首页 | 本学科首页   官方微博 | 高级检索  
     检索      

抗几何攻击的数字图像版权保护算法
引用本文:郝红杰,吴一全.抗几何攻击的数字图像版权保护算法[J].南京航空航天大学学报(英文版),2007,24(4):335-342.
作者姓名:郝红杰  吴一全
作者单位:南京航空航天大学信息科学与技术学院,江苏,210016,中国
基金项目:中国博士后科学基金 , 南京航空航天大学校科研和教改项目
摘    要:为了在保证图像质量的前提下实施图像的版权保护,提出了一种基于Krawtchouk矩和标识信息的零水印算法.该方法利用从图像中提取的特征信息来构造水印,从而达到版权保护的目的.主要步骤为,首先计算原始图像的Krawtchouk低阶矩不变量来构建水印信息,接着将水印信息和密钥信息在第三方登记注册并获得标识信息,最后通过标识信息确认版权所有者.水印提取过程简单,只需计算所得图像的几个低阶Krawtchouk矩不变量.文中给出了实验结果,并与传统几何矩不变量的算法进行了比较. 结果表明,该方法对旋转、缩放、剪切、组合攻击、平移和去掉行等几何攻击以及滤波、JPEG压缩等攻击具有更高的稳健性.

关 键 词:图像版权保护  数字水印  几何攻击  Kraw-tchouk矩不变量  image  copyright  protection  digital  watermarking  geometrical  attack  Krawtchouk  moment  invariant  抗几何攻击  数字图像  版权  保护算法  GEOMETRICAL  ATTACKS  IMAGE  COPYRIGHT  PROTECTION  compression  filtering  removing  lines  combined  geometrical  attacks  scaling  show  scheme  Experimental  results  computed  processing  method
文章编号:1005-1120(2007)04-0335-08
修稿时间:2006年9月27日

NEW APPROACH TO COPYRIGHT PROTECTION OF IMAGE AGAINST GEOMETRICAL ATTACKS
Hao Hongjie,Wu Yiquan.NEW APPROACH TO COPYRIGHT PROTECTION OF IMAGE AGAINST GEOMETRICAL ATTACKS[J].Transactions of Nanjing University of Aeronautics & Astronautics,2007,24(4):335-342.
Authors:Hao Hongjie  Wu Yiquan
Abstract:To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in which features are drawn out from the image as the watermarking. The main steps of the method are presented. Firstly, some low-order moment invariants of the image are extracted. Secondly, the moment invariants and the key are registered to a fair third party to gain the timestamp. Finally, the timestamp can be used to prove who the real owner is. The processing method is simple, only with a few low-order moment invariants to be computed. Experimental results are obtained and compared with those of the method based on geometric moment invariants. Results show that the scheme can well withstand such geometrical attacks as rotating, scaling, cropping, combined attack, translating, removing lines, filtering, and JPEG lossy compression.
Keywords:image copyright protection  digital watermarking  geometrical attack  Krawtchouk moment invariant
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号