{"title":"基于图形傅里叶变换的图像零水印","authors":"Yusuke Sao, Hodaka Yamanouchi, T. Uto","doi":"10.1109/ITC-CSCC58803.2023.10212615","DOIUrl":null,"url":null,"abstract":"In this paper, we propose an image zero watermarking method using the graph Fourier transform (GFT). We introduce new elements such as sampling suitable for images, convolution of surrounding pixels, and definition of adjacency matrices based on sampling results. To extract features of a host image, a graph signal is produced with an adjacency matrix that depends on the distance from neighboring pixels. Then, the coefficients after the GFT are encoded into binary information using the K-means method. Finally, XOR operation is performed between the obtained features and watermark to achieve zero watermarking. Simulations show that the proposed method works more effectively than a comparative method in resisting a variety of common attacks.","PeriodicalId":220939,"journal":{"name":"2023 International Technical Conference on Circuits/Systems, Computers, and Communications (ITC-CSCC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Graph Fourier Transform Based Image Zero-Watermarking\",\"authors\":\"Yusuke Sao, Hodaka Yamanouchi, T. Uto\",\"doi\":\"10.1109/ITC-CSCC58803.2023.10212615\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose an image zero watermarking method using the graph Fourier transform (GFT). We introduce new elements such as sampling suitable for images, convolution of surrounding pixels, and definition of adjacency matrices based on sampling results. To extract features of a host image, a graph signal is produced with an adjacency matrix that depends on the distance from neighboring pixels. Then, the coefficients after the GFT are encoded into binary information using the K-means method. Finally, XOR operation is performed between the obtained features and watermark to achieve zero watermarking. Simulations show that the proposed method works more effectively than a comparative method in resisting a variety of common attacks.\",\"PeriodicalId\":220939,\"journal\":{\"name\":\"2023 International Technical Conference on Circuits/Systems, Computers, and Communications (ITC-CSCC)\",\"volume\":\"44 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Technical Conference on Circuits/Systems, Computers, and Communications (ITC-CSCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITC-CSCC58803.2023.10212615\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Technical Conference on Circuits/Systems, Computers, and Communications (ITC-CSCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITC-CSCC58803.2023.10212615","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Graph Fourier Transform Based Image Zero-Watermarking
In this paper, we propose an image zero watermarking method using the graph Fourier transform (GFT). We introduce new elements such as sampling suitable for images, convolution of surrounding pixels, and definition of adjacency matrices based on sampling results. To extract features of a host image, a graph signal is produced with an adjacency matrix that depends on the distance from neighboring pixels. Then, the coefficients after the GFT are encoded into binary information using the K-means method. Finally, XOR operation is performed between the obtained features and watermark to achieve zero watermarking. Simulations show that the proposed method works more effectively than a comparative method in resisting a variety of common attacks.