首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Attacking visible watermarking schemes   总被引:1,自引:0,他引:1  
Visible watermarking schemes are important intellectual property rights (IPR) protection mechanisms for digital images and videos that have to be released for certain purposes but illegal reproductions of them are prohibited. Visible watermarking techniques protect digital contents in a more active manner, which is quite different from the invisible watermarking techniques. Digital data embedded with visible watermarks will contain recognizable but unobtrusive copyright patterns, and the details of the host data should still exist. The embedded pattern of a useful visible watermarking scheme should be difficult or even impossible to be removed unless intensive and expensive human labors are involved. In this paper, we propose an attacking scheme against current visible image watermarking techniques. After manually selecting the watermarked areas, only few human interventions are required. For watermarks purely composed of thin patterns, basic image recovery techniques can completely remove the embedded patterns. For more general watermarks consisting of thick patterns, not only information in surrounding unmarked areas but also information within watermarked areas will be utilized to correctly recover the host image. Although the proposed scheme does not guarantee that the recovered images will be exactly identical to the unmarked originals, the structure of the embedded pattern will be seriously destroyed and a perceptually satisfying recovered image can be obtained. In other words, a general attacking scheme based on the contradictive requirements of current visible watermarking techniques is worked out. Thus, the robustness of current visible watermarking schemes for digital images is doubtful and needs to be improved.  相似文献   

2.
3.

In the digital world, watermarking technology is a solution for data hiding and completely essential for management and secure communications of digital data propagated over the internet-based platforms. Reversible watermarking is a quality-aware type of watermarking which has been applied in managing digital contents such as digital images, texts, audios and videos. Reversible watermarking is also known as lossless watermarking due to its preservation of all details of host and hidden data. One of the important uses of this kind of watermarking is to manage medical data regarding DICOM images. In the recent years, a new type of reversible watermarking technology entitled interpolation-based reversible watermarking has been introduced, and we are going to enhance it for DICOM images by using a hybrid approach based on computing error histogram and by applying an image interpolation with greedy weights (adaptive weighting). In practice, simulation results clearly show better performance of the proposed scheme compared to the previous techniques using interpolation-based reversible watermarking on different DICOM images.

  相似文献   

4.
一种基于DWT的双密钥自适应水印算法   总被引:1,自引:0,他引:1       下载免费PDF全文
为了更好地保护数字图像的版权,提出了一种基于小波变换域的双密钥自适应水印算法。该算法首先结合梯度分割阈值选取策略,自适应抽取图像内容特征并作为水印信息;然后利用载体图像的邻域特征自适应确定量化步长,并通过量化调制小波系数嵌入数字水印。针对不断出现的各种各样的水印攻击,尤其是解释攻击,通过对其原理的分析,提出了由认证中心分密钥和作者分密钥组成的双密钥水印方案,较好地解决了在抗解释攻击方面存在的问题,提高了水印信息的安全性。仿真实验表明,该自适应水印算法不仅具有良好的不可见性,而且对JPEG压缩、高斯噪声、图像剪切和中值滤波等攻击具有理想的鲁棒性。  相似文献   

5.
医学图像在存储和传输过程中,不允许做有损压缩等变换。医院给出图像必须是要负责任的,所以医学图像不允许别人改动,特别是在病灶区不能改动。为了确保达到这一目的,一种新的采用符号动力学方法的数字水印被提出。根据这一方法,在嵌入水印的时候,可以使得图像中的关键部分不需要修改。一旦有人改动图像,马上可以从水印检查中发现,可以确保图像不被别人改动。  相似文献   

6.
Recently, digital watermarking has become an important technique to preserve patients’ privacy in telemedicine applications. Since, medical information are highly sensitive, security of watermarked medical images becomes a critical issue in telemedicine applications. In this paper, two targeted attacks have been proposed against a key based color image watermarking scheme and also a non-key based one, in order to evaluate their security in telemedicine applications. The target schemes are SVD-based and QR-based color image watermarking algorithms, which their embedding procedures are quit the same. The proposed attacks exploit the prior knowledge of the watermarking algorithms to make changes in the exact embedding spaces. Thus, these changes would cause disruption in extraction procedure. Our experimental results show that the key based watermarking scheme is more secure than the non-key based one. This is because the proposed targeted attack needs to distort the key based watermarked images more than non-key based ones to remove the embedded watermarks. Our proposed targeted attacks also have more efficient performance in removing watermarks than other general attacks such as JPEG compression, Gaussian noise and etc. Finally, these attacks have been proposed to show the vulnerabilities of watermarking schemes in order to help the designers to implement more secure schemes.  相似文献   

7.
In recent years, end users can easily capture digital images using several devices, such as smartphones, mobile devices and digital imaging cameras, allowing such images to be easily copied, manipulated, transmitted or format converted without any restrictions. This fact suggests the necessity to develop digital tools, such as digital watermarking, to solve the issues associated with copyright protection and ownership authentication of digital images. To claim the ownership of a digital image, we propose a camouflaged, unseen-visible watermarking technique based on luminance and texture properties in conjunction with an image enhancement criterion. The proposed method has some advantages over invisible and visible watermarking methodologies in terms of readability and imperceptibility of the watermark, respectively. The experimental results demonstrate that the proposed scheme is effective and applicable for digital images on a variety of topics, including natural scenes and man-made objects, both indoors and outdoors. A comparison with previously reported methods based on unseen-visible watermarking techniques is also provided.  相似文献   

8.
基于离散小波变换的QR二维条码防伪技术   总被引:1,自引:0,他引:1  
基于数字水印的快速响应矩阵(QR)二维条码防伪技术的水印容量低、防伪效果差。为解决该问题,提出QR码二值图像Rand灰度化和背景图灰度化方法,以提高防伪水印容量。QR码二值图像灰度化的程度由灰度化阈值决定,并且可以根据实际应用需要灵活确定。在此基础上,设计基于离散小波变换的QR二维条码防伪水印方案,通过量化函数实现水印的嵌入和检测,利用混沌密钥生成的二维混沌序列控制水印嵌入和检测的位置。实验结果表明,该方案在确保条码信息可识别的条件下,提高了QR码防伪水印的性能。  相似文献   

9.
一种基于多小波的盲的数字图象水印技术   总被引:9,自引:1,他引:9  
以一个图案作水印且提取时不需要原图象的数字水印技术 (blind waterm arking)面临许多挑战 ,因而 ,这种技术的研究文献很少 .本文首次提出了一种基于多小波 (multiwavelet)变换的盲的数字图象水印技术 .与标量小波不同 ,在图象的多小波变换系数中 ,同一尺度且同一方向上存在两个 (或以上 )对应不同小波的细节子图 ,本文中的方法正是利用多小波变换这一独特性质嵌入一幅二值图案 .为了增加水印的稳健性 ,我们采用 (7,4 )汉明编码 (Hamming code)将水印的校验图也嵌入到多小波变换域中 .特别是 ,水印图案的提取不需要原始图象 .实验结果表明 ,这种方法对JPEG压缩、平滑滤波、锐化、噪声、对比度增强、重量化、重采样等多种图象处理具有很好的稳健性  相似文献   

10.

In this paper we propose a novel region based hybrid medical image watermarking (MIW) scheme to ensure authenticity, integrity and confidentiality of medical images. In this scheme a digital medical image is partitioned into region of interest (ROI) and the region of non interest (RONI). To detect and localize ROI tampering with high accuracy pixel wise positional and relational bits are calculated. Positional bit is calculated with respect to MSBs, row and column of the pixel. Relational bit shows the relation between MSBs. Two original LSBs of each ROI pixel are replace by their corresponding positional and relational bits. Original LSBs of ROI pixels are concatenated and embedded in RONI for ROI recovery in the case of tampering. Multiple watermarks i.e. electronic patient record (EPR), hospitals logo and LSBs of ROI are embedded simultaneously as a robust watermark in RONI using IWT-SVD hybrid transform. The proposed scheme is blind and free from false positive detection. Various experiments have been carried out on different medical imaging modalities to evaluate the performance of the proposed scheme in terms of imperceptibility, robustness, tamper detection, localization, recovery and computation time. ROI tampering is detected and recovered with high accuracy. Thus, the proposed scheme is effective in telemedicine applications.

  相似文献   

11.
《国际计算机数学杂志》2012,89(8):1573-1594
Embedding and extraction of secret information as well as the restoration of the original un-watermarked image are highly desirable in sensitive applications such as military, medical, and law enforcement imaging. This paper presents a novel reversible watermarking approach for digital images using integer-to-integer wavelet transform, companding technique, and adaptive thresholding, enabling it to embed and recover the secret information as well as restore the image to its pristine state. The proposed method takes advantage of block-based watermarking and iterative optimization of threshold for companding which avoids histogram pre- and postprocessing. Consequently, it reduces the associated overhead usually required in most of the reversible watermarking techniques. As a result, it generates less distortion between the watermarked and the original image. Experimental results on regular as well as medical images show that the proposed method outperforms the existing reversible watermarking approaches reported in the literature.  相似文献   

12.
针对医疗图像、遥感图像等敏感数字图像在认证水印的嵌入过程中不能引入失真的特点,提出一种基于可逆数字水印的图像完整性认证方案:首先提取图像特征,将其作为hash函数的输入;再用图像发送者的私钥对hash值进行数字签名;最后将数字签名作为水印数据,利用图像相邻像素点差值直方图的特征,轻微改变图像像素点的灰度值来可逆嵌入水印数据。方案实现简单,水印嵌入后图像失真小,认证通过后还可以完全恢复原始图像。理论和实验证明水印嵌入后,PSNR值能达到51.14dB以上。  相似文献   

13.
数字水印技术被认为是对数字图像进行版权保护的一种科学而有效的方法。提出了一种基于陷门单向函数的空域水印算法,目的是为图像的版权保护设计一个高度安全的水印系统。实验结果证明该算法对诸如位置攻击、不重要位攻击、多幅图像攻击等具有较强的鲁棒性。  相似文献   

14.
傅德胜  黄伟 《计算机工程与设计》2008,29(4):1004-1006,1010
数字水印技术作为一门有效的多媒体版权保护技术受到越来越多的关注.提出了一种基于小波变换的图像数字水印算法.依据人眼视觉特性,将数字水印信息嵌入到经过小波变换后的图像的高频子带纹理区内,人眼不易察觉,再利用含水印图像和原始图像提取出嵌入的水印.采用多幅图进行实验,结果表明,该数字水印算法具有较好的隐蔽性,而且对常见的图像处理操作攻击具有较好的鲁棒性.  相似文献   

15.
目的 现有水印算法大多是基于明文域的,很容易被入侵、窃取。为了保护用户隐私、提高安全性,本文提出了一种用于盗版追踪的基于格雷码加密域的可逆水印方法,该方法支持对密文直接操作。方法 首先提出了基于格雷码的同态加密系统(HESGC),并以此加密载体图像;然后依据整数小波变换(IWT)和人类视觉系统(HVS)特性,将图像分区并合理分类;再依据新提出的算法完成嵌入、可逆恢复及提取工作;最后利用首次提出的水印追踪联合策略(JWT)来进行盗版追踪。结果 为了验证本文方法,选取USC-SIPI图像库中的6幅经典图像作为标准测试图像,与其他可逆水印算法相比,本文方法具有更高的PSNR值,PSNR高达50 dB,而且SSIM值均为1,实现了可逆功能;本文新提出的HESGC将使原始载体图像膨胀为原来的8倍,故容量较大。理论上,本文最大容量为3.75 bit/像素,目前大多可逆水印算法的最大容量不足1 bit/像素;本文方法不仅实现了盗版追踪功能,而且能够抵抗一些常见的攻击,如随机噪声、中值滤波、图像平滑和JPEG编码、LZW编码和卷积模糊等。通过比较原始追踪证明与攻击后图像的追踪证明可知,相似度在1左右的即为盗版,其他非盗版的相似度都远远低于1,大部分在0.6左右。结论 本文提出了一种基于密文域的可逆水印方案,首次提出了HESGC和JWT,实现了密文域可逆水印技术和盗版追踪功能。该方案直接采用灰度图像作为水印图像,解除了以往以二值图像作为水印图像,或者将灰度图像二值化后作为水印图像的限制,而且采用基于级联混沌技术提高了灰度水印图像的安全性。此外,本文成功消除了图像分区分类中纹理/平滑区域中的平滑/纹理孤岛,使分类结果更加准确、合理。实验结果表明,本方案不仅能够抵抗一些常见攻击,而且容量大、安全性高,很好地保护了用户隐私。本文实现了密文域可逆水印技术,适用于隐私保护要求高的医学、军事等领域。  相似文献   

16.
Digital watermarking has been presented to protect the copyright of electronic multimedia data. The previous proposed watermarking algorithms mostly embed sequences of random numbers or binary images as the watermarks. In this paper, an image accreditation technique by embedding digital gray-level image watermarks in images is proposed. In the proposed method, the host image and the watermark are decomposed into wavelet coefficients. The contextual energies of the host-image wavelet coefficients are computed to select embedding coefficients. The watermark wavelet coefficients are sorted and then embedded in the selected host coefficients. The experiments show that the proposed method provides extra robustness against JPEG-compression, image-processing, and even composite attacks compared to the traditional embedding methods. Moreover, the proposed method has no need of the original image to extract the embedded watermarks. The proposed method facilitates electronic commerce application developers to select adequate digital watermarking techniques for their development systems.  相似文献   

17.
Image watermarking has emerged as a useful method for solving security issues like authenticity, copyright protection and rightful ownership of digital data. Existing watermarking schemes use either a binary or grayscale image as a watermark. This paper proposes a new robust and adaptive watermarking scheme in which both the host and watermark are the color images of the same size and dimension. The security of the proposed watermarking scheme is enhanced by scrambling both color host and watermark images using Arnold chaotic map. The host image is decomposed by redundant discrete wavelet transform (RDWT) into four sub-bands of the same dimension, and then approximate sub-band undergoes singular value decomposition (SVD) to obtain the principal component (PC). The scrambled watermark is then directly inserted into a principal component of scrambled host image, using an artificial bee colony optimized adaptive multi-scaling factor, obtained by considering both the host and watermark image perceptual quality to overcome the tradeoff between imperceptibility and robustness of the watermarked image. The hybridization of RDWT-SVD provides an advantage of no shift-invariant to achieve higher embedding capacity in the host image and preserving the imperceptibility and robustness by exploiting SVD properties. To measure the imperceptibility and robustness of the proposed scheme, both qualitative and quantitative evaluation parameters like peak signal to noise ratio (PSNR), structural similarity index metric (SSIM) and normalized cross-correlation (NC) are used. Experiments are performed against several image processing attacks and the results are analyzed and compared with other related existing watermarking schemes which clearly depict the usefulness of the proposed scheme. At the same time, the proposed scheme overcomes the major security problem of false positive error (FPE) that mostly occurs in existing SVD based watermarking schemes.  相似文献   

18.
一种新的基于DWT、DCT和SVD的鲁棒水印算法   总被引:1,自引:0,他引:1  
本文提出一种新的基于离散小波变换(DWT)、离散余弦变换(DCT)和矩阵奇异值分解(SVD)的鲁棒水印算法.首先按照本文提出的小波分解准则对载体图像进行四层小波分解,取第四层的低频子图与三个高频子图;同样对水印图像进行小波分解得到低频子图与三个高频子图.然后用DCT、SVD方法,结合本文提出的相互嵌入准则将水印图像的低...  相似文献   

19.
一种基于Trace变换的数字图像版权保护算法   总被引:1,自引:0,他引:1       下载免费PDF全文
数字水印技术被视为一种有效的数字图像版权保护技术,但当水印信息因嵌入算法的公开而被一些攻击所破坏时,或同一幅图像被嵌入多个不同水印时,都不能有效地检测出数字作品的所有者。提出了一种基于Trace变换和标识信息的数字图像版权保护算法。该算法基于Trace变换进行数字作品的特征提取,并在第三方机构进行登记注册从而获得标识信息,然后根据标识信息确认数字作品的所有权。文中给出了算法的实验结果,并与传统的几何矩不变量算法进行了比较,结果表明,该算法对旋转、缩放、剪切及其组合、仿射变换、去掉部分行等几何攻击以及滤波和JPEG压缩攻击具有更高的稳健性。  相似文献   

20.
一种新的基于图块分类的水印算法   总被引:4,自引:1,他引:3  
高珍  张伟  张志浩 《计算机工程》2005,31(24):177-179,190
提出了一种新的小波域鲁棒性水印算法,算法以图像块矩阵的熵和标准差等特征值为依据,对图像进行了光滑和纹理等4个区域的划分,并在此基础上结合小波域系数特征,自适应地选取最佳水印嵌入位置和嵌入强度,从而在保证算法鲁棒性的同时进一步提高水印的透明性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号