{"title":"一种新的抗几何攻击水印算法","authors":"C. Jin, Hulilin Ye","doi":"10.1109/ISSPA.2005.1580210","DOIUrl":null,"url":null,"abstract":"Many electronic watermarks for still images are sensitive to geometric distortions. A novel watermarking algorithm is proposed for resisting geometric attacks to the images . The algorithm identifies the shape-specific points (SSP) from a watermarked image and uses the SSP to estimate the parameters of the geometric transformations undergone by the image. During the watermark detection process, these transformations are inverted based on the parameters. Synchronization can then be realized, which is crucial for watermark detection. Experimental results show that this watermark algorithm has very strong capability for resisting scaling, rotation, cropping, Gaussian noise, and JPEG compression attacks.","PeriodicalId":385337,"journal":{"name":"Proceedings of the Eighth International Symposium on Signal Processing and Its Applications, 2005.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A novel watermarking algorithm for resisting geometric attacks\",\"authors\":\"C. Jin, Hulilin Ye\",\"doi\":\"10.1109/ISSPA.2005.1580210\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Many electronic watermarks for still images are sensitive to geometric distortions. A novel watermarking algorithm is proposed for resisting geometric attacks to the images . The algorithm identifies the shape-specific points (SSP) from a watermarked image and uses the SSP to estimate the parameters of the geometric transformations undergone by the image. During the watermark detection process, these transformations are inverted based on the parameters. Synchronization can then be realized, which is crucial for watermark detection. Experimental results show that this watermark algorithm has very strong capability for resisting scaling, rotation, cropping, Gaussian noise, and JPEG compression attacks.\",\"PeriodicalId\":385337,\"journal\":{\"name\":\"Proceedings of the Eighth International Symposium on Signal Processing and Its Applications, 2005.\",\"volume\":\"39 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-08-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the Eighth International Symposium on Signal Processing and Its Applications, 2005.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISSPA.2005.1580210\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Eighth International Symposium on Signal Processing and Its Applications, 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISSPA.2005.1580210","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A novel watermarking algorithm for resisting geometric attacks
Many electronic watermarks for still images are sensitive to geometric distortions. A novel watermarking algorithm is proposed for resisting geometric attacks to the images . The algorithm identifies the shape-specific points (SSP) from a watermarked image and uses the SSP to estimate the parameters of the geometric transformations undergone by the image. During the watermark detection process, these transformations are inverted based on the parameters. Synchronization can then be realized, which is crucial for watermark detection. Experimental results show that this watermark algorithm has very strong capability for resisting scaling, rotation, cropping, Gaussian noise, and JPEG compression attacks.