首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 765 毫秒
1.
非对称数字水印技术研究   总被引:12,自引:1,他引:12  
在数字产品中嵌入数字水印,是对其进行版权保护的一种有力的手段。近年来提出了不少数字水印方案,但是它们中大部分都是对称的,即用于水印嵌入和水印检测的密钥是相同的。而许多实际的应用都要求非对称的数字水印方案,即水印嵌入时使用私人密钥,水印检测时只需要一个公开密钥。文章分析了非对称水印的基本特征,并对一些非对称方案,包括非对称水印算法和非对称水印协议进行了讨论。  相似文献   

2.
在分析H artung提出的基于扩频的非对称水印方案的基础上,提出了一种新颖的公钥生成策略。此策略对嵌入水印时所需要的密钥进行随机双位循环变换生成水印检测时的公钥,生成的公钥和嵌入密钥有较好的相关性,并且攻击者利用生成的公钥无法估算出私钥,从而利用此策略改进的扩频非对称水印方案,提高了水印的检测效果,较好地保证了水印的安全性。  相似文献   

3.
由于安全问题,对称数字水印方案不能够实现公开检测,近年来不少国内外学者开始研究非对称数字水印技术。本文介绍了非对称水印的基本特征以及对非对称水印的攻击,并对新近提出的非对称数字水印算法进行了详细讨论。  相似文献   

4.
何世彪  田东  张雪 《计算机工程》2012,38(17):81-83
为充分利用混沌序列的高保密性和抗截获性,设计一种基于相位偏移量同步的混沌扩频通信方案。系统的发送端采用数据帧格式,定时地将混沌扩频序列的相位偏移信息通过差分混沌相移键控的方式发送到接收端,接收端通过比较本地序列与接收序列的相位差,加速或延缓本地混沌迭代,从而实现非周期扩频序列的同步与解调。仿真实验结果表明,该方案可实现混沌扩频信号在任意时刻的接收与解调,具有较好的抗噪声性能。  相似文献   

5.
基于DFT和水印分割的遥感影像数字水印方案   总被引:1,自引:0,他引:1  
提出一种基于DFT和水印分割的遥感影像数字水印方案.算法首先对宿主遥感影像进行归一化处理,以确定不变质心,并根据不变质心选取方形区域作为水印嵌入区域;然后,产生一个伪随机序列作为数字水印信息,并将其分成两部分;最后对宿主遥感影像中所选区域进行DFT变换,并将水印分别嵌入DFT变换的幅值和相位成分中.实验证明本文算法对J...  相似文献   

6.
对数字音频水印技术的产生背景、发展现状及其应用做了一个综述,讨论了数字音频水印技术系统的特点和要求,比较了常用的数字音频水印技术,并着重讨论了非对称水印技术的实现方案,最后较系统的分析了数字音频水印的典型应用.  相似文献   

7.
对数字音频水印技术的产生背景、发展现状及其应用做了一个综述,讨论了数字音频水印技术系统的特点和要求,比较了常用的数字音频水印技术,并着重讨论了非对称水印技术的实现方案,最后较系统的分析了数字音频水印的典型应用。  相似文献   

8.
非对称水印   总被引:1,自引:0,他引:1  
由于密码学和数字水印技术在产权保护等方面有着相互补充的功能和一些类似之处,人们开始将加密技术中的“密钥”引入水印技术中,从而出现了公开密钥水印和非公开密钥水印。只是当将公开密钥的“思想”引入水印后,才对水印的基本方式和理解进行了改变,这就是“非对称水印”。论文从非对称水印产生的必然性等方面对非对称水印进行比较深入的探讨,指出它与传统水印技术的不同之处及优点,同时指出当前它的发展现状及不足。  相似文献   

9.
彭川  莫海芳 《计算机仿真》2012,29(9):278-282
数字图像水印研究中,针对图像水印鲁棒性和隐蔽性的矛盾、数字水印本身的安全问题,结合混沌系统原理,提出一种Logistic双混沌系统的鲁棒数字图像水印方案。不同于许多传统水印算法,水印嵌入时不将原始水印嵌入,而是根据密钥生成两个混沌序列作为水印序列,然后按照规则,依次根据原始水印的每个比特值选取某个混沌水印序列的一比特信息嵌入载体图像对应的DCT中频系数中。在提取水印时,根据DCT的中频系数和混沌水印序列的相关性来确定每一位原始水印比特值,最终合并得到完整的水印图像。由于水印序列的产生过程经过了混沌加密处理,所以算法效率较好,且保证了水印本身的安全性。仿真结果表明,水印嵌入和提取算法都具有良好的效果,并且具有较强的抗攻击性能。  相似文献   

10.
提出一种无失真扩频鲁棒水印方案,该方案通过量化函数对受版权保护的图像的小波域进行量化,产生的二值序列直接作为水印,即特征水印。由于该方案是基于图像内容的,并没有向图像中嵌入任何信息,不需要真正执行IDWT,水印图像没有任何失真,因而扩频水印方案是无失真水印嵌入方案。水印的鲁棒性主要由量化参数决定,而不是像传统的水印方案那样一般由嵌入的水印信息量所决定。  相似文献   

11.
基于中国剩余定理的动态水印方案   总被引:2,自引:1,他引:2       下载免费PDF全文
白雪梅  凌捷 《计算机工程》2006,32(16):155-157
针对动态图水印性能指标之间的制约关系,提出了从分解水印图变为分解水印数据以提高隐藏信息量的设计思想,分析了称为抽象水印的方案,并结合动态图水印的明显优势,给出了一种基于中国剩余定理的动态水印方案。通过分析提高了动态水印性能的策略,指出软件水印技术的进一步发展方向。  相似文献   

12.
基于DWT域的混沌置乱二值图像数字水印新算法   总被引:12,自引:0,他引:12  
提出了一种基于DWT(Discrete Wavelet Transform)域有意义二值图像数字水印新算法.利用广义猫映射产生的混沌序列对水印序列的嵌入位置进行置乱,增加了嵌入水印的安全性;并利用改正的二值运算方法将水印嵌入到图像深层小波域的低频子图中.水印的检测不需要原始图像.大量仿真结果证明了该算法嵌入的数字水印既具有很好的隐蔽性,又具有很理想的鲁棒性.  相似文献   

13.
提出了多重离散Chirp-Fourier变换(M-DCFT)域水印方案。把多个Chirp类水印信息分别嵌入在不同重数的DCFT域,利用DCFT域Chirp信号的聚集性进行盲检测。以PSNR作为水印容量衡量指标,推导了多重DCFT域的水印容量公式。仿真结果表明,在相同的PSNR限制下,变换域水印容量随变换重数的增大而增加,且远大于空域水印容量。提出的水印方案可以选择把水印嵌入在不同重数的DCFT域,不仅嵌入方式灵活,而且具有更高的水印安全性。  相似文献   

14.
The tamper-proof of web pages is of great importance. Some watermarking schemes have been reported to solve this problem. However, both these watermarking schemes and the traditional hash methods have a problem of increasing file size. In this paper, we propose a novel watermarking scheme for the tamper-proof of web pages, which is free of this embarrassment. For a web page, the proposed scheme generates watermarks based on the principal component analysis (PCA) technique. The watermarks are then embedded into the web page through the upper and lower cases of letters in HTML tags. When a watermarked web page is tampered, the extracted watermarks can detect the modifications to the web page, thus we can keep the tampered one from being published. Extensive experiments are performed on the proposed scheme and the results show that the proposed scheme can be a feasible and efficient tool for the tamper-proof of web pages.  相似文献   

15.
基于矩阵置乱的自适应视频水印算法   总被引:3,自引:0,他引:3       下载免费PDF全文
视频数字水印技术是当前水印研究中的一个热点。为了更好的保证视频水印的鲁棒性,提出了一种基于MPEG-2运动分量的自适应数字水印算法。该算法首先利用矩阵置乱来确定水印片段的目标图像组,然后结合人眼视觉系统选择水印比特嵌入的运动分量。实验结果表明,该算法不仅对于针对视频水印的特殊攻击具有高鲁棒性,且水印嵌入前后图像的峰值信噪比仅有微弱差异。  相似文献   

16.
Multimedia Tools and Applications - A reversible image watermarking scheme recovers the original cover image after extracting the embedded watermarks. A visible image watermarking scheme embeds...  相似文献   

17.
For 2D vector maps, obtaining good tamper localization performance and original content recovery with existing reversible fragile watermarking schemes is a technically challenging problem. Using an improved reversible watermarking method and a fragile watermarking algorithm based on vertex insertion, we propose a reversible fragile watermarking scheme that detects and locates tampered blocks with high accuracy while ensuring recovery of the original content. In particular, we propose dividing the features of the vector map into different blocks, calculating the block authentication watermarks and embedding the watermarks with different watermarking schemes. While the block division ensures superior accuracy of tamper localization, the reversible watermarking method and the fragile watermarking algorithm based on vertex insertion provide recovery of the original content. Experimental results show that the proposed scheme could detect and locate malicious attacks such as vertex/feature modification, vertex/feature addition, and vertex/feature deletion.  相似文献   

18.
Attacking visible watermarking schemes   总被引:1,自引:0,他引:1  
Visible watermarking schemes are important intellectual property rights (IPR) protection mechanisms for digital images and videos that have to be released for certain purposes but illegal reproductions of them are prohibited. Visible watermarking techniques protect digital contents in a more active manner, which is quite different from the invisible watermarking techniques. Digital data embedded with visible watermarks will contain recognizable but unobtrusive copyright patterns, and the details of the host data should still exist. The embedded pattern of a useful visible watermarking scheme should be difficult or even impossible to be removed unless intensive and expensive human labors are involved. In this paper, we propose an attacking scheme against current visible image watermarking techniques. After manually selecting the watermarked areas, only few human interventions are required. For watermarks purely composed of thin patterns, basic image recovery techniques can completely remove the embedded patterns. For more general watermarks consisting of thick patterns, not only information in surrounding unmarked areas but also information within watermarked areas will be utilized to correctly recover the host image. Although the proposed scheme does not guarantee that the recovered images will be exactly identical to the unmarked originals, the structure of the embedded pattern will be seriously destroyed and a perceptually satisfying recovered image can be obtained. In other words, a general attacking scheme based on the contradictive requirements of current visible watermarking techniques is worked out. Thus, the robustness of current visible watermarking schemes for digital images is doubtful and needs to be improved.  相似文献   

19.
Shi  Hui  Wang  Xianghai  Li  Mingchu  Bai  Jun  Feng  Bin 《Multimedia Tools and Applications》2017,76(5):6941-6972

Since existing watermarking schemes usually cannot recover the tampered position, a secure variable-capacity self-recovery watermarking scheme is proposed. Both watermark embedding capacity and security are taken into account. The original image is divided into texture blocks and smooth blocks, and the texture blocks not only save traditional information, and save the “details” information. The so-called “details” information refers to the texture information, which not only can effectively resist mean attack, but also help to improve the quality of the recovered image to meet the needs of practical work. And then according to the characteristics of different blocks, the different length compound watermarks are produced. The so-called “compound watermarks” include the authentication watermarks and information watermarks. Authentication watermarks are used to detect the tampered region, and the information watermarks which include basic watermark and additional watermark are used to recover image. Then the compound watermarks are inserted into the other blocks based on the new proposed scheme called three level secret-key embedding scheme (TLSES). And then detect the tamper blocks and recover them by the three level tamper detection scheme (TLTDS). The experimental results show that the paper can not only accurately detect the tamper region and recover image, but also can effectively resist mean attack and collage attack.

  相似文献   

20.
A novel image recovery algorithm for removing visible watermarks is presented. Independent component analysis (ICA) is utilized to separate source images from watermarked and reference images. Three independent component analysis approaches are examined in the proposed algorithm, which includes joint approximate diagonalization of eigenmatrices, second-order blind identification, and FastICA. Moreover, five different visible watermarking methods to embed uniform and linear-gradient watermarks are implemented. The experimental results show that visible watermarks are successfully removed, and that the proposed algorithm is independent of both the adopted ICA approach and the visible watermarking method. In the final experiment, several public domain images sourced from various websites are tested. The results of this study demonstrate that the proposed algorithm can blindly and successfully remove the visible watermarks without knowing the watermarking methods in advance  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号