<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">tuzsut</journal-id><journal-title-group><journal-title xml:lang="ru">Труды учебных заведений связи</journal-title><trans-title-group xml:lang="en"><trans-title>Proceedings of Telecommunication Universities</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">1813-324X</issn><issn pub-type="epub">2712-8830</issn><publisher><publisher-name>СПбГУТ</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.31854/1813-324X-2020-6-3-92-99</article-id><article-id custom-type="elpub" pub-id-type="custom">tuzsut-135</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>ТРУДЫ МОЛОДЫХ УЧЕНЫХ</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>YOUNG SCHOLARS RESEARCH</subject></subj-group></article-categories><title-group><article-title>Метод ЦВЗ для селективной аутентификации изображений, устойчивый к JPEG-сжатию, изменениям яркости и контрастности</article-title><trans-title-group xml:lang="en"><trans-title>A Watermarking Method for Selective Image Authentication Tollerant to JPEG Compression, Brightness and Contrast Adjustments</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Жувикин</surname><given-names>А. Г.</given-names></name><name name-style="western" xml:lang="en"><surname>Zhuvikin</surname><given-names>A. ..</given-names></name></name-alternatives><email xlink:type="simple">mail@zhuvikin.com</email><xref ref-type="aff" rid="aff-1"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Санкт-Петербургский государственный университет телекоммуникаций им. проф. М.А. Бонч-Бруевича<country>Россия</country></aff><aff xml:lang="en">The Bonch-Bruevich Saint-Petersburg State University of Telecommunications<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2020</year></pub-date><pub-date pub-type="epub"><day>13</day><month>04</month><year>2021</year></pub-date><volume>6</volume><issue>3</issue><fpage>92</fpage><lpage>99</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Жувикин А.Г., 2021</copyright-statement><copyright-year>2021</copyright-year><copyright-holder xml:lang="ru">Жувикин А.Г.</copyright-holder><copyright-holder xml:lang="en">Zhuvikin A...</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://tuzs.sut.ru/jour/article/view/135">https://tuzs.sut.ru/jour/article/view/135</self-uri><abstract><p>Одними из наиболее перспективных приложений для цифровых водяных знаков (ЦВЗ) являются системы селективной аутентификации изображений (САИ). Для реализации таких систем требуются методы вложения данных в покрывающее изображение со значительной емкостью. При этом метод вложения должен быть устойчив к классу естественных преобразованиям данной САИ-системы. В этой работе предлагается новый метод погружения ЦВЗ в изображение, который обладает большой емкостью вложения и является одновременно устойчивым к JPEG-сжатию, изменениям яркости и контрастности. Добиться такого результата удалось благодаря развитию метода вложения с использованием дискретного вейвлет-преобразования. Алгоритмом предусмотрено двухэтапное вложение, а также применение методик выравнивания и восстановления гистограммы. Экспериментальные результаты показали значительную устойчивость ЦВЗ к JPEG-сжатию, изменениям яркости и контрастности при высоком визуальном качестве изображения сразу после погружения по метрике PSNR.</p></abstract><trans-abstract xml:lang="en"><p>One of the most promising application of the digital watermarking is the selective image authentication (SIA) systems. In order to implement such a system one requires an embedding algorithm with an appropriate capacity. In addition, an embedding method is to be robust for the class of non-malicious manipulations which the SIA system is designed for. We propose the new method which has a significant embedding capacity while still being tolerant to JPEG compression, brightness and contrast adjustments. This was possible due to the extension of the well-known discrete wavelet transform embedding technique. We propose two-step embedding scheme and the use of image histogram equalisation and recovering operations. The experiment results show acceptable tolerance to JPEG compression, brightness and contrast adjustments with good visual quality in terms of PSNR just after embedding.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>яркость</kwd><kwd>контрастность</kwd><kwd>дискретное вейвлет-преобразование</kwd><kwd>выравнивание гистограммы</kwd><kwd>системы селективной аутентификации изображений</kwd></kwd-group><kwd-group xml:lang="en"><kwd>JPEG</kwd><kwd>brightness</kwd><kwd>contrast</kwd><kwd>discrete wavelet transform</kwd><kwd>histogram equalisation</kwd><kwd>selective image authentication systems</kwd></kwd-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Cisco Annual Internet Report (2018-2023). Available from: https://www.cisco.com/c/en/us/solutions/collateral/ executive-perspectives/annual-internet-report/white-paper-c11-741490.pdf (дата обращения 05.08.2020)</mixed-citation><mixed-citation xml:lang="en">Cisco Annual Internet Report (2018-2023). Available from: https://www.cisco.com/c/en/us/solutions/collateral/ executive-perspectives/annual-internet-report/white-paper-c11-741490.pdf (дата обращения 05.08.2020)</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Haouzia A., Noumeir R. Methods for image authentication: a survey // Multimed Tools and Applications. 2008. Vol. 39. Iss. 1-46. DOI:10.1007/s11042-007-0154-3</mixed-citation><mixed-citation xml:lang="en">Haouzia A., Noumeir R. Methods for image authentication: a survey // Multimed Tools and Applications. 2008. Vol. 39. Iss. 1-46. DOI:10.1007/s11042-007-0154-3</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Korzhik V., Zhuvikin A., Morales-Luna G. Selective image authentication tolerant to JPEG compression // Proceedings of the 6th International Conference on Information, Intelligence, Systems and Applications (IISA, Corfu, Greece, 6-8 July 2015). IEEE, 2015. DOI:10.1109/IISA.2015.7388076</mixed-citation><mixed-citation xml:lang="en">Korzhik V., Zhuvikin A., Morales-Luna G. Selective image authentication tolerant to JPEG compression // Proceedings of the 6th International Conference on Information, Intelligence, Systems and Applications (IISA, Corfu, Greece, 6-8 July 2015). IEEE, 2015. DOI:10.1109/IISA.2015.7388076</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Zhuvikin A., Korzhik V., Morales-Luna G. Semi-Fragile Image Authentication based on CFD and 3-Bit Quantization // Indian Journal of Science and Technology. 2016. Vol. 9. Iss. 48. PP. 1-7. DOI:10.17485/ijst/2016/v9i48/109167</mixed-citation><mixed-citation xml:lang="en">Zhuvikin A., Korzhik V., Morales-Luna G. Semi-Fragile Image Authentication based on CFD and 3-Bit Quantization // Indian Journal of Science and Technology. 2016. Vol. 9. Iss. 48. PP. 1-7. DOI:10.17485/ijst/2016/v9i48/109167</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Daofu G., Fenlin L., Xiangyang L., Ping W. Robust Image Watermarking against Brightness and Contrast Change // Proceedings of the 4th International Conference on Multimedia Information Networking and Security (Nanjing, China, 2-4 November 2012). IEEE, 2012. PP. 995-998. DOI:10.1109/MINES.2012.252</mixed-citation><mixed-citation xml:lang="en">Daofu G., Fenlin L., Xiangyang L., Ping W. Robust Image Watermarking against Brightness and Contrast Change // Proceedings of the 4th International Conference on Multimedia Information Networking and Security (Nanjing, China, 2-4 November 2012). IEEE, 2012. PP. 995-998. DOI:10.1109/MINES.2012.252</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Li X.-D. Image digital watermarking algorithm in DCT domain for resisting brightness-and-contrast adjusting attack // Journal of Optoelectronics. Laser. 2013. Vol. 6. URl: http://en.cnki.com.cn/Article_en/CJFDTotal-GDZJ201306027.htm (дата обращения 03.08.2020)</mixed-citation><mixed-citation xml:lang="en">Li X.-D. Image digital watermarking algorithm in DCT domain for resisting brightness-and-contrast adjusting attack // Journal of Optoelectronics. Laser. 2013. Vol. 6. URl: http://en.cnki.com.cn/Article_en/CJFDTotal-GDZJ201306027.htm (дата обращения 03.08.2020)</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Muñoz-Ramirez D.-O., Ponomaryov V., Reyes-Reyes R., Kyrychenko V., Pechenin O., Totsky A. A robust watermarking scheme to JPEG compression for embedding a color watermark into digital images // Proceedings of the 9th International Conference on Dependable Systems, Services and Technologies (DESSERT, Kiev, Ukraine, 24-27 May 2018). IEEE, 2018. PP. 619-624. DOI:10.1109/DESSERT.2018.8409206</mixed-citation><mixed-citation xml:lang="en">Muñoz-Ramirez D.-O., Ponomaryov V., Reyes-Reyes R., Kyrychenko V., Pechenin O., Totsky A. A robust watermarking scheme to JPEG compression for embedding a color watermark into digital images // Proceedings of the 9th International Conference on Dependable Systems, Services and Technologies (DESSERT, Kiev, Ukraine, 24-27 May 2018). IEEE, 2018. PP. 619-624. DOI:10.1109/DESSERT.2018.8409206</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Nguyen P., Beghdadi A., Luong M. Perceptual watermarking robust to JPEG compression attack // Proceedings of the 5th International Symposium on Communications, Control and Signal Processing, Rome, Italy, 2-4 May 2012). IEEE, 2012. PP. 1-4. DOI:10.1109/ISCCSP.2012.6217798</mixed-citation><mixed-citation xml:lang="en">Nguyen P., Beghdadi A., Luong M. Perceptual watermarking robust to JPEG compression attack // Proceedings of the 5th International Symposium on Communications, Control and Signal Processing, Rome, Italy, 2-4 May 2012). IEEE, 2012. PP. 1-4. DOI:10.1109/ISCCSP.2012.6217798</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Wang X., Feng X., He N., Jia Q., Zou Y. JPEG image compression algorithm analysis and local optimization // Proceedings of the International Conference on Advanced Management Science (ICAMS 2010, Chengdu, China, 9-11 July 2010). IEEE, 2010. PP. 5-7. DOI:10.1109/ICAMS.2010.5553016</mixed-citation><mixed-citation xml:lang="en">Wang X., Feng X., He N., Jia Q., Zou Y. JPEG image compression algorithm analysis and local optimization // Proceedings of the International Conference on Advanced Management Science (ICAMS 2010, Chengdu, China, 9-11 July 2010). IEEE, 2010. PP. 5-7. DOI:10.1109/ICAMS.2010.5553016</mixed-citation></citation-alternatives></ref><ref id="cit10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">Gallager R.G. Low-density parity-check codes. Cambridge: M.I.T. Press, 1963.</mixed-citation><mixed-citation xml:lang="en">Gallager R.G. Low-density parity-check codes. Cambridge: M.I.T. Press, 1963.</mixed-citation></citation-alternatives></ref><ref id="cit11"><label>11</label><citation-alternatives><mixed-citation xml:lang="ru">Zhu Y., Huang C. Histogram equalization algorithm for variable gray level mapping // Proceedings of the 8th World Congress on Intelligent Control and Automation (Jinan, China, 7-9 July 2010). IEEE, 2010. PP. 6022-6025. DOI:10.1109/WCICA.2010.5554587</mixed-citation><mixed-citation xml:lang="en">Zhu Y., Huang C. Histogram equalization algorithm for variable gray level mapping // Proceedings of the 8th World Congress on Intelligent Control and Automation (Jinan, China, 7-9 July 2010). IEEE, 2010. PP. 6022-6025. DOI:10.1109/WCICA.2010.5554587</mixed-citation></citation-alternatives></ref><ref id="cit12"><label>12</label><citation-alternatives><mixed-citation xml:lang="ru">The USC-SIPI Image Database // University of Southern California. Viterbi School of Engineering. URL: http://sipi.usc.edu/database (дата обращения 17.06.2020)</mixed-citation><mixed-citation xml:lang="en">The USC-SIPI Image Database // University of Southern California. Viterbi School of Engineering. URL: http://sipi.usc.edu/database (дата обращения 17.06.2020)</mixed-citation></citation-alternatives></ref><ref id="cit13"><label>13</label><citation-alternatives><mixed-citation xml:lang="ru">Brown D. The Exact Security of ECDSA // In Advances in Elliptic Curve Cryptography. Cambridge: Cambridge University Press, 2000.</mixed-citation><mixed-citation xml:lang="en">Brown D. The Exact Security of ECDSA // In Advances in Elliptic Curve Cryptography. Cambridge: Cambridge University Press, 2000.</mixed-citation></citation-alternatives></ref><ref id="cit14"><label>14</label><citation-alternatives><mixed-citation xml:lang="ru">Huynh-Thu Q., Ghanbari M. Scope of validity of PSNR in image/video quality assessment // Electronics letters. 2008. Vol. 44. Iss. 13. PP. 800-801. DOI:10.1049/el:20080522</mixed-citation><mixed-citation xml:lang="en">Huynh-Thu Q., Ghanbari M. Scope of validity of PSNR in image/video quality assessment // Electronics letters. 2008. Vol. 44. Iss. 13. PP. 800-801. DOI:10.1049/el:20080522</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
