUTATIONAL complexity 

摘      要:Traditional watermarking schemes are sensitive to geometric distortions, in which synchronisation for recovering embedded information is a challenging task because of the disorder caused by rotation, scaling or translation (RST). The existing RST-resistant watermarking methods still have limitations with respect to robustness, capacity or fidelity. In this study, the authors address several major problems in RST-invariant watermarking. The first point is how to take advantage of the high RST resilience of scale-invariant feature transform (SIFT) features, which show good performance in terms of RST-resistant pattern recognition. Since many keypoint-based watermarking methods do not discuss cropping attacks, the second issue discussed in this study is how to resist cropping using a human visual system (HVS), which also helps us to eliminate computational complexity. The third issue is the investigation of an HVS-based watermarking strategy for extracting only feature points in the human attentive area. Lastly, a variable-length watermark synchronisation algorithm using dynamic programming is proposed. Experimental results show that the proposed algorithms are practical and show superior performance in comparison with many existing works in terms of watermark capacity, watermark transparency, and the resistance to RST attacks.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分