计算机应用 ›› 2013, Vol. 33 ›› Issue (02): 434-437.DOI: 10.3724/SP.J.1087.2013.00434

• 信息安全 • 上一篇    下一篇

基于图像Tchebichef矩抗几何攻击的零水印算法

程兴宏,侯榆青,程璟星,蒲鑫   

  1. 西北大学 信息科学与技术学院,西安 710127
  • 收稿日期:2012-08-02 修回日期:2012-09-06 出版日期:2013-02-01 发布日期:2013-02-25
  • 通讯作者: 侯榆青
  • 作者简介:程兴宏(1983-),男,陕西汉中人,硕士研究生,主要研究方向:图像处理、图像水印;
    侯榆青(1963-),女,陕西榆林人,教授,主要研究方向:数字图像处理、数字水印;
    程璟星(1989-),男,山西晋中人,硕士研究生,主要研究方向:数字信号处理;
    蒲鑫(1986-),男,陕西宝鸡人,硕士研究生,主要研究方向:图形图像处理。
  • 基金资助:
    陕西省教育厅科研计划项目

Image zero-watermarking algorithm against geometric attacks based on Tchebichef moments

CHENG Xinghong,HOU Yuqing,CHENG Jingxing,PU Xin   

  1. School of Information Science and Technology, Northwest University, Xi'an Shaanxi 710127, China
  • Received:2012-08-02 Revised:2012-09-06 Online:2013-02-01 Published:2013-02-25
  • Contact: HOU Yuqing

摘要: 由于目前基于图像矩技术的水印算法水印容量小,算法复杂,鲁棒性有待提高,提出一种新颖的抗几何攻击的零水印算法。该算法以图像归一化技术和Tchebichef矩系数的特点为基础,首先计算原始图像单位圆内旋转归一化的Tchebichef矩,将Tchebichef矩的左上角部分扫描成数值矩阵;然后根据数值矩阵和水印图像生成二进制密钥并保存到零水印信息库。证明版权时待检测图像也按相同的流程处理,利用密钥和生成的数字矩阵提取待检测图像的水印。实验结果表明,该算法对任意角度的旋转、缩放和常规信号处理及其组合攻击具有很强的鲁棒性。

关键词: 零水印, Tchebichef矩, 图像归一化, 几何攻击, 鲁棒性

Abstract: The existing watermarking algorithm based on image moments has the disadvantages of small capacity, large complexity and its robustness should be improved in further study. A new zero-watermarking against geometric attacks was proposed. Using the image normalization and the features of Tchebichef moments, the rotation normalized Tchebichef moments of original image was calculated in the unit circle, and the upper-left corner of Tchebichef moments was scanned into numerical matrix. Afterwards, binary secret key was generated according to numerical matrix and watermark image, and saved to zero-watermarking information database. In detection, the same process was executed to draw out numerical matrix from the unauthenticated image, and watermark image was extracted by using the secret key and numerical matrix. The experimental results show that this algorithm is robust against rotation attacks of random angles, scaling attacks and common signal processing operations, even combined attacks.

Key words: zero-watermarking, Tchebichef moment, image normalization, geometric attack, robustness

中图分类号: