首页> 外文期刊>Image Processing, IET >Lossless digital image watermarking in sparse domain by using K-singular value decomposition algorithm
【24h】

Lossless digital image watermarking in sparse domain by using K-singular value decomposition algorithm

机译:利用k-奇异值分解算法在稀疏域中无损数字图像水印

获取原文
获取原文并翻译 | 示例
           

摘要

The crucial hurdle faced by the watermarking technique is to maintain the steadiness corresponding to several attacks while assisting a sufficient level of security. In this study, a robust lossless sparse domain-based watermarking approach combined with discrete cosine transform (DCT) is introduced to hide the secret message in the selected significant sparse elements of the host image. The proposed method takes advantage of a sparse representation-based dictionary learning process. To enhance the security of the original image, the authors first apply the DCT on a secret message. These DCT coefficients with some regularised parameters will be inserted into the selected significant sparse coefficients. At the extraction stage, the secret message is extracted from those significant sparse coefficients by employing the sparse domain orthogonal matching pursuit algorithm. Finally, the inverse DCT is applied to extract the secret message without any information loss. To show the effectiveness of the proposed method, different commonly used attacks are simulated. Simulation results in terms of peak signal-to-noise ratio, structural similarity, normal correlation, and feature similarity indicate that the proposed method can recover the hidden secret message accurately against seven different types of attacks including speckle, Gaussian, salt and pepper, rotate, crop, fold, and blur attack.
机译:水印技术所面临的关键障碍是保持对应于若干攻击的稳定性,同时有助于足够的安全性。在本研究中,引入了一种坚固的无损稀疏域的水印方法,与离散余弦变换(DCT)结合起来,以隐藏主机图像的选定的大量稀疏元素中的秘密消息。所提出的方法利用基于稀疏表示的字典学习过程。为了增强原始图像的安全性,作者首先将DCT应用于秘密信息。这些具有一些正则化参数的DCT系数将插入所选择的显着稀疏系数。在提取阶段,通过采用稀疏域正交匹配追踪算法,从那些有明显的稀疏系数中提取秘密消息。最后,逆DCT应用于提取秘密消息而无需任何信息丢失。为了显示所提出的方法的有效性,模拟了不同常用的攻击。仿真结果在峰值信噪比,结构相似度,正常相关性和特征相似度方面表明,该方法可以准确地恢复隐藏的秘密信息,以七种不同类型的攻击,包括斑点,高斯,盐和胡椒,旋转,作物,折叠和模糊攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号