共查询到19条相似文献,搜索用时 187 毫秒
1.
DCT域的隐形水印应嵌入哪里,水印才足够稳健?尽管许多关于DCT域水印算法的文献赞成水印应放在对视觉效果重要的分量,但DC分量总是被无一例外地排除在外.本文提出了一个DCT域隐形水印的嵌入对策和一个应用该对策的自适应水印算法.基于对图像DCT系数振幅的定量分析,我们指出:DC分量比任何AC分量有更大的感觉容量,从稳健性的角度,DC分量最适合用来嵌入水印.应用这个对策,本文提出了一个把视觉系统纹理掩蔽特性结合到水印编码过程的自适应水印算法.实验结果有效地支持了这个结论,所产生的隐形水印体现了很好的稳健性. 相似文献
2.
抗仿射变换的扩频图像水印算法 总被引:10,自引:1,他引:9
稳健性是数字水印算法的重要性能指标之一.本文提出了一个抗仿射变换攻击的图像水印盲检测算法.该算法从影响水印稳健性的因素-嵌入策略、水印结构和水印检测的同步三个方面(特别是水印检测同步)来提高水印的稳健性.有意义的水印经过直接序列扩频调制后与一个训练序列一起嵌入于图像DWT域的低频子带.在图像DFT域的中频我们嵌入一个匹配模板.检测时,先检测匹配模板,得到图像所受几何攻击的参数并作几何校正,然后在DWT域根据训练序列作平移同步后检测水印信息.应用所提出的算法,我们把一个由44个字符构成的水印(264 bits)嵌入到一幅512×512×8的图像中,实验结果表明所提出算法在隐藏数据量、对抗常规信号处理和线性几何变换的稳健性方面大大优于已报道的算法. 相似文献
3.
文中提出了一种基于离散小波变换和混沌加密的数字水印新算法,采用二维混沌变换对水印图像加密;对载体图像进行多分辨离散小波变换,应用小波系数判断载体图像的纹理复创杂程度后,依据人眼的视觉系统(HVS)特性,将水印信号嵌入到图像的低频部分,对图像的不同分解层分别选取不同的纹理阈值和水印嵌入强度,将数字水印嵌入到相同分辨层的原始图像中,提高了水印算法的鲁棒性.在检测和提取水印时,通过水印相似度(NC)和峰值信噪比(PNSR)评价水印质量,实验结果表明提出的算法可以抵抗剪裁、JPEG压缩、滤波等几何攻击,算法简单,计算复杂度小,兼顾了水印的不可见性和鲁棒性. 相似文献
4.
5.
6.
本文提出了一种基于原始图像Krawtchouk不变矩实现的仿射攻击不变性局部水印算法.具体介绍了Krawtchouk不变矩的构造方法,水印是事先产生的且与原始图像无关,通过将水印嵌入到图像的Krawtchouk不变矩中实现仿射攻击不变性.这种基于Krawtchouk矩的水印算法是局部水印技术,即水印的嵌入只是影响到部分原始图像,因此该算法对剪切攻击具有很好的鲁棒性.检测过程中采用独立分量分析技术实现真正意义上的盲检测.文中具体分析了所提出算法的计算复杂度,实验数据说明这种水印算法对通用水印测试软件Stirmark具有很好的鲁棒性. 相似文献
7.
8.
本文提出了一类基于DCT特性的鲁棒加半脆弱的双水印算法.首先根据图像的纹理特性将原始图像分块,然后,利用不同的嵌入因子将可见水印嵌入到原始图像以显示所有权,然后通过混沌序列确定不可见水印的嵌入位置,将它嵌入到高纹理区以认证图像,从而达到防篡改的目的.经验证,此双水印系统能够有效达到标识认证图像所有权的目的,有较高的鲁棒性和实效性. 相似文献
9.
10.
利用最低有效位的思想,提出了一个量子图像水印方案。在该方案中,嵌入者通过置换载体图像灰度值的某一个比特把水印图像嵌入到量子载体图像的某些像素中,这些像素由一个私钥决定。只有拥有这个私钥的版权者才可以在不知道初始载体图像的前提下提取出水印信息。分别设计了嵌入和提取算法的量子电路图,并给出了该水印算法的计算机仿真。通过比较嵌入载体图像和初始载体图像之间的峰值信噪比,说明提出的水印方案实现了不可见性。实验结果也表明,提出的水印方案具有良好的可伸缩性。 相似文献
11.
利用人眼对比敏感度视觉特性和图像的纹理特征,提出了一种彩色图像的水印算法。算法首先依据图像的纹理特征,将图像进行分割;再将水印嵌入到图像纹理复杂的部分,并利用人眼对比敏感阈值控制水印的嵌入量,从而实现水印的嵌入;最后利用逆过程实现水印的提取。同时对3幅不同复杂纹理的图像进行仿真实验,并对3幅含水印图进行5种方式的攻击测试,且与近些年国内外报道的8种水印算法进行对比分析。结果表明,在中间剪切1/4区域、质量因子为20%的压缩和旋转90°较强的攻击下,提取水印的NC值和含水印图的SSIM值均仍能达到0.8以上,且比8种水印算法具有更好的鲁棒性。综合结果表明,在水印嵌入过程中,提出的算法能够有效解决水印容量与视觉透明性、鲁棒性之间的平衡,是一种行之有效的图像水印算法。 相似文献
12.
In this dissertation, sereral key problems in the field of steganographic image security are mainly studied and discussed: (1) A novel kind of image cryptosystem is studied. The encrypted information of secret image is embedded into an ordinary image, which can be transmitted publicly, and it will not cause attention of illegal eavesdropper. The following results are achieved: (a) The image hiding algorithm and its improved algorithm based on wavelet transform and vector quantization are propo… 相似文献
13.
Watermark detection is a topic which is seldom addressed in the watermarking literature. Most authors concentrate on developing novel watermarking algorithms. In a practical watermarking system, however, one must be able to distinguish between watermarked and unwatermarked documents. Many existing systems belong to the class of so called 'yes/no' watermarks, where the detector correlates the candidate image with some known sequence to determine whether a mark is present. Unfortunately, these watermarks often carry no extra information and are not very useful. On the other hand, multi-bit watermarking schemes typically use a separate reference watermark and the payload of the watermark is decoded only when this reference watermark is successfully detected in the received image. It is shown that it is not necessary to use a reference watermark for detection purposes if the watermark payload is encoded with an error control code. One can then put all the energy into the payload watermark and increase its robustness. The turbo code is used as an example of error control codes in the work presented, and simulation results using an algorithm based on the authors' previous work verifies their theory. 相似文献
14.
Leelavathy Narkedamilly Venkateswara Prasad Evani Srinivas Kumar Samayamantula 《ETRI Journal》2015,37(3):595-605
This paper proposes a robust, imperceptible block‐based digital video watermarking algorithm that makes use of the Speeded Up Robust Feature (SURF) technique. The SURF technique is used to extract the most important features of a video. A discrete multiwavelet transform (DMWT) domain in conjunction with a discrete cosine transform is used for embedding a watermark into feature blocks. The watermark used is a binary image. The proposed algorithm is further improved for robustness by an error‐correction code to protect the watermark against bit errors. The same watermark is embedded temporally for every set of frames of an input video to improve the decoded watermark correlation. Extensive experimental results demonstrate that the proposed DMWT domain video watermarking using SURF features is robust against common image processing attacks, motion JPEG2000 compression, frame averaging, and frame swapping attacks. The quality of a watermarked video under the proposed algorithm is high, demonstrating the imperceptibility of an embedded watermark. 相似文献
15.
16.
本文提出了一种基于小波域的闭环自适应图像鲁棒数字盲水印技术.水印的嵌入过程是一个闭环过程,且其嵌入的位置及强度均与原始图像有关.水印嵌入的初始强度由小波域图像压缩的量化因子决定,并根据检测要求不断的进行调整,从而达到水印的最佳嵌入.本文证明了这种闭环系统的收敛性,并且给出了水印检测过程中正确检测概率和虚警检测概率的求解公式,可用于闭环系统的检测性能判决条件.水印的检测过程中不需要任何原始图像和原始水印信号的信息,采用独立分量分析实现对水印信号的盲检测.检测过程中不仅可以检测到水印的存在,而且可以提取出嵌入到图像中的多个水印信号.实验结果证实了本文提出的闭环自适应数字盲水印技术优于传统的自适应水印技术,水印检测过程中在不需要考虑水印图像所经历的攻击类型及攻击参数的情况下可以正确的提取水印信号.本文提出的水印算法对通用水印测试软件Stirmark具有很好的鲁棒性. 相似文献
17.
《Signal Processing: Image Communication》2005,20(2):129-150
In digital watermarking, robustness is still a challenging problem if different sets of attacks need to be tolerated simultaneously. In this paper, we deal with this problem by using an integrated solution involving side-informed embedding, moment normalization, and content-dependent watermarks. First, a new image watermarking method based on the concept of communications with side information is proposed. We investigate the characteristics of mean filtering in formulating new watermark embedding and extraction processes. Second, regarding resistance to geometrical attacks, we do not rely on the concept of pilot signals because they are vulnerable to synchronization removal attacks. We instead use block-based watermarking and moment normalization mechanisms to recover geometrical distortions. Third, regarding resistance to the copy attack, the content-dependent watermark is employed to avoid treating an un-watermarked image as one that has been watermarked. The robustness of our approach has been verified using both the StirMark and the copy attack. 相似文献
18.
19.
The concept of digital rights management architecture for multimedia will be presented in this paper, with focus on robust digital image watermarking, which is able to undergo geometrical attacks performed against the embedded watermarks. Geometrical attacks are still an open problem for many digital watermarking algorithms used in present time. Most of geometrical attacks can be described by using affine transforms. A new approach to improve robustness against geometrical attacks is presented. The discrete Fourier transform and log-polar mapping are used for watermark embedding and for watermark detection. Some attacks against the embedded watermarks are performed and the results are given. Also two modifications, usage of the proposed method as a synchronization template and implementation for the color images, are presented and experimental results are given too. 相似文献