共查询到19条相似文献,搜索用时 406 毫秒
1.
讨论了数字水印技术在信息安全中的应用,对相关技术作了较系统的论述,介绍了数字水印的技术原理、典型算法及攻击方法等,提出了军事通信上的数字水印文件、数字水印命令等初步方案,对军事信息领域的保密安全有一定的指导意义和理论价值。 相似文献
2.
3.
一种高效抗旋转攻击的盲数字水印技术 总被引:1,自引:0,他引:1
随着计算机和网络的飞速发展,人们相互间的信息传送量的的极大提高,越来越需要一种有效的版权保护方法来保护流通信息的版权。所谓数字水印就是一种嵌入到图像、视频或者音频中的不可见标志,用于信息数据的版权保护、数字签名等。现代数字水印技术在数字图像中应用得最为广泛,传统的数字水印技术更多地应用在对固定不动的图像进行变换,无法抵御旋转攻击。本文提出了一种高效抵抗旋转攻击的盲数字水印技术,能几乎抵抗任何角度的旋转攻击,并且由于算法本身理论的关系,在压缩、滤波方面也有很强的鲁棒性。 相似文献
4.
应用MATLAB实现数字水印算法 总被引:2,自引:0,他引:2
介绍了数字水印算法中常用的MATLAB函数,应用MATLAB语言实现了一个空间域数字水印算法的嵌入、提取和攻击过程,并给出了程序运行的结果. 相似文献
5.
数字水印是多媒体数字产品版权保护和内容抗篡改的重要技术之一.本文在对以往脆弱型数字水印分析基础之上,给出了三种基于混沌系统的脆弱型数字水印技术,充分利用混沌系统对初值敏感和伪噪音等特性,使得相同子块在不同混沌状态下可能隐藏不同的水印信息,从而克服Holliman攻击和矢量拼贴攻击,有力的增强该脆弱型水印技术抵抗恶意攻击的能力.实验结果表明该算法在不破坏宿主图像视觉质量基础上,可精确地检测和定位对图像内容的局部恶意篡改,同时该算法很容易推广到其他数字媒体. 相似文献
6.
邱志宏 《微电子学与计算机》2012,29(12)
针对音频文件中嵌入数字水印的应用需求,提出了基于掩频效应的数字水印嵌入原理,详细阐述了利用掩频效应实现音频数字水印的嵌入流程和提取流程,给出了数字水印嵌入和提取过程中的关键计算函数.对所设计的音频数字水印算法进行了实验测试和分析,测试结果表明:本文算法具有良好的不可见性和鲁棒性,能够抵御常见的数字水印攻击方法,但在抗采样点的剪切攻击时采样效果性能尚不理想. 相似文献
7.
8.
9.
10.
11.
随着计算机和网络技术的飞速发展,多媒体信息的安全问题引起人们极大的关注.数字水印是信息安全领域的新技术,他作为版权保护和安全认证的有力工具已得到广泛的发展.简要介绍了数字图像水印技术的基本原理,着重分析了典型的变换域算法及常见的攻击方式和相应对策,通过对算法的研究,指出变换域数字图像水印的关键问题,就是水印嵌入的频带选择问题. 相似文献
12.
数字水印技术是一种新的信息安全技术.在信息安全、数据隐藏、维护个人的合法权益等方面扮演着重要的角色.文中论述了文本数字水印技术透明性、鲁棒性、安全性方面的特点.针对文本水印技术的5种主要算法:基于字符特征格式、字符属性、基于句法、语义改写、字符间距的嵌入水印信息的算法进行了详尽的论述.具体阐述了每种算法在鲁棒性、透明性、容量、安全性等方面的优势与劣势.根据性能分析,在实际应用中,可以有选择地根据自己的需要,选择侧重点不同的水印算法以满足自己的要求. 相似文献
13.
14.
Nasrin M. Makbol Bee Ee Khoo 《AEUE-International Journal of Electronics and Communications》2013,67(2):102-112
Copyright protection and proof of ownership are two of the main important applications of the digital image watermarking. The challenges faced by researchers interested in digital image watermarking applications lie in the creation of new algorithms to serve those applications and to be resistant to most types of attacks, especially the geometrical attacks. Robustness, high imperceptibility, security, and large capacity are four essential requirements in any watermarking scheme. This paper presents a new image watermarking scheme based on the Redundant Discrete Wavelet Transform (RDWT) and the Singular Value Decomposition (SVD). The gray scale image watermark was embedded directly in the singular values of the RDWT sub-bands of the host image. The scheme achieved a large capacity due to the redundancy in the RDWT domain and at the same time preserved high imperceptibility due to SVD properties. Embedding the watermarking pixel's values without any modification inside the wavelet coefficient of the host image overcomes the security issue. Furthermore, the experimental results of the proposed scheme showed a high level of robustness not only against the image processing attacks but also against the geometrical attacks which are considered as difficult attacks to resist. 相似文献
15.
随着射频识别(RFID)技术的广泛应用,隐私安全问题引起了人们的极大关注。首先从安全性和实用性方面讨论了现有的RFID安全协议存在的不足,然后对一种基于动态密钥的低成本RFID标签安全方案进行了分析,较好地解决了在认证协议中容易出现的数据不同步和重传攻击问题。 相似文献
16.
Joint robustness and security enhancement for feature-based image watermarking using invariant feature regions 总被引:1,自引:0,他引:1
Local image features have been widely applied in feature-based watermarking schemes. The feature invariance is exploited to achieve robustness against attacks, but the leakage of information about hidden watermarks from publicly known locations and sizes of features are often unconsidered in security. This paper, therefore, proposes a novel image watermarking approach, which adopts invariant feature regions to jointly enhance its robustness and security. Initially, circular feature regions are determined by the scale-adapted auto-correlation matrix and the Laplacian-of-Gaussian operation. Leakage of secret information is also controlled carefully during feature detection procedure. An optimal selection process formulated as a multidimensional knapsack problem is then proposed to select robust non-overlapping regions from those circular feature regions to resist various attacks. This process is implemented by a genetic algorithm-based approach, and incorporates randomization to mitigate the security risk. Finally, each selected region is normalized to obtain a geometrically invariant feature region, and embedded with a region-dependent watermark to overcome the weakness of multiple-redundant watermarks. The evaluation results based on the StirMark benchmark present the proposed scheme can tolerate various attacks, including noise-like signal processing and geometric distortions. A security analysis in terms of differential entropy also confirms the security improvement of the proposed method. 相似文献
17.
Osama S. Faragallah 《AEUE-International Journal of Electronics and Communications》2013,67(3):189-196
This paper presents an efficient, robust, and imperceptible video watermarking technique based on singular value decomposition (SVD) performed in the Discrete Wavelet Transform (DWT) domain. In the proposed DWT-based SVD video watermarking method, the video frames are transformed with the DWT using two resolution levels. The high frequency band HH and the middle frequency bands LH and HL are SVD transformed and the watermark is hidden in them. The proposed DWT-based SVD video watermarking method is characterized by two improvements: (1) a cascade of two powerful mathematical transforms; the Discrete Wavelet Transform (DWT)-based SVD using additive method, and (2) an error correction code is applied and embeds the watermark with spatial and temporal redundancy. The aim of these improvements is to increase robustness against attacks based on video characteristics and the robustness against image processing attacks, realize high security level, protect the watermark against bit errors and obtain good perceptual quality. The proposed DWT-based SVD video watermarking method has been tested in the presence of video and image processing attacks and experimental results proved that the proposed DWT-based SVD video watermarking method survives attacks based on video characteristics and image processing techniques. 相似文献
18.
19.
论文提出了一种新型的DCT域扩频盲水印算法。通过将水印进行扩频调制,嵌入在载体图像的中频部分,大大提高了水印算法的稳健性;同时利用混沌算法将水印在嵌入前打乱,能大大提高隐蔽载体的鲁棒性和安全性。水印提取不需要原始载体图像,具有广泛的实用价值。实验证明该算法能抵抗常见的攻击,抗噪声攻击和JPEG压缩性能理想。 相似文献