首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
基于匹配滤波的有意义图像水印算法   总被引:15,自引:0,他引:15       下载免费PDF全文
图像隐形水印是解决数字媒体版权保护的有效手段.目前的大多数水印算法采用伪随机序列构成水印,因而只能给出"Yes"(有水印)或"No"(无水印)的回答.嵌入有意义的水印在一些应用场合更加重要,但同时也带来了更多的困难.嵌入有意义的水印必须解决二个问题:(1)嵌入的水印具有一定的数据量;(2)从有失真的水印图像中正确地提取嵌入的水印.本文应用数字通信的理论和方法,提出了一个嵌入有意义字符串的DCT域隐形水印算法.该算法采用BCH编码和匹配滤波来降低误码率.应用所提出的算法,把一个32个字符组成的水印嵌入到256×256的图像中并达到了较好的稳健性.在水印图像信噪比受Gaussian加性噪声干扰下降到26dB时,仍实现了对嵌入水印零错误概率的检测.  相似文献   

2.
Digital watermarking has been proposed as the means for copyright protection of multimedia data. Many of existing watermarking schemes focused on the robust means to mark an image invisibly without really addressing the ends of these schemes. This paper first discusses some scenarios in which many current watermarking schemes fail to resolve the rightful ownership of an image. The key problems are then identified, and some crucial requirements for a valid invisible watermark detection are discussed. In particular, we show that, for the particular application of resolving rightful ownership using invisible watermarks, it might be crucial to require that the original image not be directly involved in the watermark detection process. A general framework for validly detecting the invisible watermarks is then proposed. Some requirements on the claimed signature/watermarks to be used for detection are discussed to prevent the existence of any counterfeit scheme. The optimal detection strategy within the framework is derived. We show the effectiveness of this technique based on some visual-model-based watermark encoding schemes.  相似文献   

3.
Linear chirps, a special case of polynomial phase exponentials, have recently been proposed for digital watermarking. In this work, we propose a known-host-state methodology for designing image watermarks that are robust to compression. We use a two-dimensional frequency-modulated chirp as a spreading function in a block-based spatial watermarking scheme. In each block, the chirp is used to embed binary phase information. Chirp parameters allow for spectral shaping of the watermark to match host content. Since host state is known to the embedder, it is possible to tune the chirp for optimum performance, particularly against compression. In contrast to existing chirp watermarking where only a single watermark is generally embedded, the proposed block chirp watermarking allows for a much higher payload. Detection is done using chirp transform subject to key exchange for security. We show that the proposed method significantly outperforms non-adaptive watermarking across all compression factors under variety of attacks.  相似文献   

4.
The paper describes a high-capacity blind video watermarking system invariant to geometrical attacks such as shift, rotation, scaling and cropping. A spatial domain reference watermark is used to obtain invariance to geometric attacks by employing image registration techniques to determine and invert the attacks. A second, high-capacity watermark, which carries the data payload, is embedded in the wavelet domain according to a human visual system model. This is protected by a state-of-the-art error correction code (turbo code). For a false detection probability of 10/sup -8/, the proposed system is invariant to scaling up to 180%, rotation up to 70/spl deg/, and arbitrary aspect ratio changes up to 200% on both axes. Furthermore, the system is virtually invariant to any shifting, cropping, or combined shifting and cropping. The system is also robust to MPEG2 compression, even when combined with shifting and cropping.  相似文献   

5.
一种小波域自适应鲁棒闭环数字盲水印技术   总被引:11,自引:1,他引:10       下载免费PDF全文
张力  韦岗  张基宏 《电子学报》2003,31(10):1476-1480
本文提出了一种基于小波域的闭环自适应图像鲁棒数字盲水印技术.水印的嵌入过程是一个闭环过程,且其嵌入的位置及强度均与原始图像有关.水印嵌入的初始强度由小波域图像压缩的量化因子决定,并根据检测要求不断的进行调整,从而达到水印的最佳嵌入.本文证明了这种闭环系统的收敛性,并且给出了水印检测过程中正确检测概率和虚警检测概率的求解公式,可用于闭环系统的检测性能判决条件.水印的检测过程中不需要任何原始图像和原始水印信号的信息,采用独立分量分析实现对水印信号的盲检测.检测过程中不仅可以检测到水印的存在,而且可以提取出嵌入到图像中的多个水印信号.实验结果证实了本文提出的闭环自适应数字盲水印技术优于传统的自适应水印技术,水印检测过程中在不需要考虑水印图像所经历的攻击类型及攻击参数的情况下可以正确的提取水印信号.本文提出的水印算法对通用水印测试软件Stirmark具有很好的鲁棒性.  相似文献   

6.
Hiding digital watermarks using multiresolution wavelet transform   总被引:2,自引:0,他引:2  
In this paper, an image accreditation technique by embedding digital watermarks in images is proposed. The proposed method for the digital watermarking is based on the wavelet transform. This is unlike most previous work, which used a random number of a sequence of bits as a watermark and where the watermark can only be detected by comparing an experimental threshold value to determine whether a sequence of random signals is the watermark. The proposed approach embeds a watermark with visual recognizable patterns, such as binary, gray, or color image in images by modifying the frequency part of the images. In the proposed approach, an original image is decomposed into wavelet coefficients. Then, multi-energy watermarking scheme based on the qualified significant wavelet tree (QSWT) is used to achieve the robustness of the watermarking. Unlike other watermarking techniques that use a single casting energy, QSWT adopts adaptive casting energy in different resolutions. The performance of the proposed watermarking is robust to a variety of signal distortions, such as JPEG, image cropping, sharpening, median filtering, and incorporating attacks  相似文献   

7.
Circularly symmetric watermark embedding in 2-D DFT domain   总被引:9,自引:0,他引:9  
In this paper, a method for digital image watermarking is described that is resistant to geometric transformations. A private key, which allows a very large number of watermarks, determines the watermark, which is embedded on a ring in the DFT domain. The watermark possesses circular symmetry. Correlation is used for watermark detection. The original image is not required in detection. The proposed method is resistant to JPEG compression, filtering, noise addition, scaling, translation, cropping, rotation, printing and rescanning. Experimental results prove the robustness of this method against the aforementioned attacks.  相似文献   

8.
一种基于余数判决的数字水印算法   总被引:2,自引:0,他引:2       下载免费PDF全文
王东建  蒋铃鸽  何晨 《电子学报》2004,32(7):1099-1102
本文给出了一种新型的鲁棒水印算法.首先选择一个混沌映射来置换水印数据和载体图像,以取得很好的置换效果.与现有其它空间域算法不同,本方案不直接修改单个象素的灰度值,而是根据提出的严格余数条件,重新设置载体图像象素间的灰度关系以实现水印数据的嵌入.并根据余数判决准则,利用基于空间域的纠错技术进行水印提取.仿真实验表明,该水印算法在保证载体图像质量的同时,具有较强的鲁棒性:在用JPEG将载体图像压缩到27.4%时仍能提出可识别的水印信息,并且能有效地抵抗加性高斯白噪声的干扰,在同步条件下对剪切、缩放、旋转等几何攻击也具有较好的鲁棒性.  相似文献   

9.
In this paper, we present a scalable approach to lossless watermarking for audio signals. The proposed watermarking framework is built on a recently standardized two-layer scalable audio coder advanced audio zip (AAZ) . By embedding watermarks in both the core layer and enhancement layer bitstreams in a special way, the watermark distortion in either layer is compensated by the watermark in the opposite layer. The proposed spread-spectrum-based solution overcomes both the problem of introducing noninvertible distortions in lossy watermark approaches and the problem of nonadaptive embedding in lossless watermarking approaches. Theoretic analysis and experiment results further confirm the validity of the proposed framework in terms of payload, robustness, data expansion property, and perceptual quality.  相似文献   

10.
Multiscale fragile watermarking based on the Gaussian mixture model.   总被引:5,自引:0,他引:5  
In this paper, a new multiscale fragile watermarking scheme based on the Gaussian mixture model (GMM) is presented. First, a GMM is developed to describe the statistical characteristics of images in the wavelet domain and an expectation-maximization algorithm is employed to identify GMM model parameters. With wavelet multiscale subspaces being divided into watermarking blocks, the GMM model parameters of different watermarking blocks are adjusted to form certain relationships, which are employed for the presented new fragile watermarking scheme for authentication. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. A secret embedding key is designed to securely embed the fragile watermarks so that the new method is robust to counterfeiting, even when the malicious attackers are fully aware of the watermark embedding algorithm. It is shown that the presented new method can securely embed a message bit stream, such as personal signatures or copyright logos, into a host image as fragile watermarks. Compared with conventional fragile watermark techniques, this new statistical model based method modifies only a small amount of image data such that the distortion on the host image is imperceptible. Meanwhile, with the embedded message bits spreading over the entire image area through the statistical model, the new method can detect and localize image tampering. Besides, the new multiscale implementation of fragile watermarks based on the presented method can help distinguish some normal image operations such as JPEG compression from malicious image attacks and, thus, can be used for semi-fragile watermarking.  相似文献   

11.
在音频水印领域,嵌入大量水印而不影响宿主音 频的听觉质量,同时具有良好的鲁棒 性,仍然是一项具有挑战的工作。针对这一问题,本文提出了一种大容量,透明,鲁棒的音 频水印算法。首先对音频应用2级离散小波变换(DWT),并选取低频分量作奇异值分解(SV D),然后将水印嵌入在奇异值矩阵的非对角线元素中,可同时提高算法的透明性和嵌入容 量。另外,利用汉明码编码提升水印的鲁棒性和安全性。仿真实验结果表明,所提算法在平 均信噪比37.75 dB的情况下,可以达到5512 bps 的嵌入容量,对噪声添加、滤波、剪切、压缩等各种信号处理攻击具有良好的鲁棒性。  相似文献   

12.
The concept of digital rights management architecture for multimedia will be presented in this paper, with focus on robust digital image watermarking, which is able to undergo geometrical attacks performed against the embedded watermarks. Geometrical attacks are still an open problem for many digital watermarking algorithms used in present time. Most of geometrical attacks can be described by using affine transforms. A new approach to improve robustness against geometrical attacks is presented. The discrete Fourier transform and log-polar mapping are used for watermark embedding and for watermark detection. Some attacks against the embedded watermarks are performed and the results are given. Also two modifications, usage of the proposed method as a synchronization template and implementation for the color images, are presented and experimental results are given too.  相似文献   

13.
High-Fidelity Data Embedding for Image Annotation   总被引:1,自引:0,他引:1  
High fidelity is a demanding requirement for data hiding, especially for images with artistic or medical value. This correspondence proposes a high-fidelity image watermarking for annotation with robustness to moderate distortion. To achieve the high fidelity of the embedded image, we introduce a visual perception model that aims at quantifying the local tolerance to noise for arbitrary imagery. Based on this model, we embed two kinds of watermarks: a pilot watermark that indicates the existence of the watermark and an information watermark that conveys a payload of several dozen bits. The objective is to embed 32 bits of metadata into a single image in such a way that it is robust to JPEG compression and cropping. We demonstrate the effectiveness of the visual model and the application of the proposed annotation technology using a database of challenging photographic and medical images that contain a large amount of smooth regions.  相似文献   

14.
Capacity of full frame DCT image watermarks   总被引:14,自引:0,他引:14  
The evaluation of the number of bits that can be hidden within an image through digital watermarking is a crucial topic, which has been addressed only for additive watermarks. The evaluation of watermark capacity is very important because it allows to put a theoretical upper bound on the amount of information that can be hidden into an image by a given watermarking procedure, regardless of the watermark extraction technique. It is the purpose of this work to suggest a methodology for the evaluation of the watermark capacity in a nonadditive, non-Gaussian framework, and to discuss the results we obtained by applying it to a set of standard images.  相似文献   

15.
Watermarking techniques that need no original information during watermark detection, known as blind watermarking, are more desirable than informed ones for practical usage and convenience in watermark extraction. A blind MPEG-2 watermarking technique operating in the DCT (discrete cosine transform) domain is presented, which is generally robust against arbitrary ratio scaling, provided that turbo codes are used for error correction. The method can be directly applied to other block-DCT-based video compression techniques. The main advantage of the scheme is its simplicity, blindness and the ability to tailor the watermark payload in a trade-off with other watermark requirements. As synchronisation is automatically obtained from the frames in the scaled video itself, a connection between the source and the target video is not necessary for watermarking detection  相似文献   

16.
一种新颖的基于非压缩数字视频的水印盲检测算法   总被引:10,自引:0,他引:10  
数字水印是一种嵌入到多媒体数据中用来进行版权标识的工具。在众多的宿主媒体中,数字视频因具有隐藏容量大、透明性好、鲁棒性强等诸多优点而受到日益广泛的关注。但是很多文献中提到的视频水印都是从数据流中提取单帧图像进行处理,这类算法与静态图像的水印方法如出一辙,没有充分利用视频文件的各种特性。而且对帧平均、视频压缩等常见的运动图像攻击方法十分敏感。针对这些问题,本文以非压缩视频文件为实验对象,结合人类视觉模型和彩色图像场景分割的方法,提出并实现了一种基于视频时间轴的数字水印盲检测算法。实验结果表明算法有效实用。  相似文献   

17.
In this dissertation, sereral key problems in the field of steganographic image security are mainly studied and discussed: (1) A novel kind of image cryptosystem is studied. The encrypted information of secret image is embedded into an ordinary image, which can be transmitted publicly, and it will not cause attention of illegal eavesdropper. The following results are achieved: (a) The image hiding algorithm and its improved algorithm based on wavelet transform and vector quantization are propo…  相似文献   

18.
Digital watermarking robust to geometric distortions.   总被引:23,自引:0,他引:23  
In this paper, we present two watermarking approaches that are robust to geometric distortions. The first approach is based on image normalization, in which both watermark embedding and extraction are carried out with respect to an image normalized to meet a set of predefined moment criteria. We propose a new normalization procedure, which is invariant to affine transform attacks. The resulting watermarking scheme is suitable for public watermarking applications, where the original image is not available for watermark extraction. The second approach is based on a watermark resynchronization scheme aimed to alleviate the effects of random bending attacks. In this scheme, a deformable mesh is used to correct the distortion caused by the attack. The watermark is then extracted from the corrected image. In contrast to the first scheme, the latter is suitable for private watermarking applications, where the original image is necessary for watermark detection. In both schemes, we employ a direct-sequence code division multiple access approach to embed a multibit watermark in the discrete cosine transform domain of the image. Numerical experiments demonstrate that the proposed watermarking schemes are robust to a wide range of geometric attacks.  相似文献   

19.
A feature-based robust digital image watermarking scheme   总被引:15,自引:0,他引:15  
A robust digital image watermarking scheme that combines image feature extraction and image normalization is proposed. The goal is to resist both geometric distortion and signal processing attacks. We adopt a feature extraction method called Mexican hat wavelet scale interaction. The extracted feature points can survive a variety of attacks and be used as reference points for both watermark embedding and detection. The normalized image of an image (object) is nearly invariant with respect to rotations. As a result, the watermark detection task can be much simplified when it is applied to the normalized image. However, because image normalization is sensitive to image local variation, we apply image normalization to nonoverlapped image disks separately. The disks are centered at the extracted feature points. Several copies of a 16-bit watermark sequence are embedded in the original image to improve the robustness of watermarks. Simulation results show that our scheme can survive low-quality JPEG compression, color reduction, sharpening, Gaussian filtering, median filtering, row or column removal, shearing, rotation, local warping, cropping, and linear geometric transformations.  相似文献   

20.
In digital watermarking, robustness is still a challenging problem if different sets of attacks need to be tolerated simultaneously. In this paper, we deal with this problem by using an integrated solution involving side-informed embedding, moment normalization, and content-dependent watermarks. First, a new image watermarking method based on the concept of communications with side information is proposed. We investigate the characteristics of mean filtering in formulating new watermark embedding and extraction processes. Second, regarding resistance to geometrical attacks, we do not rely on the concept of pilot signals because they are vulnerable to synchronization removal attacks. We instead use block-based watermarking and moment normalization mechanisms to recover geometrical distortions. Third, regarding resistance to the copy attack, the content-dependent watermark is employed to avoid treating an un-watermarked image as one that has been watermarked. The robustness of our approach has been verified using both the StirMark and the copy attack.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号