基于回归支持向量机的鲁棒水印算法

Fuxin Wang, Wei Song, J. Hou
{"title":"基于回归支持向量机的鲁棒水印算法","authors":"Fuxin Wang, Wei Song, J. Hou","doi":"10.1109/ICOSP.2008.4697584","DOIUrl":null,"url":null,"abstract":"This paper presents a robust watermarking algorithm based on regression of SVM. The host image is divided into two parts firstly. The first one is to train SVM using features including four relationships between the neighbor pixels, and the other part is to embed watermarks. The center pixels of image blocks are compared with the predicted pixels of trained SVM, and then modified to embed watermarks. Because of the introduction of Pseudorandom Circular Chain (PCC) scheme, the training pixels and the test pixels can spread all over the host image, which increases accurate rate of the watermark-extraction. Otherwise, for the security consideration, logistic mapping is used to permute the watermark image. Experiment results demonstrate that this algorithm can get good perceptual invisibility, and robustness against many attacks.","PeriodicalId":445699,"journal":{"name":"2008 9th International Conference on Signal Processing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Regression of SVM based robust watermarking algorithm\",\"authors\":\"Fuxin Wang, Wei Song, J. Hou\",\"doi\":\"10.1109/ICOSP.2008.4697584\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a robust watermarking algorithm based on regression of SVM. The host image is divided into two parts firstly. The first one is to train SVM using features including four relationships between the neighbor pixels, and the other part is to embed watermarks. The center pixels of image blocks are compared with the predicted pixels of trained SVM, and then modified to embed watermarks. Because of the introduction of Pseudorandom Circular Chain (PCC) scheme, the training pixels and the test pixels can spread all over the host image, which increases accurate rate of the watermark-extraction. Otherwise, for the security consideration, logistic mapping is used to permute the watermark image. Experiment results demonstrate that this algorithm can get good perceptual invisibility, and robustness against many attacks.\",\"PeriodicalId\":445699,\"journal\":{\"name\":\"2008 9th International Conference on Signal Processing\",\"volume\":\"44 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-12-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 9th International Conference on Signal Processing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOSP.2008.4697584\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 9th International Conference on Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOSP.2008.4697584","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

提出了一种基于支持向量机回归的鲁棒水印算法。首先将主机图像分为两部分。第一部分是利用包含相邻像素之间的四种关系的特征来训练支持向量机,另一部分是嵌入水印。将图像块的中心像素与训练好的支持向量机的预测像素进行比较,然后进行修改以嵌入水印。由于引入了伪随机环链(PCC)方案,训练像素和测试像素可以分布在宿主图像上,提高了水印提取的正确率。否则,出于安全性考虑,采用逻辑映射对水印图像进行排列。实验结果表明,该算法具有良好的感知不可见性,对多种攻击具有鲁棒性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Regression of SVM based robust watermarking algorithm
This paper presents a robust watermarking algorithm based on regression of SVM. The host image is divided into two parts firstly. The first one is to train SVM using features including four relationships between the neighbor pixels, and the other part is to embed watermarks. The center pixels of image blocks are compared with the predicted pixels of trained SVM, and then modified to embed watermarks. Because of the introduction of Pseudorandom Circular Chain (PCC) scheme, the training pixels and the test pixels can spread all over the host image, which increases accurate rate of the watermark-extraction. Otherwise, for the security consideration, logistic mapping is used to permute the watermark image. Experiment results demonstrate that this algorithm can get good perceptual invisibility, and robustness against many attacks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信