山东大学学报(理学版) ›› 2016, Vol. 51 ›› Issue (9): 68-75.doi: 10.6040/j.issn.1671-9352.3.2015.069
毛家发1,2,3,黄艳红1,钮心忻2,肖刚1,3,朱李楠1,盛伟国1,3
MAO Jia-fa1,2,3, HUANG Yan-hong1, NIU Xin-xin2, XIAO Gang1, 3, ZHU Li-nan1, SHENG Wei-guo1,3
摘要: 在基于失真不可感知的控制模型(maximize payload under imperceptive, MPUI)下,研究了空域图像的最大水印容量。发现最大水印容量不仅与嵌入强度有关,而且与图像尺寸大小、复杂度、视觉敏感度等因素相关。在理论上推导了最大水印容量与图像大小、嵌入强度的关系,并采用多元回归分析方法研究了图像复杂度、视觉敏感度与嵌入率的关系模型。综合这些内外因素,借助于主客观评价体系,推算出水印嵌入容量的估算方法,并在实验中验证了该估算方法的有效性。
中图分类号:
[1] 董秀则,张茹,钮心忻. MB隐写分析算法[J]. 北京邮电大学学报,2012,02:99-103. DONG Xiuze, ZHANG Ru, NIU Xinxin. A steganalysis algorithm on MB stegano-graphy[J].Journal of Beijing University of Posts and Telecommunications, 2012, 02:99-103. [2] 高虎明,李凯捷,王英娟.基于SIFT 抗几何攻击的数字水印算法[J]. 计算机应用,2013,33(3):748-751. GAO Huming, LI Kaijie, WANG Yingjuan. A digital watermarking algorithm based on SIFT against geometric attacks [J]. Journal of Computer Applications, 2013, 33(3):748-751. [3] 武嘉,张茹,钮心忻,等. 针对BPCS隐写的隐写分析法[J]. 北京邮电大学学报,2009,04:113-116. WU Jia, ZHANG Ru, NIU Xinxin, et al. Reliable detection of BPCS stega-nography [J]. Journal of Beijing University of Posts and Telecommunications, 2009, 04:113-116. [4] 沈昌祥,张焕国,冯登国,等.信息安全综述[J].中国科学(E集:信息科学), 2007, 37(2):129-150. SHEN Changxiang, ZHANG Huanguo, FENG Dengguo, et al. Information security review [J]. Science in China(Series E: Information Sciences), 2007, 37(2):129-150. [5] VORBRUGGEN J C, CAYRE F. The Certimark benchmark: architecture and future perspectives[C] //Proceeding of the IEEE International Conference on Multimedia and Expo(ICME2002).New York: IEEE, 2002:485-488. [6] KIM H C, LIN E T, GUITART O, et al. Further progress in watermark evaluation testbed(WET)[C] //Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents(SPIE2005). USA: SPIE, 2005:236-247. [7] SOLACHIDIS V, TEFAS A, NIKOLAIDIS N, et al. A benchmarking protocol for water-marking methods[C] //Proceedings of International Conference on Image Processing. New York: IEEE, 2001, 3:1023-1026. [8] MOULIN P, OSULLIVAN J A. Information theoretic analysis of information hiding [J]. IEEE Transactions on Information Theory, 2003, 49(3):563-593. [9] COHEN A, LAPIDOTH A. The Gaussian watermarking game[J]. IEEE Transactions on Information Theory, 2002, 48(6):1639-1667. [10] SOMEKH-BARUCH A, MERHAV N. On the capacity game of public watermarking system[J]. IEEE Transactions on Infor-mation Theory, 2004, 50(3):511-524. [11] SAJEDI H, JAMZAD M. Secure steganography based on embedding capacity[J]. International Journal of Information Security, 2009, 8(6):433-445. [12] 高海英. 音频信息隐藏理论及应用[D]. 北京: 北京邮电大学,2006. GAO Haiying. The theory and application of audio information hiding [D]. Beijing: Beijing University of Posts and Telecommunicatons, 2006. [13] COHEN A S, LAPIDOTH A. The capacity of the vector Gaussian watermarking game[C] //Proceeding of the IEEE International Symposium on Information Theory(ISIT2001). Piscataway: IEEE, 2001: 24-29. [14] ZHANG X, WANG S. Steganography using multiple-base notational system and human vision sensitivity[J]. IEEE Signal Processing Letters, 2005, 12(1):67-70. [15] MAO J F, NIU X X, YANG Y X, et al. JPEG2000 image maximum steganogra-phy payload based on MPUI model [J].Journal of Software, 2014, 25(7):1606-1620. [16] FILLER T, JUDAS J, FRIDRICH J. Gibbs construction in steganography[J].IEEE Transactions on Information Forensics and Security, 2010, 5(4): 705-720. [17] MOHAND S A. Wavelet modeling using finite mixtures of generalized Gaussian distribution: application to texture discrimination and retrieval[J]. IEEE Transactions on Image Processing, 2012, 21(4):1452-1464. [18] PANYAVARAPORN J, HORKAEW P, WONGTRAIRAT W. QR code watermarking algorithm based on wavelet transform[C] // Proceedings of the 13th International Symposium on Communications and Information Technologies. Piscataway: IEEE, 2013:791-796. [19] JAMZAD M, YAGHMAEE F. Achieving higher stability in watermarking according to image complexity[J]. Scientia Iranica, 2006, 13(4):404-412. [20] HALLER R S. Complexity of real images evaluated by densitometric analysis and psychophysical scaling[D]. USA: University of Arizona, 1970. [21] 王向阳,杨红颖,郑宏亮,等.基于视觉权值的分块颜色直方图图像检索算法[J].自动化学报,2010,36(10):1489-1492. WANG Xiangyang, YANG Hongying, ZHENG Hongliang, et al. A Color block-histogram image retrieval based on visual weight[J].Acta Automatica Sinica, 2010, 36(10):1489-1492. [22] DELAIGLE J F, DEVLEESCHOUWER C, MACQ B, et al. Human visual system fea-tures enabling watermarking[C] //Proceedings of 2002 IEEE International Conference on Multimedia and Expo. New York: IEEE, 2002: 489-492. [23] JAIN A K, 韩博, 徐枫. 数字图像处理基础[M]. 北京:清华大学出版社,2006. JAIN A K, HAN Bo, XU Feng. Foundation of digital image processing[M]. Beijing: Tsinghua University Press, 2006. [24] WU Jianzhen, XIE Jianying, YANG Yupu. An adaptive blind watermarking scheme utilizing neural network for synch ronization[J]. Journal of Harbin Institute of Technology, 2007, 14(2):281-286. [25] KER A D. A capacity result for batch steganography [J]. IEEE Signal Process Let, 2007, 14(8):525-528. |
[1] | 刘龙飞,杨晓元. 一类新的周期为p3的GF(l)上广义割圆序列的线性复杂度[J]. 山东大学学报(理学版), 2017, 52(3): 24-31. |
[2] | 王国辉, 杜小妮, 万韫琦, 李芝霞. 周期为pq的平衡四元广义分圆序列的线性复杂度[J]. 山东大学学报(理学版), 2016, 51(9): 145-150. |
[3] | 刘伍颖,易绵竹,张兴. 一种时空高效的多类别文本分类算法[J]. J4, 2013, 48(11): 99-104. |
[4] | 马云艳,栾贻会*. 基于局部LRS方法的稀疏信号片段检测[J]. J4, 2012, 47(12): 1-5. |
[5] | 郭文鹃,杨公平*,董晋利. 指纹图像分割方法综述[J]. J4, 2010, 45(7): 94-101. |
[6] | . 线性规划的宽邻域预估校正算法[J]. J4, 2009, 44(7): 66-70. |
[7] | 王锦玲 兰娟丽. GF(q)上一类新型的广义自缩序列[J]. J4, 2009, 44(10): 91-96. |
[8] | 王锦玲,刘宗成 . 主控生成器[J]. J4, 2008, 43(1): 81-87 . |
|