Citation: | JIANG Nan, HAO Li-gang, ZHU Xiao-lu. Digital Watermarking Algorithm Based on Dual Circulation[J]. Journal of Beijing University of Technology, 2012, 38(11): 1694-1697,1715. |
[1] |
DONG Ping,BRANKOV Jovan G,GALATSANOS Nilolas P,et al.Digital watermarking robust to geometric distortions[J].IEEE Transactions on Image Processing,2005,14(12):2140-2150.
|
[2] |
JEANLUC Dugelay,STPHANE Roche,CHRISTIAN Rey,et al.Still-image watermarking robust to local geometric distortions[J].IEEE Transactions on Image Processing,2006,15(9):2831-2842.
|
[3] |
LEE Ming-sui,CHIU Yu-hsiang.Image recovery of geometric distortion with multi-bit data embedding[C]∥Proceedings of the IEEE International Conference on Multimedia & Expo 2010.Singapore:IEEE Press,2010:382-387.
|
[4] |
DARIUSZ Bogumil.Reversing global and local geometrical distortions in image watermarking[C]∥Lecture Notes in Computer Science 3200.Toronto:Springer,2004:25-37.
|
[5] |
SVIATOSLAY Voloshynovskiy,FRKDKRIC Deguillaume,PUN Thiewy.Multibit digital watermarking robust against local nonlinear geometrical distortions[C]∥Proceedings of the IEEE International Conference on Image Processing 2001.Thessaloniki:IEEE Press,2001:999-1002.
|
[6] |
王志伟,朱长青,殷硕文,等.一种基于DFT的DEM自适应数字水印算法[J].中国图像图形学报,2010,15(5):796-801.WANG Zhi-wei,ZHU Chang-qing,YIN Shuo-wen,et al.An adaptive watermarking algorithm for DEM based on DFT[J].Journal of Images and Graphics,2010,15(5):796-801.(in Chinese)
|
[7] |
ZHOU Ya-xun,JIN Wei.An adaptive robust digital image watermark based on the discrete operation[C]∥Proceedings of the 2010 International Conference on Multimedia Technology.Ningbo:IEEE Press,2010:1-4.
|
[8] |
伍宏涛,胡云,钮心忻,等.抗JPEG压缩和图像合并的水印算法[J].电子与信息学报,2005,27(6):914-918.WU Hong-tao,HU Yun,NIU Xin-xin,et al.Watermarking algorithm with resistance to JPEG lossy compressing and images uniting[J].Journal of Electronics and Information Technology,2005,27(6):914-918.(in Chinese)
|
[9] |
CHOU Chun-hsien,LIU Kuo-cheng.A perceptually tuned watermarking scheme for color images[J].IEEE Transactions on Image Processing,2010,19(11):2966-2982.
|
[10] |
KUTTER M,BHATTACHARJEE S K,EBRAHIMI T.Towards second generation watermarking schemes[C]∥Proceedings of the IEEE International Conference on Image Processing.Kobe:IEEE Press,1999:320-323.
|
[11] |
WANG Xiang-yang,WU Jun,NIU Pan-pan.A new digital image watermarking algorithm resilient to desynchronization attacks[J].IEEE Transactions on Information Forensics and Security,2007,2(4):655-663.
|
[12] |
王向阳,侯丽敏,邬俊.基于图像特征点的强鲁棒数字水印嵌入方案[J].自动化学报,2008,34(1):1-6.WANG Xiang-yang,HOU Li-min,WU Jun.Feature-based digital image watermarking scheme robust to geometric attacks[J].Acta Automatica Sinica,2008,34(1):1-6.(in Chinese)
|
[13] |
KANG Xian-gui,HUANG Ji-wu,ZENG Wen-jun.Efficient general print-scanning resilient data hiding based on uniform log-polar mapping[J].IEEE Transactions on Information Forensics and Security,2010,5(1):1-12.
|
[14] |
楼偶俊.基于Contourlet域特征点的抗几何攻击水印方法[J].计算机研究与发展,2010,47(1):113-120.LOU Ou-jun.Feature point based image watermarking scheme in Contourlet domain against geometrical attacks[J].Journal of Computer Research and Development,2010,47(1):113-120.(in Chinese)
|
[1] | ZHAN Jing, CHEN Peng, ZHANG Qian, LI Yongzhen, ZHAO Yong. Survey on Code Reuse Attack and Defense Technology Evolution[J]. Journal of Beijing University of Technology, 2024, 50(5): 632-650. DOI: 10.11936/bjutxb2022070008 |
[2] | WANG Wei, ZHU Junyi, LIU Chaofeng, WANG Zhitao. Anti-destructive and Robustness of Urban Epidemic Prevention Medical Rescue Network[J]. Journal of Beijing University of Technology, 2024, 50(5): 583-590. DOI: 10.11936/bjutxb2023050018 |
[3] | LIU Kun, ZENG En, LIU Bohan, LI Junda, LI Jiangrong. Adversarial Attack and Defense Method Based on Multivariable Time Series Data[J]. Journal of Beijing University of Technology, 2023, 49(4): 415-423. DOI: 10.11936/bjutxb2022090028 |
[4] | WANG Xiujuan, XIANG Congbin. DoS Attack Detecting Algorithm Based on Accumulation[J]. Journal of Beijing University of Technology, 2017, 43(9): 1328-1334. DOI: 10.11936/bjutxb2016090074 |
[5] | YAN Ying-jian, YANG Chang-sheng, LI Wei, ZHANG Li-chao. Power Analysis Attack of Grain-128 Stream Cipher[J]. Journal of Beijing University of Technology, 2015, 41(6): 842-850. DOI: 10.11936/bjutxb2014120031 |
[6] | LI Jianjun, FANG Juan, JI Qi, LIU Peng, MAO Junjie, LIN Li, JIANG Wei. FPGA-based Trusted Platform Module Attack[J]. Journal of Beijing University of Technology, 2013, 39(1): 70-75. |
[7] | CAI Yong-quan, ZHANG En, HE Jing-yang. (t,n) Threshold Signature Scheme Withstanding the Conspiracy Attack[J]. Journal of Beijing University of Technology, 2011, 37(8): 1231-1235. |
[8] | GUO Chun-xia, LIU Zeng-liang, XU Xin, MIAO Qing, TAO Yuan. Network Attackers Behavior Characteristics and Planning Algorithm[J]. Journal of Beijing University of Technology, 2011, 37(4): 619-623. |
[9] | HU Zhi-hua. Differential Algebraic Attack of Serpent[J]. Journal of Beijing University of Technology, 2010, 36(5): 651-653. |
[10] | DING Li, ZHOU Yuan, QIAN Hai-feng. Security Analysis and Improvement of Digital Multi-signature on the Generalized Conic Curve[J]. Journal of Beijing University of Technology, 2010, 36(5): 646-650. |