首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
基于小波—奇异值分解的数字水印新算法*   总被引:9,自引:5,他引:4  
为了有效地保护数字作品的版权,提出了一种以离散小波多级分解与奇异值分解相结合的数字水印新算法。该算法充分利用小波与奇异值的固有性质,对原始图像进行多级小波分解,并对部分子带作奇异值分解。将水印置乱来保证一定的安全性,再对其进行分块离散余弦变换,然后将它嵌入到中间奇异值及其周围的部分矩阵块中。实验表明,该方法不仅有较好的透明性,而且能抗大多数处理攻击,有较好的鲁棒性。  相似文献   

2.
This paper presents a secure, robust, and blind adaptive audio watermarking algorithm based on singular value decomposition (SVD) in the discrete wavelet transform domain using synchronization code. In our algorithm, a watermark is embedded by applying a quantization-index-modulation process on the singular values in the SVD of the wavelet domain blocks. The watermarked signal is perceptually similar to the original audio signal and gives high quality output. Experimental results show that the hidden watermark data is robust to additive noise, resampling, low-pass filtering, requantization, MP3 compression, cropping, echo addition, and denoising. Performance analysis of the proposed scheme shows low error probability rates. The data embedding rate of the proposed scheme is 45.9 bps. The proposed scheme has high payload and superior performance against MP3 compression compared to the earlier audio watermarking schemes.  相似文献   

3.
提出了一种稳健的自适应混合域数字音频水印算法,该算法具有以下特点:(1)通过采纳更为稳健的同步信号及其全新嵌入策略,提高了音频水印的抗攻击能力;(2)充分利用DWT的多分辨率特性和DCT的能量压缩特性,改善了数字水印的隐藏效果;(3)结合听觉掩蔽特性自适应确定量化步长,提高了数字水印的不可感知性;(4)以保证不可感知性和稳健性的良好平衡为前提,实现了数字水印的盲检测.仿真实验表明,所提出的算法不仅具有较好的不可感知性,而且对诸如重新采样、重新量化、叠加噪声、低通滤波、随机剪切等攻击均具有较好的稳健性.特别地,该算法对于最为普通的MP3压缩攻击具有极强的抵抗能力(尤其是高压缩比下).  相似文献   

4.
为提高传统数字图像水印算法的安全性, 解决数字水印对信号处理和几何失真比较敏感的问题, 提出一种新的以离散小波多级分解与奇异值分解相结合的数字图像水印算法. 不同于常见的基于小波变换的数字水印技术, 该方案在原始图像离散小波变换的低频近似区域和高频对角区域中嵌入水印, 在图像的保真度和鲁棒性之间取得较好的折衷. 水印检测时, 将从低频近似区域和高频对角区域中提取出的水印进行比较, 选择效果较好的水印作为最终检测水印. 实验结果表明, 提出的多水印算法对于各种攻击具有较强的鲁棒性.  相似文献   

5.
In this paper, a robust semi-blind watermarking scheme for color images, based on multiple decompositions is proposed to preserve the copyrights of the owner. Using multiple decompositions, the gray watermark is embedded into a host color image. Prior to that, to enhance security the gray watermark is encrypted with Arnold transform and SVD by generating secret keys. The luminance component of the given host image is subjected to discrete wavelet transform(DWT), contourlet transform(CT), Schur decomposition and singular value decomposition(SVD) in sequence and finally the watermark is embedded. In the semi-blind extraction process, the watermark is extracted without the help of the original host image. Experimental results show that the proposed watermarking scheme has better visual imperceptibility and high robustness against image & signal processing attacks compared to other methods.  相似文献   

6.
基于混沌和SVD DWT的稳健数字图像水印算法*   总被引:6,自引:1,他引:5  
针对现有适用于图像的数字水印对信号处理和几何失真比较敏感的问题,提出一种稳健的数字图像水印算法。该算法先对整个图像应用三级离散小波变换,再对低频域运用奇异值分解,并通过修改奇异值,嵌入经过混沌置乱的水印图像的奇异值,在小波变换域的中频系数上嵌入水印信息。水印检测时,分别在中频区域和低频提取水印并进行比较,采用效果较好的水印作为检测水印。实验结果表明,该方法对一般的信号处理操作及几何攻击等均具有较好的鲁棒性。  相似文献   

7.
In this paper, a novel semi-fragile watermarking scheme for authenticating an audio signal based on dual-tree complex wavelet transform (DT-CWT) and discrete cosine transform (DCT) is proposed. Specifically, the watermark data are efficiently inserted into the coefficients of the low-frequency sub-band of DT-CWT taking advantages of both DCT and quantization index modulation (QIM). First, the original digital audio signal is segmented and then performed with DT-CWT. Second, based on the energy compression property, the low-frequency sub-band coefficients of the DT-CWT domain are performed with DCT, and the DC component is utilized to embed one distorted watermark bit by the QIM technique. Finally, inverse DCT and DT-CWT are orderly implemented on the watermarked coefficients of each audio segment to get a watermarked audio signal. Simulation results show that the hybrid embedding domain constructed by DT-CWT and DCT is effective, and the proposed watermarking scheme is not only inaudible, but also robust against content persistent non-malicious audio signal processing operations, such as MP3 compression, noise addition, re-sampling, re-quantization, etc. Furthermore, the proposed scheme can effectively authenticate the veracity and integrity of audio content and greatly expands the applicability of the audio watermarking scheme.  相似文献   

8.
基于人耳听觉特性和小波变换的时频特性,提出了一种水印嵌入与检测算法。通过提取音频信号幅度的最大值进行小波变换,再在小波变换的重要系数中嵌入水印。仿真实验证明:该算法隐藏水印具有较好的不可感知性和较强的稳健性。  相似文献   

9.
基于DCT变换及SVD处理的音频数字水印算法   总被引:1,自引:0,他引:1  
赵静  周明全 《微机发展》2005,15(2):50-52
提出了一种基于离散余弦变换及奇异值分解的音频水印算法。首先对二值水印图像进行奇异值分解求出奇异值,然后对所得奇异值进行基于音频信号变换域性质的调制,并对音频信号进行离散余弦变换并计算水印嵌入点,最后将经过调制的水印信号嵌入。仿真试验证明这种自适应音频数字水印算法具有稳健性和不可觉察性。  相似文献   

10.
To optimize the tradeoff between imperceptibility and robustness properties, this paper proposes a robust and invisible blind image watermarking scheme based on a new combination of discrete cosine transform (DCT) and singular value decomposition (SVD) in discrete wavelet transform (DWT) domain using least-square curve fitting and logistic chaotic map. Firstly cover image is decomposed into four subbands using DWT and the low frequency subband LL is partitioned into non-overlapping blocks. Then DCT is applied to each block and several particular middle frequency DCT coefficients are extracted to form a modulation matrix, which is used to embed watermark signal by modifying its largest singular values in SVD domain. Optimal embedding strength for a specific cover image is obtained from an estimation based on least-square curve fitting and provides a good compromise between transparency and robustness of watermarking scheme. The security of the watermarking scheme is ensured by logistic chaotic map. Experimental results demonstrate the better effectiveness of the proposed watermarking scheme in the perceptual quality and the ability of resisting to conventional signal processing and geometric attacks, in comparison with the related existing methods.  相似文献   

11.
针对数字图像的版权保护问题,提出一种基于Fibonacci置乱的小波域数字图像盲水印方案。将原图像中的感兴趣区域(ROI)作为水印来源,以此提高水印的隐蔽性。在水印嵌入过程中,将原图像进行分块,对每个块进行Fibonacci置乱和离散小波变换(DWT),选择出低频子带,用于水印嵌入。同时,对水印也执行DWT,选择出低频子带,通过Fibonacci置乱得到置乱矩阵,将水印的置乱矩阵嵌入到主图像的块中。在水印提取过程中,根据嵌入过程中设定的秘钥,通过逆Fibonacci置乱和逆DWT过程提取水印。在多种图像攻击下的仿真结果表明,该水印方案具有较高的安全性、鲁棒性和隐蔽性。  相似文献   

12.
离散小波变换(DWT)和奇异值分解都可以作为数字水印算法有效的工具.提出了一种基于离散小波变换和奇异值分解联合的数字水印算法,先将整个图像分成4个区域,然后再对每个区域运用奇异值分解方法,通过修改奇异值来嵌入水印信息.实验结果表明,该算法具有很好的稳健性,在经过了一般的信号处理操作和JPEG压缩后,嵌入的水印能被可靠的提取和检测.  相似文献   

13.
It is a challenging work to design a robust audio watermarking scheme against various attacks. Wavelet moment invariances are new features combining the moment invariant features and the wavelet features, and they have some excellent characteristics, such as the ability to capture local information, robustness against common signal processing, and the linear relationship between a signal and its wavelet moments etc. Based on wavelet moment and synchronization code, we propose a new digital audio watermarking algorithm with good auditory quality and reasonable resistance against most attacks in this paper. Firstly, the origin digital audio is segmented and then each segment is cut into two parts. Secondly, with the spatial watermarking technique, synchronization code is embedded into the statistics average value of audio samples in the first part. And then, map 1D digital audio signal in the second part into 2D form, and calculate its wavelet moments. Finally, the watermark bit is embedded into the average value of modulus of the low-order wavelet moments. Meanwhile combining the two adjacent synchronization code searching technology, the algorithm can extract the watermark without the help from the origin digital audio signal. Simulation results show that the proposed watermarking scheme is not only inaudible and robust against common signals processing such as MP3 compression, noise addition, resampling, and re-quantization etc., but also robust against the desynchronization attacks such as random cropping, amplitude variation, pitch shifting, and jittering etc.  相似文献   

14.
数字音频信号的脆弱水印嵌入算法   总被引:34,自引:0,他引:34  
该文给出了量化系数嵌入水印比特信息的基本原理,在此基础上提出了数字音频信号的脆弱水印嵌入算法。该算法充分利用离散子波变换的多分辨率特性,通过等概率随机量化音频信号不同子带的子波系数嵌入视觉可辨别的水印-二值图像。仿真实验结果表明,该文提出的数字音频信号脆弱水印嵌入算法对有损压缩、滤波和重新采样等操作具有很强的敏感性。  相似文献   

15.
为使频域水印技术更好地应用于数字图像的版权保护,提出一种基于离散余弦变换和奇异值分解相结合的图像哈希水印算法。利用DWT变换提取载体图像的低频系数矩阵构造水印;对载体图像进行分块DCT变换,提取每个子块的低频系数;对低频系数所组成的矩阵进行SVD变换,在对角阵上嵌入水印;对频域系数进行逆变换得到含水印图。将已有算法和当前所提出的算法进行对比,实验结果表明,所提水印算法具有良好的不可感知性和鲁棒性。  相似文献   

16.
以整型提升小波变换、人类听觉掩蔽特性、数字音频局部邻域特性为基础,提出了一种自适应小波域数字音频水印嵌入算法,该算法具有以下特点:(1)结合人类听觉系统的掩蔽特性,实现了水印嵌入位置的自适应确定;(2)引入了高效的整型提升小波变换;(3)利用数字音频的局部邻域特性,实现了数字水印嵌入深度的智能调节;(4)数字水印信息的提取不需要原始音频信号.对比实验表明:该自适应数字音频水印算法不仅具有较好的透明性,而且对诸如叠加噪声、有损压缩、低通滤波、重新采样、重新量化等攻击均具有较好的鲁棒性(特别是叠加噪声与低通滤波)。  相似文献   

17.
针对目前数字水印算法存在的不足,本文将离散小波变换和奇异值分解相结合,提出了一种基于机器学习的图像数字水印算法.首先将载体图像进行一级小波变换,提取其低频子带图像对其进行4×4分块处理,然后对每一分块进行奇异值分解后嵌入水印,并提取特征向量用于最小二乘支持向量机的训练,训练好的最小二乘支持向量机用于自适应最大水印嵌入强度的计算以及水印的盲提取.实验选取三张512×512的标准测试图像以及64×64的二值水印图像对算法的透明性与鲁棒性进行测试.实验结果证明,图像具有很好的透明性,PSNR达到了63.71dB,针对旋转、剪切、JPEG压缩、高斯噪声等常规攻击手段时,算法能保持较强的鲁棒性.  相似文献   

18.
基于m序列的音频水印隐藏算法   总被引:1,自引:0,他引:1  
该文提出基于m序列的音频信息隐藏算法,将需要隐藏的水印信息进行m序列的扩展;对数字音频信号进行分段离散小波变换,最后将经过调制的水印信号嵌入到二层小波变换的中频系数中。在接收端,利用盲检测可以精确地提取水印信号。实验仿真结果表明:算法对原始载体音频信号的影响极小,具有较好的鲁棒性和透明性。  相似文献   

19.
基于DWT的盲音频水印算法研究   总被引:5,自引:0,他引:5  
曹建春  沈淑娟 《计算机应用》2006,26(10):2326-2327
提出了一种基于离散小波变换的盲音频数字水印算法,该算法采取分段重复嵌入方式在能量最强的小波系数内隐藏水印信号。仿真实验结果表明,该算法具有较强的鲁棒性和不可感知性,能有效抵御各种常见攻击,并且在水印检测时不需要原始的音频信号。  相似文献   

20.
Securing medical data while transmission on the network is required because it is sensitive and life-dependent data. Many methods are used for protection, such as Steganography, Digital Signature, Cryptography, and Watermarking. This paper introduces a novel robust algorithm that combines discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD) digital image-watermarking algorithms. The host image is decomposed using a two-dimensional DWT (2D-DWT) to approximate low-frequency sub-bands in the embedding process. Then the sub-band low-high (LH) is decomposed using 2D-DWT to four new sub-bands. The resulting sub-band low-high (LH1) is decomposed using 2D-DWT to four new sub-bands. Two frequency bands, high-high (HH2) and high-low (HL2), are transformed by DCT, and then the SVD is applied to the DCT coefficients. The strongest modified singular values (SVs) vary very little for most attacks, which is an important property of SVD watermarking. The two watermark images are encrypted using two layers of encryption, circular and chaotic encryption techniques, to increase security. The first encrypted watermark is embedded in the S component of the DCT components of the HL2 coefficients. The second encrypted watermark is embedded in the S component of the DCT components of the HH2 coefficients. The suggested technique has been tested against various attacks and proven to provide excellent stability and imperceptibility results.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号