期刊文献+

一种基于支持向量回归机的稳健数字图像水印算法 被引量:1

A robust image digital watermarking based on support vector regression
下载PDF
导出
摘要 提出一种支持向量回归机SVR的数字图像水印算法.选择载体图像平滑区域中心像素及其7×7邻域做为SVR的训练样本,利用SVR的学习和泛化能力,建立图像空域像素邻域之间的SVR模型,通过调整中心像素值实现水印嵌入.实验结果表明,该算法具有良好的不可感知性,对JPEG压缩、椒盐噪声、高斯低通滤波、模糊、锐化、剪切、尺寸变化等攻击有较强的稳健性.同时提取水印过程不需要原始载体图像,可实现水印的盲检测. An digital image watermarking algorithm based on support vector regression(SVR)is proposed in this paper.Firstly,7×7 neighbors of center pixel in smoothing areas is chosen as training samples.Then,the SVR model between the neighbors pixels and center pixel in spatial domain is constructed utilizing the good learning ability and generalization ability of SVR.Finally,the watermark is embedded by adjusting the value of center pixel.Experimental results show that this algorithm has the good unperceptibility and the strong robustness for the JPEG compression,the spiced salt noise,Gauss lowpass filter,blur,sharpen,cropping and size transformation.The algorithm is a blind watermarking because of the process of extracting watermark without the original digital image.
出处 《大庆石油学院学报》 CAS 北大核心 2008年第6期106-108,114,共4页 Journal of Daqing Petroleum Institute
基金 黑龙江省科技厅科技攻关项目(GZ06A102) 黑龙江省教育厅科学技术研究项目(11513007)
关键词 数字图像水印 支持向量回归机(SVR) 不可感知性 稳健性 digital image watermarking support vector regression(SVR) unperceptibility robustness
  • 相关文献

参考文献5

  • 1邓乃扬,田英杰.数据挖掘中的新方法-支持向量机[M].北京:科学出版社,2006.
  • 2STEVE R G. Support vector machines for classification and regression[R]. Technical report. Southampton University of Southampton, Faeuhy of Engineering, Science and Mathematics Scod of Electronics and Computer Science, 2003:1--28.
  • 3李三平,张毓森,尹康银.基于支持向量机的小波域图像水印算法[J].系统工程与电子技术,2008,30(2):354-357. 被引量:14
  • 4MAYANK V, RICHA S, AFZEI. N. Improving biometric recognition accuracy and robustness using DWT and SVM watermarking[J]. IEICE Electronics express, 2005,2(12):362-367.
  • 5李春花,卢正鼎.一种基于支持向量机的图像数字水印算法[J].中国图象图形学报,2006,11(9):1322-1326. 被引量:23

二级参考文献18

  • 1van Schyndel R G, Tirkel A Z, Osborne C F. A digital watermark[A]. In: Proceedings of the IEEE International Conference on Image Processing[C], Austin, Texas, USA, 1994, 2: 86-90.
  • 2Nikolaidis N, Pitas I. Copyright protection of images using robust digital signatures [A]. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing [C],Atlanta, Georgia, USA, 1996, 4:2168-2171.
  • 3Cox I J, Kilian J, Leighton F T, et al. Secure spread spectrum watermarking for multimedia [J]. IEEE Transactions on Image Processing. 1997, 6(12): 1673-1687.
  • 4Hsu Chion-ting, Wu Ja-ling. Multiresolution watermarking for digital image[J]. IEEE Transactions on Circuits and Systems Ⅱ: Analog and Digital Signal Processing, 1998, 45 (8): 1097-1101.
  • 5Lou Der-chyuan, Liu Jiang-lung, Hu Ming-chiang. Adaptive digital watermarking using neural network technique[A]. In: Proceedings of the IEEE International Carnahan Conference on Security Technology[C], Taipei, Taiwan, 2003: 325-332.
  • 6Davis K J, Najarian K. Maximizing strength of digital watermarks using neural networks[A]. In: Proceedings of the International Joint Conference on Neural Networks [C], Washington DC, USA, 2001,4:2893-2898.
  • 7Shieh C S, Huang H C, Wang F H, et al. Genetic watermarking based on transform-domain techniques [J]. Pattern Recognition,2004, 37(3): 555-565.
  • 8Pereira S, Voloshynoskiy S, Pun T. Optimal transform domains watermark embedding via linear programming[J]. Signal Processing,2001, 81(6):1251-1260.
  • 9[美]Vapnik V N著,张学工译.统计学习理论的本质[M].北京:清华大学出版社,2000.
  • 10Li Chun-hua, Lu Zheng-ding, Zhou Ke. SVR-Parameters Selection for Image watermarking [A]. In: Proceedings of 17th IEEE International Conference on Tools with Artificial Intelligence [C],Hongkong, China, 2005: 466-470.

共引文献44

同被引文献17

  • 1吕秀丽,年桂君,王秀梅,陶利军.双重置乱技术在数字水印中的应用[J].大庆石油学院学报,2005,29(4):133-135. 被引量:2
  • 2张建贵,邓胜前,陈凌剑.确定图像降质的鲁棒性数字水印嵌入算法[J].光学技术,2006,32(4):548-552. 被引量:3
  • 3曲宝,程玉光,乔健,林国欣.基于小波域数字水印的有序多重签名方案[J].大庆石油学院学报,2007,31(4):95-97. 被引量:1
  • 4Taha M. Mohamed,Hesham N. Elmahdy,Hoda M. Onsi.Efficient watermark detection by using the longest common substring technique[J]Egyptian Informatics Journal,2011(2).
  • 5Imran Usman,Asifullah Khan.BCH coding and intelligent watermark embedding: Employing both frequency and strength selection[J]Applied Soft Computing Journal,2009(1).
  • 6Rafiullah Chamlawi,Asifullah Khan,Imran Usman.Authentication and recovery of images using multiple watermarks[J]Computers and Electrical Engineering,2009(3).
  • 7Dimitrios Tsolis,Spiridon Nikolopoulos,Lambros Drossos,Spyros Sioutas,Theodore Papatheodorou.Applying robust multibit watermarks to digital images[J]Journal of Computational and Applied Mathematics,2008(1).
  • 8Santa Agreste,Guido Andaloro.A new approach to pre-processing digital image for wavelet-based watermark[J]Journal of Computational and Applied Mathematics,2007(2).
  • 9Michalis Xenos,Katerina Hantzara,Evanthia Mitsou,Ioannis Kostopoulos.A model for the assessment of watermark quality with regard to fidelity[J]Journal of Visual Communication and Image Representation,2005(6).
  • 10Aidan Mooney,John G. Keating,Daniel M. Heffernan.A detailed study of the generation of optically detectable watermarks using the logistic map[J]Chaos Solitons and Fractals,2005(5).

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部