首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 125 毫秒
1.
王伟 《微计算机信息》2007,23(24):59-60,94
随着因特网的发展,数字水印技术被广泛的应用于数字图像,音频,视频等多媒体产品的版权保护。该文提出了一种有效的数字水印算法。首先利用混沌映射将水印进行预处理,保证水印的安全性,然后,原始图像按水印的比特位分成若干个大小相等的子块,利用奇异值分解来分解每个子块,将水印比特嵌入到子块的最大奇异值处,最后,利用反变换得到嵌入水印的图像。实验表明,本方法保证了水印信息的安全性,有较好的不可见性和鲁棒性。  相似文献   

2.
随着数字博物馆的不断发展,关于数字博物馆中的图像版权保护越来越受到人们的重视。首先对数字水印技术和数字博物馆进行介绍,然后就数字水印技术用于解决数字博物馆中图像版权保护问题进行探讨,提出一种新的基于奇异值分解的盲数字图像水印算法。利用Arnold混沌映射将水印进行预处理,并按水印的大小把原始图像分成若干个子块,利用矩阵的奇异分解方法分解每个子块,通过比较调整相邻图像块最大奇异值来完成水印的嵌入。实验结果表明,该算法对于JPEG有损压缩、剪切、加噪声等攻击具有很强的鲁棒性。  相似文献   

3.
基于DWT域的混沌置乱二值图像数字水印新算法   总被引:12,自引:0,他引:12  
提出了一种基于DWT(Discrete Wavelet Transform)域有意义二值图像数字水印新算法.利用广义猫映射产生的混沌序列对水印序列的嵌入位置进行置乱,增加了嵌入水印的安全性;并利用改正的二值运算方法将水印嵌入到图像深层小波域的低频子图中.水印的检测不需要原始图像.大量仿真结果证明了该算法嵌入的数字水印既具有很好的隐蔽性,又具有很理想的鲁棒性.  相似文献   

4.
针对奇异值分解(SVD)存在的虚警错误和水印隐蔽性与鲁棒性的矛盾问题,提出了一种基于Slant变换和SVD的稳健性数字水印算法。对二值水印图像进行Arnold置乱和Logistic映射双因子加密预处理,增强水印信息安全性;将原始载体图像分成8×8不重叠子块分别对其进行Slant变换和块奇异值分解;然后将水印图像SVD后的左奇异矩阵和奇异值矩阵相乘作为水印主成分嵌入到每个子块的最大奇异值中。仿真实验结果表明,该算法不仅有效解决了传统SVD水印算法的虚警问题,提升了运行速度和水印安全性,在具有较好隐蔽性的同时,对JPEG压缩、噪声、滤波、几何攻击等也有较好的稳健性。  相似文献   

5.
为了提高数字水印的鲁棒性以及水印嵌入位置的保密性,提出了一种基于Logistic混沌映射和整数小流变换—奇异值分解(IWT-SVD)量化的盲鲁棒水印算法:对二值水印图像进行Arnold置乱,对原始载体图像进行8×8分块,利用生成的Logistic混沌序列选择嵌入水印的图像块,充分保证了水印嵌入位置的保密性;对选中的图像块进行二级IWT分解,对得到的二级低频子带系数进行SVD;将置乱后的水印信息嵌入.算法不需要原始载体图像,实现了水印的盲提取,更具实用性.仿真实验结果表明:算法对常规图像处理操作、压缩攻击和剪切攻击均具有较强的稳健性.  相似文献   

6.
一种基于分块DCT的混沌半脆弱图像水印技术*   总被引:2,自引:0,他引:2  
提出了一种用于数字图像内容认证的半脆弱水印方案。将图像进行分块,图像块的归一化标准差经量化操作后映射为混沌系统初值,经混沌映射生成水印比特。用量化系数技术将水印比特嵌入块DCT直流系数。利用混沌对初值极端敏感性的特点,能够定位检测对加入水印图像的窜改,并且水印提取不需要原始图像。实验结果表明,嵌入水印后图像的视觉质量好;算法具有对图像内容局部窜改检测的有效性、敏感性以及良好的窜改定位能力,并具有更好的抗JPEG压缩、加性高斯噪声和中值滤波的鲁棒性。  相似文献   

7.
提出了一种结合小波域和空域的图像数字水印新算法。依据重要性将原始水印分成两部分,分别嵌入载体图像小波域和空域。并利用混沌系统对水印序列的嵌入位置进行置乱。重要水印嵌入小波域多级分解的低频子图;采用二值量化算法。其余水印嵌入载体空域非LSB的中间比特位;并采用最小化像素改变策略。实验结果证明了该算法在提高水印容量的同时,嵌入水印也具有很好的安全性、隐蔽性和鲁棒性。  相似文献   

8.
基于整数小波变换和混沌映射的盲数字水印算法   总被引:1,自引:0,他引:1  
介绍一种基于整数小波变换和混沌映射的盲数字水印技术。利用广义Arnold混沌映射对水印图像进行置乱,利用整数小波变换对载体图像进行三级小波分解,然后用Logistic混沌映射随机产生各水印比特嵌入第二层高频部分HH2中整数小波系数的比特位置。水印的提取不需要原始图像。实验结果表明该算法嵌入的数字水印既有很好的隐蔽性,又能抵抗剪切和JPEG压缩的攻击.  相似文献   

9.
基于混沌和数字签名的图像数字水印   总被引:1,自引:0,他引:1  
该文提出了一种基于混沌映射和数字签名的数字水印系统。用混沌映射对原始图像进行处理 ,生成一张与原始水印大小一样的图像块 ,计算图像块的每一子块的均值 ,把图像块转换成一个二值图像 ,然后将该二值图像与原始二值水印作运算得到一个新的私有水印 ,水印的还原过程与以上过程相反。结合数字签名技术把原始图像所有者有关信息通过认证中心进行认证签名 ,从而能够保证了水印的安全性。实验结果表明 ,本方法对一般图像处理具有一定程度的鲁棒性  相似文献   

10.
彭川  莫海芳 《计算机仿真》2012,29(9):278-282
数字图像水印研究中,针对图像水印鲁棒性和隐蔽性的矛盾、数字水印本身的安全问题,结合混沌系统原理,提出一种Logistic双混沌系统的鲁棒数字图像水印方案。不同于许多传统水印算法,水印嵌入时不将原始水印嵌入,而是根据密钥生成两个混沌序列作为水印序列,然后按照规则,依次根据原始水印的每个比特值选取某个混沌水印序列的一比特信息嵌入载体图像对应的DCT中频系数中。在提取水印时,根据DCT的中频系数和混沌水印序列的相关性来确定每一位原始水印比特值,最终合并得到完整的水印图像。由于水印序列的产生过程经过了混沌加密处理,所以算法效率较好,且保证了水印本身的安全性。仿真结果表明,水印嵌入和提取算法都具有良好的效果,并且具有较强的抗攻击性能。  相似文献   

11.
为使频域水印技术更好地应用于数字图像的版权保护,提出一种基于离散余弦变换和奇异值分解相结合的图像哈希水印算法。利用DWT变换提取载体图像的低频系数矩阵构造水印;对载体图像进行分块DCT变换,提取每个子块的低频系数;对低频系数所组成的矩阵进行SVD变换,在对角阵上嵌入水印;对频域系数进行逆变换得到含水印图。将已有算法和当前所提出的算法进行对比,实验结果表明,所提水印算法具有良好的不可感知性和鲁棒性。  相似文献   

12.
Digital watermarking technology is concerned with solving the problem of copyright protection, data authentication, content identification, distribution, and duplication of the digital media due to the great developments in computers and Internet technology. Recently, protection of digital audio signals has attracted the attention of researchers. This paper proposes a new audio watermarking scheme based on discrete wavelet transform (DWT), singular value decomposition (SVD), and quantization index modulation (QIM) with a synchronization code embedded with two encrypted watermark images or logos inserted into a stereo audio signal. In this algorithm, the original audio signal is split into blocks, and each block is decomposed with a two-level DWT, and then the approximate low-frequency sub-band coefficients are decomposed by SVD transform to obtain a diagonal matrix. The prepared watermarking and synchronization code bit stream is embedded into the diagonal matrix using QIM. After that, we perform inverse singular value decomposition (ISVD) and inverse discrete wavelet transform (IDWT) to obtain the watermarked audio signal. The watermark can be blindly extracted without knowledge of the original audio signal. Experimental results show that the transparency and imperceptibility of the proposed algorithm is satisfied, and that robustness is strong against popular audio signal processing attacks. High watermarking payload is achieved through the proposed scheme.  相似文献   

13.
Su  Qingtang  Liu  Yonghui  Liu  Decheng  Yuan  Zihan  Ning  Hongye 《Multimedia Tools and Applications》2019,78(7):8113-8132

At present, the binary images are often used as the original watermark images of many watermarking methods, but partial methods cannot be easily extended to colour image watermarking methods. For resolving this problem, we propose a new watermarking method using ternary coding and QR decomposition for colour image. In the procedure of embedding watermark, the colour image watermark is coded to ternary information; the colour host image is also separated into image blocks of sized 3?×?3, and these image blocks are further decomposed via QR decomposition; then, one ternary watermark is embedded into one orthogonal matrix Q of QR decomposition by the proposed rules. In the procedure of extracting watermark, the proposed method uses the blind-manner to extract the embedded ternary information. The novelty of this scheme lies in the proposed ternary coding for watermark image, which can improve the imperceptibility, embedded watermark capacity and real-time feature of the watermarking scheme. The results of simulation show the presented technique is better than other compared schemes with respect to imperceptibility, embedded watermark capacity and real-time feature under the similar robustness.

  相似文献   

14.
To optimize the tradeoff between imperceptibility and robustness properties, this paper proposes a robust and invisible blind image watermarking scheme based on a new combination of discrete cosine transform (DCT) and singular value decomposition (SVD) in discrete wavelet transform (DWT) domain using least-square curve fitting and logistic chaotic map. Firstly cover image is decomposed into four subbands using DWT and the low frequency subband LL is partitioned into non-overlapping blocks. Then DCT is applied to each block and several particular middle frequency DCT coefficients are extracted to form a modulation matrix, which is used to embed watermark signal by modifying its largest singular values in SVD domain. Optimal embedding strength for a specific cover image is obtained from an estimation based on least-square curve fitting and provides a good compromise between transparency and robustness of watermarking scheme. The security of the watermarking scheme is ensured by logistic chaotic map. Experimental results demonstrate the better effectiveness of the proposed watermarking scheme in the perceptual quality and the ability of resisting to conventional signal processing and geometric attacks, in comparison with the related existing methods.  相似文献   

15.
目的 传统Krawtchouk变换处理图像时存在变换域信息表示单一、不可调节等问题,传统分数阶Krawtchouk变换处理实信号表示有冗余等问题。为了构造更加灵活的图像变换域表示,提出了实离散分数阶Krawtchouk变换,并应用于数字图像水印。方法 利用对传统Krawtchouk变换矩阵特征值分解的方式,通过对分解后的特征值矩阵的实矩阵分数化构造得到了实离散分数阶Krawtchouk变换的变换矩阵,从而构造出实离散分数阶Krawtchouk变换。然后,利用所提变换从实数域变换到实数域这一特性,提出了在实离散分数阶Krawtchouk变换嵌入水印信息的图像水印算法。算法采用了图像分块处理的方式,对每个图像块的实离散分数Krawtchouk变换系数进行奇异值分解,将水印信息嵌入奇异值分解矩阵中,然后进行逆向实离散分数阶Krawtchouk变换得到嵌入水印后的图像。结果 通过比较所提实离散分数阶Krawtchouk变换域水印算法和传统Krawtchouk变换域水印算法,提取水印的平均错误率在中值滤波、均值滤波、高斯滤波、JPEG压缩和缩放攻击下,分别降低了12.39%、10.04%、18.50%、71.49%和17.60%。结论 实验结果表明,提出的实离散分数阶Krawtchouk变换域水印方案对中值滤波、均值滤波、高斯滤波、JPEG压缩和缩放等多种信号处理攻击具有较好的鲁棒性。  相似文献   

16.
提出了一种基于奇异值分解的量化水印盲检算法.利用图像矩阵的奇异值稳定性好且最大奇异值远远大于其他奇异值的特点,首先时分块图像最大奇异值进行量化,再结合其奇偶性将二值水印嵌入量化后的奇异值中.实验结果表明,水印算法在满足较好的不可见性和较强的鲁棒性的同时;还可实现水印的盲提取.  相似文献   

17.
In this paper, a robust semi-blind watermarking scheme for color images, based on multiple decompositions is proposed to preserve the copyrights of the owner. Using multiple decompositions, the gray watermark is embedded into a host color image. Prior to that, to enhance security the gray watermark is encrypted with Arnold transform and SVD by generating secret keys. The luminance component of the given host image is subjected to discrete wavelet transform(DWT), contourlet transform(CT), Schur decomposition and singular value decomposition(SVD) in sequence and finally the watermark is embedded. In the semi-blind extraction process, the watermark is extracted without the help of the original host image. Experimental results show that the proposed watermarking scheme has better visual imperceptibility and high robustness against image & signal processing attacks compared to other methods.  相似文献   

18.
基于Hilbert扫描和SVD的小波域图像水印算法   总被引:1,自引:0,他引:1       下载免费PDF全文
为了提高水印的安全性、鲁棒性和不可见性,提出了一种基于Hilbert扫描和SVD(Singular Value Decomposition,奇异值分解)的小波域图像水印技术。算法以一幅有意义的二值水印图像为水印信号。首先对原始图像进行一层小波变换,对低频分量进行图像分块,并对每一个图像块进行SVD。利用了SVD的单向非对称性和正交矩阵的性质,给出了一种自适应水印方案。同时,利用了Hilbert扫描能很好地保持图像空间局部连接性的特点。然后,利用图像的局部统计特征自适应地修改阈值,利用两个阈值严格控制系数的修改程度,使算法达到不可见性和鲁棒性之间的最优平衡。水印的提取无需原始图像的参与,达到了真正的盲水印。实验结果表明,该算法是有效的,对常见的图像处理操作具有较强的鲁棒性。  相似文献   

19.
This paper presents a robust watermarking approach for hiding grayscale watermarks into digital images. Plugging the codebook concept into the singular value decomposition (SVD), the proposed method embeds the singular values (SVs) of the original image into the watermark one to attain the lossless objective. The experimental results show that the proposed scheme guarantees the extracted watermark on an average and the worst PSNR values of 24.91 and 19.96 dB, respectively. In addition to the guarantee of the quality of extracted watermark image, the security of the referenced watermark is further strengthened by applying chaos permutation on it in advance. The proposed scheme leads to satisfactory robustness to various attacks and is compared to other well-known grayscale watermarking methods to reveal its efficiency for practical applications.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号