Computer and Modernization ›› 2023, Vol. 0 ›› Issue (04): 111-117.
Previous Articles Next Articles
Online:
2023-05-09
Published:
2023-05-09
CHEN Xiao-wen, SHI Hui. A Digital Watermarking Detection Model Based on DWT-SVD and Transfer Learning[J]. Computer and Modernization, 2023, 0(04): 111-117.
[1] | FRIDRICH J, KODOVSKY J. Rich models for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security, 2012,7(3):868-882. |
[2] | TAN S Q, ZHANG H J, LI B, et al. Pixel-decimation-assisted steganalysis of synchronize-embedding-changes steganography[J]. IEEE Transactions on Information Forensics and Security, 2017,12(7):1658-1670. |
[3] | LU W, LI R P, ZENG L W, et al. Binary image steganalysis based on histogram of structuring elements[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2020,30(9):3081-3094. |
[4] | TAN S Q, LI B. Stacked convolutional auto-encoders for steganalysis of digital images[C]// Proceedings of the 2014 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference. 2014. DOI: 10.1109/APSIPA.2014.7041565. |
[5] | ZENG J S, TAN S Q, LIU G Q, et al. WISERNet: Wider separate-then-reunion network for steganalysis of color images[J]. IEEE Transactions on Information Forensics and Security, 2019,14(10):2735-2748. |
[6] | LIU J R, LU W, ZHAN Y L, et al. Efficient binary image steganalysis based on ensemble neural network of multi-module[J]. Journal of Real-Time Image Processing, 2020,17(1):137-147. |
[7] | LIU N S, GUO D H. Robust digital watermarking based on chaotic maps[C]// Proceedings of the 2012 International Conference on Anti-counterfeiting, Security and Identification. 2012. DOI: 10.1109/ICASID.2012.6325280. |
[8] | PANDEY P, KUMAR S, SINGH S K. Rightful ownership through image adaptive DWT-SVD watermarking algorithm and perceptual tweaking[J]. Multimedia Tools and Applications, 2014,72(1):723-748. |
[9] | MISHRA A, AGARWAL C, SHARMA A, et al. Optimized gray-scale image watermarking using DWT-SVD and firefly algorithm[J]. Expert Systems with Applications, 2014,41(17):7858-7867. |
[10] | CENTINEL G, CERKEZI L L. Chaotic digital image watermarking scheme based on DWT and SVD[C]// Proceedings of the 2015 9th International Conference on Electrical and Electronics Engineering. 2015:251-255. |
[11] | 展虎,毛力. 基于NSCT-DCT-DWT-SVD联合数字水印算法[J]. 计算机应用与软件, 2018,35(3):309-315. |
[12] | 张秀娟,朱春伟. 一种基于DWT-SVD的图像数字水印算法[J]. 数字技术与应用, 2017(10):104-107. |
[13] | BOROUMAND M, CHEN M, FRIDRICH J. Deep residual network for steganalysis of digital images[J]. IEEE Transactions on Information Forensics and Security, 2019,14(5):1181-1193. |
[14] | 解晓康. 基于迁移学习的模糊图像识别技术研究[D]. 武汉:华中科技大学, 2016. |
[15] | 张雪松,庄严,闫飞,等. 基于迁移学习的类别级物体识别与检测研究与进展[J]. 自动化学报, 2019,45(7):1224-1243. |
[16] | 黄家才,舒奇,朱晓春,等. 基于迁移学习的机器人视觉识别与分拣策略[J]. 计算机工程与应用, 2019,55(8):232-237. |
[17] | 庄福振,罗平,何清,等. 迁移学习研究进展[J]. 软件学报, 2015,26(1):26-39. |
[18] | 宋光慧. 基于迁移学习与深度卷积特征的图像标注方法研究[D]. 杭州:浙江大学, 2016. |
[19] | WANG Y F, COTTRELL G W. Bikers are like tobacco shops, formal dressers are like suits: Recognizing urban tribes with caffe[C]// Proceedings of the 2015 IEEE Winter Conference on Applications of Computer Vision. 2015:876-883. |
[20] | HU H T, HSU L Y, CHOU H H. An improved SVD-based blind color image watermarking algorithm with mixed modulation incorporated[J]. Information Sciences, 2020,519:161-182. |
[21] | BAS P, FILLER T, PEVNY T. “Break our steganographic system”: The ins and outs of organizing BOSS[C]// Proceedings of the 2011 International Workshop on Information Hiding. 2011:59-70. |
[22] | AHMADI M, NOROUZI A, KARIMI N, et al. ReDMark: Framework for residual diffusion watermarking based on deep networks[J]. Expert Systems with Applications, 2020,146. DOI: 10.1016/j.eswa.2019.113157. |
[23] | BAS P, FURON T. BOWS-2[EB/OL]. (2007-07-30)[2022-02-07]. http://bows2.ec-lille.fr. |
[24] | 薛胜男,陈秀宏. 基于混沌加密和SVD的数字图像水印算法[J]. 计算机工程, 2012,38(19):107-110. |
[25] | 孙超. 基于DWT-SVD的数字图像盲水印算法研究[D]. 广州:华南理工大学, 2012. |
[26] | Alvin, WICAKSANA A, PRASETIYOWATI M I. Digital watermarking for color image using DHWT and LSB[C]// Proceedings of the 2019 5th International Conference on New Media Studies. 2019:94-99. |
[27] | 李传鑫,刘增力. 时频分析与VGG19迁移学习的轴承故障检测[J]. 电子测量技术, 2021,44(5):161-165. |
[28] | SU Q T. Novel blind colour image watermarking technique using Hessenberg decomposition[J]. IET Image Processing, 2016,10(11):817-829. |
[29] | 魏立线,高培贤,刘佳,等. 基于卷积神经网络的图像隐写分析方法[J]. 计算机应用研究, 2019,36(1):235-238. |
[30] | PIBRE L, JEROME P, IENCO D, et al. Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover source-mismatch[J]. arXiv preprint arXiv:1511.04855, 2015. |
[31] | 陈升. 基于深度学习的图像隐写分析研究[D]. 贵阳:贵州大学, 2021. |
[32] | YE J, NI J Q, YANG Y. Deep learning hierarchical representations for image steganalysis[J]. IEEE Transactions on Information Forensics and Security, 2017,12(11):2545-2557. |
[33] | JIN Z J, LI H, YANG Y, et al. An image steganalysis model combined with the directionality of residuals[C]// Proceedings of the 2020 International Conference on Artificial Intelligence and Security. 2020:546-556. |
[1] | HU Chong-jia, LIU Jin-zhou, FANG Li. Unsupervised Domain Adaptation for Outdoor Point Cloud Semantic Segmentation [J]. Computer and Modernization, 2024, 0(01): 74-79. |
[2] | ZHANG Zhi-xia, XIE Bao-qiang. Natural Gas Load Forecasting Based on FCGA-LSTM and Transfer Learning [J]. Computer and Modernization, 2023, 0(07): 7-12. |
[3] | YANG Jun, WANG Jin-lin, NI Hong, SHENG Yi-qiang, . Dynamic Transfer Method Based on Sensitivity in Industrial Control Network Anomaly Detection [J]. Computer and Modernization, 2023, 0(05): 46-51. |
[4] | BAI Xu-guang, LIU Cheng-zhong, HAN Jun-ying, GAO Jia-meng, CHEN Jun-kang. Classification Method of Small Sample Apple Leaves Based on SE-ResNeXt [J]. Computer and Modernization, 2023, 0(01): 18-23. |
[5] | XU Ya-jun, GUO En-hao, CHEN Lin, SI Cheng-ke. A Data-driven Deep Modulation Identification Method for RF Signals [J]. Computer and Modernization, 2022, 0(06): 80-86. |
[6] | HE Li-wen, ZHANG Rui-chi. Driver Distracted Behavior Recognition Based on Deep Learning [J]. Computer and Modernization, 2022, 0(06): 67-74. |
[7] | ZHANG Yun-yao, HUANG He-ming, ZHANG Hui-yun, . Speech Recognition in Complex Noise Environment [J]. Computer and Modernization, 2021, 0(09): 68-74. |
[8] | SU Hao, DING Sheng, ZHANG Chao-hua, . Ship Object Detection in Any Direction at Sea Based on Active and Transfer Learning [J]. Computer and Modernization, 2021, 0(09): 21-30. |
[9] | CHEN Xiang, ZOU Qing-nian, XIE Shao-yu, CHEN Cui-qiong. Identification of Platen Switch State Based on Transfer Learning Strategy [J]. Computer and Modernization, 2021, 0(05): 120-126. |
[10] | ZHANG Meng-yu. Flower Recognition Based on ResNet and Attention Mechanism [J]. Computer and Modernization, 2021, 0(04): 61-67. |
[11] | XIE Xing-yu1, ZHANG Ying-lu2. Predicting Student Grades Ranking Based on Improved TrAdaboost Algorithm [J]. Computer and Modernization, 2016, 0(2): 122-126. |
[12] | XIE Jiang-long, LIU Bo. Transfer Learning Algorithm Based on Tensor Data [J]. Computer and Modernization, 2016, 0(2): 42-48. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||