Visual Attention Based Image Zero Watermark Scheme With Ensemble Similarity

被引:0
作者
Shi, Jie [1 ]
Yan, Qin [1 ]
Shi, Huijuan [1 ]
Wang, Yapeng [1 ]
机构
[1] Hohai Univ, Coll Comp & Informat, Nanjing, Jiangsu, Peoples R China
来源
2013 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP 2013) | 2013年
关键词
image watermark; visual attention; ensemble similarity; SIFT; authentication; ROBUST;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Most existing digital image watermarking schemes tend to have the inherent conflicts between imperceptibility and robustness because watermarks are embedded by parameter modification. Image watermark techniques resolve this dilemma by extracting invariant features from the image as "embedded" watermark. In this paper we propose an image zero watermark scheme based on visual attention regions of images. In the proposed scheme visual attention model carefully selects top-N salient areas, where a set of selected Scale Invariant Feature transform (SIFT) descriptors are extracted as a watermark. The distance of each pair of SIFT descriptors from the reference and test images are calculated by Kullback-Leibler (KL) divergence after mapping into the high dimensional space respectively. The final distance of two sets of SIFT descriptor are determined by ensemble similarity. The experimental results indicate that the proposed scheme outperforms image zero watermark scheme based on color and edge histograms (CEH) and is robust to attacks of geometric distortion, contrast/luminance distortion and JPEG compression.
引用
收藏
页数:5
相关论文
共 11 条
[1]  
Fridrich J., 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540), P178, DOI 10.1109/ITCC.2000.844203
[2]   Matching parameter estimation by using the radial basis function interpolation [J].
Fuji, Y. ;
Abe, Y. ;
Iiguni, Y. .
IET IMAGE PROCESSING, 2012, 6 (04) :407-416
[3]   A constructive and unifying framework for zero-bit watermarking [J].
Furon, Teddy .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2007, 2 (02) :149-163
[4]   A model of saliency-based visual attention for rapid scene analysis [J].
Itti, L ;
Koch, C ;
Niebur, E .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1998, 20 (11) :1254-1259
[5]   A robust image authentication method distinguishing JPEG compression from malicious manipulation [J].
Lin, CY ;
Chang, SF .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2001, 11 (02) :153-168
[6]   Distinctive image features from scale-invariant keypoints [J].
Lowe, DG .
INTERNATIONAL JOURNAL OF COMPUTER VISION, 2004, 60 (02) :91-110
[7]   Color and texture descriptors [J].
Manjunath, BS ;
Ohm, JR ;
Vasudevan, VV ;
Yamada, A .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2001, 11 (06) :703-715
[8]   Robust and secure image hashing [J].
Swaminathan, Ashwin ;
Mao, Yinian ;
Wu, Min .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (02) :215-230
[9]   Information Content Weighting for Perceptual Image Quality Assessment [J].
Wang, Zhou ;
Li, Qiang .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2011, 20 (05) :1185-1198
[10]  
Wen Quan, 2003, Acta Electronica Sinica, V31, P214