2023年全國(guó)碩士研究生考試考研英語(yǔ)一試題真題(含答案詳解+作文范文)_第1頁(yè)
已閱讀1頁(yè),還剩11頁(yè)未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說(shuō)明:本文檔由用戶(hù)提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

1、Digital Signal Processing 20 (2010) 442–453Contents lists available at ScienceDirectDigital Signal Processingwww.elsevier.com/locate/dspA novel CRT-based watermarking technique for authentication of multimedia contentsJa

2、gdish C. Patra a,?, A. Karthik a, Cedric Bornand ba School of Computer Engineering, Nanyang Technological University, Nanyang Avenue, Singapore b HEIG-VD, University of Applied Sciences, Yverdon-les-Bains, Switzerlanda r

3、 t i c l e i n f o a b s t r a c tArticle history:Available online 28 July 2009Keywords:Digital watermarkingChinese remainder theoremSingular value decompositionDigital watermarking techniques have been proposed as a sol

4、ution to the problem ofcopyright protection of multimedia data. In this paper, we propose a novel Chineseremainder theorem (CRT)-based technique for digital watermarking. The use of CRTfor this purpose provides additiona

5、l security along with resistance to some familiarattacks. We have shown that this technique is quite resilient to addition of the noise.We have compared performance of the proposed technique with recently reported twosin

6、gular value decomposition (SVD)-based watermarking techniques and shown its superiorperformance in terms of tampering assessment function (TAF), computational efficiencyand peak signal to noise ratio (PSNR). For example,

7、 the embedding time of the proposedCRT-based scheme is 6 and 3 times faster than the SVD-based Schemes 1 and 2,respectively. This technique can also be applied to document, audio and video contents. © 2009 Elsevier

8、Inc. All rights reserved.1. IntroductionToday’ s information driven economy is dominated by the tremendous growth of the Internet and explosion of day-to-daydata processing with huge amount of multimedia data. Easy avail

9、ability of content-editing software, mobile and compactdigital devices and the Internet, make the digital lifestyle of common man quite different from that of few years ago. Digitalmultimedia contents, e.g., text, image,

10、 video and audio, can be easily altered, stored or transmitted to any point of the globeinstantly. However, multimedia digital content owners are skeptical of putting their content on the Internet due to lack ofintellect

11、ual property protection available to them. In order to address this situation, digital watermarking is indeed one ofthe solutions to protect the ownership of these contents. In digital watermarking techniques, some digit

12、al signature thatis unique to the owner or copyright information is embedded into the host multimedia content. The signature embeddedremains invisible and imperceptible and cannot be removed easily even under certain man

13、ipulations, e.g., addition of noise,compression, tampering and scaling operations. Only the authorized recipient of the digital content can extract the water-mark from the watermarked content with the knowledge of some k

14、ey information. In this way security, content integrityand intellectual protection can be provided to the owner. In this direction, starting from mid-1990, several researchers havereported many watermarking techniques in

15、 spatial and transform domains [1–3].Some important properties of an effective watermarking scheme are [1–3]: (i) imperceptibility: there should not be anynoticeable difference between a watermarked content and the origi

16、nal, (ii) robustness: the embedded watermark should beable to withstand to some extent of content manipulation. Any attempt to destroy a watermark should also void the wa-termarked content and (iii) trustworthiness: no o

17、ther watermark other than the embedded watermark should be extracted* Corresponding author.E-mail addresses: aspatra@ntu.edu.sg (J.C. Patra), AL0001IK@ntu.edu.sg (A. Karthik), cedric.bornand@heig-vd.ch (C. Bornand).1051-

18、2004/$ – see front matter © 2009 Elsevier Inc. All rights reserved.doi:10.1016/j.dsp.2009.07.004444 J.C. Patra et al. / Digital Signal Processing 20 (2010) 442–453Fig. 1. Watermarking Scheme 1. The change in rank re

19、sults in a shifted Panda in the extracted watermark: (a) original 16 × 16 watermark, (b) extracted16 × 16 watermark, (c) difference between original and extracted watermarks.for embedding watermark bits. This r

20、eliance causes the scheme to be less resistant to attacks, which alters the rank of theimage blocks. The host image is a grey-scale image and the watermark is a binary image. First, the host image is dividedinto blocks o

21、f n × n pixels. A single watermark bit is embedded in a block. The blocks are chosen randomly using a pseudo-random number generator (PRNG) based on their rank. The blocks with higher ranks are selected first before

22、 those of lowerranks.In order to embed a watermark bit in a block the following procedure is adopted. We first perform a SVD transformationon the selected block. Let c1 and c2 denote the second and the third elements (u2

23、1 and u31) of the first column of U matrix,respectively. The embedding rules are as follows:To embed a watermark bit ‘ 1,’ the value of c1 ? c2 should be positive and its magnitude is greater than a strengthfactor, s. If

24、 this condition is not satisfied, c1 and c2 are modified as c? 1 and c? 2, respectively, and are given byc? 1 = a + s/2,c? 2 = a ? s/2, (2)where a = (|c1|+ |c2|)/2.To embed a watermark bit ‘ 0,’ the value of c1 ? c2 shou

25、ld be negative and its magnitude is greater than the strengthfactor, s. If this condition is not satisfied, c1 and c2 are respectively modified as c? 1 and c? 2 given byc? 1 = a ? s/2,c? 2 = a + s/2. (3)To reconstruct th

26、e watermarked block, an inverse SVD transformation is performed on the modified U matrix withthe original D and V matrices. This watermarked block then replaces the original selected block in the host image. Thisembeddin

27、g process is repeated until all the watermark bits have been embedded.In this scheme, the selection of image blocks based on higher ranks would lower the distortion level of the watermarkedimage. However, the rank is not

28、 a reliable feature as it is not stable. The rank of the selected block could change after mod-ifications are made to the elements c1 and c2. Therefore, without any tampering to the watermarked image, the extractedwaterm

29、ark could be corrupted due to a change in rank of the block. Fig. 1 shows the corruption of the extracted watermarkdue to changes in rank. In general, when the strength factor increases, the likelihood of changing of the

30、 rank of a blockincreases. This leads to a higher level of corruption and distortion in the watermark and watermarked image, respectively.The initial steps of the extraction procedure are similar to that of the embedding

31、 process up to and including theselection of the coefficients c1 and c2. The value of c1 ? c2 determines the value of the extracted watermark bit. A positivedifference indicates that the watermark bit is a ‘ 1.’Whereas,

32、a negative difference would imply that a watermark bit ‘ 0’isextracted.2.2. Watermarking Scheme 2The embedding procedure of the scheme proposed by Patra et al. [15] is an improved version of Scheme 1. The hostimage is di

33、vided into a number of super-blocks that is equal to the number of watermark bits. From each super-block,a sub-block is selected which is transformed via SVD to embed the watermark. Instead of embedding exclusively in th

34、eU matrix, the V matrix is also utilized. A counter is introduced to allow random selection of embedding the watermark bitin either U or V matrix to improve the security and robustness.In addition, the coefficients (c1 a

35、nd c2) are selected randomly from the first column of the U or V matrices using a PRNG.This flexibility gives an edge over the scheme proposed by Chang et al. [14], as malicious tampering cannot be targeted atthe two mod

36、ified coefficients due to their random selection. However, to minimize the distortion to the watermarked image,the position of c2 must be consecutive to c1. Experiments show that the watermarked image quality reduces as

37、the distancebetween the modified coefficients is increased. The modifications of c1 and c2 are similar to the procedure in Scheme 1. Thereconstruction of the new block, re-placement of the block into the image, and extra

38、ction procedure are also similar to thatof Scheme 1.This scheme removes the reliance on rank and also improves security by using random selection of coefficients forembedding the watermark bits. The weakness of this sche

溫馨提示

  • 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶(hù)所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 眾賞文庫(kù)僅提供信息存儲(chǔ)空間,僅對(duì)用戶(hù)上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶(hù)上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶(hù)因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

最新文檔

評(píng)論

0/150

提交評(píng)論