首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 203 毫秒
1.
黄福莹  覃团发  陈华 《电视技术》2015,39(20):11-13
提出了一种基于离散小波变换、离散傅里叶变换和奇异值分解相结合的盲水印算法。该算法对原始图像进行一级离散小波变换后选择低频子带图像作分块离散傅里叶变换,然后对分块离散傅里叶变换的幅度谱进行奇异值分解,选择最大奇异值并采用量化嵌入方法实现水印的嵌入和盲提取。为了提高算法对旋转攻击的鲁棒性,采用基于Radon变换的检测算法对待检测图像进行旋转校正。实验结果表明,该算法对一些常规攻击和几何攻击都具有较强的鲁棒性。  相似文献   

2.
文章提出了一种基于分块思想的DWT-SVD盲数字水印算法,与传统的DWT-SVD算法,将水印信息直接嵌入到载体图像中不同,文章将水印图像进行量化嵌入到载体图像中,水印的提取不需要原始载体图像,可用密钥和量化因子实现盲提取。实验结果表明,该算法能够有效抵抗噪声、滤波等攻击。  相似文献   

3.
一种基于混沌序列的DCT域盲数字水印算法   总被引:4,自引:1,他引:4  
文章提出了一种基于混沌序列的DCT域盲数字水印嵌入和检测新算法。该算法以二值图作为水印.通过混沌序列确定水印信号嵌入位置,根据JPEG标准的量化表系数确定水印的嵌入强度.只有利用正确密钥才能提取水印,保证了算法的安全性;提取水印时不需要宿主图像,实现了盲水印技术。实验仿真表明了该算法简单易行且对常见的水印攻击有较好的鲁棒性和实效性。  相似文献   

4.
提出了一种改进的小波域稳健性盲水印算法.原始图像经小波变换后,对近似子带进行分块,根据子块灰度值的排序情况并结合HVS特性,进行灰度水印的嵌入.实验表明,该算法在PSNR值和主观视觉效果上,含水印图像的不可见性都有明显的提高,并且对剪切、加噪、旋转、JPEG压缩等攻击的稳健性高.  相似文献   

5.
文章针对各种数字多媒体版权容易被窃取修改盗用,提出一种改进的基于SVD和DWT变换多子带嵌入的数字盲水印算法。新算法首先对原始载体图像进行分块,运用SVD分解出奇异值和奇异值向量,然后运用DWT变换分成4个子带,将置乱后的水印运用特殊算法嵌入到除了低频子带外的其他3个子带中,最后直接运用阈值的方法将水印提取出来。实验结果表明,与传统的DWT水印算法相比,新算法具有良好的不可见性和鲁棒性,不仅能抵抗裁剪,旋转等几何攻击,而且能有效抵抗噪声、图像灰度值变化等攻击。  相似文献   

6.
一种基于统计量化的抗几何攻击图像水印算法   总被引:3,自引:0,他引:3  
依据图像受到几何攻击时亮度值统计特性不变原理提出了一种基于统计量化的抗几何攻击图像水印算法。用二值序列作为水印,水印嵌入时,首先选取一段亮度值范围,然后根据一定的步长将其划分为小区间,每一水印位对应一区间,最后对亮度值进行量化,使每个区间的像素都被量化到一个亮度值上。水印提取时,首先统计每个亮度值的像素个数,然后按照嵌入时的方法选取亮度范围并且划分区间,从每个区间提取一位水印信息。实验表明,这种方法对图像缩放、旋转和剪切等几何攻击有很强的鲁棒性,对中值滤波、噪声等常规攻击也具有较强鲁棒性。  相似文献   

7.
DWT域基于系数量化的盲水印算法   总被引:2,自引:0,他引:2  
贺冲  王慧琴 《通信技术》2010,43(3):159-161,164
提出了一种DWT域内基于系数量化的盲提取图像水印算法。通过分块量化DWT域的近似分量来嵌入二值水印信息。水印提取实现了盲提取,并结合Haar小波的特殊性质,增强水印的鲁棒性。仿真实验证明了该算法不仅具有较好的不可见性,而且对常用的普通攻击和诸如旋转、缩放、平移等几何攻击也具有较好的鲁棒性。  相似文献   

8.
文章对RGB图像的一个分量进行二级小波分解,利用混沌序列进行二进制编码生成数字指纹,采用模运算将数字指纹嵌入到小波变换后的水平分量中,盗版追踪时可以采用盲提取指纹信息。实验结果表明,选取合适码长的数字指纹嵌入载体图像中,在适当的合谋尺寸下,能很好的追踪到合谋用户。  相似文献   

9.
一种与JPEG图像压缩编码结合的细胞自动机域盲水印算法   总被引:2,自引:0,他引:2  
该文结合JPEG图像压缩编码和细胞自动机,提出一种用于JPEG压缩图像的数字盲水印算法。该算法先用Moore型细胞自动机对水印图像进行置乱;随后用2维正交细胞自动机变换将原始灰度图像进行分解,并在分解后得到的低频细胞自动机域系数中嵌入置乱后的水印信息。最后将嵌入了水印的图像按JPEG图像压缩标准进行编码。水印的提取是在解码过程中进行的。实验结果表明,该水印算法有较好的隐藏性;对常见的攻击如JPEG压缩、滤波、剪切、旋转以及加性噪声攻击等有较好的鲁棒性。  相似文献   

10.
当今数字媒体作品拷贝、篡改等侵权问题愈演愈烈,因此进行语音信号的抗共谋攻击研究对维护音频发行者的版权和数字音乐产品市场的正常运行很有必要,本文建立DCT变换模型,将复杂的时域问题转换为频域内的问题,通过MATLAB、EXCEL等软件进行数据分析,利用人耳隐蔽效应,在音频信号允许的波动范围内,对原始音频文件数据作分帧分段处理,以特定的水印作为指纹信息,对音频采样点数据进行修改,从而实现指纹信息的嵌入。同时将水印前后的音频图像、MOS标准以及信噪比作为评价嵌入水印后音频质量评价的依据,证明本文选择的模型良好。根据实验所得的嵌入指纹信息前后的波形,得到除个别奇异值外,嵌入水印信息前后无明显差异,因此认为嵌入水印信息后对原始音频文件数据影响不大。此外,本文随机选取20名测试者对嵌入水印信息的音频文件进行测听并评分,评分结果的平均值为4.8,依据MOS打分标准得到音频质量为优,即符合要求;此外,本文分别计算了原始音频信号及嵌入指纹信息后音频信号的信噪比,嵌入指纹信息后音频信号信噪比由61.3713dB降为18.6198dB,从主观和客观角度均证明嵌入水印后音频的性能较好;为了能够根据用户共谋所得的音频数据找出共谋用户,本文以"与"共谋攻击和平均共谋攻击为例,使用Matlab进行仿真实验,结果表明,无论采取何种共谋方式,均能根据文中相应的公式得到参与共谋的用户,进而达到维护音频发行者版权的目的。  相似文献   

11.
A novel blind fingerprint detection scheme for images is presented in Discrete Cosine Transform (DCT) domain. Anti-Collusion Codes (ACCs) are employed to design the fingerprints, which can accommodate more users than orthogonal modulation based fingerprints with the same amount of signals. The selected DCT coefficients of the original image are quantized according to fingerprints, the standard JPEG quantization table is employed to improve the ability of anti-compression. The fingerprints were extracted without original signal's participation by judging which interval of the DCT coefficients belong to. Besides, the detection threshold is optimized automatically during tracing colluders. Experimental results show that the proposed blind fingerprint detection scheme has larger capacity and is more efficient than the existing algorithms.  相似文献   

12.
In this paper, we propose multimodal biometric image watermarking scheme through a two-stage integrity verification method using the hidden thumbnail feature vectors for safe authentication of multimodal biometrics data, face and fingerprint, respectively. It is basically blind and spread spectrum-based robust watermarking method. The proposed method enables us to detect a tampered region by controlling watermark embedding strength to meet the requirement of predefined watermark extraction threshold. The key idea is that the thumbnail feature vectors of a face image as a watermark pattern are utilized by embedding into a fingerprint image in order to verify the integrity of respective biometric data. The first stage of integrity verification for a fingerprint image is done by deciding the validity of extracted thumbnail patterns. The second stage of integrity verification for a face image is done by one-to-one matching between the thumbnail feature vectors extracted from a face image and the thumbnail one of the received face image. Experimental results showed that the proposed method has a high detection rate of the forged biometric data and guarantees the security assurance.  相似文献   

13.
Recovery of image blocks using the method of alternating projections.   总被引:3,自引:0,他引:3  
A technique for block-loss restoration in block-based image and video coding, dubbed recovery of image blocks using the method of alternating projections (RIBMAP), is developed. The algorithm is based on orthogonal projections onto constraint sets in a Hilbert space. For the recovery of a linear dimension N size block, a total of 8N vectors are extracted from the surrounding area of an N x N missing block. These vectors form a library from which the best matching spatial information for the missing block is extracted. Recovery vectors, including both undamaged and restored damaged pixels, are introduced. The vectors are used to find highly correlated information relating to the lost pixels. To assure continuity with the surrounding undamaged area, three additional convex constraints are formulated. Adherance to these sets is imposed using alternating projections. Simulation results using orthogonal projections demonstrate that RIBMAP recovers spatial structure faithfully. Simulation comparisons with other procedures are presented: Ancis and Giusto's hybrid edge-based average-median interpolation technique, Sun and Kwok's projections onto convex sets-based method, Hemami and Meng's interblock correlation interpolation approach, Shirani et al.'s modified interblock correlation interpolation scheme, and Alkachouh and Bellanger's fast discrete cosine transformation-based spatial domain interpolation algorithm. Characteristic of the results are those of the "Lena" JPEG image when one fourth of periodically spaced blocks in the image have errors. The peak signal-to-noise ratio of the restored image is 28.68, 29.99, 31.86, 31.69, 31.57, and 34.65 dB using that of Ancis and Giusto, Sun and Kwok, Hemami and Meng, Shirani et al., Alkachouh and Bellanger, and RIPMAP, respectively.  相似文献   

14.
提出一种基于纹理指纹的恶意代码特征提取及检测方法,通过结合图像分析技术与恶意代码变种检测技术,将恶意代码映射为无压缩灰阶图片,基于纹理分割算法对图片进行分块,使用灰阶共生矩阵算法提取各个分块的纹理特征,并将这些纹理特征作为恶意代码的纹理指纹;然后,根据样本的纹理指纹,建立纹理指纹索引结构;检测阶段通过恶意代码纹理指纹块生成策略,采用加权综合多分段纹理指纹相似性匹配方法检测恶意代码变种和未知恶意代码;在此基础上,实现恶意代码的纹理指纹提取及检测原型系统。通过对6种恶意代码样本数据集的分析和检测,完成了对该系统的实验验证。实验结果表明,基于上述方法提取的特征具有检测速度快、精度高等特点,并且对恶意代码变种具有较好的识别能力。  相似文献   

15.
张东阁  傅雨田 《红外与激光工程》2018,47(4):404001-0404001(7)
利用无监督学习的一类支持向量机(One Class Support Vector Machine,OCSVM)和随机场景图像序列,构造滚动更新的像元分类模型,实现红外焦平面盲元的在线检测。根据正常像元和异常像元数量和灰度特征的差异,以随机图像序列作为输入数据,使用OCSVM建立单一类别的像元分类模型,灰度变化的像元归为一类,其他像元不属于此类。由于随机图像序列的滚动更新,OCSVM模型及支持向量也随之更新。统计支持向量的频次,高频次支持向量对应的像元聚为一类,即为异常像元。以320256中波红外图像序列为例,说明了OCSVM模型进行盲元检测的过程,检测结果与黑体定标的结果一致。基于随机场景和OCSVM模型的盲元检测方法摆脱了定标黑体的约束,提高了盲元检测的灵活性。  相似文献   

16.
张长兴  刘成玉  亓洪兴  张东  蔡能斌 《红外与激光工程》2020,49(1):0104002-0104002(7)
受红外焦平面阵列生产工艺及材料本身特性影响,红外焦平面阵列不可避免地存在盲元,严重困扰红外数据的处理与应用。光栅分光推扫式热红外高光谱成像仪一般以红外焦平面阵列的其中的一维作为光谱维进行推扫式成像,空间维只剩一维,与一般的热像仪具有二维空间维的成像机制有很大区别。常规的实验室定标法和开窗处理的场景检测方法不能满足该成像方式的盲元检测需求。以热红外高光谱成像仪中的盲元检测为目标,有针对性地提出了基于光谱匹配的盲元检测算法。该方法从光谱维角度出发,以不同温度实验室黑体定标数据生成温升光谱数据,在数据规则化处理的基础上,自动提取有效像元目标的伪光谱曲线,采用光谱角匹配的方式实现盲元的自动检测。以典型的热红外高光谱成像仪获取数据并开展盲元检测实验,结果表明该方法充分利用了热红外高光谱成像仪的光谱维信息,检测精度较高,盲元补偿后的数据可满足热红外高光谱数据的行业应用。  相似文献   

17.
This paper proposes a reversible data hiding method based on image interpolation and the detection of smooth and complex regions in the cover images. A binary image that represents the locations of reference pixels is constructed according the local image activity. In complex regions, more reference pixels are chosen and, thus, fewer pixels are used for embedding, which reduces the image degradation. On the other hand, in smooth regions, less reference pixels are chosen, which increases the embedding capacity without introducing significant distortion. Pixels are interpolated according to the constructed binary image, and the interpolation errors are then used to embed data through histogram shifting. The pixel values in the cover image are modified one grayscale unit at most to ensure that a high quality stego image can be produced. The experimental results show that the proposed method provides better image quality and embedding capacity compared with prior works.  相似文献   

18.
基于边缘检测和像素分类的可逆数据隐藏   总被引:2,自引:2,他引:0  
为了提高嵌入算法的整体性能,提出一种基于边缘检测和像素分类的灰度图像可逆数据隐藏算法。算法按嵌入容量优先原则自适应地选择最佳阈值提取图像边缘,并根据边缘信息和指定的图像质量控制因子将像素分为平滑、弱边缘和强边缘像素3类。对平滑像素,通过增加嵌入强度的方法提高嵌入容量,预测误差直方图平移2位;对弱边缘像素,像素值最大修改量为1,从而保证图像含密质量;强边缘像素的像素值保持不变,进一步提高含密图像质量。实验结果表明,本文算法在保证图像质量的同时有效提高嵌入容量,算法的整体性能优于其它同类算法。  相似文献   

19.
为了有效检测和补偿红外焦平面阵列(IRFPA)的盲元,提出一种IRFPA盲元即时处理的新算法。该算法利用红外系统实时成像过程中盲元与有效像元的窗口响应率存在的显著差异性,实现盲元的快速检测;依据图像信息的时空相关性实现盲元的在线补偿。最后给出了盲元处理的硬件实现过程。实验结果表明:该算法流程简单,通用性强,能够对系统工作过程中随机出现的盲元进行即时检测和补偿,在实际工程中具有较大的应用价值。  相似文献   

20.
It is a challenging work to design a blind color image watermarking scheme for protecting copyright, which is different from the existing schemes used binary image or grayscale image as watermark and is also different from other non-blind watermarking schemes. In this paper, we analyze the feature of the upper Hessenberg matrix, and propose a blind color image watermarking scheme using upper Hessenberg matrix of Hessenberg transform. Arnold transform is used to improve the security, and the MD5-based Hash pseudo-random algorithm is also used to improve the robustness. In the process of watermark embedding, the encrypted watermark information is embedded into the biggest energy element of the Hessenberg matrix by quantization technique. In the process of watermark extraction, the watermark is extracted from the attacked host image with blind manner. Simulation results show that the proposed scheme outperforms other related methods in the aspects of the invisibility, robustness, capacity and computational complexity.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号