共查询到19条相似文献,搜索用时 93 毫秒
1.
本文结合传统的密码学和小波变换域数字水印技术,在水印信息被嵌入到载体作品之前,根据密码学原理将水印进行加密,然后再进行嵌入,充分考虑了小波变换的频域特性与人类视觉系统的很好匹配.在前人的研究基础上,利用图像的小波变换域的JND模型提出了一种基于混沌映射的在图像的小波变换域嵌入数字水印的算法.实验证明,用该算法嵌入的水印... 相似文献
2.
基于元胞自动机的多重零水印算法 总被引:1,自引:0,他引:1
利用混沌序列随机选择图像元胞自动机变换的低频系数产生初始构型,元胞自动机根据初始构型演化出零水印,然后用其加载有意义的二值水印,从而实现多重水印的零嵌入,从根本上保证了水印的不可见性.由于算法是基于元胞自动机域的,充分利用了元胞自动机复杂多变的特性,使水印有很好的安全性.实验结果表明提出的算法有较好的鲁棒性,也很好地解决了常见零水印方案所面临的问题. 相似文献
3.
为了提高数字图像水印的鲁棒性,提出一种结合BCH码和JND模型的小波域数字图像水印算法.该算法采用Ar-nold变换和BCH码对二值水印图像进行置乱加密以及编码,对载体图像分块后再进行二维离散小波变换,将加密并且编码后的水印信息嵌入到载体图像各子块的二维离散小波变换的低频子带中,嵌入强度根据载体图像的JND值自适应的选取.实验结果表明,水印的透明性很好,在遭受不同类型和强度的水印攻击时,具有较强的鲁棒性. 相似文献
4.
提出了一种结合HVS的DCT域自适应图像水印算法,该算法根据人类视觉系统的频率、亮度、对比度特点,利用JND阈值自适应地调整要嵌入的水印强度,并根据人类视觉频率响应函数表征的人眼对中频信息敏感度较低频信息敏感度低的特点,把水印信息嵌入到经过DCT变换后的原始图像中频区域,完成数字水印的嵌入。 相似文献
5.
一种基于DWT与SVD的数字图像水印算法 总被引:3,自引:2,他引:1
利用小波变换和矩阵奇异值的固有特性,提出了一种基于小波变换和奇异值分解的数字图像水印算法.算法对原始载体图像进行小波变换和奇异值分解;对水印图像进行Arnold变换和奇异值分解;把分解后的水印信息嵌入到分解后的原始载体图像中,再进行相应的变换处理,得到嵌有水印的图像.实验结果表明,该算法具有良好的安全性和鲁棒性. 相似文献
6.
7.
8.
9.
提出了一种基于小波变换(DWT)和离散余弦变换(DCT)的图像扩频水印技术.该算法首先将原始图像进行DWT和DCT变换提取图像中重要的频率部分,将扩频后的水印图像嵌入到经变换后的原始图像中.然后利用扩频序列的自相关函数特征进行检测提取水印,将从受到攻击的图像中提取出的水印和原始水印的相似性进行计算得出实验结果,从而得出... 相似文献
10.
基于HVS感知模型与数据压缩的可逆图像水印算法 总被引:1,自引:1,他引:0
提出了一种基于人类视觉系统(HVS)感知模型和数据压缩技术可逆图像水印算法.算法首先将原始图像进行分块,每块进行DCT变换,利用JND模型对变换域系数进行处理,得到每个像素最大可提取的有效位并提取.将提取出的有效位串进行压缩,得到压缩位串,将水印信息与压缩位串连接在一起嵌入原始图像,同时记录边信息,包括每个像素点的最大可提取有效位数目以及嵌入位置,提取时可据此边信息完全恢复原始图像,并得到水印信息.容置的大小取决于所使用的压缩算法,使用游程编码进行压缩.同时,运用人类视觉系统的感知模型,保证了嵌入水印后的图像的视觉质量. 相似文献
11.
《Industrial Electronics, IEEE Transactions on》2001,48(5):875-882
In this paper, an image accreditation technique by embedding digital watermarks in images is proposed. The proposed method for the digital watermarking is based on the wavelet transform. This is unlike most previous work, which used a random number of a sequence of bits as a watermark and where the watermark can only be detected by comparing an experimental threshold value to determine whether a sequence of random signals is the watermark. The proposed approach embeds a watermark with visual recognizable patterns, such as binary, gray, or color image in images by modifying the frequency part of the images. In the proposed approach, an original image is decomposed into wavelet coefficients. Then, multi-energy watermarking scheme based on the qualified significant wavelet tree (QSWT) is used to achieve the robustness of the watermarking. Unlike other watermarking techniques that use a single casting energy, QSWT adopts adaptive casting energy in different resolutions. The performance of the proposed watermarking is robust to a variety of signal distortions, such as JPEG, image cropping, sharpening, median filtering, and incorporating attacks 相似文献
12.
13.
《Communications Letters, IEEE》2007,11(2):179-181
Transmission of block-coded images through error-prone wireless channels often results in lost blocks. In this study, we investigate a novel error concealment method for covering up these high packet losses and reconstructing a close approximation. Our scheme is a modified discrete wavelet transform (DWT) technique (namely, subbands based image error concealment (SIEC)) for embedding downsized replicas of original image into itself. We propose that this technique can be implemented for wireless channels to combat degradations in a backward-compatible scheme. We show that the proposed error concealment technique is promising, especially for the erroneous channels causing a wider range of packet losses, at the expense of computational burden 相似文献
14.
基于ICA的智能数字水印技术 总被引:3,自引:0,他引:3
该文提出了一种基于智能信息分析方法--独立分量分析的智能数字水印新算法。水印嵌入之前先对其进行预处理,嵌入过程可以在图像任意作用域中实现,并给出了小波域中的一种闭环嵌入方法。水印嵌入的强度由小波域视觉模型决定。在不需要任何原始图像、水印和攻击类型等信息的情况下,该算法不仅可以检测到水印而且可以完全提取水印,实现了真正意义上的水印盲检测,并对多个水印嵌入的情况也可以进行水印提取。水印检测的精确程度取决于图像与水印之间的独立性以及所采用的密钥。实验过程中攻击由通用水印测试软件Stirmark产生,实验数据证明本文提出的水印算法对Stirmark提供的各种攻击剪切、滤波、图象压缩、删行、删列、几何攻击以及多种攻击同时存在时都具有很好的鲁棒性。 相似文献
15.
Adaptive Block-size Transform based Just-Noticeable Difference model for images/videos 总被引:1,自引:0,他引:1
Lin Ma King Ngi Ngan Fan Zhang Songnan Li 《Signal Processing: Image Communication》2011,26(3):162-174
In this paper, we propose a novel Adaptive Block-size Transform (ABT) based Just-Noticeable Difference (JND) model for images/videos. Extension from 8×8 Discrete Cosine Transform (DCT) based JND model to 16×16 DCT based JND is firstly performed by considering both the spatial and temporal Human Visual System (HVS) properties. For still images or INTRA video frames, a new spatial selection strategy based on the Spatial Content Similarity (SCS) between a macroblock and its sub-blocks is proposed to determine the transform size to be employed to generate the JND map. For the INTER video frames, a temporal selection strategy based on the Motion Characteristic Similarity (MCS) between a macroblock and its sub-blocks is presented to decide the transform size for the JND. Compared with other JND models, our proposed scheme can tolerate more distortions while preserving better perceptual quality. In order to demonstrate the efficiency of the ABT-based JND in modeling the HVS properties, a simple visual quality metric is designed by considering the ABT-based JND masking properties. Evaluating on the image and video subjective databases, the proposed metric delivers a performance comparable to the state-of-the-art metrics. It confirms that the ABT-based JND consists well with the HVS. The proposed quality metric also is applied on ABT-based H.264/Advanced Video Coding (AVC) for the perceptual video coding. The experimental results demonstrate that the proposed method can deliver video sequences with higher visual quality at the same bit-rates. 相似文献
16.
17.
Xu-Dong Zhang Jian Feng Kwok-Tung Lo 《Journal of Visual Communication and Image Representation》2003,14(4):474-491
In this paper, an image watermarking scheme is developed using the tree-based spatial-frequency feature of wavelet transform. With our approach, the watermark sequence is inserted in those high activity texture regions of an image having the maximum strength of just noticeable distortion (JND) tolerance of the human visual system (HVS). Simulation results show that the proposed method achieves a good compromise between the robustness and transparency. 相似文献
18.
This article shows the results obtained when using secure spread-spectrum watermarking on gray-scale images in the watermark only attack (WOA) framework. Two secure modulations, natural watermarking (NW) and circular watermarking (CW), are compared with classical insecure modulations, spread spectrum (SS) and improved spread spectrum (ISS), from distortion, robustness, and security points of view. Implementations of CW and NW for still images are proposed: they use a wavelet transform and variable strength embedding with bounded distortion. Robustness of these schemes is assured by using JPEG compression and security is quantified by using a source separation technique: independent component analysis (ICA). Finally, tests are conducted on 2,000 natural images. They allow to distinguish between WOA security classes. 相似文献
19.
基于双密度双树复数小波变换的图像融合研究 总被引:4,自引:0,他引:4
双密度双树复数小波变换综合了双密度小波、双树小波和复数小波的优点,具有平移不变性以及良好的方向性,将其引入图像融合能够更好地提取原始图像的特征,为融合图像提供更多的信息。该文提出一种基于双密度双树复数小波变换的图像融合方法,首先将图像进行双密度双树复数小波变换,然后在相应尺度上利用融合规则将变换系数融合,最后进行重构得到融合结果。采用多组具有不同特征的源图像进行融合实验,并对融合图像进行了主客观评价。实验结果表明,该文方法的融合效果优于传统的小波变换方法。 相似文献