Метод ЦВЗ для селективной аутентификации изображений, устойчивый к JPEG-сжатию, изменениям яркости и контрастности
https://doi.org/10.31854/1813-324X-2020-6-3-92-99
Аннотация
Об авторе
А. Г. ЖувикинРоссия
Список литературы
1. Cisco Annual Internet Report (2018-2023). Available from: https://www.cisco.com/c/en/us/solutions/collateral/ executive-perspectives/annual-internet-report/white-paper-c11-741490.pdf (дата обращения 05.08.2020)
2. Haouzia A., Noumeir R. Methods for image authentication: a survey // Multimed Tools and Applications. 2008. Vol. 39. Iss. 1-46. DOI:10.1007/s11042-007-0154-3
3. Korzhik V., Zhuvikin A., Morales-Luna G. Selective image authentication tolerant to JPEG compression // Proceedings of the 6th International Conference on Information, Intelligence, Systems and Applications (IISA, Corfu, Greece, 6-8 July 2015). IEEE, 2015. DOI:10.1109/IISA.2015.7388076
4. Zhuvikin A., Korzhik V., Morales-Luna G. Semi-Fragile Image Authentication based on CFD and 3-Bit Quantization // Indian Journal of Science and Technology. 2016. Vol. 9. Iss. 48. PP. 1-7. DOI:10.17485/ijst/2016/v9i48/109167
5. Daofu G., Fenlin L., Xiangyang L., Ping W. Robust Image Watermarking against Brightness and Contrast Change // Proceedings of the 4th International Conference on Multimedia Information Networking and Security (Nanjing, China, 2-4 November 2012). IEEE, 2012. PP. 995-998. DOI:10.1109/MINES.2012.252
6. Li X.-D. Image digital watermarking algorithm in DCT domain for resisting brightness-and-contrast adjusting attack // Journal of Optoelectronics. Laser. 2013. Vol. 6. URl: http://en.cnki.com.cn/Article_en/CJFDTotal-GDZJ201306027.htm (дата обращения 03.08.2020)
7. Muñoz-Ramirez D.-O., Ponomaryov V., Reyes-Reyes R., Kyrychenko V., Pechenin O., Totsky A. A robust watermarking scheme to JPEG compression for embedding a color watermark into digital images // Proceedings of the 9th International Conference on Dependable Systems, Services and Technologies (DESSERT, Kiev, Ukraine, 24-27 May 2018). IEEE, 2018. PP. 619-624. DOI:10.1109/DESSERT.2018.8409206
8. Nguyen P., Beghdadi A., Luong M. Perceptual watermarking robust to JPEG compression attack // Proceedings of the 5th International Symposium on Communications, Control and Signal Processing, Rome, Italy, 2-4 May 2012). IEEE, 2012. PP. 1-4. DOI:10.1109/ISCCSP.2012.6217798
9. Wang X., Feng X., He N., Jia Q., Zou Y. JPEG image compression algorithm analysis and local optimization // Proceedings of the International Conference on Advanced Management Science (ICAMS 2010, Chengdu, China, 9-11 July 2010). IEEE, 2010. PP. 5-7. DOI:10.1109/ICAMS.2010.5553016
10. Gallager R.G. Low-density parity-check codes. Cambridge: M.I.T. Press, 1963.
11. Zhu Y., Huang C. Histogram equalization algorithm for variable gray level mapping // Proceedings of the 8th World Congress on Intelligent Control and Automation (Jinan, China, 7-9 July 2010). IEEE, 2010. PP. 6022-6025. DOI:10.1109/WCICA.2010.5554587
12. The USC-SIPI Image Database // University of Southern California. Viterbi School of Engineering. URL: http://sipi.usc.edu/database (дата обращения 17.06.2020)
13. Brown D. The Exact Security of ECDSA // In Advances in Elliptic Curve Cryptography. Cambridge: Cambridge University Press, 2000.
14. Huynh-Thu Q., Ghanbari M. Scope of validity of PSNR in image/video quality assessment // Electronics letters. 2008. Vol. 44. Iss. 13. PP. 800-801. DOI:10.1049/el:20080522
Рецензия
Для цитирования:
Жувикин А.Г. Метод ЦВЗ для селективной аутентификации изображений, устойчивый к JPEG-сжатию, изменениям яркости и контрастности. Труды учебных заведений связи. 2020;6(3):92-99. https://doi.org/10.31854/1813-324X-2020-6-3-92-99
For citation:
Zhuvikin A... A Watermarking Method for Selective Image Authentication Tollerant to JPEG Compression, Brightness and Contrast Adjustments. Proceedings of Telecommunication Universities. 2020;6(3):92-99. (In Russ.) https://doi.org/10.31854/1813-324X-2020-6-3-92-99