• 综合性科技类中文核心期刊
    • 中国科技论文统计源期刊
    • 中国科学引文数据库来源期刊
    • 中国学术期刊文摘数据库(核心版)来源期刊
    • 中国学术期刊综合评价数据库来源期刊
JIANG Nan, HAO Li-gang, ZHU Xiao-lu. Digital Watermarking Algorithm Based on Dual Circulation[J]. Journal of Beijing University of Technology, 2012, 38(11): 1694-1697,1715.
Citation: JIANG Nan, HAO Li-gang, ZHU Xiao-lu. Digital Watermarking Algorithm Based on Dual Circulation[J]. Journal of Beijing University of Technology, 2012, 38(11): 1694-1697,1715.

Digital Watermarking Algorithm Based on Dual Circulation

More Information
  • Received Date: March 20, 2011
  • Available Online: December 02, 2022
  • To solve the problems of resisting to joint attacks and the low extraction accuracy rate that exist in present digital watermarking algorithms,a block fast fourier transtorm(FFT) based on digital watermarking algorithm was proposed.The algorithm normalized the image size and modified the values of blocked FFT coefficients according to the watermark.Watermark was embedded in accordance with the dual circulation.When extracting,the values of FFT coefficients indicated the watermark.Experimental results show that this algorithm can increase resistance to noise filtering and other conventional signal processing attacks;JPEG compression;rotation,translation and scaling attack;cropping and splicing attacks;and their combined attack.The bit error rate is almost 0.
  • [1]
    DONG Ping,BRANKOV Jovan G,GALATSANOS Nilolas P,et al.Digital watermarking robust to geometric distortions[J].IEEE Transactions on Image Processing,2005,14(12):2140-2150.
    [2]
    JEANLUC Dugelay,STPHANE Roche,CHRISTIAN Rey,et al.Still-image watermarking robust to local geometric distortions[J].IEEE Transactions on Image Processing,2006,15(9):2831-2842.
    [3]
    LEE Ming-sui,CHIU Yu-hsiang.Image recovery of geometric distortion with multi-bit data embedding[C]∥Proceedings of the IEEE International Conference on Multimedia & Expo 2010.Singapore:IEEE Press,2010:382-387.
    [4]
    DARIUSZ Bogumil.Reversing global and local geometrical distortions in image watermarking[C]∥Lecture Notes in Computer Science 3200.Toronto:Springer,2004:25-37.
    [5]
    SVIATOSLAY Voloshynovskiy,FRKDKRIC Deguillaume,PUN Thiewy.Multibit digital watermarking robust against local nonlinear geometrical distortions[C]∥Proceedings of the IEEE International Conference on Image Processing 2001.Thessaloniki:IEEE Press,2001:999-1002.
    [6]
    王志伟,朱长青,殷硕文,等.一种基于DFT的DEM自适应数字水印算法[J].中国图像图形学报,2010,15(5):796-801.WANG Zhi-wei,ZHU Chang-qing,YIN Shuo-wen,et al.An adaptive watermarking algorithm for DEM based on DFT[J].Journal of Images and Graphics,2010,15(5):796-801.(in Chinese)
    [7]
    ZHOU Ya-xun,JIN Wei.An adaptive robust digital image watermark based on the discrete operation[C]∥Proceedings of the 2010 International Conference on Multimedia Technology.Ningbo:IEEE Press,2010:1-4.
    [8]
    伍宏涛,胡云,钮心忻,等.抗JPEG压缩和图像合并的水印算法[J].电子与信息学报,2005,27(6):914-918.WU Hong-tao,HU Yun,NIU Xin-xin,et al.Watermarking algorithm with resistance to JPEG lossy compressing and images uniting[J].Journal of Electronics and Information Technology,2005,27(6):914-918.(in Chinese)
    [9]
    CHOU Chun-hsien,LIU Kuo-cheng.A perceptually tuned watermarking scheme for color images[J].IEEE Transactions on Image Processing,2010,19(11):2966-2982.
    [10]
    KUTTER M,BHATTACHARJEE S K,EBRAHIMI T.Towards second generation watermarking schemes[C]∥Proceedings of the IEEE International Conference on Image Processing.Kobe:IEEE Press,1999:320-323.
    [11]
    WANG Xiang-yang,WU Jun,NIU Pan-pan.A new digital image watermarking algorithm resilient to desynchronization attacks[J].IEEE Transactions on Information Forensics and Security,2007,2(4):655-663.
    [12]
    王向阳,侯丽敏,邬俊.基于图像特征点的强鲁棒数字水印嵌入方案[J].自动化学报,2008,34(1):1-6.WANG Xiang-yang,HOU Li-min,WU Jun.Feature-based digital image watermarking scheme robust to geometric attacks[J].Acta Automatica Sinica,2008,34(1):1-6.(in Chinese)
    [13]
    KANG Xian-gui,HUANG Ji-wu,ZENG Wen-jun.Efficient general print-scanning resilient data hiding based on uniform log-polar mapping[J].IEEE Transactions on Information Forensics and Security,2010,5(1):1-12.
    [14]
    楼偶俊.基于Contourlet域特征点的抗几何攻击水印方法[J].计算机研究与发展,2010,47(1):113-120.LOU Ou-jun.Feature point based image watermarking scheme in Contourlet domain against geometrical attacks[J].Journal of Computer Research and Development,2010,47(1):113-120.(in Chinese)
  • Related Articles

    [1]ZHAN Jing, CHEN Peng, ZHANG Qian, LI Yongzhen, ZHAO Yong. Survey on Code Reuse Attack and Defense Technology Evolution[J]. Journal of Beijing University of Technology, 2024, 50(5): 632-650. DOI: 10.11936/bjutxb2022070008
    [2]WANG Wei, ZHU Junyi, LIU Chaofeng, WANG Zhitao. Anti-destructive and Robustness of Urban Epidemic Prevention Medical Rescue Network[J]. Journal of Beijing University of Technology, 2024, 50(5): 583-590. DOI: 10.11936/bjutxb2023050018
    [3]LIU Kun, ZENG En, LIU Bohan, LI Junda, LI Jiangrong. Adversarial Attack and Defense Method Based on Multivariable Time Series Data[J]. Journal of Beijing University of Technology, 2023, 49(4): 415-423. DOI: 10.11936/bjutxb2022090028
    [4]WANG Xiujuan, XIANG Congbin. DoS Attack Detecting Algorithm Based on Accumulation[J]. Journal of Beijing University of Technology, 2017, 43(9): 1328-1334. DOI: 10.11936/bjutxb2016090074
    [5]YAN Ying-jian, YANG Chang-sheng, LI Wei, ZHANG Li-chao. Power Analysis Attack of Grain-128 Stream Cipher[J]. Journal of Beijing University of Technology, 2015, 41(6): 842-850. DOI: 10.11936/bjutxb2014120031
    [6]LI Jianjun, FANG Juan, JI Qi, LIU Peng, MAO Junjie, LIN Li, JIANG Wei. FPGA-based Trusted Platform Module Attack[J]. Journal of Beijing University of Technology, 2013, 39(1): 70-75.
    [7]CAI Yong-quan, ZHANG En, HE Jing-yang. (t,n) Threshold Signature Scheme Withstanding the Conspiracy Attack[J]. Journal of Beijing University of Technology, 2011, 37(8): 1231-1235.
    [8]GUO Chun-xia, LIU Zeng-liang, XU Xin, MIAO Qing, TAO Yuan. Network Attackers Behavior Characteristics and Planning Algorithm[J]. Journal of Beijing University of Technology, 2011, 37(4): 619-623.
    [9]HU Zhi-hua. Differential Algebraic Attack of Serpent[J]. Journal of Beijing University of Technology, 2010, 36(5): 651-653.
    [10]DING Li, ZHOU Yuan, QIAN Hai-feng. Security Analysis and Improvement of Digital Multi-signature on the Generalized Conic Curve[J]. Journal of Beijing University of Technology, 2010, 36(5): 646-650.

Catalog

    Article views (16) PDF downloads (7) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return