虚拟形象人脸的鲁棒盲水印

Samira Bader, Rabiaa Chaaba, N. B. Ben Amara
{"title":"虚拟形象人脸的鲁棒盲水印","authors":"Samira Bader, Rabiaa Chaaba, N. B. Ben Amara","doi":"10.1109/ICTIA.2014.7883773","DOIUrl":null,"url":null,"abstract":"We present in this paper an access security method to virtual world based on a watermarking approach of avatar faces. The authentication approach consists in hiding, as a mark in the avatar's face, the fingerprint of its owner, who is a virtual world resident. We have used the wavelet packet decomposition and the singular values decomposition methods to achieve the watermarking process. The extracted features from the fingerprint, which are coded to a binary format are inserted into the avatar's face. The developed approach ensures a total imperceptibility and a blind extraction of the watermark. The algorithm has been evaluated against various attack types, where the obtained results are promising.","PeriodicalId":390925,"journal":{"name":"2014 Information and Communication Technologies Innovation and Application (ICTIA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Robust and blind watermarking of avatar faces\",\"authors\":\"Samira Bader, Rabiaa Chaaba, N. B. Ben Amara\",\"doi\":\"10.1109/ICTIA.2014.7883773\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We present in this paper an access security method to virtual world based on a watermarking approach of avatar faces. The authentication approach consists in hiding, as a mark in the avatar's face, the fingerprint of its owner, who is a virtual world resident. We have used the wavelet packet decomposition and the singular values decomposition methods to achieve the watermarking process. The extracted features from the fingerprint, which are coded to a binary format are inserted into the avatar's face. The developed approach ensures a total imperceptibility and a blind extraction of the watermark. The algorithm has been evaluated against various attack types, where the obtained results are promising.\",\"PeriodicalId\":390925,\"journal\":{\"name\":\"2014 Information and Communication Technologies Innovation and Application (ICTIA)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 Information and Communication Technologies Innovation and Application (ICTIA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICTIA.2014.7883773\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Information and Communication Technologies Innovation and Application (ICTIA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTIA.2014.7883773","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

本文提出了一种基于虚拟人物面部水印的虚拟世界访问安全方法。这种身份验证方法包括将虚拟世界居民的指纹隐藏在虚拟化身的脸上作为标记。我们采用了小波包分解和奇异值分解方法来实现水印过程。从指纹中提取的特征被编码成二进制格式,然后插入到虚拟人物的脸上。该方法保证了水印的完全不可感知和盲提取。该算法已经针对各种攻击类型进行了评估,获得的结果是有希望的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Robust and blind watermarking of avatar faces
We present in this paper an access security method to virtual world based on a watermarking approach of avatar faces. The authentication approach consists in hiding, as a mark in the avatar's face, the fingerprint of its owner, who is a virtual world resident. We have used the wavelet packet decomposition and the singular values decomposition methods to achieve the watermarking process. The extracted features from the fingerprint, which are coded to a binary format are inserted into the avatar's face. The developed approach ensures a total imperceptibility and a blind extraction of the watermark. The algorithm has been evaluated against various attack types, where the obtained results are promising.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信