首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 649 毫秒
1.
半色调图像中数据隐藏算法   总被引:10,自引:0,他引:10       下载免费PDF全文
在许多打印和出版应用中,需要在半色调图像中嵌入数据用于作品的版权保护和认证.本文提出了一种半色调图像中数据隐藏的算法,该算法利用DCT的中频系数比较法进行数字水印信息的嵌入.在对数字水印信息进行嵌入前,首先进行编码,转化成比特流,然后通过改变DCT中频系数的序关系嵌入数字水印,经打印/扫描后提取出水印,实验结果显示:该算法能够抵抗打印—扫描攻击,并且隐藏效果好,恢复水印时不需要原始图像.该算法也可用于普通证件的防伪.  相似文献   

2.
Data hiding watermarking for halftone images   总被引:11,自引:0,他引:11  
In many printer and publishing applications, it is desirable to embed data in halftone images. We proposed some novel data hiding methods for halftone images. For the situation in which only the halftone image is available, we propose data hiding smart pair toggling (DHSPT) to hide data by forced complementary toggling at pseudo-random locations within a halftone image. The complementary pixels are chosen to minimize the chance of forming visually undesirable clusters. Our experimental results suggest that DHSPT can hide a large amount of hidden data while maintaining good visual quality. For the situation in which the original multitone image is available and the halftoning method is error diffusion, we propose the modified data hiding error diffusion (MDHED) that integrates the data hiding operation into the error diffusion process. In MDHED, the error due to the data hiding is diffused effectively to both past and future pixels. Our experimental results suggest that MDHED can give better visual quality than DHSPT. Both DHSPT and MDHED are computationally inexpensive.  相似文献   

3.
基于奇异值分解的近无损可逆数字水印方案   总被引:1,自引:0,他引:1  
赵彦涛 《光电子.激光》2009,(11):1486-1492
提出一种基于奇异值分解(SVD)和可逆信息隐藏的近无损鲁棒水印方法。首先将图像分块,然后进行SVD分解,并将水印嵌入到其进去奇异值的U分量中,最后将可恢复载体图像的信息经可逆信息隐藏方法嵌入到水印图像中,在提取水印和恢复载体图像过程中都不需要原载体图像。实验证明,该算法不仅能使原载体图像近无损恢复,而且能有效地抵抗JPEG压缩、噪声干扰、低通滤波,剪切和旋转等典型的攻击,具有较强的鲁棒性。  相似文献   

4.
The watermarking method has emerged as an important tool for content tracing, authentication, and data hiding in multimedia applications. We propose a watermarking strategy in which the watermark of a host is selected from the robust features of the estimated forged images of the host. The forged images are obtained from Monte Carlo simulations of potential pirate attacks on the host image. The solution of applying an optimization technique to the second-order statistics of the features of the forged images gives two orthogonal spaces. One of them characterizes most of the variations in the modifications of the host. Our watermark is embedded in the other space that most potential pirate attacks do not touch. Thus, the embedded watermark is robust. Our watermarking method uses the same framework for watermark detection with a reference and blind detection. We demonstrate the performance of our method under various levels of attacks.  相似文献   

5.
Watermarking in halftone images with parity-matched error diffusion   总被引:2,自引:0,他引:2  
In this paper, a halftone watermarking technique of high watermark rate, robustness, and watermark-rate flexibility is presented. This technique, namely the parity-matched error diffusion (PMEDF) method, is capable of achieving an embedded watermark rate as high as 6.25-25% with good image quality and without the need for the original image as the reference for the decoding. The proposed PMEDF method employs the high efficient parity-matching strategy to spread a watermark bit to each pixel of a block of the host image. Thus, the majority voting mechanism can be applied for decoding to achieve an advantage of high robustness. As documented in the experimental results, this technique is capable of guarding against degradation, due to cropping, tampering, as well as print-and-scan process in error-diffused halftone images.  相似文献   

6.
This paper presents a halftoning-based watermarking method that enables the embedding of a color image into binary black-and-white images. To maintain the quality of halftone images, the method maps watermarks to halftone channels using homogeneous dot patterns. These patterns use a different binary texture arrangement to embed the watermark. To prevent a degradation of the host image, a maximization problem is solved to reduce the associated noise. The objective function of this maximization problem is the binary similarity measure between the original binary halftone and a set of randomly generated patterns. This optimization problem needs to be solved for each dot pattern, resulting in processing overhead and a long running time. To overcome this restriction, parallel computing techniques are used to decrease the processing time. More specifically, the method is tested using a CUDA-based parallel implementation, running on GPUs. The proposed technique produces results with high visual quality and acceptable processing time.  相似文献   

7.
应用于实时通信版权保护的BTC图像水印技术   总被引:1,自引:1,他引:0  
郎永祥  秦拯 《电视技术》2011,35(17):12-14
现有BTC图像水印方案多为脆弱水印技术或数据隐藏技术,不能应用于数字图像版权保护.为保护数字电视实时通信图像版权,结合Haar小波变换,提出一种稳健的BTC域图像水印算法.算法首先对载体图像BTC域两重建电平进行Haar小波变换,然后通过修改低频系数以嵌入稳健水印.水印提取时无须原始载体图像参与.仿真实验表明,算法具有...  相似文献   

8.
It is a challenging work to design a robust halftone image watermarking scheme against desynchronization attacks. In this paper, we propose a feature-based digital watermarking method for halftone images with low computational complexity, good visual quality and reasonable resistance toward desynchronization attacks. Firstly, the feature points are extracted from host halftone image by using multi-scale Harris–Laplace detector, and the local feature regions (LFRs) are constructed according to the feature scale theory. Secondly, discrete Fourier transform (DFT) is performed on the LFRs, and the embedding positions (DFT coefficients) are selected adaptively according to the magnitude spectrum information. Finally, the digital watermark is embedded into the LFRs by quantizing the magnitudes of the selected DFT coefficients. By binding the watermark with the geometrically invariant halftone image features, the watermark detection can be done without synchronization error. Simulation results show that the proposed scheme is invisible and robust against common signals processing such as median filtering, sharpening, noise adding, and JPEG compression, etc., and desynchronization attacks such as rotation, scaling, translation (RST), cropping, local random bend, and print-scan, etc.  相似文献   

9.
基于异或运算和图像融合的盲数字水印嵌入和检测方法   总被引:2,自引:0,他引:2  
杨定礼  夏军  尹涵春   《电子器件》2005,28(2):275-278
数字水印隐藏是将一个版权识别标志(水印信号)嵌入到图像中的技术。本文提出的一种新的隐藏水印的方法是将水印看作是二值图像,运用小波变换,异或运算,图像融合的方法以及中值滤波来隐藏和提取数字水印。这种方法的优点是不需要原始图像就可以提取出水印图像,可以加密码,对椒盐噪声,剪切攻击具有鲁棒性。  相似文献   

10.
A halftone watermarking method of high quality, robustness, and capacity flexibility is presented in this paper. An objective halftone image quality evaluation method based on the human visual system obtained by a least-mean-square algorithm is also introduced. In the encoder, the kernels-alternated error diffusion (KAEDF) is applied. It is able to maintain the computational complexity at the same level as ordinary error diffusion. Compared with Hel-Or using ordered dithering, the proposed KAEDF yields a better image quality through using error diffusion. We also propose a weighted lookup table (WLUT) in the decoder instead of lookup table (LUT), as proposed by Pei and Guo, so as to achieve a higher decoded rate. As the experimental results demonstrate, this technique is able to guard against degradation due to tampering, cropping, rotation, and print-and-scan processes in error-diffused halftone images.  相似文献   

11.
In this dissertation, sereral key problems in the field of steganographic image security are mainly studied and discussed: (1) A novel kind of image cryptosystem is studied. The encrypted information of secret image is embedded into an ordinary image, which can be transmitted publicly, and it will not cause attention of illegal eavesdropper. The following results are achieved: (a) The image hiding algorithm and its improved algorithm based on wavelet transform and vector quantization are propo…  相似文献   

12.
密文图像的可逆数据隐藏技术既能保证载体内容不被泄露,又能传递附加信息。本文提出了一种基于块容量标签(block capacity label, BCL)的高容量密文图像可逆数据隐藏算法。该方案在图像加密之前进行预处理,首先将图像分为两个区域:参考像素区域和预测像素区域。然后将预测像素区域分为不重叠的块,根据所提出的算法确定分块的BCL,在对图像进行加密之后嵌入BCL,生成加密图像;在秘密数据嵌入阶段,根据BCL和数据隐藏密钥嵌入秘密数据。实验测试了BOWS-2数据集,平均嵌入容量为3.806 8 bpp,与现有方法相比,该方法可以获得更高的秘密数据嵌入容量,并可以实现原始图像的完美重建。  相似文献   

13.
基于压缩感知的鲁棒可分离的密文域水印算法   总被引:2,自引:0,他引:2  
为了满足密文域水印嵌入的需要,该文基于压缩感知技术,提出一种鲁棒可分离的密文域水印算法。首先,内容拥有者将图像进行不重叠分块,利用边缘检测手段划分重要块和非重要块。重要块用传统加密方式进行加密,非重要块用压缩感知技术进行加密,同时为水印嵌入留出一定空间,然后根据嵌入密钥,实现二值水印的密文嵌入。在接收端获取图像内容和水印的方式是可分离的,同时根据含水印的密文图像块的像素分布特性可重新判断块的属性,避免了传输块属性信息。此外,水印信息重复4次嵌入在密文图像的不同区域,保证了水印的鲁棒性。实验结果显示所提方案在抵抗适度攻击时具有鲁棒性和安全性。  相似文献   

14.
Self-conjugate watermarking technique for halftone images   总被引:1,自引:0,他引:1  
A novel method for hiding visual patterns in a single error diffused halftone image is presented called self-conjugate error diffusion (SCED). The hidden patterns appear on the halftone image when the halftone image is folded or is overlapped with its own rotated version. Simulation results show that the halftone images have good visual quality and the hidden pattern is clearly visible.  相似文献   

15.
High-Fidelity Data Embedding for Image Annotation   总被引:1,自引:0,他引:1  
High fidelity is a demanding requirement for data hiding, especially for images with artistic or medical value. This correspondence proposes a high-fidelity image watermarking for annotation with robustness to moderate distortion. To achieve the high fidelity of the embedded image, we introduce a visual perception model that aims at quantifying the local tolerance to noise for arbitrary imagery. Based on this model, we embed two kinds of watermarks: a pilot watermark that indicates the existence of the watermark and an information watermark that conveys a payload of several dozen bits. The objective is to embed 32 bits of metadata into a single image in such a way that it is robust to JPEG compression and cropping. We demonstrate the effectiveness of the visual model and the application of the proposed annotation technology using a database of challenging photographic and medical images that contain a large amount of smooth regions.  相似文献   

16.
植基于人类视觉系统之二色调图像信息隐藏技术   总被引:3,自引:0,他引:3  
二色调图像(halftone image)是一种非常特殊的黑白图像,即在一定的距离观看它时,二色调图像仍具有灰阶图像的视觉效果。此种图像被广泛地使用在新闻报纸或杂志中。本文提出了一个利用了人类视觉特性的方法,有效地将机密信息隐藏在二色调图像中,实验结果显示此方法具有很高的实用价值。  相似文献   

17.
Scalar Costa scheme for information embedding   总被引:12,自引:0,他引:12  
Research on information embedding, particularly information hiding techniques, has received considerable attention within the last years due to its potential application in multimedia security. Digital watermarking, which is an information hiding technique where the embedded information is robust against malicious or accidental attacks, might offer new possibilities to enforce the copyrights of multimedia data. In this paper, the specific case of information embedding into independent identically distributed (IID) data and attacks by additive white Gaussian noise (AWGN) is considered. The original data is not available to the decoder. For Gaussian data, in 1983, Costa proposed a scheme that theoretically achieves the capacity of this communication scenario. However, Costa's scheme is not practical. Thus, several research groups have proposed suboptimal practical communication schemes based on Costa's idea. The goal of this paper is to give a complete performance analysis of the scalar Costa scheme (SCS), which is a suboptimal technique using scalar embedding and reception functions. Information theoretic bounds and simulation results with state-of-the-art coding techniques are compared. Further, reception after amplitude scaling attacks and the invertibility of SCS embedding are investigated.  相似文献   

18.
Reversible data hiding in encrypted images is an effective technique to embed information in encrypted domain, without knowing the original content of the image or the encryption key. In this paper, a high-capacity reversible data hiding scheme for encrypted images based on MSB (most significant bit) prediction is proposed. Since the prediction is not always accurate, it is necessary to identify the prediction error and store this information in the location map. The stream cipher is then used to encrypt the original image directly. During the data hiding phase, up to three MSBs of each available pixel in the encrypted image are substituted by the bits of the secret message. At the receiving end, the embedded data can be extracted without any errors and the original image can be perfectly reconstructed by utilizing MSB prediction. Experimental results show that the scheme can achieve higher embedding capacity than most related methods.  相似文献   

19.
Watermarking on Colored Images   总被引:3,自引:2,他引:1  
1 IntroductionInthelastfew years,manyschemesofwater markinghavebeenintroduced ,andtheresearchersalwaystrytheirbesttofindanalgorithmwhichal lowsthemtoembedarobustwatermarkwithoutaf fectingthequalityoftheimage.Uptillnow ,therehasbeennoschemegoodenoughtobead…  相似文献   

20.
基于ICA的智能数字水印技术   总被引:3,自引:0,他引:3  
该文提出了一种基于智能信息分析方法--独立分量分析的智能数字水印新算法。水印嵌入之前先对其进行预处理,嵌入过程可以在图像任意作用域中实现,并给出了小波域中的一种闭环嵌入方法。水印嵌入的强度由小波域视觉模型决定。在不需要任何原始图像、水印和攻击类型等信息的情况下,该算法不仅可以检测到水印而且可以完全提取水印,实现了真正意义上的水印盲检测,并对多个水印嵌入的情况也可以进行水印提取。水印检测的精确程度取决于图像与水印之间的独立性以及所采用的密钥。实验过程中攻击由通用水印测试软件Stirmark产生,实验数据证明本文提出的水印算法对Stirmark提供的各种攻击剪切、滤波、图象压缩、删行、删列、几何攻击以及多种攻击同时存在时都具有很好的鲁棒性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号