{"title":"虚拟形象人脸的鲁棒盲水印","authors":"Samira Bader, Rabiaa Chaaba, N. B. Ben Amara","doi":"10.1109/ICTIA.2014.7883773","DOIUrl":null,"url":null,"abstract":"We present in this paper an access security method to virtual world based on a watermarking approach of avatar faces. The authentication approach consists in hiding, as a mark in the avatar's face, the fingerprint of its owner, who is a virtual world resident. We have used the wavelet packet decomposition and the singular values decomposition methods to achieve the watermarking process. The extracted features from the fingerprint, which are coded to a binary format are inserted into the avatar's face. The developed approach ensures a total imperceptibility and a blind extraction of the watermark. The algorithm has been evaluated against various attack types, where the obtained results are promising.","PeriodicalId":390925,"journal":{"name":"2014 Information and Communication Technologies Innovation and Application (ICTIA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Robust and blind watermarking of avatar faces\",\"authors\":\"Samira Bader, Rabiaa Chaaba, N. B. Ben Amara\",\"doi\":\"10.1109/ICTIA.2014.7883773\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We present in this paper an access security method to virtual world based on a watermarking approach of avatar faces. The authentication approach consists in hiding, as a mark in the avatar's face, the fingerprint of its owner, who is a virtual world resident. We have used the wavelet packet decomposition and the singular values decomposition methods to achieve the watermarking process. The extracted features from the fingerprint, which are coded to a binary format are inserted into the avatar's face. The developed approach ensures a total imperceptibility and a blind extraction of the watermark. The algorithm has been evaluated against various attack types, where the obtained results are promising.\",\"PeriodicalId\":390925,\"journal\":{\"name\":\"2014 Information and Communication Technologies Innovation and Application (ICTIA)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 Information and Communication Technologies Innovation and Application (ICTIA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICTIA.2014.7883773\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Information and Communication Technologies Innovation and Application (ICTIA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTIA.2014.7883773","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
We present in this paper an access security method to virtual world based on a watermarking approach of avatar faces. The authentication approach consists in hiding, as a mark in the avatar's face, the fingerprint of its owner, who is a virtual world resident. We have used the wavelet packet decomposition and the singular values decomposition methods to achieve the watermarking process. The extracted features from the fingerprint, which are coded to a binary format are inserted into the avatar's face. The developed approach ensures a total imperceptibility and a blind extraction of the watermark. The algorithm has been evaluated against various attack types, where the obtained results are promising.