首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到18条相似文献,搜索用时 93 毫秒
1.
提出了一种新颖的盲检测水印算法.该方法是一种利用图像块的DCT系数的算术均值来隐藏水印信息的盲检测水印算法,该算法在提取水印时不需要原始公开宿主图像,并且对常见水印攻击方法JPEG攻击具有良好的稳健性.  相似文献   

2.
基于DCT域的数字盲水印技术   总被引:2,自引:2,他引:0  
范腾飞  黄颖为  闫雪艳  冯汉禄 《包装工程》2010,31(5):103-105,131
提出一种鲁棒性较好的DCT域数字盲水印方案。该方案将汉明编码应用于二值水印图像,同时,采用混沌调制序列伪随机选取嵌入区域,提高水印算法的安全性。通过分析DCT中频特定系数关系,实现水印的盲提取。实验结果表明,该算法对于常见的图像攻击具有较好的鲁棒性,是一种有效的盲水印。  相似文献   

3.
基于图像校正的抗几何变换全息水印算法   总被引:1,自引:1,他引:0  
白韬韬  刘真  卢鹏 《包装工程》2014,35(19):103-108
目的提出了一种基于图像校正的抗几何变换全息水印算法。方法在水印嵌入时,将原始二值水印图像,利用共轭对称延拓傅里叶计算全息方法生成全息水印,并嵌入在原始图像小波变换的对角线高频系数中,逆变换得到含水印图像。在含水印图像的DFT域中嵌入模版信息,在水印提取时,首先利用模版信息对图像进行校正,然后提取水印信息。结果该算法保留了全息水印的优良特性,结合了模版匹配校正技术,可以有效抵抗滤波、噪声、裁切、JPEG压缩、旋转、等比例缩放及其组合攻击。结论该算法在实际应用中能有效抵抗几何攻击,可以应用于数字图像的版权保护中。  相似文献   

4.
基于奇异值分解和混沌映射的脆弱认证水印   总被引:3,自引:1,他引:2  
提出一种基于奇异值分解和混沌映射的图像脆弱认证水印算法,将混沌映射的初值敏感性应用到图像的篡改检测中.对图像子块进行奇异值分解,同时利用Logistic混沌映射产生认证水印;然后利用Logistic混沌映射设计了一个子块与子块之间的映射函数,将认证水印序列嵌入在相应映射块的LSB上.实验结果表明,算法不仅对篡改非常敏感,而且能够有效地抵抗拼贴攻击和区分篡改图像内容与篡改水印.  相似文献   

5.
基于DCT图像水印系统的研究   总被引:1,自引:1,他引:0  
针对计算机网络不断发展中多媒体版权难以保护问题,研究了基于DCT域图像水印算法,分析了该算法的特点,提出了基于DCT域的图像数字水印方案。该方案将水印嵌入到DCT域感觉容量最重要的系数DC分量上。实验结果验证了该算法的有效性、可靠性、抗攻击性、鲁棒性和不可见性,能够为媒体信息在防伪、防篡改、认证、保障数据安全和完整性等方面提供有效的技术保障。  相似文献   

6.
基于掩蔽效应和抖动调制的盲水印方案   总被引:2,自引:2,他引:0  
顾振宇  袁野  张国锋 《包装工程》2013,34(15):114-119
通过对信号处理领域抖动调制原理的分析,并结合人类视觉系统的掩蔽效应,提出了一个DCT 域盲水印模型。在MATLAB 仿真环境中,针对二值图像水印,实现了水印的预处理、嵌入、提取以及F 范数下水印检测。在水印嵌入过程中,通过自动调节量化步长改善了水印的透明性,水印检测时无需原始宿主图像,实现了盲检测,而且省略了反余弦变换过程,降低了算法复杂度。仿真实验表明,水印算法在JPEG 高强度压缩、剪切、各种噪声叠加以及多重水印等攻击下具有高鲁棒性。算法思想可应用于数字版权保护以及隐秘通讯等领域。  相似文献   

7.
基于离散余弦变换(DCT)技术和扩频通信技术提出三维模型稳健水印嵌入算法. 算法将原始的一维二值水印序列利用扩频通信技术生成可以直接嵌入的水印信息;利用主成分分析(PCA)方法,将原始模型变换到仿射(旋转、 平移和均匀缩放)不变空间中,选取模型顶点到其中心距离作为水印嵌入单元,基于双极性量化嵌入单元离散余弦变换系数的方法嵌入水印并实现水印的盲提取. 该算法嵌入的水印信息具有不可见性,能够抵抗模型的旋转、平移、均匀缩放等常见攻击. 仿真实验验证了算法的有效性.  相似文献   

8.
基于混沌和置乱双重加密的数字图像水印算法   总被引:1,自引:1,他引:0  
提出一种基于离散平稳小波变换的变换域的数字图像水印嵌入和提取算法.本算法先将数字水印图像进行置乱变换(Arnold变换),然后将置乱后的水印图像进行混沌加密,将加密后的水印按行展开成一维行向量,并将像素值从大到小排序,将原始图像平稳小波分解得到的低频系数也按行展开成一维行向量 ,并按从大到小排序.将排序后的水印图像嵌入排序后的低频系数中,变回二维后结合其它频域重构出水印图像 ,水印提取是嵌入过程的逆过程,将提取出的水印图像进行混沌解密、Arnold反置乱变换得到原始水印图像.本算法选择了合适的水印嵌入位置,实验结果表明:该算法使图像的不可见性好,而且所嵌入的水印对一般的图像处理攻击如噪声、滤波、旋转、压缩等有较强的鲁棒性.  相似文献   

9.
选取基于DCT域的鲁棒水印算法、数字图像处理工作者常用的Lena图和天津科技大学校徽图像作为嵌入的二值水印图,利用MATLAB软件进行水印图像的嵌入、提取实验和鲁棒性检测实验。结果证明该算法能够实现数字水印的提取和检测,并具有较强抵抗常见攻击的能力,鲁棒性较好,能够实现初步的数字图像的防伪和版权保护。  相似文献   

10.
基于视觉内容分析和遗传算法优化的鲁棒图像水印算法   总被引:1,自引:1,他引:0  
左悦 《包装工程》2019,40(1):209-217
目的为了兼顾水印图像的不可感知性与鲁棒性,利用DCT(Discrete Cosine Transform)变换域,设计载体视觉内容分析耦合遗传算法优化的鲁棒图像水印技术。方法首先,将载体图像分割为一系列的非重叠子块,并引入奇异值分解机制,定义视觉内容分析方法,获取每个子块的活性因子,活性因子值较大的子块为水印嵌入位置;利用DCT机制处理活性因子值较大的子块得到相应的直流系数;联合结构相似度SSIM、峰值信噪比PSNR以及归一化相关系数NC,并基于权重因子设计适应度函数,通过执行遗传算法寻找最优的嵌入强度;根据优化的嵌入强度构建水印嵌入方法,将二值水印隐藏到这些直流系数中,通过逆DCT变换输出水印图像;设计水印检测方法,从水印图像中提取二值水印。结果实验数据显示,与当前基于变换域的水印技术相比,所提算法具有更高的视觉不可感知性与抗几何攻击能力,面对多种几何攻击,所提算法的PSNR与NC值分别保持在45 dB,0.96以上。结论所提算法能够较好地将水印信息隐藏在载体中,具有较高的视觉不可感知性与抗几何攻击能力,在版权保护、信息防伪等领域具有较好的参考价值。  相似文献   

11.
Meng XF  Cai LZ  Yang XL  Xu XF  Dong GY  Shen XX  Zhang H  Wang YR 《Applied optics》2007,46(21):4694-4701
A novel single-channel color-image watermarking with digital-optics means based on phase-shifting interferometry (PSI) and a neighboring pixel value subtraction algorithm in the discrete-cosine-transform (DCT) domain is proposed. The converted two-dimensional indexed image matrix from an original color image is encrypted to four interferograms by a PSI and double random-phase encoding technique. Then the interferograms are embedded in one chosen channel of an enlarged color host image in the DCT domain. The hidden color image can be retrieved by DCT, the improved neighboring pixel value subtraction algorithm, an inverse encryption process, and color image format conversion. The feasibility of this method and its robustness against some types of distortion and attacks from the superposed image with different weighting factors are verified and analyzed by computer simulations. This approach can avoid the cross-talk noise due to direct information superposition, enhance the imperceptibility of hidden data, and improve the efficiency of data transmission.  相似文献   

12.
An optical image watermarking algorithm, based on singular value decomposition (SVD) ghost imaging and multiple transforms, is designed. The watermark image is first encrypted by applying an SVD ghost imaging system, then the encrypted watermark is embedded into the cover image with the help of multiple transforms, including lifting wavelet transform (LWT), discrete cosine transform (DCT), discrete fractional angular transform (DFAT) and SVD. Four sub-band images are produced from the host image by LWT and DCT. The improved DFAT, whose scaling factors and parameter are optimized by particle swarm optimization algorithm, is operated in the new matrix. Afterwards, SVD is executed in the two-part image and the encrypted watermark is embedded in the host image by mutual operation of different matrices. Simulation results validate that the proposed watermark scheme is superior in the aspects of security, robustness and imperceptibility.  相似文献   

13.
季诺然  吕晓琪  谷宇  赵瑛  刘坤 《包装工程》2017,38(15):173-178
目的针对现行数字水印算法中抗几何攻击能力弱以及嵌入水印信息容量差的问题,提出一种Contourlet变换下QR码与混沌加密相结合的彩色图像水印算法。方法采用QR码作为水印图像,利用Logistic混沌序列对其进行加密,再将加密的水印图像嵌入到二级Contourlet变换的低通子带中,利用系数间的大小关系,修改系数完成水印嵌入与提取。结果通过实验结果可知,水印的嵌入对载体图像影响较小,PSNR值高达42.764,经过旋转、剪切及常规攻击后,提取出的水印均可正确解码。结论该算法具有良好的安全性、不可见性,对于各类攻击具有较优的鲁棒性。水印信息容量高于普通图像,水印提取方式为盲提取,能够更好地满足各类数字作品版权保护的实际需要。  相似文献   

14.
In order to solve the problem of patient information security protection in medical images, whilst also taking into consideration the unchangeable particularity of medical images to the lesion area and the need for medical images themselves to be protected, a novel robust watermarking algorithm for encrypted medical images based on dual-tree complex wavelet transform and discrete cosine transform (DTCWT-DCT) and chaotic map is proposed in this paper. First, DTCWT-DCT transformation was performed on medical images, and dot product was per-formed in relation to the transformation matrix and logistic map. Inverse transformation was undertaken to obtain encrypted medical images. Then, in the low-frequency part of the DTCWT-DCT transformation coefficient of the encrypted medical image, a set of 32 bits visual feature vectors that can effectively resist geometric attacks are found to be the feature vector of the encrypted medical image by using perceptual hashing. After that, different logistic initial values and growth parameters were set to encrypt the watermark, and zero-watermark technology was used to embed and extract the encrypted medical images by combining cryptography and third-party concepts. The proposed watermarking algorithm does not change the region of interest of medical images thus it does not affect the judgment of doctors. Additionally, the security of the algorithm is enhanced by using chaotic mapping, which is sensitive to the initial value in order to encrypt the medical image and the watermark. The simulation results show that the pro-posed algorithm has good homomorphism, which can not only protect the original medical image and the watermark information, but can also embed and extract the watermark directly in the encrypted image, eliminating the potential risk of decrypting the embedded watermark and extracting watermark. Compared with the recent related research, the proposed algorithm solves the contradiction between robustness and invisibility of the watermarking algorithm for encrypted medical images, and it has good results against both conventional attacks and geometric attacks. Under geometric attacks in particular, the proposed algorithm performs much better than existing algorithms.  相似文献   

15.
基于Logistic混沌加密的NSCT-SVD抖动调制盲水印算法   总被引:1,自引:1,他引:0  
马婷  高大鹏  王欣 《包装工程》2016,37(5):156-160,166
目的提出一种既安全又具高稳健性的盲水印算法。方法首先通过Logistic映射混沌置乱对图像加密,然后对载体图像进行三层非采样Contourlet变换(NSCT),提取低频部分进行8×8分块,最后对低频带的子块进行奇异值分解(SVD),将混沌变换的水印图像嵌入在进行抖动调制的奇异值中。结果该算法解决了奇异值分解引起的False positive问题即虚警率,在提取水印的算法过程中没有用到原载体图像,实现了水印的嵌入及盲检测。实验结果显示,该算法提高了水印的防伪性,耐常见攻击的抵抗能力也较强。结论该算法满足了数字水印技术要求的隐蔽性和稳健性,并且可以对数字产品起到版权保护的作用。  相似文献   

16.
In this paper, an evolutionary-based algorithm for digital image watermarking is proposed. Robustness and imperceptibility are two important properties of digital image watermarking which conflict with each other. A singular value decomposition (SVD)-based intelligent algorithm is applied to make a trade-off between robustness and imperceptibility. In the proposed algorithm, first, the original image is divided into 8×8 blocks. Then some special blocks are transformed into discrete cosine transform (DCT) domain. SVD decomposition of DCT coefficients of special blocks is the next stage of the method. Finally, a binary watermark image is embedded into the singular values by a quantisation method. The major property of the proposed method is the generation of a binary watermark image using genetic algorithm to solve the optimisation problem between robustness and imperceptibility. So the watermark could be variable and image adaptive. The simulation results show improvement in robustness of the proposed method against several attacks such as noise contamination, filtering, joint photographic experts group (JPEG) compression and some geometrical attacks like cropping, rotation and rescaling in comparison with a recently similar existing work.  相似文献   

17.
随机检测是视频水印需要解决的关键问题之一,目前的视频水印缺乏有效的随机检测技术.对此,文中提出了一种适用于随机检测的稳健性视频水印方法.该方法先将水印信号进行BCH编码并按密钥置换,然后将编码后的数据和同步码依次嵌入到DCT块的候选中频系数中,并通过同步码来实现水印的快速随机检测.实验表明,该方法具有良好的抗噪声、视频压缩编码和裁剪性,并能实现了水印的随机检测和水印信息的字节对齐.  相似文献   

18.
基于图像特征区域的加密全息水印算法   总被引:3,自引:2,他引:1  
孙刘杰  李晨璐 《包装工程》2013,34(15):109-113
针对图像的特征区域,提出了一种变换域的加密全息水印算法。根据K-均值聚类思想,将图像分为前、后景区特征区域,用双随机相位调制为全息水印加密,提高水印的安全性;通过DCT 变换,在变换域中将加密的全息水印嵌入中频系数,兼顾了人眼的视觉特性和水印的鲁棒性,且属于盲水印算法。实验结果表明,该水印算法能够抵抗常见的各种攻击,重建水印清晰、有效,水印具有极强的隐蔽性、鲁棒性和安全性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号