首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 109 毫秒
1.
3D模型数字水印研究进展   总被引:1,自引:1,他引:1  
数字水印作为3D模型版权保护和内容认证的有效手段近年来被广泛研究,论文从水印算法的分类、典型算法、性能衡量等方面全面综述了近年来国内外3D模型数字水印研究与开发的进展情况,总结了3D模型水印算法发展的新特点,并对该领域未来可能的研究方向和重点进行了展望。  相似文献   

2.
基于多小波变换的彩色数字水印   总被引:3,自引:0,他引:3  
随着数字多媒体技术的发展,数字水印技术已经成为数字版权保护领域的一个研究热点.多小波所拥有的对称性、正交性、有限支撑等重要特性弥补了单小波的不足.针对传统数字水印技术的有限性,通过对频域数字水印算法进行分析,提出了一种新的数字水印算法.新算法以提升格式小波变换为基础,对原始图像和水印图像进行提升格式小波变换,将水印信息嵌入到中频系数中.实现了二维彩色图像将为水印信息嵌入到二维图像数据中.实验证明,新算法在对彩色图像进行水印处理方面达到较好的效果,具有较好的健壮性.  相似文献   

3.
视频数字水印技术综述   总被引:12,自引:0,他引:12  
视频数字水印是保护视频版权的一种有效技术手段.在研究国内外视频数字水印研究现状的基础上,对当前视频水印技术的特点、它的分类、攻击手段、视频水印的嵌入和提取算法做了综述,指出了各种算法的优缺点,给出了视频数字水印嵌入和提取算法有代表性的实例.最后归纳了视频水印的关键技术,并指出了视频水印今后研究的发展趋势.  相似文献   

4.
基于矢量量化的数字水印是数字水印技术一个新的研究领域。主要研究基于矢量量化的数字图像水印技术的原理和性能。在简要介绍水印技术和矢量量化技术后阐述了基于矢量量化的数字水印算法的基本原理。通过分析几种典型的矢量量化水印算法,总结出基于矢量量化水印算法的特点是其在嵌入容量和算法易行性方面有绝对优势,并且对于VQ压缩攻击有很好的鲁棒性,但水印图像的质量对于版权保护来说还有待提高。指出进一步研究的方向是结合DCT、DWT、HVS来改善。  相似文献   

5.
基于矢量量化的数字图像水印技术研究   总被引:2,自引:2,他引:0  
基于矢量量化的数字水印是数字水印技术一个新的研究领域.主要研究基于矢量量化的数字图像水印技术的原理和性能.在简要介绍水印技术和矢量量化技术后阐述了基于矢量量化的数字水印算法的基本原理.通过分析几种典型的矢量量化水印算法,总结出基于矢量量化水印算法的特点是其在嵌入容量和算法易行性方面有绝对优势,并且对于VQ压缩攻击有很好的鲁棒性,但水印图像的质量对于版权保护来说还有待提高.指出进一步研究的方向是结合DCT、DWT、HVS来改善.  相似文献   

6.
数字水印技术是解决数字作品版权保护的一个重要手段。衡量数字水印技术可靠性的标准是能否抵抗各种水印攻击,而几何攻击是目前困扰数字水印领域发展的突出问题,数字水印多采用盲水印算法。总结了当前抗几何攻击的各种盲水印方法,并对今后的研究方向进行了探讨。  相似文献   

7.
结合近几年混沌数字水印的研究成果,系统地从混沌数字水印研究分类和研究领域两个方面,综述了混沌数字水印的最新研究成果。介绍了混沌数字水印的定义及常见分类,从混沌序列数字水印、混沌映射数字水印和混沌系统数字水印三个方面介绍了国内外研究情况,从文本水印、图形水印、音频水印、视频水印等领域详细综述了混沌数字水印研究理论和算法,就混沌数字水印研究中存在的问题和未来的发展趋势进行了总结和展望。  相似文献   

8.
基于DCT变换域的数字水印技术   总被引:1,自引:0,他引:1  
数字水印是现代信号处理领域研究的热点之一,涉及图像处理、数字通信、密码学、信息安全等多学科领域,增强数字水印的鲁棒性是数字水印问题的关键。在对数字水印的概念、特点、分类等进行了系统研究的基础上,采用基于离散余弦变换(DCT)的数字水印算法,实现了水印的嵌入和检测,并采用Jpeg压缩、图像仿射变换等多种水印攻击算法对水印算法的性能进行了评价。  相似文献   

9.
基于零树编码的数字水印算法   总被引:2,自引:0,他引:2  
随着多媒体技术的发展,数字水印技术已经成为数字版权保护领域的一个研究热点。针对传统数字水印技术的有限性,通过对频域数字水印算法进行分析,提出了一种新的数字水印算法。新算法以零树编码思想为基础,对原始图像和水印图像进行小波变换和零树编码嵌入,实现了二维彩色图像将为水印信息嵌入到二维图像数据中。实验证明,新算法在对彩色图像进行水印处理方面达到较好的效果,具有较好的健壮性。  相似文献   

10.
唐松生  董颖 《计算机安全》2007,(9):31-33,45
数字水印是实现版权保护的有效技术,视频水印研究是目前水印技术领域的一个热点。该文综合国内外的视频水印技术的发展,对水印的特点、技术分类、嵌入提取算法和攻击技术进行了全面的介绍,指出了典型算法,并对视频水印技术的发展趋势进行了展望。  相似文献   

11.
Watermarking 3D objects for verification   总被引:8,自引:0,他引:8  
We introduce and investigate the fundamental similarities and differences of watermarking 3D graphic models compared to 2D images, and propose some solutions to address a class of applications of digital watermarking-the verification of 3D polygonal models. To our knowledge, watermarking of 3D objects for verification purposes has not been addressed in any published literature. The proposed scheme, in its present form, is not intended for use in applications that require robust watermarks. One recent work in 3D data hiding addressed applications requiring robust means of hiding data. We first introduce digital watermarking, discuss its goals and application domains, and explain the different categories of watermarks. We believe the goals and applications will remain fairly similar for 2D images and 3D models  相似文献   

12.
Copyright protection of digital media has become an important issue in the creation and distribution of digital content. As a solution to this problem, digital watermarking techniques have been developed for embedding specific information identifying the owner in the host data imperceptibly. Most watermarking methods developed to date mainly focused on digital media such as images, video, audio, and text. Relatively few watermarking methods have been presented for 3D graphical models. In this paper we propose a robust 3D graphical model watermarking scheme for triangle meshes. Our approach embeds watermark information by perturbing the distance between the vertices of the model to the center of the model. More importantly, to make our watermarking scheme robust against various forms of attack while preserving the visual quality of the models our approach distributes information corresponds to a bit of the watermark over the entire model, and the strength of the embedded watermark signal is adaptive with respect to the local geometry of the model. We also introduce a weighting scheme in the watermark extraction process that makes watermark detection more robust against attacks. Experiments show that this watermarking scheme is able to withstand common attacks on 3D models such as mesh simplification, addition of noise, model cropping as well as a combination of these attacks.  相似文献   

13.

Many modern applications make use of 3D modeling and / or reconstruction of complex objects, such as historical monuments and entire urban centers. One of the most common representations of these 3D models is by point clouds, which are a dense set of points irregularly organized in a 3D coordinate system. Usually, the acquisition methods are highly expensive due to the necessary equipment and size of these models. This factor motivates the proposal of watermarking techniques to guarantee the copyright protection as well as to detect illegal copies. This paper presents a non-blind watermarking method for 3D point clouds. The method is based on the graph Fourier transform, a recently introduced signal processing tool which has been applied to signals lying over arbitrarily irregular domains. Unlike other published works regarding point cloud watermarking, instead of inserting the bit sequence in the models’ spatial coordinates, in this work the bits are embedded in the color information attributed in each point of a cloud. Simulation results show high imperceptibility and robustness against several attacks, such as affine transformations, reordering, noise addition and cropping.

  相似文献   

14.
15.
We introduce a novel semi-blind-and-semi- reversible robust watermarking scheme for three-dimensional (3D) polygonal models. The proposed approach embeds watermarks in the significant features of 3D models in a spread-spectrum manner. This novel scheme is robust against a wide variety of attacks including rotation, translation, scaling, noise addition, smoothing, mesh simplifications, vertex reordering, cropping, and even pose deformation of meshes. To the best of our knowledge, the existing approaches including blind, semi-blind, and non-blind detection schemes cannot withstand the attack of pose editing, which is a very common routine in 3D animation. In addition, the watermarked models can be semi-reversed (i.e., the peak signal-to-noise ratio (PSNR) of the recovered models is greater than 90 dB in all experiments) in semi-blind detection scheme. Experimental results show that this novel approach has many significant advantages in terms of robustness and invisibility over other state-of-the-art approaches.  相似文献   

16.
Towards Blind Detection of Robust Watermarks in Polygonal Models   总被引:8,自引:0,他引:8  
We describe a Digital Watermarking system dedicated for embedding watermarks into 3D polygonal models. The system consists of three watermarking algorithms, one named Vertex Flood Algorithm (VFA) suitable for embedding fragile public readable watermarks with high capacity and offering a way of model authentication, one realizing affine invariant watermarks, named Affine Invariant Embedding (AIE) and a third one, named Normal Bin Encoding (NBE) algorithm, realizing watermarks with robustness against more complex operations, most noticeably polygon reduction. The watermarks generated by these algorithms are stackable. We shortly discuss the implementation of the system, which is realized as a 3D Studio MAX plugin.  相似文献   

17.
Fragile watermarking for authenticating 3-D polygonal meshes   总被引:2,自引:0,他引:2  
Designing a powerful fragile watermarking technique for authenticating three-dimensional (3-D) polygonal meshes is a very difficult task. Yeo and Yeung were first to propose a fragile watermarking method to perform authentication of 3-D polygonal meshes. Although their method can authenticate the integrity of 3-D polygonal meshes, it cannot be used for localization of changes. In addition, it is unable to distinguish malicious attacks from incidental data processings. In this paper, we trade off the causality problem in Yeo and Yeung's method for a new fragile watermarking scheme. The proposed scheme can not only achieve localization of malicious modifications in visual inspection, but also is immune to certain incidental data processings (such as quantization of vertex coordinates and vertex reordering). During the process of watermark embedding, a local mesh parameterization approach is employed to perturb the coordinates of invalid vertices while cautiously maintaining the visual appearance of the original model. Since the proposed embedding method is independent of the order of vertices, the hidden watermark is immune to some attacks, such as vertex reordering. In addition, the proposed method can be used to perform region-based tampering detection. The experimental results have shown that the proposed fragile watermarking scheme is indeed powerful.  相似文献   

18.
三维几何模型数字水印综述   总被引:1,自引:0,他引:1  
主要对近些年来在三维几何模型数字水印研究方面的算法进行了总结.首先给出了三维几何模型数字水印的一些基本概念,进而对三维水印在空域和变换域的典型算法进行了介绍,最后对三维几何模型的难点和发展前景进行了总结和展望.  相似文献   

19.
李军  余娅 《计算机科学》2007,34(8):248-249
本文给出了一种NURBS曲面模型的三维数字水印算法.该算法不直接将水印信息嵌入到NURBS曲面的参数中,而是对原始NURBS曲面模型进行修改,通过映射成虚拟2D图像,利用已有的DCT域图像水印嵌入算法将信息嵌入到2D图像中,再对2D图像进行提取产生新的NURBS曲面水印模型.该算法对于控制顶点、节点向量的改变以及模型表面的近似等操作具有鲁棒性.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号