Histogram Based Watermarking Algorithm Robust to Geometric Attack with High Embedding Capacity
被引:0
作者:
Zheng, Wei
论文数: 0引用数: 0
h-index: 0
机构:
Tsinghua Univ, Dept Comp Sci & Technol, Beijing, Peoples R ChinaTsinghua Univ, Dept Comp Sci & Technol, Beijing, Peoples R China
Zheng, Wei
[1
]
Liu, WenJie
论文数: 0引用数: 0
h-index: 0
机构:
Tsinghua Univ, Dept Comp Sci & Technol, Beijing, Peoples R ChinaTsinghua Univ, Dept Comp Sci & Technol, Beijing, Peoples R China
Liu, WenJie
[1
]
Li, ShunDong
论文数: 0引用数: 0
h-index: 0
机构:
Shanxi Normal Univ, Sch Comp Sci, Xian, Shaanxi, Peoples R ChinaTsinghua Univ, Dept Comp Sci & Technol, Beijing, Peoples R China
Li, ShunDong
[2
]
Zhao, XiangHui
论文数: 0引用数: 0
h-index: 0
机构:
China Informat Technol Secur Evaluat Ctr, Beijing, Peoples R ChinaTsinghua Univ, Dept Comp Sci & Technol, Beijing, Peoples R China
Zhao, XiangHui
[3
]
Wang, DaoShun
论文数: 0引用数: 0
h-index: 0
机构:
Tsinghua Univ, Dept Comp Sci & Technol, Beijing, Peoples R ChinaTsinghua Univ, Dept Comp Sci & Technol, Beijing, Peoples R China
Wang, DaoShun
[1
]
机构:
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing, Peoples R China
[2] Shanxi Normal Univ, Sch Comp Sci, Xian, Shaanxi, Peoples R China
[3] China Informat Technol Secur Evaluat Ctr, Beijing, Peoples R China
来源:
PROCEEDINGS OF 2016 IEEE ADVANCED INFORMATION MANAGEMENT, COMMUNICATES, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IMCEC 2016)
|
2016年
基金:
中国国家自然科学基金;
关键词:
digital watermark;
histogram;
capacity;
robustness;
geometric attacks;
D O I:
暂无
中图分类号:
TP [自动化技术、计算机技术];
学科分类号:
0812 ;
摘要:
The image's histogram represents the statistical feature of distribution of pixels and is not related to the specific positions of pixels. Tbis feature gives bistogram-based algoritbms tbe ability to resist geometric attacks, but the embedding capacity is limited. In tbis paper we combine two typical bistogram-based functions and give two relationsbips to tbree bins in a group. So tbe embedding capacity increases. Experiment results sbow tbe embedding capacity increases and our algorithm's performance in geometric attacks is close to typical existing bistogram-based algoritbms.