{"title":"压缩图像的攻击特征","authors":"H. Knowles, D. Winne, C. N. Canagarajah, D. Bull","doi":"10.1109/ICCE.2003.1218810","DOIUrl":null,"url":null,"abstract":"We propose the use of robust watermarks to enable the characterisation of attacks even after lossy compression, such as JPEG and JPEG2000. A previously constructed Bayesian framework is used to allow characterisation of attacks from a predetermined library, and the double watermarking technique as earlier proposed by the authors is employed to generate the features used to drive the classifier. The results show that the developed techniques perform well for both types of compression.","PeriodicalId":319221,"journal":{"name":"2003 IEEE International Conference on Consumer Electronics, 2003. ICCE.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Attack characterisation of compressed images\",\"authors\":\"H. Knowles, D. Winne, C. N. Canagarajah, D. Bull\",\"doi\":\"10.1109/ICCE.2003.1218810\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We propose the use of robust watermarks to enable the characterisation of attacks even after lossy compression, such as JPEG and JPEG2000. A previously constructed Bayesian framework is used to allow characterisation of attacks from a predetermined library, and the double watermarking technique as earlier proposed by the authors is employed to generate the features used to drive the classifier. The results show that the developed techniques perform well for both types of compression.\",\"PeriodicalId\":319221,\"journal\":{\"name\":\"2003 IEEE International Conference on Consumer Electronics, 2003. ICCE.\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2003-06-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2003 IEEE International Conference on Consumer Electronics, 2003. ICCE.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCE.2003.1218810\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2003 IEEE International Conference on Consumer Electronics, 2003. ICCE.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCE.2003.1218810","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
We propose the use of robust watermarks to enable the characterisation of attacks even after lossy compression, such as JPEG and JPEG2000. A previously constructed Bayesian framework is used to allow characterisation of attacks from a predetermined library, and the double watermarking technique as earlier proposed by the authors is employed to generate the features used to drive the classifier. The results show that the developed techniques perform well for both types of compression.