• Acta Photonica Sinica
  • Vol. 49, Issue 2, 0210003 (2020)
Sheng YUAN1, Zhen WANG1, Xin ZHOU2, and Pi-bin BING1
Author Affiliations
  • 1College of Physics and Electronics, North China University of Water Resources and Electric Power, Zhengzhou 450046, China
  • 2College of Electronics and Information Engineering, Sichuan University, Chengdu 610065, China
  • show less
    DOI: 10.3788/gzxb20204902.0210003 Cite this Article
    Sheng YUAN, Zhen WANG, Xin ZHOU, Pi-bin BING. Blind Watermarking Method Based on Binarized Computational Ghost Imaging[J]. Acta Photonica Sinica, 2020, 49(2): 0210003 Copy Citation Text show less
    计算鬼成像加密系统示意图Schematic diagram of the encryption system based on CGI
    Fig. 1. 计算鬼成像加密系统示意图Schematic diagram of the encryption system based on CGI
    基于二值化计算鬼成像的水印方法流程图Flow chart of watermarking method based on BCGI
    Fig. 2. 基于二值化计算鬼成像的水印方法流程图Flow chart of watermarking method based on BCGI
    水印图像的计算鬼成像和隐藏重建结果Retrieved watermark images by CGI, BCGI and hiding technique
    Fig. 3. 水印图像的计算鬼成像和隐藏重建结果Retrieved watermark images by CGI, BCGI and hiding technique
    BCGI重建水印图像的相关系数(CC)随采样次数变化关系Plot of CCs of the retrieved watermark by BCGI varying with the number of measurements
    Fig. 4. BCGI重建水印图像的相关系数(CC)随采样次数变化关系Plot of CCs of the retrieved watermark by BCGI varying with the number of measurements
    嵌入水印宿主图像的PSNR随嵌入因子的变化关系Plot of PSNRs of the embedding images varying with different embedding factors
    Fig. 5. 嵌入水印宿主图像的PSNR随嵌入因子的变化关系Plot of PSNRs of the embedding images varying with different embedding factors
    二值与灰度水印图像的隐藏和提取结果Results of hiding and extraction for binary and grayscale watermarks
    Fig. 6. 二值与灰度水印图像的隐藏和提取结果Results of hiding and extraction for binary and grayscale watermarks
    错误密钥下重建的水印图像和识别结果Retrieved watermarks and authentication results when the key is wrong
    Fig. 7. 错误密钥下重建的水印图像和识别结果Retrieved watermarks and authentication results when the key is wrong
    受到不同攻击的仿真结果Simulation results of different attacks
    Fig. 8. 受到不同攻击的仿真结果Simulation results of different attacks
    容错能力分析Analysis on the capability of fault tolerance
    Fig. 9. 容错能力分析Analysis on the capability of fault tolerance
    重建水印图像相关系数(CC)随提取数据错误率的变化图Plot of CCs of the retrieved watermark images varying with the error rates in the extracted data
    Fig. 10. 重建水印图像相关系数(CC)随提取数据错误率的变化图Plot of CCs of the retrieved watermark images varying with the error rates in the extracted data
    AttackPSNR of the host image embedding watermark/dBCC of the retrieved watermark image
    GWN30.816 20.201 0
    SPN31.204 50.200 2
    GLPF32.852 90.206 5
    JPEG compression33.601 60.204 0
    Table 1. PSNRs and CCs of the retrieved watermarks under several kinds of attacks
    Sheng YUAN, Zhen WANG, Xin ZHOU, Pi-bin BING. Blind Watermarking Method Based on Binarized Computational Ghost Imaging[J]. Acta Photonica Sinica, 2020, 49(2): 0210003
    Download Citation