首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于模糊聚类和Zernike矩的自适应水印算法
引用本文:余楚迎,李建忠,张伯泉.基于模糊聚类和Zernike矩的自适应水印算法[J].汕头大学学报(自然科学版),2010,25(4):66-74.
作者姓名:余楚迎  李建忠  张伯泉
作者单位:[1]汕头大学物理系,广东汕头515063 [2]韩山师范学院数学与信息技术系,广东潮州521041 [3]广东工业大学计算机学院,广东广州510006
摘    要:基于模糊聚类和Zernike矩技术,提出一种抗几何攻击鲁棒的自适应图像水印算法.首先根据人眼视觉系统的掩蔽特性,并利用模糊C-均值聚类算法自适应地选择适合嵌入数字水印的位置,然后通过奇异值分解将水印信息嵌入到宿主图像.实验结果表明,该算法不仅具有较好的透明性,而且能有效地抵抗旋转、缩放、翻转和旋转-缩放组合等几何攻击,同时对JPEG压缩、滤波和图像增强等常见攻击也有较好的鲁棒性.

关 键 词:自适应水印算法  模糊C-均值聚类  Zernike矩  几何攻击

Adaptive Watermarking Algorithm Based on Fuzzy Clustering and Zernike Moments
YU Chu-ying,LI Jian-zhong,ZHANG Bo-quan.Adaptive Watermarking Algorithm Based on Fuzzy Clustering and Zernike Moments[J].Journal of Shantou University(Natural Science Edition),2010,25(4):66-74.
Authors:YU Chu-ying  LI Jian-zhong  ZHANG Bo-quan
Institution:YU Chu-ying, LI Jian-zhong, ZHA NG Bo-quan (1. Department of Physies, Shantou University, Shantou 515063, Guangdnng, China; 2. Department of Mathematics and Information Technnlogy, Hanshan Normal University, Chaozhou 521041, Guangdong, China; 3. Facuhy of computer, Guangdong University of Technology, Guangzhou 510006, Guangdong, China)
Abstract:An adaptive geometric robust watermarking scheme is presented based on fuzzy clustering and Zernike moments technique. By turtilizing fuzzy C-mean clustering algorithm and human visual system, the suitabh; locations for embedding watermark are selected adaptively. The watermark is embedded into the host image by singular value decomposition transform. In the watermark detection process, the geometric distortion parameters of the attacked image are estimated first by the geometric correction method which is based on the Zemike moments. The watermark is extracted from the recovered image. The experimental results demonstrate that the proposed scheme is invisible and robust against rotation, scaling, flipping and combined attacks, as well as a variety of common manipulations such as JPEG compression, filtering, cropping and image enhancement.
Keywords:adaptive watermarking algorithm  fuzzy C-means clustering  Zernike moments  geometric attacks
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号