首页 | 官方网站   微博 | 高级检索  
     

基于混沌的Contourlet域抗几何攻击图像水印算法
引用本文:李 峰,陈光喜,丁 勇.基于混沌的Contourlet域抗几何攻击图像水印算法[J].计算机应用研究,2012,29(11):4327-4330.
作者姓名:李 峰  陈光喜  丁 勇
作者单位:桂林电子科技大学 a. 广西可信软件重点实验室 b. 数学与计算科学学院,广西 桂林,541004
基金项目:国家自然科学基金资助项目(60963024); 广西可信软件重点实验室开放基金
摘    要:为了提高水印算法的抗几何攻击性和自适应性,提出了一种基于混沌的Contourlet域抗几何攻击的自适应图像水印算法。首先对载体图像进行Contourlet变换,并对低频子带进行分块奇异值分解,然后根据HVS原理自适应地将混沌加密后的水印信息嵌入到每块的最大奇异值中;最后使用改进的Harris-Laplace算子提取含水印图像的特征点。水印提取时利用受攻击前后图像的特征点矫正图像的几何变形。实验表明,该算法对JPEG压缩、滤波、加噪、旋转、缩放和平移等常规的图像处理和几何攻击具有很强的鲁棒性。

关 键 词:数字水印  Contourlet变换  几何攻击  特征点  混沌  自适应性

Image watermarking algorithm against geometrical attacks inContourlet domain based on chaos
LI Feng,CHEN Guang-xi,DING Yong.Image watermarking algorithm against geometrical attacks inContourlet domain based on chaos[J].Application Research of Computers,2012,29(11):4327-4330.
Authors:LI Feng  CHEN Guang-xi  DING Yong
Affiliation:a. Guangxi Key Laboratory of Trusted Software, b. School of Mathematics & Computational Science, Guilin University of Electronic Technology, Guilin Guangxi 541004, China
Abstract:In order to improve the robustness against geometrical attacks and self-adaptability, this paper proposed an adaptive image watermarking algorithm in Contourlet domain based on chaos. Firstly, it applied a Contourlet transform to the cover image, and divided the low frequency sub-band into many blocks which were decomposed with singular value decompositionSVD. Secondly, it adaptively embedded the watermark information with chaotic encryption into the largest singular value of every block based on human visual system HVS. Finally, it extracted the feature points by the improved Harris-Laplace operator. During detection, restored the attacked imageby using feature points of it and those of the watermarked image. Experimental results show the proposed algorithm is robust to common image processing and geometric attacks such as JPEG compression, filtering, noise addition, rotation, scaling and translation.
Keywords:digital watermarking  Contourlet transform  geometric attacks  feature points  chaos  self-adaptability
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机应用研究》浏览原始摘要信息
点击此处可从《计算机应用研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号