计算机科学 ›› 2014, Vol. 41 ›› Issue (Z11): 263-267.

• 信息安全 • 上一篇    下一篇

一种基于CS-SIFT抗几何攻击的图像双水印算法

李浩,李宏昌   

  1. 武警工程大学信息工程系 西安710086;武警工程大学理学院 西安710086
  • 出版日期:2018-11-14 发布日期:2018-11-14

Geometric Attack Resisting Double-watermarking Algorithm Based on CS-SIFT

LI Hao and LI Hong-chang   

  • Online:2018-11-14 Published:2018-11-14

摘要: 利用压缩感知(CS)技术及图像尺度不变特征变换(SIFT),研究了一种既能抗几何攻击又能实现盲水印的方法。第一重版权水印经过扩频,嵌入在非抽样轮廓变换(NSCT)低频子带的DWT域中;第二重认证水印通过对含第一重水印的图像压缩感知生成,并作为零水印提交IPR数据库保存。提取水印时,先通过获取的零水印信息得到SIFT特征模板,并对含水印图像完整性进行验证及篡改定位和恢复,再根据SIFT特征点的尺度特征和坐标关系,对图像进行几何校正,使水印信息的提取位置同步。实验表明,该算法透明性良好、水印容量较大,而且对于常规攻击和多种几何攻击都具有良好的鲁棒性。

关键词: 数字水印,压缩感知,零水印,尺度不变特征变换,几何校正

Abstract: A geometric attack resisting and watermarking blind extraction implemented algorithm is proposed based on compressive sampling(CS) techniques and the SIFT feature.The first copyright watermarking is spectrum spread and embedded in DWT domain of NCST’s lower frequency band.The second watermarking is authentication watermarking.It is generated by compressive sampling of the first watermarking,and stored in IPR database as zero-watermarking.In the process of watermarking extraction,firstly,SIFT feature template is acquired through zero-watermarking,and it veri-fies the integrity of watermarked image,locates and restores alterations.Then the image is calibrated with scale features and coordinate relationship of SIFT feature points so as to update watermarking extracting locations.The simulation shows that,the proposed algorithm has huge watermarking capacity and favorable transparency.It is robust to ordinary attacks as well as several geometric attacks.

Key words: Digital watermarking,Compressive sampling(CS),Zero-watermarking,Scale invariant,Geometric calibration

[1] 夏建平,周激流,何坤,等.基于小波变换和Tucker分解的彩色图像数字水印[J].计算机应用研究,2010,7(2):798-800
[2] 何冰,朱志平.基于奇异值分解的抗几何攻击鲁棒性盲水印算法[J].技术研究,2012,1(3):71-73
[3] 张翼,唐向宏.基于图像归一化的抗几何攻击水印技术[J].电路与系统学报,2009,4(6):53-58
[4] Pereira A,Pun T.Robust template matching for affine resistant image watermarks [J].IEEE Transactions on Image Proces-sing,2000,9(6):1123-1129
[5] 楼偶俊.基于Contourlet域特征点的抗几何攻击水印方法[J].计算机研究与发展,2010,7(1):113-120
[6] 陈利利,王向阳.基于SIFT的椭圆区域鲁棒数字水印方案[J].计算机工程与应用,2012,8(1):98-101,7
[7] 赵文娴,王玲,杨韫饴.基于SIFT的NSCT-SVD域水印算法[J].计算机工程与应用,2012,8(10):106-110
[8] Candes E J,Wakin M B.An introduction to compressive sampling[J].IEEE Signal Processing Magazine,2008,25(2):21-30
[9] Baraniuk R,Davenport M,Devore R,et al.A simple proof of the restricted isometry property for random matrices[J].Constructive Approximation,2008,8(3):253-263
[10] Dossal C,Reyre G,Fadili J.A numerical exploration of com-pressed sampling recovery[J].Linear algebra and Its Applications,2010,2(7):1663-1679
[11] Low D G.Object recognition from local scale-invariant features [C]∥International Conference on Computer Vision.Corfu,Greece,1999(9):1150-1157
[12] Lowe D G.Distinctive image features from scal-invariant keypoints[J].Internatonal Journal on computer Vision,2004,60(2):91-110

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!