高级检索

    基于Contourlet域特征点的抗几何攻击水印方法

    Feature Point Based Image Watermarking Scheme in Contourlet Domain Against Geometrical Attacks

    • 摘要: 有效抵抗几何攻击的水印算法是目前水印技术研究的难点之一,很小的几何变形就可能使大多数水印算法失效.对图像Contourlet变换和Harris-Affine算子的特性进行了分析和讨论,在此基础上提出了一种以仿射不变特征点的基于Contourlet的抗几何攻击水印算法.首先,用Contourlet变换提取出多尺度、多方向的纹理信息;再用Harris-Affine检测算子从变换域的中、低频方向子带中提取出仿射不变特征点,结合自适应局部结构的特征尺度确定特征区域,并用U变换对其归一化处理,水印就自适应地嵌入到归一化后的区域中;水印嵌入采纳矢量量化的策略,将水印信息重复嵌入到不同方向子带、多个不相交的局部仿射不变特征区域.检测时,利用特征点实现水印的重同步,采用“多数原则”来提取水印的位信息,无需求助于原始图像.仿真结果表明,算法不仅具有较好的透明性,而且对常规信号处理和去仿射攻击均具有较好的鲁棒性

       

      Abstract: Image watermarking resistant to geometrical attacks is the hotspot and challenging task in the state-of-the-art research on watermarking. Even an invisible affine transformation can invalidate most existing watermarking algorithms. This the authors analyse and discuss the characteristic of contourlet transform and Harris-Affine detector, and on this basis, propose a novel contourlet-domain watermarking algorithm against geometric attacks based on the affine-invariant feature points and characteristics of regions. First, the proposed scheme uses contourlet transform to extract multidirectional and multiscale texture information, and then obtains the feature points invariant to the affine transformation from the low and middle directional subbands by Harris-Affine detector. Second, the feature regions are adaptively computed by the feature scale of the local structure and normalized by U transform. The watermarking is emdedded adaptively in those characteristic regions which are normalized. Finally, by vector quantization, several copies of the watermark are embedded into the no overlapped local feature regions in different directional subbands. During detection, the resynchronization is achieved through feature points. And the embedded sequence can be extracted by “majority principles” without resorting to the original host image. Experimental results show that the proposed algorithm has good transparency and is very robust to common image processing and geometric attacks.

       

    /

    返回文章
    返回