首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 125 毫秒
1.
提出了一种使用置乱技术置乱水印图像,然后将Gold码用于水印结构设计的扩频数字水印算法。通过置乱技术提高了抽取数字水印的视觉效果,并可以在一定程度上弥补数字水印在嵌入、传输和抽取过程中的损耗。利用Gold码具有较多独立码的特性,以多位二进制信息为单位对置乱后的二值图像水印进行扩频调制,然后将调制信号自适应地加入到载体图像离散余弦变换域的低频分量系数中。应用Gold码使得算法可以采用较长的扩频序列,相应提高了鲁棒性。这种结合置乱和扩频的水印算法对于抵抗各种噪声、滤波和压缩等合法攻击以及其他非法攻击都具有很好的鲁棒性。  相似文献   

2.
图像置乱在数字水印中的应用研究   总被引:2,自引:2,他引:0  
近年来,图像置乱技术被广泛地应用在数字水印中.文中分析了典型置乱算法的性能,验证了其作用.实验表明,由于Arnold变换计算简单,迭代较小的次数就可以获得较好的置乱效果,因此更适合在水印中应用.同时,在水印图像经过Arnold置乱预处理的情况下,当含水印图像的面积被剪切掉3/4时,提取出来的水印仍然比较清晰,所以采用置乱技术,很大程度上提高了水印的鲁棒性.  相似文献   

3.
信息隐藏是信息安全的一个新的重要内容,数字水印技术是信息隐藏技术研究领域的重要分支.鲁棒性和隐藏性是数字水印技术的关键.本文提出了一种基于离散小波变换和二维经验模式分解的图像数字水印算法,在嵌入水印前把水印进行Arnold变换,把水印信息置乱,消除像素的空间相关性,从而提高了水印信息的安全性和鲁棒性.实验结果表明,该水...  相似文献   

4.
黄志高 《通信技术》2010,43(3):150-152
介绍了数字图像置乱的基本概念,引入置乱度的定义对置乱后的图像作定量分析,提出了基于二维混沌映射Arnold变换的数字图像置乱方法,通过分析Arnold变换的周期及控制参数,实现对数字图像的最佳置乱。并通过对数字水印信号进行置乱,使得原始水印信号的相关性减弱,在遭到剪切攻击时,可以将提取出的水印信号的错误码元尽可能地分散开来,因此有效地提高了数字水印算法的抗剪切攻击性能。  相似文献   

5.
汪太月  ;李宏伟 《通信技术》2014,(9):1084-1089
介绍了离散余弦变换的系数特征,提出了一种基于离散余弦变换的彩色图像置乱数字水印算法。算法是将数字水印置乱加密后微小的扰动原始彩色图像经离散余弦变换后的对应系数,从而达到数字水印嵌入的目的。仿真实验表明算法简单高效,原图像与嵌入水印后图像差异小,水印提取准确,能较好的保证数字水印不可感知性,在对嵌入水印图像进行各种加噪、裁剪、旋转、锐化等处理后,水印仍有较强的鲁棒性。  相似文献   

6.
基于混沌置乱和混沌加密的DCT域数字水印算法   总被引:1,自引:0,他引:1  
把混沌理论应用到图像置乱中,提出了基于混沌的数字图像置乱算法.利用混沌加密算法来对水印数据进行加密,能有效防止攻击者根据统计学方法来检测到水印.然后,对载体图像进行DCT变换,并在DCT域上嵌入水印.通过抗攻击仿真实验表明,该数字水印算法具有较强的抗剪切攻击和噪声攻击能力.  相似文献   

7.
本文从传统密码学方法不能满足版权保护的现实需要出发,运用数字水印的基本理论,提出了一种基于置乱技术的数字图像水印嵌入方法,该方法利用离散傅立叶变换,对水印图像进行置乱加密和随机产生嵌入位置来保证水印的安全性,提取水印时不需要原始图像.用MATLAB实验证明该算法有较好的不可见性,能够抵挡各种几何攻击,具有较好的鲁棒性.  相似文献   

8.
孙锐  孙洪  姚天任 《信号处理》2003,19(2):135-139
许多通常的多媒体信号处理,如剪切、滤波、感知编码等,引起了水印信号衰落状的偏倚。本文提出了一种应用传输分集技术改善数字水印的稳健性的方案。该方案对原始图像作小波金字塔分解,并选择中频子带作为传输信道用来嵌入水印,然后对水印进行伪随机置乱,利用空时编码及其差分检测技术实现水印的嵌入与提取,提取过程无需使用原始图像与估计信道状态信息。实验结果证实了该方案改善了稳健水印的性能。  相似文献   

9.
基于运动矢量的视频图象数字水印算法   总被引:6,自引:0,他引:6  
数字水印技术是近年发展起来的一种用于数字产品版权保护和真伪性论证的新兴技术。与静止图象相比,视频水印技术要满足盲检的要求。本文根据运动矢量的特征值ρl,提出了一种视频图象水印新算法。实验结果表明,所提出的水印算法简单、快速,能满足视频编码的实时性要求;算法与现有的视频压缩标准有很好的兼容性;水印的提取具有盲检功能,无需原图象;水印的嵌入不影响I帧的图象质量,与嵌入水印前的原压缩图象相比,嵌入水印后的视频图象信噪比损失很小。  相似文献   

10.
为了有效地克服外界攻击对数字水印的破坏性,增强数字水印的鲁棒性,提出了一种基于非下采样轮廓波变换(Nonsample Contourlet Transform,NSCT)与离散分数阶傅里叶变换(Discrete Fractional Fourier Transform,DFRFT)相结合的数字水印算法.首先,通过Logistic置乱处理水印信号,增强水印的安全性;然后,对宿主图像进行NSCT分解,对其中的低频分量进行DFRFT分解;最后,将置乱的水印图像嵌入到DFRFT分解系数中,从而进一步加强水印的不可见性和鲁棒性.实验结果表明,该算法不仅具有较好的鲁棒性,还可以有效地抵抗外界攻击.  相似文献   

11.
音频数字水印技术综述   总被引:3,自引:1,他引:2  
作为保护音频文件版权的有效方法,数字音频水印已逐渐成为信息安全领域的研究热点.文中系统地介绍了数字音频水印的基本原理和相关概念,探讨了目前常见的几种典型音频数字水印算法,并对各种算法的性能进行了分析比较.文章最后指出了现阶段音频数字水印存在的问题,并对下一步的发展方向进行了展望.  相似文献   

12.
信息隐藏与数字水印   总被引:7,自引:0,他引:7  
杨波 《信息技术》2003,27(5):30-33
作为信息隐藏技术的一个主要分支 ,数字水印技术已逐渐成为保护数字产品版权的重要手段 ,得到了广泛的研究和应用。本文第一部分简要介绍了现代信息隐藏技术的产生背景 ;第二部分介绍了信息隐藏技术的研究内容、发展及研究现状 ,并给出了信息隐藏系统的一个通用模型 ;第三部分首先给出了数字水印技术的定义及模型 ,然后对数字水印技术的应用领域、分类及特征进行了系统介绍 ,最后简要介绍了数字水印技术的一些主要的研究及应用情况  相似文献   

13.
Perceptual watermarks for digital images and video   总被引:19,自引:0,他引:19  
The growth of new imaging technologies has created a need for techniques that can be used for copyright protection of digital images and video. One approach for copyright protection is to introduce an invisible signal, known as a digital watermark, into an image or video sequence. In this paper, we describe digital watermarking techniques, known as perceptually based watermarks, that are designed to exploit aspects of the the human visual system in order to provide a transparent (invisible), yet robust watermark. In the most general sense, any watermarking technique that attempts to incorporate an invisible mark into an image is perceptually based. However, in order to provide transparency and robustness to attack, two conflicting requirements from a signal processing perspective, more sophisticated use of perceptual information in the watermarking process is required. We describe watermarking techniques ranging from simple schemes which incorporate common-sense rules in using perceptual information in the watermarking process, to more elaborate schemes which adapt to local image characteristics based on more formal perceptual models. This review is not meant to be exhaustive; its aim is to provide the reader with an understanding of how the techniques have been evolving as the requirements and applications become better defined  相似文献   

14.
数字水印技术是一种重要的知识产权核(IP)保护技术,也是应用最广泛的IP核保护技术。介绍了常用的数字水印生成方法,分析了在FPGA设计的各个层面(软核、固核、硬核)的IP核数字水印技术。IP核保护数字水印技术可以分为附加保护技术、约束保护技术和检测技术,从附加和约束两个方面分析了水印嵌入技术,介绍了水印检测技术,分析了各种方法的原理和优缺点。从性能影响、资源开销、透明性、安全性、可信度等5个方面,对几种典型的水印技术进行评估比较,最后指出数字水印技术需要解决的问题和发展趋势。  相似文献   

15.
The rapid growth of digital multimedia and Internet technologies has made copyright protection, copy protection, and integrity verification three important issues in the digital world. To solve these problems, the digital watermarking technique has been presented and widely researched. Traditional watermarking algorithms are mostly based on discrete transform domains, such as the discrete cosine transform, discrete Fourier transform (DFT), and discrete wavelet transform (DWT). Most of these algorithms are good for only one purpose. Recently, some multipurpose digital watermarking methods have been presented, which can achieve the goal of content authentication and copyright protection simultaneously. However, they are based on DWT or DFT. Lately, several robust watermarking schemes based on vector quantization (VQ) have been presented, but they can only be used for copyright protection. In this paper, we present a novel multipurpose digital image watermarking method based on the multistage vector quantizer structure, which can be applied to image authentication and copyright protection. In the proposed method, the semi-fragile watermark and the robust watermark are embedded in different VQ stages using different techniques, and both of them can be extracted without the original image. Simulation results demonstrate the effectiveness of our algorithm in terms of robustness and fragility.  相似文献   

16.
Digital watermarks have been proposed as a means for copyright protection of multimedia data. We address the capability of invisible watermarking schemes to resolve copyright ownership. We show that, in certain applications, rightful ownership cannot be resolved by current watermarking schemes alone. Specifically, we attack existing techniques by providing counterfeit watermarking schemes that can be performed on a watermarked image to allow multiple claims of rightful ownership. In the absence of standardization and specific requirements imposed on watermarking procedures, anyone can claim ownership of any watermarked image. In order to protect against the counterfeiting techniques that we develop, we examine the properties necessary for resolving ownership via invisible watermarking. We introduce and study invertibility and quasi-invertibility of invisible watermarking techniques. We propose noninvertible watermarking schemes, and subsequently give examples of techniques that we believe to be nonquasi-invertible and hence invulnerable against more sophisticated attacks proposed in the paper. The attacks and results presented in the paper, and the remedies proposed, further imply that we have to carefully reevaluate the current approaches and techniques in invisible watermarking of digital images based on application domains, and rethink the promises, applications and implications of such digital means of copyright protection  相似文献   

17.
数字水印技术是将信息隐藏从而实现多媒体数据的版权保护,数字水印的研究主要是所提出的算法具有更好的不可见性和鲁棒性。提出了2种不同的变换域方法:一种是基于DCT域的水印算法,水印信息取自二值签名图像;另一种是基于小波分解的数字水印算法,采用服从高斯分布的随机数作为水印信息。实验结果表明,这2种水印算法具有良好的性能,实现的水印具有不可见性,而且对于常见的图像处理具有很好的鲁棒性。  相似文献   

18.
Digital watermarking for telltale tamper proofing andauthentication   总被引:2,自引:0,他引:2  
In this paper, we consider the problem of digital watermarking to ensure the credibility of multimedia. We specifically address the problem of fragile digital watermarking for the tamper proofing of still images. Applications of our problem include authentication for courtroom evidence, insurance claims, and journalistic photography. We present a novel fragile watermarking approach which embeds a watermark in the discrete wavelet domain of the image by quantizing the corresponding coefficients. Tamper detection is possible in localized spatial and frequency regions. Unlike previously proposed techniques, this novel approach provides information on specific frequencies of the image that have been modified. This allows the user to make application-dependent decisions concerning whether an image, which is JPEG compressed for instance, still has credibility. Analysis is provided to evaluate the performance of the technique to varying system parameters. In addition, we compare the performance of the proposed method to existing fragile watermarking techniques to demonstrate the success and potential of the method for practical multimedia tamper proofing and authentication  相似文献   

19.
基于DCT的数字视频水印算法研究   总被引:1,自引:0,他引:1  
通过分析已有的基于DCT变换的视频水印算法,提出了一种充分考虑人眼视觉特性、并通过采用水印嵌入控制策略对特定位置DCT系数进行修改以嵌入水印的方案.新算法易于实现,具有较高的鲁棒性.  相似文献   

20.
数字水印的攻击方法   总被引:11,自引:1,他引:10  
数字水印是近两年来出现的数字产品版权保护技术,目的是保护数字产品的合法拷贝和传播,是当前国际学术界的研究热点。数字水印包括算法设计和攻击技术两方面,它们是互相促进的对立面,本文简单讨论了数字水印的概念和应用,全面分析总结了当前数字水印的各种攻击方法,提出了数字水印下一步的发展方向,对改进和设计水印算法具有重要的指导作用。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号