期刊文献+

基于立体视觉掩蔽的自恢复非对称立体图像水印 被引量:2

Binocular suppression based asymmetrical stereo image watermarking with self-recovery
下载PDF
导出
摘要 为了认证立体图像的完整性,提出了一种基于立体视觉掩蔽的非对称立体图像水印方法。首先,根据立体视觉特性,建立立体视觉掩蔽计算模型,设计了立体图像左右视点嵌入不同容量的非对称水印;其次,使用小波变换系数计算不同类型的恢复水印,将其分别嵌入2个或3个不同映射块,从而提高篡改恢复质量。仿真实验结果证明,该方法能够有效检测和恢复、拼接、粘贴等不同类型的篡改,并且恢复质量高于现有以及扩展的单图像水印方法。 To authenticate the integrity of stereo image, an asymmetrical stereo image watermarking scheme based on binocular suppression was proposed. Firstly, according to the features of stereo vision, the computation of binocular sup- pression model was established. The concept of asymmetric stereo image watermarking was defined that two views of stereo image were embedded with different data payloads. Then, discrete wavelet transform was employed to generate different types of recovery watermark for each block, and their copies were embedded into two or three different mapping blocks to improve the quality of recovery. The experimental results demonstrate that the proposed method can detect and recover different kinds of tamper effectively, such as collage attack, and the recovered quality is better than those of other existing and extended mono-image watermarking methods.
出处 《通信学报》 EI CSCD 北大核心 2013年第6期57-68,共12页 Journal on Communications
基金 国家自然科学基金资助项目(61071120 61171163 61111140392 61271270 612712700) 国家科技支撑计划基金资助项目(2012BAH67F01)~~
关键词 立体图像 非对称立体图像水印 立体视觉掩蔽 篡改恢复 stereo image asymmetric stereo image watermarking binocular suppression tamper recovery
  • 相关文献

参考文献3

二级参考文献30

  • 1冯林 ,李彦君 ,邵刚 ,王秀坤 ,滕弘飞 .利用人眼视觉系统理论实现DCT域快速分形编码[J].计算机辅助设计与图形学学报,2005,17(1):67-73. 被引量:2
  • 2Lahouari G, Ahmed B, Mohammad K I, and Said B. Digital image watermarking using balanced multiwavelets. IEEE Trans. on Signal Processing, 2006, 54(4): 1519-1536. 被引量:1
  • 3Yuan H and Zhang X P. Multiscale fragile watermarking based on the gaussian mixture model. IEEE Trans. on Image Processing, 2006, 15(10): 3189-3200. 被引量:1
  • 4Schlauweg M, Pr6frock D, Palfner T, and Mtlller E. Quantization-based semi-fragile public-key watermarking for secure image authentication. In Proc. of SPIE, San Diego, California, USA, 2005, 5915: 41-51. 被引量:1
  • 5Sharkas M, E1Shafie D, and Hamdy N. A dual digital-image watermarking technique. In Proc. of 3rd WOrld Enformatika Conference (WEC'05), Istanbul, Turkey, 2005: 136-139. 被引量:1
  • 6DOERR G,DUGELAY J L.A guide tour of video watermarking[J].Signal Processing:Image Communication,2003,18(4):263-282. 被引量:1
  • 7HARTUNG F,GIROD B.Watermarking of uncompressed and com-pressed video[J].Signal Process,1998,66(3):283-301. 被引量:1
  • 8KOZ A,ALATAN A A.Oblivious spatio-temporal watermarking ofdigital video by exploiting the human visual system[J].IEEE TransCircuits Syst Video Technol,2008,18(3):326-337. 被引量:1
  • 9HARTUNG F,GIROD B.Digital watermarking of MPEG-2 codedvideo in the bitstream domain[A].IEEE International Conference onAcoustic,Speech,and Signal Processing[C].Munich,Germany,1997.2621-2624. 被引量:1
  • 10CHOI D,DO H,CHOI H,et al.A blind MPEG-2 video watermarkingrobust to camcorder recording[J].Signal Processing,2010,90(4):1327-1332. 被引量:1

共引文献38

同被引文献31

  • 1Navas K A,Sreevidya S,Sasikumar M.A benchmark for medical image watermarking[C]//Maribor:14th International Workshop on Systems,Signals & Image Processing and 6th EURASIP Conference,2007:27-30. 被引量:1
  • 2Zhang Jing,Liu Xiaoqian,Wang Jie.A scalable message authentication scheme for JPEG2000 codestreams[C]//IEEE,the 5th International Conference on Computer Science & Education,2010:978-980. 被引量:1
  • 3Hsiao Ju-Yuan,Chan Ke-Fan,Chang J Morris.Block-based reversible data embedding[J].Signal Processing,2009(89):556-569. 被引量:1
  • 4Chang Chin-Chen,Lin Chin-Yang,Fan Yi Hsuan.Lossless data hiding for color images based on block truncation coding[J].Pattern Recognition,2008 (41):2347-2357. 被引量:1
  • 5Hua Yuning,Wang A-na,Wu Bo.An algorithm for image authentication based on fragile watermarking[C]//3rd International Conference on Intelligent Networks and Intelligent Systems,2010:52-54. 被引量:1
  • 6Xie Rongsheng,Wu Keshuo,Zhu Shunzhi.An improved semi-fragile digital watermarking scheme for image authentication[C]//IEEE International Workshop on Anti-counterfeiting,Security,Identification,2007:262-263. 被引量:1
  • 7Phadikar A,Maity SP,Mandal M.QIM data hiding for tamper detection and correction in digital images using wavelet transform[C]//23rd Canadian Conference on Electrical and Computer Engineering,2010:840-842. 被引量:1
  • 8Chen Mingju,Sun Xingbo.A digital image watermarking of self-recovery base on the SPIHT algorithm[C]//IEEE.2nd International Conference on Signal Processing Systems,2010:621-623. 被引量:1
  • 9Son J, Son W, Kim S,et al. Three-dimensional imaging for creating real-world-like environments[J] Proc. of the IEEE,2013,101(1) :190-205. 被引量:1
  • 10ZHOU Wu-jie, JIANG Gang-yi, YU Mei,et al. Reduced-ref- erence stereoscopic image quality assessment based on view and disparity zero-watermarks[J]. Signal Process- ing: Image Communication,2014,29(1) : 167-176. 被引量:1

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部