Computer Science ›› 2014, Vol. 41 ›› Issue (Z11): 263-267.

Previous Articles     Next Articles

Geometric Attack Resisting Double-watermarking Algorithm Based on CS-SIFT

LI Hao and LI Hong-chang   

  • Online:2018-11-14 Published:2018-11-14

Abstract: A geometric attack resisting and watermarking blind extraction implemented algorithm is proposed based on compressive sampling(CS) techniques and the SIFT feature.The first copyright watermarking is spectrum spread and embedded in DWT domain of NCST’s lower frequency band.The second watermarking is authentication watermarking.It is generated by compressive sampling of the first watermarking,and stored in IPR database as zero-watermarking.In the process of watermarking extraction,firstly,SIFT feature template is acquired through zero-watermarking,and it veri-fies the integrity of watermarked image,locates and restores alterations.Then the image is calibrated with scale features and coordinate relationship of SIFT feature points so as to update watermarking extracting locations.The simulation shows that,the proposed algorithm has huge watermarking capacity and favorable transparency.It is robust to ordinary attacks as well as several geometric attacks.

Key words: Digital watermarking,Compressive sampling(CS),Zero-watermarking,Scale invariant,Geometric calibration

[1] 夏建平,周激流,何坤,等.基于小波变换和Tucker分解的彩色图像数字水印[J].计算机应用研究,2010,7(2):798-800
[2] 何冰,朱志平.基于奇异值分解的抗几何攻击鲁棒性盲水印算法[J].技术研究,2012,1(3):71-73
[3] 张翼,唐向宏.基于图像归一化的抗几何攻击水印技术[J].电路与系统学报,2009,4(6):53-58
[4] Pereira A,Pun T.Robust template matching for affine resistant image watermarks [J].IEEE Transactions on Image Proces-sing,2000,9(6):1123-1129
[5] 楼偶俊.基于Contourlet域特征点的抗几何攻击水印方法[J].计算机研究与发展,2010,7(1):113-120
[6] 陈利利,王向阳.基于SIFT的椭圆区域鲁棒数字水印方案[J].计算机工程与应用,2012,8(1):98-101,7
[7] 赵文娴,王玲,杨韫饴.基于SIFT的NSCT-SVD域水印算法[J].计算机工程与应用,2012,8(10):106-110
[8] Candes E J,Wakin M B.An introduction to compressive sampling[J].IEEE Signal Processing Magazine,2008,25(2):21-30
[9] Baraniuk R,Davenport M,Devore R,et al.A simple proof of the restricted isometry property for random matrices[J].Constructive Approximation,2008,8(3):253-263
[10] Dossal C,Reyre G,Fadili J.A numerical exploration of com-pressed sampling recovery[J].Linear algebra and Its Applications,2010,2(7):1663-1679
[11] Low D G.Object recognition from local scale-invariant features [C]∥International Conference on Computer Vision.Corfu,Greece,1999(9):1150-1157
[12] Lowe D G.Distinctive image features from scal-invariant keypoints[J].Internatonal Journal on computer Vision,2004,60(2):91-110

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!