|Table of Contents|

Multi-bit Watermark Algorithm Resisting Local Geometric Attacks


Research Field:
Publishing date:


Multi-bit Watermark Algorithm Resisting Local Geometric Attacks
WANG Dan12LU Pei-zhong12
1.Department of Computer Science and Engineering,Fudan University,Shanghai 200433,China;2.Southwest Institute of Electronic and Telecommunication Technique,Shanghai 200434,China
watermark geometrical attacks multi-bits feature points fast correlation attacks random bending attacks
A novel local geometrical invariant multi-bit watermark algorithm based on decoding using fast correlation attacks is proposed in this paper.The binary bit sequences of watermark as the initial state are fed into the linear feedback shift register,and the output sequence is embedded into the triangles which are obtained according to the scale-space Harris feature points and Delaunay tessellations.During the extraction,the embedded watermark is extracted according to the fast correlation attacks technique which has powerful error-correcting capacity.Simulation results show that the proposed algorithm is highly robust against various attacks including rotation scaling translation,cropping,even random bending attack in StirMark,JPEG compression and filtering and so on.


[1]Bas P, Chassery JM, M acq B. Geom etr ica lly invariant w aterm ark ing using feature po ints [ J]. IEEE Trans on Im age Processing, 2002, 11 ( 9): 1 014- 1 028.
[2] 王金伟, 戴跃伟, 王执铨. 一种置换DCT 域中频系 数的盲水印算法[ J] . 南京理工大学学报(自然科 学版), 2005(增) : 15- 19.
[3] Dong P, Brankov J G. D ig ita lw ate rm ark ing robust to g eom etr ic d istortions [ J]. IEEE Trans on Im age Pro?? cessing, 2005, 14 ( 12): 2 140- 2 150.
[4] Lu P Z, W ang D. A geom etr ica l robust im age da ta hid?? ing schem e using FCA??based resynchronization [ A ]. Proc of 9th Info rma tion H id ing W orkshop ( IH2007) [ C]. St??Ma lo: Springer??Ve rlag, 2007. 267- 278.
[5] Petitco las F. Stirm ark4. 0 [ EB /OL], [ Online]: ht?? tp: / /www. c.l cam. ac. uk /use rs / fapp2 /w aterm arking / stirm ark, 2006.
[6] H arris C, StephenM. A comb ined co rner and edge de?? tector [ A] . Proc of the 4th A lvey V ision Conf [ C ]. Manchester: Spr inger??Verlag, 1988. 147- 151.
[7] Low e D G. D istinc tive im age features from sca le??inva r?? iant keypo ints [ J]. Int J Com pute V ision, 2004, 60: 99- 110.
[8] S iegenthaler T. Decrypting a c lass of stream c iphers u?? sing c iphe rtex t on ly [ J] . IEEE T rans on Com put, 1985, 34: 81- 85. (上接第405页)
[14] 李飞, 高济, 刘柏嵩, 等. 知识管理中语义与关键字 相结合的检索方法. 计算机辅助设计与图形学学 报, 2004, 16( 12) : 1 696- 1 702.


Last Update: 2012-12-19