Journal of Xidian University ›› 2024, Vol. 51 ›› Issue (5): 110-121.doi: 10.19665/j.issn1001-2400.20240601
• Computer Science and Technology & Cyberspace Security • Previous Articles Next Articles
WU Xinting1,2,3(), HUANG Ying2(
), NIU Baoning1(
), GUAN Hu3(
), LAN Fangpeng1(
), LIU Jie2,3(
)
Received:
2023-11-16
Online:
2024-07-18
Published:
2024-07-18
Contact:
HUANG Ying, NIU Baoning
E-mail:wuxinting1998@163.com;ying.huang@bupt.edu.cn;niubaoning@tyut.edu.cn;hu.guan@ia.ac.cn;lanfangpeng@tyut.edu.cn;AILJ@bupt.edu.cn
CLC Number:
WU Xinting, HUANG Ying, NIU Baoning, GUAN Hu, LAN Fangpeng, LIU Jie. Image texture-guided iterative watermarking model[J].Journal of Xidian University, 2024, 51(5): 110-121.
"
模型名称 | 鲁棒性(BAR)/% | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Identity | Crop p=0.035 | Cropout p=0.3 | Dropout p=0.3 | GF σ=2.0 | JPEG Q=50 | Resize p=50% | CN | ||||||||||
HiDDeN[ | 98.10 | 80.34 | 75.96 | 76.89 | 82.72 | 84.09 | 82.72 | 74.30 | |||||||||
HiDDeN_no | 99.95 | 92.50 | 93.82 | 97.20 | 84.20 | 89.04 | 84.26 | 84.38 | |||||||||
IGA[ | 99.96 | 86.88 | 79.33 | 77.51 | 81.44 | 87.35 | 81.44 | 92.22 | |||||||||
ABDH[ | 95.35 | 81.64 | 74.82 | 75.31 | 79.33 | 82.62 | 80.23 | 81.24 | |||||||||
ARWGAN[ | 96.54 | 97.99 | 97.81 | 96.53 | 89.67 | 86.67 | |||||||||||
MBRS[ | 92.68 | 99.96 | 99.32 | 95.97 | 91.97 | 87.64 | |||||||||||
Two-stage[ | 89.00 | 97.30 | 97.40 | 98.60 | 76.20 | 91.70 | 88.80 | ||||||||||
ITGI | 96.16 | 93.91 | 99.97 | 99.61 | 96.95 | 93.82 | 92.88 | 93.46 |
[1] | LEE J E, SEO Y H, KIM D W. Convolutional Neural Network-Based Digital Image Watermarking Adaptive to the Resolution of Image and Watermark[J]. Applied Sciences, 2020, 10(19):6854. |
[2] | AHMADI M, NOROUZI A, KARIMI N, et al. ReDMark:Framework for Residual Diffusion Watermarking Based on Deep Networks[J]. Expert Systems with Applications, 2020, 146:113157. |
[3] | LIU Y, GOU M, ZHANG J, et al. A Novel Two-Stage Separable Deep Learning Framework for Practical Blind Watermarking[C]// Proceedings of the 27th ACM International conference on multimedia. New York: ACM, 2019:1509-1517. |
[4] | LUO X, ZHAN R, CHANG H, et al. Distortion Agnostic Deep Watermarking[C]//2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition(CVPR). Piscataway:IEEE, 2020:13548-13557. |
[5] | TANCIK M, MILDENHALL B, NG R. Stegastamp:Invisible Hyperlinks in Physical Photographs[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway:IEEE, 2020:2117-2126. |
[6] | ZHU J, KAPLAN R, JOHNSON J, et al. Hidden:Hiding Data with Deep Networks[C]// Proceedings of the European Conference on Computer Vision(ECCV). Switzerland: Springer Cham, 2018:657-672. |
[7] | ZHANG H, LI Y. Digital Watermarking via Inverse Gradient Attention[C]// 2022 9th International Conference on Behavioural and Social Computing(BESC).Piscataway:IEEE, 2022:1-3. |
[8] | YU C. Attention Based Data Hiding with Generative Adversarial Networks[C]// Proceedings of the AAAI Conference on Artificial Intelligence,34.Menlo Park:AAAI, 2020, 34(01):1120-1128. |
[9] | HUANG J, LUO T, LI L, et al. ARWGAN:Attention-guided Robust Image Watermarking Model Based on GAN[J]. IEEE Transactions on Instrumentation and Measurement, 2023, 72:1-17. |
[10] | MEI Y, WU G, YU X, et al. A Robust Blind WatermarkingScheme Based on Attention Mechanism and Neural Joint Source-Channel Coding[C]// 2022 IEEE 24th International Workshop on Multimedia Signal Processing(MMSP).Piscataway:IEEE, 2022:1-6. |
[11] | FANG H, JIA Z, QIU Y, et al. De-end:Decoder-drivenWatermarking Network[J]. IEEE Transactions on Multimedia, 2023, 25:7571-7581. |
[12] | JIA Z, FANG H, ZHANG W. Mbrs:Enhancing Robustness of DNN-Based Watermarking by Mini-Batch of Real and Simulated JPEG Compression[C]// Proceedings of the 29th ACM International Conference on Multimedia. New York: ACM, 2021:41-49. |
[13] | WU Y, WANG B, DAI C, et al. Enhancing Robustness and Imperceptibility of Blind Watermarking with Improved Message Processor[C]//2023 IEEE International Conference on Acoustics,Speech and Signal Processing(ICASSP). Piscataway:IEEE, 2023:1-5. |
[14] | MA R, GUO M, HOU Y, et al. Towards Blind Watermarking:Combining Invertible and Non-invertible Mechanisms[C]// Proceedings of the 30th ACM International Conference on Multimedia. New York: ACM, 2022:1532-1542. |
[15] | ZONG T, XIANG Y, NATGUNANATHAN I, et al. Robust Histogram Shape-Based Method for Image Watermarking[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2014, 25(5):717-729. |
[16] | GUGELMANN D, SOMMER D, LENDERS V, et al. Screen Watermarking for Data Theft Investigationand Attribution[C]// 2018 10th International Conference on Cyber Conflict(CyCon).Piscataway:IEEE, 2018:391-408. |
[17] | GHAI D, GIANEY H K, JAIN A, et al. Quantum and Dual-Tree Complex Wavelet Transform-Based Image Watermarking[J]. International Journal of Modern Physics B, 2020, 34(04):2050009. |
[18] | HUANG Y, NIU B, GUAN H, et al. Enhancing Image Watermarking with Adaptive Embedding Parameter and PSNR Guarantee[J]. IEEE Transactions on Multimedia, 2019, 21(10):2447-2460. |
[19] | LUO Y, LI L, LIU J, et al. A Multi-Scale Image Watermarking Based on Integer Wavelet Transform and Singular Value Decomposition[J]. Expert Systems with Applications, 2021, 168:114272. |
[20] | GUL E. A Blind Robust Color Image Watermarking Method Based on Discrete Wavelet Transform and Discrete Cosine Transform Using Grayscale Watermark Image[J]. Concurrency and Computation:Practice and Experience, 2022, 34(22):e6884. |
[21] | KUMAR C, SINGH A K, KUMAR P. A Recent Survey on Image Watermarking Techniques and Its Application in E-Governance[J]. Multimedia Tools and Applications, 2018, 77:3597-3622. |
[22] | LAXMANIK A, SINGH P K. Robust and Imperceptible Image Watermarking Technique Based on SVD,DCT,BEMD and PSO in Wavelet Domain[J]. Multimedia Tools and Applications, 2022, 81(16):22001-22026. |
[23] | WANG L, JI H. A Watermarking Optimization Method Based on Matrix Decomposition and DWT for Multi-Size Images[J]. Electronics, 2022, 11(13):2027. |
[24] | POLJICAK A, DONEVSKI D, JELUSIC P B, et al. Robust DFT Watermarking Method with Gray Component Replacement Masking[J]. Multimedia Tools and Applications, 2022, 81(21):30365-30386. |
[25] | PARAH S A, SHEIKH J A, LOAN N A, et al. Robust and Blind Watermarking Technique in DCT Domain Using Inter-Block Coefficient Differencing[J]. Digital Signal Processing, 2016, 53:11-24. |
[26] | LU J, WANG M, DAI J, et al. Multiple Watermark Scheme Based on DWT-DCT Quantization for Medical Images[J]. Journal of Information Hiding and Multimedia Signal Processing, 2015, 6(3):458-472. |
[27] | TSUI T K, ZHANG X P, ANDROUTSOS D. Color Image Watermarking Using Multidimensional Fourier Transforms[J]. IEEE Transactions on Information Forensics and Security, 2008, 3(1):16-28. |
[28] | GENG L, ZHANG W, CHEN H, et al. Real-Time Attacks on Robust Watermarking Tools in the Wild by CNN[J]. Journal of Real-Time Image Processing, 2020, 17:631-641. |
[29] | KANDI H, MISHRA D, GORTHI S R K S. Exploring the Learning Capabilities of Convolutional Neural Networks for Robust Image Watermarking[J]. Computers & Security, 2017, 65:247-268. |
[30] | HUANG Y, GUAN H, LIU J, et al. Robust Texture-Aware Local Adaptive Image Watermarking with Perceptual Guarantee[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2023, 33(9):4660-4674. |
[31] | 郭娜, 黄樱, 牛保宁, 等. 融合区域边缘特征的双重自适应图像水印算法[J]. 西安电子科技大学学报, 2023, 50(5):118-131. |
GUO Na, HUANG Ying, NIU Baoning, et al. A Double Adaptive Image Watermarking Algorithm Based on Regional Edge Features[J]. Journal of Xidian University, 2023, 50(5):118-131. | |
[32] | 黄樱, 牛保宁, 关虎, 等. 基于图像纹理的自适应水印算法[J]. 北京航空航天大学学报, 2019, 45(12):2403-2414. |
HUANG Ying, NIU Baoning, GUAN Hu, et al. Image Texture Based Adaptive Watermarking Algorithm[J]. Journal of Beijing University of Aeronautics and Astronautics, 2019, 45(12):2403-2414. | |
[33] | KUMAR P R, SAILAJA K L. Watermarking Algorithm Using Sobel Edge Detection[J]. International Journal of Advanced Networking and Applications, 2011, 2(05):861-867. |
[34] | LIN T Y, MAIRE M, BELONGIE S, et al. Microsoft Coco:Common Objects in Context[C]// Computer Vision-ECCV 2014:13th European Conference. Switzerland: Springer Cham, 2014:740-755. |
[1] | ZHANG Jing, WU Huixue, ZHANG Shaobo, LI Yunsong. Decoder-side enhanced image compression network under distributed strategy [J]. Journal of Xidian University, 2025, 52(1): 1-13. |
[2] | WANG Chao, JIANG Xiaofeng, WANG Sumin. Research on the quantum effect traffic prediction algorithm oriented towards intuitive reasoning [J]. Journal of Xidian University, 2025, 52(1): 152-162. |
[3] | ZHAO Congjian, JIAO Yiyuan, LI Yanni. Overview of deep sentence-level entity relation extraction [J]. Journal of Xidian University, 2024, 51(6): 117-131. |
[4] | XU Haitao, LIU Yuzhe, YAN Xinyi, LI Jiaojiao, XUE Changbin. Fusion classification network for hyperspectral and LiDAR eature coupling modeling [J]. Journal of Xidian University, 2024, 51(6): 73-83. |
[5] | ZHANG Mingjin, ZHOU Nan, LI Yunsong. Smooth interactive compression network for infrared small target detection [J]. Journal of Xidian University, 2024, 51(4): 1-14. |
[6] | GAO Dihui, SHENG Lijie, XU Xiaodong, MIAO Qiguang. Joint feature approach for image-text cross-modal retrieval [J]. Journal of Xidian University, 2024, 51(4): 128-138. |
[7] | WAN Pengwu, HUI Xi, CHEN Dongrui, WU Bo. Modulation recognition based on the two-dimensional asynchronous in-phase quadrature histogram [J]. Journal of Xidian University, 2024, 51(4): 78-90. |
[8] | GUAN Yepeng, SU Guangyao, SHENG Yi. Time series prediction method based on the bidirectional long short-term memory network [J]. Journal of Xidian University, 2024, 51(3): 103-112. |
[9] | XIA Yilan, WANG Xiumei, CHENG Peitao. Texture-aware video inpainting algorithm based on the multi-attention mechanism [J]. Journal of Xidian University, 2024, 51(3): 136-146. |
[10] | HE Wangpeng, HU Deshun, LI Cheng, ZHOU Yue, GUO Baolong. Siamese network tracking using template updating and trajectory prediction [J]. Journal of Xidian University, 2024, 51(3): 46-54. |
[11] | LIU Wei, WANG Mengyang, BAI Baoming. Efficient semantic communication method for bandwidth constrained scenarios [J]. Journal of Xidian University, 2024, 51(3): 9-18. |
[12] | LIU Zhenyan, ZHANG Hua, LIU Yong, YANG Libo, WANG Mengdi. Efficient seed generation method for software fuzzing [J]. Journal of Xidian University, 2024, 51(2): 126-136. |
[13] | ZHAI Fengwen, SUN Fanglin, JIN Jing. Study of EEG classification of depression by multi-scale convolution combined with the Transformer [J]. Journal of Xidian University, 2024, 51(2): 182-195. |
[14] | DING Xinmiao, WANG Jiaxing, GUO Wen. Three-dimensional attention-enhanced algorithm for violence scene detection [J]. Journal of Xidian University, 2024, 51(1): 114-124. |
[15] | LIU Bochong, CAI Huaiyu, WANG Yi, CHEN Xiaodong. Self-supervised contrastive representation learning for semantic segmentation [J]. Journal of Xidian University, 2024, 51(1): 125-134. |
|