首页> 外文期刊>Expert systems with applications >New robust method for image copyright protection using histogram features and Sine Cosine Algorithm
【24h】

New robust method for image copyright protection using histogram features and Sine Cosine Algorithm

机译:使用直方图特征和正弦余弦算法的图像版权保护的新鲁棒方法

获取原文
获取原文并翻译 | 示例

摘要

Zero-watermarking methods are widely used for efficient copyright protection of digital images. These methods have the ability to withstand both common image processing attacks and some geometric attacks. However, they cannot effectively resist the complex image attacks such as translation, cropping, combined geometric attacks, UnZign, etc. For this purpose, we propose in this work a novel robust zero-watermarking method that can effectively resist several complex image attacks. The proposed method involves the use of the histogram descriptor to generate a secret sequence of binary values from a user-selected Region of Interest (ROI). In order to check the intellectual property rights, the Sine Cosine Algorithm (SCA) is used for detecting the ROI in the attacked image. Then, the computed histogram of this ROI is binarized with a secret method. Next, the resulting sequence of binary values is compared to the original one generated from the original ROI. If there is a high similarity between these binary sequences, the grayscale image copyrights are validated. The simulation results show that the proposed method is not only resistant to geometric attacks (rotation, scaling) and to common image attacks (JPEG compression, filtering, etc.), but it is also robust against the most complex image attacks (cropping, translation, combined geometric attacks, etc.). Furthermore, the results of the comparisons carried out in terms of robustness against different types of attacks prove the superiority of our method over other similar recent zero-watermarking methods.
机译:零水印方法广泛用于数字图像的有效版权保护。这些方法具有能够承受普通图像处理攻击和一些几何攻击。然而,他们不能有效地抵抗复杂的图像攻击,例如翻译,裁剪,组合的几何攻击,Unizign等,为此目的,我们提出了一种新颖的鲁棒零水印方法,可以有效地抵抗多种复杂的图像攻击。该方法涉及使用直方图描述符来从用户选择的感兴趣区域(ROI)生成二进制值的秘密序列。为了检查知识产权,正弦余弦算法(SCA)用于检测攻击图像中的ROI。然后,通过秘密方法二向计算该ROI的直方图。接下来,将得到的二进制值序列与原始ROI生成的原始值进行比较。如果这些二进制序列之间存在高相似性,则验证灰度图像版权。仿真结果表明,该方法不仅抵抗几何攻击(旋转,缩放)和常见的图像攻击(JPEG压缩,过滤等),而且对最复杂的图像攻击也是强大的(裁剪,翻译组合几何攻击等)。此外,在针对不同类型攻击的鲁棒性方面进行的比较结果证明了我们对其他类似最近零水印方法的方法的优越性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号