{"title":"基于回归支持向量机的鲁棒水印算法","authors":"Fuxin Wang, Wei Song, J. Hou","doi":"10.1109/ICOSP.2008.4697584","DOIUrl":null,"url":null,"abstract":"This paper presents a robust watermarking algorithm based on regression of SVM. The host image is divided into two parts firstly. The first one is to train SVM using features including four relationships between the neighbor pixels, and the other part is to embed watermarks. The center pixels of image blocks are compared with the predicted pixels of trained SVM, and then modified to embed watermarks. Because of the introduction of Pseudorandom Circular Chain (PCC) scheme, the training pixels and the test pixels can spread all over the host image, which increases accurate rate of the watermark-extraction. Otherwise, for the security consideration, logistic mapping is used to permute the watermark image. Experiment results demonstrate that this algorithm can get good perceptual invisibility, and robustness against many attacks.","PeriodicalId":445699,"journal":{"name":"2008 9th International Conference on Signal Processing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Regression of SVM based robust watermarking algorithm\",\"authors\":\"Fuxin Wang, Wei Song, J. Hou\",\"doi\":\"10.1109/ICOSP.2008.4697584\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a robust watermarking algorithm based on regression of SVM. The host image is divided into two parts firstly. The first one is to train SVM using features including four relationships between the neighbor pixels, and the other part is to embed watermarks. The center pixels of image blocks are compared with the predicted pixels of trained SVM, and then modified to embed watermarks. Because of the introduction of Pseudorandom Circular Chain (PCC) scheme, the training pixels and the test pixels can spread all over the host image, which increases accurate rate of the watermark-extraction. Otherwise, for the security consideration, logistic mapping is used to permute the watermark image. Experiment results demonstrate that this algorithm can get good perceptual invisibility, and robustness against many attacks.\",\"PeriodicalId\":445699,\"journal\":{\"name\":\"2008 9th International Conference on Signal Processing\",\"volume\":\"44 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-12-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 9th International Conference on Signal Processing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOSP.2008.4697584\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 9th International Conference on Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOSP.2008.4697584","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Regression of SVM based robust watermarking algorithm
This paper presents a robust watermarking algorithm based on regression of SVM. The host image is divided into two parts firstly. The first one is to train SVM using features including four relationships between the neighbor pixels, and the other part is to embed watermarks. The center pixels of image blocks are compared with the predicted pixels of trained SVM, and then modified to embed watermarks. Because of the introduction of Pseudorandom Circular Chain (PCC) scheme, the training pixels and the test pixels can spread all over the host image, which increases accurate rate of the watermark-extraction. Otherwise, for the security consideration, logistic mapping is used to permute the watermark image. Experiment results demonstrate that this algorithm can get good perceptual invisibility, and robustness against many attacks.