T. Gopalakrishnan, S. Ramakrishnan, K. Balasamy, A.S. Muthananda Murugavel
{"title":"基于高斯混合模型的半脆弱水印恶意图像攻击","authors":"T. Gopalakrishnan, S. Ramakrishnan, K. Balasamy, A.S. Muthananda Murugavel","doi":"10.1109/WICT.2011.6141229","DOIUrl":null,"url":null,"abstract":"In this paper, the requirements, techniques and applications of digital watermarking for high-quality images were discussed. The several classes of digital watermarking techniques defined by their appearance and application domains specify the requirements and summarize the current research efforts in the image applications. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. A secret embedding key is designed to securely embed the fragile watermarks so that the method is robust to counterfeiting, even when the malicious attackers are fully aware of the watermark embedding algorithm. For robustness this algorithm should resist all kinds of attacks, such as common signal processing operators, geometric attacks and so on.","PeriodicalId":178645,"journal":{"name":"2011 World Congress on Information and Communication Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Semi fragile watermarking using Gaussian mixture model for malicious image attacks\",\"authors\":\"T. Gopalakrishnan, S. Ramakrishnan, K. Balasamy, A.S. Muthananda Murugavel\",\"doi\":\"10.1109/WICT.2011.6141229\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, the requirements, techniques and applications of digital watermarking for high-quality images were discussed. The several classes of digital watermarking techniques defined by their appearance and application domains specify the requirements and summarize the current research efforts in the image applications. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. A secret embedding key is designed to securely embed the fragile watermarks so that the method is robust to counterfeiting, even when the malicious attackers are fully aware of the watermark embedding algorithm. For robustness this algorithm should resist all kinds of attacks, such as common signal processing operators, geometric attacks and so on.\",\"PeriodicalId\":178645,\"journal\":{\"name\":\"2011 World Congress on Information and Communication Technologies\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 World Congress on Information and Communication Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WICT.2011.6141229\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 World Congress on Information and Communication Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WICT.2011.6141229","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Semi fragile watermarking using Gaussian mixture model for malicious image attacks
In this paper, the requirements, techniques and applications of digital watermarking for high-quality images were discussed. The several classes of digital watermarking techniques defined by their appearance and application domains specify the requirements and summarize the current research efforts in the image applications. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. A secret embedding key is designed to securely embed the fragile watermarks so that the method is robust to counterfeiting, even when the malicious attackers are fully aware of the watermark embedding algorithm. For robustness this algorithm should resist all kinds of attacks, such as common signal processing operators, geometric attacks and so on.