查询结果:   李亚琴,方立刚,廖黎莉,杨元峰.基于三维动画权重参数和Jordan变换的水印算法[J].计算机应用与软件,2019,36(9):204 - 208,231.
中文标题
基于三维动画权重参数和Jordan变换的水印算法
发表栏目
图像处理与应用
摘要点击数
478
英文标题
WATERMARKING ALGORITHM BASED ON WEIGHT PARAMETER OF 3D ANIMATION AND JORDAN TRANSFORM
作 者
李亚琴 方立刚 廖黎莉 杨元峰 Li Yaqin Fang Ligang Liao Lili Yang Yuanfeng
作者单位
江苏省现代企业信息化应用支撑软件工程技术研发中心 江苏 苏州 215104 苏州大学 江苏 苏州 215104    
英文单位
Jiangsu Province Support Software Engineering R&D Center for Modern Information Technology Application in Enterprise, Suzhou 215104, Jiangsu, China Soochow University, Suzhou 215104, Jiangsu, China    
关键词
数字水印 三维动画 权重参数 Jordan变换 SVD分解
Keywords
Digital watermarking 3D animation Weight parameters Jordan transform SVD decomposition
基金项目
国家自然科学基金项目(41201338);苏州市产业技术创新专项(SYG201710);苏州市职业大学“青蓝工程”资助项目;江苏开放大学(江苏城市职业学院)“十三五”规划课题(2017XTZC01);江苏省“青蓝工程”资助项目
作者资料
李亚琴,副教授,主研领域:数字水印,信息安全。方立刚,教授。廖黎莉,讲师。杨元峰,副教授。 。
文章摘要
随着HTML5等技术的快速发展和广泛应用,对数字动画内容的保护成为重要研究课题。可在不可察觉性、良好的抗攻击性、水印高嵌入量之间保持良好平衡的数字水印算法是值得推广的算法。提出一种应用于三维动画的数字水印算法,利用Jordan变换和SVD分解得到奇异值特征矩阵。根据奇异值特征矩阵的元素值确定嵌入的位置,将水印信息嵌入到三维动画中的骨骼权重参数中,形成含有水印的三维动画。利用嵌入算法的逆过程和密钥从动画骨骼权重参数中提取出水印。仿真实验结果表明,该算法满足了水印的隐蔽性,表现出对常见攻击的强鲁棒性,信息安全得到了明显提升,可以应用到文化创意类动漫数字产品的版权保护中。
Abstract
With the rapid development and extensive application of HTML5 and other technologies, the protection of digital animation content has become an important research topic. The digital watermarking algorithm, which can maintain a good balance between impermeability, good anti-aggressiveness and watermark embedding capacity is an algorithm worth popularizing. A digital watermarking algorithm was proposed and applied to the three dimensional animation. Jordan transform and SVD decomposition were used to obtain the singular value matrix. According to the element value of the singular value matrix, we determined the embedding position, embed the watermark into weight parameters of the bones in the three dimensional animation, and formed the three-dimensional animation containing the watermark. The watermark was extracted from the animation skeleton weight parameters using the inverse process and key of the embedded algorithm. The simulation results show that the algorithm satisfies the concealment of the watermark, and has strong robustness against common attacks. Information security has been improved significantly, and this algorithm can be applied to the copyright protection of cultural creative animation digital products.
下载PDF全文