首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 194 毫秒
1.
研究了混沌序列、提升小波在彩色图像盲水印中的应用,给出一种新的基于混沌序列和提升小波的抗剪切变换攻击的彩色图像盲水印算法。算法同时采用两种不同的混沌序列,提高了算法的安全性;根据HVS特性使中低频使用不同的算法自适应地嵌入水印,使算法有了很好的隐藏效果;使用提升小波变换提高了算法的效率;对受严重攻击后提取出的水印进行优化处理,使算法有了很好的鲁棒性。实验证明该算法具有较高的效率、较好的隐藏效果、很好的安全性和鲁棒性,尤其在抗剪切攻击方面格外显著。  相似文献   

2.
基于小波变换的数字水印技术   总被引:2,自引:2,他引:0  
郭倩  陈广学  陈奇峰 《包装工程》2015,36(19):115-119,129
目的研究一种基于二维码的信息化包装防伪技术。方法按照QR编码规则,将文字信息编码生成含彩色底纹的QR码载体图像和QR码水印图像;对彩色二维码进行空间转换提取其亮度分量,对水印QR码图像进行混沌置乱,把置乱后的水印图像利用离散小波变换嵌入到载体图像亮度分量经二级小波变换后的中频系数中,形成嵌入水印后的彩色QR码图像;客户终端运用提取算法从彩色载体QR码图像中提取QR水印。结果实验证明该算法具有较高的水印信息嵌入强度容忍度,并且可以抵抗旋转和剪切等几何攻击,对高斯噪声、椒盐噪声、低通滤波、均值滤波具有较强的鲁棒性。结论将二维码和数字水印结合的防伪技术应用于包装安全领域,有利于识别伪劣假冒商品,达到产品安全保护的目的。  相似文献   

3.
强鲁棒性QR码水印技术   总被引:11,自引:11,他引:0  
提出了一种增强数字水印系统鲁棒性的数字水印技术。算法将标识信息编码为快速响应矩阵码(QR码),将其作为数字水印,利用离散小波变换方法将QR码嵌入到了载体图像二级小波分解后的中频系数中,在保证水印不可见性的前提下能增强水印的鲁棒性。设计了对比实验,实验结果表明,将QR码作为数字水印,能增强水印安全性和鲁棒性,且该方法适用于任何水印算法。  相似文献   

4.
季诺然  吕晓琪  谷宇  赵瑛  刘坤 《包装工程》2017,38(15):173-178
目的针对现行数字水印算法中抗几何攻击能力弱以及嵌入水印信息容量差的问题,提出一种Contourlet变换下QR码与混沌加密相结合的彩色图像水印算法。方法采用QR码作为水印图像,利用Logistic混沌序列对其进行加密,再将加密的水印图像嵌入到二级Contourlet变换的低通子带中,利用系数间的大小关系,修改系数完成水印嵌入与提取。结果通过实验结果可知,水印的嵌入对载体图像影响较小,PSNR值高达42.764,经过旋转、剪切及常规攻击后,提取出的水印均可正确解码。结论该算法具有良好的安全性、不可见性,对于各类攻击具有较优的鲁棒性。水印信息容量高于普通图像,水印提取方式为盲提取,能够更好地满足各类数字作品版权保护的实际需要。  相似文献   

5.
改进的基于 QR 码的数字全息水印   总被引:9,自引:9,他引:0  
王子煜  孙刘杰 《包装工程》2014,35(7):144-148
目的提出改进的基于快速响应矩阵码(QR码)的数字全息水印。方法利用加密傅里叶全息技术对QR码进行加密并生成全息图,在标准颜色空间下,抽取彩色载体图像的L分量进行二级小波分解,将全息图嵌入到其分解后的低频系数中,以实现水印信息的隐藏。为提高QR码译码成功率,对提取后的水印进行十字型中值滤波处理。结论 QR码水印能够保存完整的水印信息,比普通图像水印鲁棒性强,且相比于其他基于QR码的数字全息水印算法具有更强的鲁棒性。  相似文献   

6.
数字水印技术是知识产权保护和数字多媒体防伪的有效手段。分析比较数字图像水印算法中常见的混沌系统,选取三维Lorenz混沌系统产生的混沌序列对数字水印信息进行加密处理,增强水印信号的鲁棒性。水印图像的嵌入选用三级小波分解的系数,均衡不可见性和鲁棒性。水印图像的提取需要原始载体图像。  相似文献   

7.
目的提出一种基于QR码的自适应抗打印扫描盲水印算法。方法首先对载体QR码进行三级小波变换,并对低频部分进行4×4分块Schur分解,然后利用子块酉矩阵的系数差值的稳定性,将二值水印信息自适应嵌入到载体QR码中,最后对含水印QR码打印扫描并提取出水印信息。同时,算法实现了盲提取。结果算法能较好抵抗打印扫描攻击,并对高斯噪声、椒盐噪声、斑纹噪声、泊松噪声、JPEG压缩等攻击具有较强的鲁棒性。结论算法具有较强的抗打印扫描性能,可以广泛应用于数字产品的版权保护。  相似文献   

8.
针对工程图的版权保护和现有相关算法鲁棒性不强的特点,提出了一种基于字符点阵式编码的工程图信息隐藏算法。该算法首先对隐藏信息进行点阵式编码处理,然后根据使用Logistic混沌系统产生的二值化混沌序列选择其中部分线段实体,结合HVS和隐藏信息对工程图的线宽进行微小修改,从而实现信息隐藏。实验结果显示该算法对工程图的平移、旋转、缩放和编辑等攻击具有较好的鲁棒性。  相似文献   

9.
基于HVS与实体调色板的二维工程图信息隐藏算法   总被引:1,自引:1,他引:0  
基于HVS与实体调色板的特性,提出一种二维工程图的信息隐藏算法.该算法先获得工程图中的有序实体集,然后根据所产生的二值化混沌序列,选择其中部分实体,结合I-IVS和隐秘信息依次对选中实体的颜色进行微小修改,从而实现信息的隐藏.仿真结果表明,该信息隐藏算法对旋转、平移与均匀缩放等攻击具有较好的鲁棒性.  相似文献   

10.
一种新的安全鲁棒全息数字水印技术   总被引:7,自引:5,他引:2  
孙刘杰  王子煜 《包装工程》2013,34(1):106-109,118
提出了一种将快速响应矩阵码(QR码)作为水印的加密同轴全息数字水印技术。该算法将QR码作为水印,提高了水印的鲁棒性;利用双随机相位调制技术对水印加密,增强了水印的安全性;通过离散小波变换将全息水印图像嵌入彩色载体图像的中频系数中,兼顾了水印的不可见性和鲁棒性。提取水印时,进行高斯滤波处理,增加了QR码译码成功率。实验表明,该算法有良好的不可见性和鲁棒性。  相似文献   

11.
This work presents a low-complexity audio coder-decoder (CODEC) based on fixed-point arithmetic to save the usage of system resources in a low-end embedded system. To reduce time complexity and memory usage, a simplified discrete wavelet transform (DWT) with only integer operations is developed. The simplified DWT reduces the computation that is required for the trigonometric operations in the fixed-point system. Moreover, separating the even and odd orders of wavelet coefficients halves the computation time of the original DWT. Additionally, a tri-mode zeroes recording algorithm (TZRA) is proposed. The proposed TZRA utilizes different encoding modes with their corresponding bit data structures to record the locations of zero wavelet coefficients, and determines the optimal encoding mode that uses the fewest bits. To further improve the compression performance, a dynamic wavelet level selecting algorithm is developed to decide the wavelet level for compressing each of frame. This algorithm can dynamically select the optimal wavelet level with the fewest bits by using the determined mode from the TZRA. The experimental results herein reveal that the encoder in the proposed CODEC can multiply computation by factors of 164 and 112 and reduce the size of the execution file by approximately 95.61 and 98.42% relative to baseline audio compression CODECs. Such results indicate that the efficiency when used in real consumer products with fixed-point arithmetic.  相似文献   

12.
文猛  张释如 《包装工程》2022,43(21):162-168
目的 为了解决目前三维数据隐藏算法不能兼顾无失真和盲提取的问题,提出一种新的完全无失真的三维网格模型数据隐藏盲算法。方法 首先使用混沌逻辑映射选择嵌入与提取模式,保证数据的安全性。然后利用面元素重排,完全不会造成三维模型失真的性质,通过不同嵌入模式规则对三角面元素进行重排,以嵌入秘密数据。接收端则可根据相应的提取模式规则提取秘密数据。结果 仿真结果与分析表明,该算法不会对三维模型造成任何失真,嵌入容量为每顶点2比特,且能抵抗仿射变换攻击、噪声攻击和平滑攻击等。结论 这种三维数据隐藏盲算法无失真,容量大、安全性高、鲁棒性强,适用于三维载体不容修改的情形,如军事、医学、秘密通信和版权保护等。  相似文献   

13.
《中国工程学刊》2012,35(5):523-528
Information hiding and secret communication is one of the most interesting and fascinating domains. This hiding method exploits some features of audio signals to be able to hide data from perception robustly. Every year researchers introduce their work and discuss how to make these techniques more and more robust against different types of attacks. In this article, we present an improved audio steganography approach that reduces distortion of the stego audio. Using the proposed algorithm, secret information is strongly protected from hackers and sent to its destination in a safe manner.  相似文献   

14.
郭静博 《包装工程》2018,39(13):222-232
目的为了解决当前混沌图像加密技术忽略了随机序列产生的时间延迟现象,且难以克服其自身迭代的周期性,使其序列的自相关性不理想,导致密文安全性不佳等问题。方法引入级联耦合混沌半导体环形激光器,设计基于物理随机位生成器与混沌像素交叉互换的图像加密算法。首先引入SHA-256散列函数,利用明文像素值,生成一个256位的密钥,并将其分割为一系列的8位子密钥;利用这些子密钥来计算Logistic-Sine复合映射的初始条件,以输出一组随机序列;根据混沌序列,定义像素交叉互换机制,对输入明文进行预处理,消除相邻像素之间的相关性;基于级联耦合混沌半导体环形激光器,充分利用其自身的时间延迟与交叉反馈的特性,设计物理随机位生成器,以同步输出考虑时间延迟的控制矩阵与随机位流;将Logistic-Sine复合映射输出的混沌序列转换为一个过渡矩阵,联合控制矩阵,定义像素混淆机制,彻底改变明文的像素位置;最后,利用随机位流,设计像素联系扩散函数,改变图像的像素值。结果实验结果显示,与当前混沌加密技术相比,所提算法具有更高的安全性与鲁棒性,能够有效抗击明文攻击,相应的密文熵值约为7.9958,且NPCR(7)Number of Pixel Change Rate(8)、UACI(Unified Average Changing Intensity)分别为99.50%、33.46%。结论所提加密算法具有较高的安全性和抗攻击能力,能够安全保护图像在网络中传输,在信息防伪等领域具有较好的应用价值。  相似文献   

15.
The traditional information hiding methods embed the secret information by modifying the carrier, which will inevitably leave traces of modification on the carrier. In this way, it is hard to resist the detection of steganalysis algorithm. To address this problem, the concept of coverless information hiding was proposed. Coverless information hiding can effectively resist steganalysis algorithm, since it uses unmodified natural stego-carriers to represent and convey confidential information. However, the state-of-the-arts method has a low hidden capacity, which makes it less appealing. Because the pixel values of different regions of the molecular structure images of material (MSIM) are usually different, this paper proposes a novel coverless information hiding method based on MSIM, which utilizes the average value of sub-image’s pixels to represent the secret information, according to the mapping between pixel value intervals and secret information. In addition, we employ a pseudo-random label sequence that is used to determine the position of sub-images to improve the security of the method. And the histogram of the Bag of words model (BOW) is used to determine the number of sub-images in the image that convey secret information. Moreover, to improve the retrieval efficiency, we built a multi-level inverted index structure. Furthermore, the proposed method can also be used for other natural images. Compared with the state-of-the-arts, experimental results and analysis manifest that our method has better performance in anti-steganalysis, security and capacity.  相似文献   

16.
变换域加密全息水印算法   总被引:9,自引:9,他引:0  
李孟涛  孙刘杰  刘真 《包装工程》2011,32(15):22-24
提出了一种基于DCT-DWT的彩色图像全息水印算法。为了保证水印信息的安全性,该算法首先对水印信息进行双随机相位调制,并生成水印全息图;其次,将载体图像在Lab空间内的L分量进行4×4分块,对每一分块进行DCT变换,抽取每个矩阵的中低频系数,组成一个新的矩阵,并对之进行小波分解,将水印全息图嵌入到它的中低频小波系数上。实验结果表明,基于DCT-DWT变换的水印算法具有较好的不可见性,对常见的攻击具有强鲁棒性。  相似文献   

17.
This research presents, and clarifies the application of two permutation algorithms, based on chaotic map systems, and applied to a file of speech signals. They are the Arnold cat map-based permutation algorithm, and the Baker’s chaotic map-based permutation algorithm. Both algorithms are implemented on the same speech signal sample. Then, both the premier and the encrypted file histograms are documented and plotted. The speech signal amplitude values with time signals of the original file are recorded and plotted against the encrypted and decrypted files. Furthermore, the original file is plotted against the encrypted file, using the spectrogram frequencies of speech signals with the signal duration. These permutation algorithms are used to shuffle the positions of the speech files signals’ values without any changes, to produce an encrypted speech file. A comparative analysis is introduced by using some of sundry statistical and experimental analyses for the procedures of encryption and decryption, e.g., the time of both procedures, the encrypted audio signals histogram, the correlation coefficient between specimens in the premier and encrypted signals, a test of the Spectral Distortion (SD), and the Log-Likelihood Ratio (LLR) measures. The outcomes of the different experimental and comparative studies demonstrate that the two permutation algorithms (Baker and Arnold) are sufficient for providing an efficient and reliable voice signal encryption solution. However, the Arnold’s algorithm gives better results in most cases as compared to the results of Baker’s algorithm.  相似文献   

18.
Anisoplanatic electromagnetic (EM) propagation across a turbulent atmosphere has been recently examined for an unmodulated carrier propagating over an image-bearing transparency through optical lensing, and for the embedded information inside a carrier recovered using heterodyning and digital demodulation. Carrier modulation yielded better recovery than simple lens-based imaging. A possible mitigation strategy is proposed whereby the image information is encrypted on an RF chaotic carrier, thereafter secondarily embedded onto an optical carrier. Results based on the modified von Karman (MVKS) and the Hufnagel-Valley (H-V) models showed that the signal/image recovery under turbulence is improved compared with non-chaotic propagation. The case of time-varying/dynamic images is also taken up; it is demonstrated via cross-correlation products that turbulence is mitigated by the use of chaotic carrier encryption. Overall, transmission via chaos offers mitigation against distortions due to turbulence along with the security feature inherent via the chaos keys which prevent signal recovery without key-matching.  相似文献   

19.
目的为了提高信息隐藏通信技术的安全性,提出一种自毁式数字水印隐藏通信技术,即使非法者截获信息的载体也无法获得信息内容。方法将生成的含水印信息的图像分切成图像碎片以此破坏内嵌的水印信息,使水印信息无法从单个的图像碎片中提取,必须经过图像碎片拼接算法合成原始含水印图像后才能提取水印信息。结果通过实验仿真分析,对于大小为32×32像素的8×8个图像碎片,复原的含水印图像无任何图像碎片拼接错位,拼接平均耗时为1.59 s,因此能实现实时在线拼接复原并顺利提取出水印信息。结论从信息的嵌入到最后信息的提取都能顺利地隐藏信息的内容和信息的存在,信息传递过程中信息的安全性能好,因此,自毁式数字水印信息隐藏通信技术是一种可行性极高的信息隐藏通信技术。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号