信号与信息处理

基于傅里叶变换的自适应抗打印扫描水印算法

展开
  • 武汉大学 印刷与包装系, 武汉 430079

收稿日期: 2016-03-04

  修回日期: 2016-04-04

  网络出版日期: 2016-05-30

Adaptive Print-Scan Resilient Image Watermarking Based on Fourier Transform

Expand
  • School of Printing and Packaging, Wuhan University, Wuhan 430079, China

Received date: 2016-03-04

  Revised date: 2016-04-04

  Online published: 2016-05-30

摘要

基于近似均匀对数极坐标变换以及傅里叶频域(discrete Fourier transform, DFT)感知通道分解,提出了一个兼顾鲁棒性和隐蔽性的盲水印算法,以抵抗普通打印扫描攻击.首先在频域分解得到中频嵌入环形区域,通过对数极坐标变换并结合局部频谱特性将水印自适应嵌入DFT中频区域,进而利用空间掩蔽对空间域图像进行失真补偿.理论分析和实验结果表明该算法具有良好的隐蔽性,对普通的打印扫描处理也获得了良好的鲁棒性.

本文引用格式

廖挺, 李治江 . 基于傅里叶变换的自适应抗打印扫描水印算法[J]. 应用科学学报, 2016 , 34(3) : 309 -316 . DOI: 10.3969/j.issn.0255-8297.2016.03.008

Abstract

A robust blind watermarking scheme that combines uniform log-polar mapping and perceptual band decomposition of Fourier domain is proposed, which can resist general print-scan attacks. The proposed scheme can guarantee invisibility and increase robustness of the watermark. Perceptual band decomposition that splits the Fourier domain into overlapping sub-bands is used to locate the mid-frequency domain. Uniform log-polar mapping is applied to mid-frequencies in the Fourier domain. Watermark embedding in the mid-frequencies is adaptively controlled by the local spectrum property. Finally, a spatial perceptual mask is used to compensate distortion after the embedded image is inversely transformed back to the spatial domain. Both the theoretical analysis and experimental results show that the proposed scheme is invisible, and robust against general print-scan attacks.

参考文献

[1] Min W, Bede L. Data hiding in image and video:part I-fundamental issues and solutions[J]. IEEE Transactions on Image Processing, 2003, 12(6):685-95.
[2] Lin C Y, Chang S F. Distortion modeling and invariant extraction for digital image print-andscan process[J]. Journal of Mechanical Working Technology, 1970, 10(3):376-381.
[3] Solanki K, Madhow U, Manjunath B S. ‘Print and scan’ resilient data hiding in images[J]. IEEE Transactions on Information Forensics & Security, 2006, 1(1):464-478.
[4] Amiri S H, Jamzad M. Robust watermarking against print and scan attack through efficient modeling algorithm[J]. Signal Processing Image Communication, 2014, 29(10):1181-1196.
[5] Zheng D, Zhao J, El-Saddik A. RST-invariant digital image watermarking based on logpolar mapping and phase correlation[J]. IEEE Transactions on Circuits & Systems for Video Technology, 2003, 13(8):753-765.
[6] Kang X, Huang J, Zeng W. Efficient general print-scanning resilient data hiding based on uniform log-polar mapping[J]. IEEE Transactions on Information Forensics & Security, 2010, 5(1):1-12.
[7] Urvoy M, Goudia D, Autrusseau F. Perceptual DFT watermarking with improved detection and robustness to geometrical distortions[J]. IEEE Transactions on Information Forensics & Security, 2014, 9(7):1108-1119.
[8] Liu H J, Steinebach M. Improved Fourier domain patchwork and template embedding using spatial masking[C]//Proceedings of SPIE the International Society for Optical Engineering, 2012, 8303:830305.
[9] He D, Su Q. A practical print-scan resilient watermarking scheme[C]//IEEE International Conference on Image Processing, 2005:257-260.
[10] Watson A B. The cortex transform:rapid computation of simulated neural images[J]. Computer Vision Graphics & Image Processing, 1987, 39(3):311-327.
[11] Bekkat N, Saadane A, Barba D. Masking effects in the quality assessment of coded images[C]//Proceedings of SPIE, Human Vision and Electronic Imaging, 2000:211-219.
[12] Barni M, Bartolini F, Piva A. Improved wavelet-based watermarking through pixel-wise masking[J]. IEEE Transactions on Image Processing a Publication of the IEEE Signal Processing Society, 2001, 10(5):783-791.
[13] 王晶,王向阳. 基于人类视觉系统的数字图像水印方法[J]. 计算机工程,2011, 37(13):107-108. Wang J, Wang X Y. Digital image watermark method based on human visual system[J]. Computer Engineering, 2011, 37(13):107-108. (in Chinese)
[14] 尤新刚,郭云彪,周琳娜. 峰值信噪比不宜用来评价信息隐藏技术[C]//全国信息隐藏学术研讨会. 2001:129-134. You X G, Guo Y B. PSNR should not be used to evaluate the information hiding[C]//Third National Symposium on Information Hiding. 2001:129-134. (in Chinese)

文章导航

/