Abstract:An affine transform invariant blind watermarking technique is proposed based on secret sharing and high order spectra in this paper. Watermark is divided into n shadows to enhance security, according to secret sharing scheme. only t or more than t shadows can reconstruct the secret watermark. The watermark is embedded in the rotation, scaling, and translation invariant vector of bispectrum. Bispectrum detection is utilized to detect whether the test image contains the watermark or not. Even with small signal noise ratio, the detector can get a high detection probability. The independent component analysis is adopted, and thus the shadow could be detected as well as extracted. Before watermark reconstruction, one way hash function is employed to withstand cheating attacks. The experimental results show that the proposed algorithm is robust against a variety of attacks by watermark test software-Stirmark.
张力,肖薇薇,纪震. 基于秘密共享和高阶谱的仿射不变性水印算法*[J]. 模式识别与人工智能, 2007, 20(4): 533-537.
ZHANG Li, XIAO WeiWei, JI Zhen. An Affine Transform Invariant Watermarking Algorithm Based on Secret Sharing and High Order Spectra. , 2007, 20(4): 533-537.
[1] Gui Guofu, Jiang Lingge, He Chen. Watermarking for Joint Ownership Verification of Digital Images. Journal of Electronic Imaging, 2006, 15(1): 1013 [2] Zou Xinguang, Sun Shenghe. Information Hiding Using Secret Sharing Scheme // Proc of the 1st International Conference on Innovative Computing, Information and Control. Beijing, China, 2006, Ⅰ: 484 487 [3] Shamir A. How to Share a Secret. Communications of ACM, 1979, 22(11): 612613 [4] Guo Huiping, Georganas N D. Digital Image Watermarking for Joint Ownership Verification without a Trusted Dealer // Proc of the International Conference on Multimedia and Expo. Baltimore, USA, 2003: 497500 [5] Wang F H, Jain L C, Pan J S. Design of Hierarchical Keys for a Multiuser Based Watermarking System // Proc of the International Conference on Multimedia and Expo. Taipei, China, 2004: 919922 [6] Chang C C, Lin I C. A New (t,n) Threshold Image Hiding Scheme for Sharing a Secret Color Image // Proc of the International Conference on Communication Technology. Beijing, China, 2003: 196202 [7] Hyvarinen A, Oja E. Independent Component Analysis: A Tutorial. Neural Networks, 2000, 13(4/5): 411430 [8] Zhang Li, Wei Gang, Zhang Jihong. A New Adaptive Closed Loop Robust Blind Image Digital Watermarking in Wavelet Domain. Acta Electronica Sinica, 2003, 31(10): 14761480 (in Chinese) (张 力,韦 岗,张基宏.一种小波域自适应鲁棒闭环数字盲水印技术.电子学报, 2003, 31(10): 14761480) [9] Sundaramorthy G, Raghuveer M R, Diana S A. Bispectral Reconstruction of Signals in Noise Amplitude Reconstruction Issues. IEEE Trans on Acoustic, Speech, Signal Processing, 1990, 38(7): 12971300 [10] Hsu C T, Wu Jaling. Hidden Digital Watermarks in Images. IEEE Trans on Image Processing, 1999, 8(1): 5868 [11] Pereira S, Pun T. Robust Template Matching for Affine Resistant Image Watermarks. IEEE Trans on Image Processing, 2000, 9(6): 11231129