共查询到20条相似文献,搜索用时 125 毫秒
1.
提出了一种使用置乱技术置乱水印图像,然后将Gold码用于水印结构设计的扩频数字水印算法。通过置乱技术提高了抽取数字水印的视觉效果,并可以在一定程度上弥补数字水印在嵌入、传输和抽取过程中的损耗。利用Gold码具有较多独立码的特性,以多位二进制信息为单位对置乱后的二值图像水印进行扩频调制,然后将调制信号自适应地加入到载体图像离散余弦变换域的低频分量系数中。应用Gold码使得算法可以采用较长的扩频序列,相应提高了鲁棒性。这种结合置乱和扩频的水印算法对于抵抗各种噪声、滤波和压缩等合法攻击以及其他非法攻击都具有很好的鲁棒性。 相似文献
2.
3.
4.
介绍了数字图像置乱的基本概念,引入置乱度的定义对置乱后的图像作定量分析,提出了基于二维混沌映射Arnold变换的数字图像置乱方法,通过分析Arnold变换的周期及控制参数,实现对数字图像的最佳置乱。并通过对数字水印信号进行置乱,使得原始水印信号的相关性减弱,在遭到剪切攻击时,可以将提取出的水印信号的错误码元尽可能地分散开来,因此有效地提高了数字水印算法的抗剪切攻击性能。 相似文献
5.
介绍了离散余弦变换的系数特征,提出了一种基于离散余弦变换的彩色图像置乱数字水印算法。算法是将数字水印置乱加密后微小的扰动原始彩色图像经离散余弦变换后的对应系数,从而达到数字水印嵌入的目的。仿真实验表明算法简单高效,原图像与嵌入水印后图像差异小,水印提取准确,能较好的保证数字水印不可感知性,在对嵌入水印图像进行各种加噪、裁剪、旋转、锐化等处理后,水印仍有较强的鲁棒性。 相似文献
6.
基于混沌置乱和混沌加密的DCT域数字水印算法 总被引:1,自引:0,他引:1
把混沌理论应用到图像置乱中,提出了基于混沌的数字图像置乱算法.利用混沌加密算法来对水印数据进行加密,能有效防止攻击者根据统计学方法来检测到水印.然后,对载体图像进行DCT变换,并在DCT域上嵌入水印.通过抗攻击仿真实验表明,该数字水印算法具有较强的抗剪切攻击和噪声攻击能力. 相似文献
7.
本文从传统密码学方法不能满足版权保护的现实需要出发,运用数字水印的基本理论,提出了一种基于置乱技术的数字图像水印嵌入方法,该方法利用离散傅立叶变换,对水印图像进行置乱加密和随机产生嵌入位置来保证水印的安全性,提取水印时不需要原始图像.用MATLAB实验证明该算法有较好的不可见性,能够抵挡各种几何攻击,具有较好的鲁棒性. 相似文献
8.
9.
10.
为了有效地克服外界攻击对数字水印的破坏性,增强数字水印的鲁棒性,提出了一种基于非下采样轮廓波变换(Nonsample Contourlet Transform,NSCT)与离散分数阶傅里叶变换(Discrete Fractional Fourier Transform,DFRFT)相结合的数字水印算法.首先,通过Logistic置乱处理水印信号,增强水印的安全性;然后,对宿主图像进行NSCT分解,对其中的低频分量进行DFRFT分解;最后,将置乱的水印图像嵌入到DFRFT分解系数中,从而进一步加强水印的不可见性和鲁棒性.实验结果表明,该算法不仅具有较好的鲁棒性,还可以有效地抵抗外界攻击. 相似文献
11.
音频数字水印技术综述 总被引:3,自引:1,他引:2
作为保护音频文件版权的有效方法,数字音频水印已逐渐成为信息安全领域的研究热点.文中系统地介绍了数字音频水印的基本原理和相关概念,探讨了目前常见的几种典型音频数字水印算法,并对各种算法的性能进行了分析比较.文章最后指出了现阶段音频数字水印存在的问题,并对下一步的发展方向进行了展望. 相似文献
12.
13.
Perceptual watermarks for digital images and video 总被引:19,自引:0,他引:19
Wolfgang R.B. Podilchuk C.I. Delp E.J. 《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》1999,87(7):1108-1126
The growth of new imaging technologies has created a need for techniques that can be used for copyright protection of digital images and video. One approach for copyright protection is to introduce an invisible signal, known as a digital watermark, into an image or video sequence. In this paper, we describe digital watermarking techniques, known as perceptually based watermarks, that are designed to exploit aspects of the the human visual system in order to provide a transparent (invisible), yet robust watermark. In the most general sense, any watermarking technique that attempts to incorporate an invisible mark into an image is perceptually based. However, in order to provide transparency and robustness to attack, two conflicting requirements from a signal processing perspective, more sophisticated use of perceptual information in the watermarking process is required. We describe watermarking techniques ranging from simple schemes which incorporate common-sense rules in using perceptual information in the watermarking process, to more elaborate schemes which adapt to local image characteristics based on more formal perceptual models. This review is not meant to be exhaustive; its aim is to provide the reader with an understanding of how the techniques have been evolving as the requirements and applications become better defined 相似文献
14.
数字水印技术是一种重要的知识产权核(IP)保护技术,也是应用最广泛的IP核保护技术。介绍了常用的数字水印生成方法,分析了在FPGA设计的各个层面(软核、固核、硬核)的IP核数字水印技术。IP核保护数字水印技术可以分为附加保护技术、约束保护技术和检测技术,从附加和约束两个方面分析了水印嵌入技术,介绍了水印检测技术,分析了各种方法的原理和优缺点。从性能影响、资源开销、透明性、安全性、可信度等5个方面,对几种典型的水印技术进行评估比较,最后指出数字水印技术需要解决的问题和发展趋势。 相似文献
15.
Multipurpose image watermarking algorithm based on multistage vector quantization. 总被引:17,自引:0,他引:17
The rapid growth of digital multimedia and Internet technologies has made copyright protection, copy protection, and integrity verification three important issues in the digital world. To solve these problems, the digital watermarking technique has been presented and widely researched. Traditional watermarking algorithms are mostly based on discrete transform domains, such as the discrete cosine transform, discrete Fourier transform (DFT), and discrete wavelet transform (DWT). Most of these algorithms are good for only one purpose. Recently, some multipurpose digital watermarking methods have been presented, which can achieve the goal of content authentication and copyright protection simultaneously. However, they are based on DWT or DFT. Lately, several robust watermarking schemes based on vector quantization (VQ) have been presented, but they can only be used for copyright protection. In this paper, we present a novel multipurpose digital image watermarking method based on the multistage vector quantizer structure, which can be applied to image authentication and copyright protection. In the proposed method, the semi-fragile watermark and the robust watermark are embedded in different VQ stages using different techniques, and both of them can be extracted without the original image. Simulation results demonstrate the effectiveness of our algorithm in terms of robustness and fragility. 相似文献
16.
Craver S. Memon N. Yeo B.-L. Yeung M.M. 《Selected Areas in Communications, IEEE Journal on》1998,16(4):573-586
Digital watermarks have been proposed as a means for copyright protection of multimedia data. We address the capability of invisible watermarking schemes to resolve copyright ownership. We show that, in certain applications, rightful ownership cannot be resolved by current watermarking schemes alone. Specifically, we attack existing techniques by providing counterfeit watermarking schemes that can be performed on a watermarked image to allow multiple claims of rightful ownership. In the absence of standardization and specific requirements imposed on watermarking procedures, anyone can claim ownership of any watermarked image. In order to protect against the counterfeiting techniques that we develop, we examine the properties necessary for resolving ownership via invisible watermarking. We introduce and study invertibility and quasi-invertibility of invisible watermarking techniques. We propose noninvertible watermarking schemes, and subsequently give examples of techniques that we believe to be nonquasi-invertible and hence invulnerable against more sophisticated attacks proposed in the paper. The attacks and results presented in the paper, and the remedies proposed, further imply that we have to carefully reevaluate the current approaches and techniques in invisible watermarking of digital images based on application domains, and rethink the promises, applications and implications of such digital means of copyright protection 相似文献
17.
18.
Kundur D. Hatzinakos D. 《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》1999,87(7):1167-1180
In this paper, we consider the problem of digital watermarking to ensure the credibility of multimedia. We specifically address the problem of fragile digital watermarking for the tamper proofing of still images. Applications of our problem include authentication for courtroom evidence, insurance claims, and journalistic photography. We present a novel fragile watermarking approach which embeds a watermark in the discrete wavelet domain of the image by quantizing the corresponding coefficients. Tamper detection is possible in localized spatial and frequency regions. Unlike previously proposed techniques, this novel approach provides information on specific frequencies of the image that have been modified. This allows the user to make application-dependent decisions concerning whether an image, which is JPEG compressed for instance, still has credibility. Analysis is provided to evaluate the performance of the technique to varying system parameters. In addition, we compare the performance of the proposed method to existing fragile watermarking techniques to demonstrate the success and potential of the method for practical multimedia tamper proofing and authentication 相似文献
19.