RST attack resistance stereo image zero watermark method based on FFST and Hessenberg decomposition

A stereoscopic image and zero watermark technology, applied in image data processing, image data processing, instruments, etc., can solve the problems of poor robustness, certified zero watermark structure and detection time, unable to resist rotation, etc. The method is simple , good translation invariance, and the effect of improving security

Active Publication Date: 2021-02-19
CIVIL AVIATION UNIV OF CHINA
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the stereoscopic image zero-watermarking methods described above are not robust and cannot resist geometric attacks such as rotation, scaling, and translation (RST)
Wang Chunpeng, Wang Xingyuan and others proposed a three-dimensional image zero-watermark algorithm based on ternary extreme harmonic-Fourier moments and chaotic mapping. Although it can resist a certain degree of geometric attacks, the construction and detection process of the authentication zero-watermark takes a relatively long time. time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RST attack resistance stereo image zero watermark method based on FFST and Hessenberg decomposition
  • RST attack resistance stereo image zero watermark method based on FFST and Hessenberg decomposition
  • RST attack resistance stereo image zero watermark method based on FFST and Hessenberg decomposition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0047] The anti-RST attack stereo image zero watermarking method based on FFST and Hessenberg decomposition provided by the present invention comprises the following steps carried out in order:

[0048] Step 1: If figure 1 As shown, the zero watermark is generated according to the feature information of the original stereo image;

[0049] Step 1.1: Zigzag-scan the original binary watermark image W of size n×n into a one-dimensional vector W 1 , and then use the fractional order Arneodo chaotic system to generate the length L(L=n 2 ) of three chaotic random sequences {P k |k=X, Y, Z}, the specific expression of the fractional order Arneodo chaotic system is as follows:

[0050]

[0051] Among them, b 1 , b 2 , b 3 , b 4 is the fractional order Arneodo chaotic system and control parameters, x 0 ,y 0 ,z 0 is the fractional order Ar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an RST attack resistance stereo image zero watermark method based on FFST and Hessenberg decomposition. The method comprises a zero watermark generation part and a zero watermark detection part. An authentication zero watermark of a three-dimensional image is constructed by utilizing the double-viewpoint characteristic of the three-dimensional image and utilizing the sizerelation between absolute values of elements at the upper left corners in respective coefficient sub-blocks after paired random image blocks are decomposed in low-frequency sub-bands after fast finiteshear wave transformation (FFST) of the left viewpoint image and the right viewpoint image, and the method is simple, novel and high in robustness. Meanwhile, a fractional order Arnodo chaotic systemis adopted to generate a random sequence, and encryption of an original binary watermark image is achieved. Before watermark extraction, geometric attack correction is carried out on a to-be-authenticated three-dimensional image by using an image matching method based on Fourier-Merlin transform. Experimental results show that the method provided by the invention has good robustness for resistingvarious common image processing attacks such as noise addition, filtering, JPEG compression, shearing, rotation, zooming, translation (RST) attacks and the like.

Description

technical field [0001] The invention belongs to the technical field of information security and image processing, and in particular relates to a zero-watermarking method for a three-dimensional image against RST attack based on fast finite shearlet transform (FFST) and Hessenberg decomposition. [0002] technical background [0003] With the rapid development of Internet and multimedia technology, binocular stereo image processing technology has been gradually applied to 3D video conferencing, virtual reality, telemedicine, education, military and other aspects. The resulting problem is that the copyright protection of stereo images has become an urgent problem to be solved. As an information hiding technology, digital watermarking technology can provide solutions for copyright protection and content authentication of multimedia resources such as images, audio and video. As a special digital watermarking technology, zero watermark does not need to "directly embed" copyright ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
CPCG06T1/0021
Inventor 韩绍程张鹏王蕊程争
Owner CIVIL AVIATION UNIV OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products