共查询到20条相似文献,搜索用时 312 毫秒
1.
抗几何攻击图像水印方案 总被引:1,自引:0,他引:1
几何形变一直是各类数字水印算法较难抵抗的攻击手段。针对此问题,提出一种抗几何攻击数字图像水印算法。采用周期性的水印嵌入图像,强度由NVF函数确定。在检测时,用白化滤波器对图像进行预处理。由于水印数据是随机的,而图像数据高度相关,白化滤波器起到增加水印数据能量,同时降低图像数据能量的作用。由理论计算得出选择滤波器的原则。然后,通过自相关检测,得到反映几何形变的峰值点。对实验结果的分析证明,该算法对各类几何攻击都能够精确定位。 相似文献
2.
3.
图像隐形水印是解决数字媒体版权保护的有效手段.目前的大多数水印算法采用伪随机序列构成水印,因而只能给出"Yes"(有水印)或"No"(无水印)的回答.嵌入有意义的水印在一些应用场合更加重要,但同时也带来了更多的困难.嵌入有意义的水印必须解决二个问题:(1)嵌入的水印具有一定的数据量;(2)从有失真的水印图像中正确地提取嵌入的水印.本文应用数字通信的理论和方法,提出了一个嵌入有意义字符串的DCT域隐形水印算法.该算法采用BCH编码和匹配滤波来降低误码率.应用所提出的算法,把一个32个字符组成的水印嵌入到256×256的图像中并达到了较好的稳健性.在水印图像信噪比受Gaussian加性噪声干扰下降到26dB时,仍实现了对嵌入水印零错误概率的检测. 相似文献
4.
5.
基于沃尔什-哈达玛变换和卷积编码的半脆弱水印算法 总被引:2,自引:0,他引:2
提出了一种基于沃尔什-哈达玛变换和卷积编码的半脆弱水印算法.在该算法中,对嵌入水印之前的图像进行像素块差分编码和卷积纠错编码来得到水印,并将其嵌入在沃尔什-哈达玛变换的图像能量值上;水印检测端通过检测卷积译码中产生的误码实现水印篡改定位,利用卷积译码的结果实现篡改图像的恢复.通过理论和实验分析了该算法的有效性和由此产生的误差.实验结果表明,本算法对于有损压缩具有良好的顽健性,可以精确地检测与定位篡改的图像区域,并且可以大致恢复原始图像内容. 相似文献
6.
7.
基于Logistic混沌映射的DCT域脆弱数字水印算法 总被引:16,自引:0,他引:16
本文提出了一种新的混沌脆弱数字水印算法.利用混沌系统对初值的极端敏感性和块不相关水印技术,将图像DCT次高频系数和水印密钥合成为logistic混沌映射初值从而生成水印,再将水印嵌入到图像DCT的高频系数中得到水印图像.利用图像DCT系数之间的关系,实现了水印的盲检测.实验结果表明,该算法可以精确检测到对水印图像的一个像数点的改变,并具有良好的定位篡改能力. 相似文献
8.
图像内容真实性认证的半易损水印方案研究 总被引:5,自引:1,他引:4
提出一种基于半易损的图像内容真实性认证方案。该算法既对不改变图像内容的一般性操作具有较好的顽健性,又能对改变图像内容的篡改操作具有较强的敏感性。在水印图像进行一般性处理后能够借助水印差别国和滑动窗检测并定位被篡改的区域。本文还从概率论的角度给出了精确的判决门限确定公式。仿真试验采用一般性操作和篡改操作相结合的方法,实验结果表明本文算法在保护数字图像内容真实性方面是可行的。 相似文献
9.
10.
针对单像素篡改检测算法和分块篡改检测算法的缺点,提出了基于交叉划分的篡改检测与恢复算法.根据图像内容生成的2×2分块水印被两次嵌入到不同的对应块中,两次分块方式采用交叉划分方式.在水印嵌入时采用混沌映射序列对水印进行了加密.根据不同的分块位置进行两次篡改检测,并根据两次检测结果交叉后逐步求精,得到最终检测结果.图像恢复采用像素级恢复方式,先确定水印嵌入区域是否被篡改然后再根据两次嵌入的信息进行恢复.实验结果表明,该算法篡改检测定位精度可以达到像素级,恢复图像质量好,能够抵抗矢量攻击和噪声攻击. 相似文献
11.
12.
《Industrial Electronics, IEEE Transactions on》2001,48(5):875-882
In this paper, an image accreditation technique by embedding digital watermarks in images is proposed. The proposed method for the digital watermarking is based on the wavelet transform. This is unlike most previous work, which used a random number of a sequence of bits as a watermark and where the watermark can only be detected by comparing an experimental threshold value to determine whether a sequence of random signals is the watermark. The proposed approach embeds a watermark with visual recognizable patterns, such as binary, gray, or color image in images by modifying the frequency part of the images. In the proposed approach, an original image is decomposed into wavelet coefficients. Then, multi-energy watermarking scheme based on the qualified significant wavelet tree (QSWT) is used to achieve the robustness of the watermarking. Unlike other watermarking techniques that use a single casting energy, QSWT adopts adaptive casting energy in different resolutions. The performance of the proposed watermarking is robust to a variety of signal distortions, such as JPEG, image cropping, sharpening, median filtering, and incorporating attacks 相似文献
13.
水印检测错误会严重损害水印系统的可信度。该文提出基于双谱和能量检测的双通道检测来实现最优盲水印检测器的设计,并给出了一种在小波域中的具体实现。传统检测方法检测概率会随着信噪比的下降而急剧下降。双通道检测时信噪比很小时只要有足够大的双谱信息,即可得到较高的检测概率。即使双谱信息很小时双通道检测系统退化为似然比检测系统,仍是最优的。检测器检测到指定的水印后利用独立分量分析技术进行水印盲恢复。实验过程中攻击由通用水印测试软件Stirmark产生,实验数据证明所设计的最优盲检测器对Stirmark提供的各种攻击(如剪切、JPEG压缩、删行/列、旋转、尺度变换、随机几何攻击等)具有很好的鲁棒性。实验结果说明这种最优检测器的性能优越于现有的水印检测器。 相似文献
14.
一种改进的基于DWT的彩色图像水印算法 总被引:2,自引:0,他引:2
文章介绍了数字水印的相关概念,结合HVS提出了一种改进的基于DWT彩色图像水印算法.首先对水印图像进行置乱加密预处理,提高了算法的安全性.然后计算绿色分量的数量,与预先设定的阈值进行比较,根据其关系选择不同的嵌入方式,将不同的色彩分量嵌入到不同的频带中.实验表明该算法在无视觉失真的条件下可以保证较好的嵌入量,且能有效抵抗常见的攻击,具有较好的鲁棒性. 相似文献
15.
基于图像内容的脊波变换域数字水印模型和算法研究 总被引:14,自引:0,他引:14
在研究人类视觉(HVS)特性的基础上提出了一种在脊波变换域基于图像内容的数字水印模型。在此模型中,嵌入数字水印的强度归结于数字图像脊波系数的视觉掩盖效应,文中建立了脊波变换域人眼临界可见误差模型。图像的水印检测被归结为Neymann-PeaLrson准则下的统计模型,该模型被用来估算水印检测的最优阈值。作为算例,将临界可见误差模型结合扩展谱技术,提出了一种新颖的图像自适应水印算法,并给出了相应的实验结果。实验表明算法性能大幅度提高。 相似文献
16.
In this paper, we propose multimodal biometric image watermarking scheme through a two-stage integrity verification method using the hidden thumbnail feature vectors for safe authentication of multimodal biometrics data, face and fingerprint, respectively. It is basically blind and spread spectrum-based robust watermarking method. The proposed method enables us to detect a tampered region by controlling watermark embedding strength to meet the requirement of predefined watermark extraction threshold. The key idea is that the thumbnail feature vectors of a face image as a watermark pattern are utilized by embedding into a fingerprint image in order to verify the integrity of respective biometric data. The first stage of integrity verification for a fingerprint image is done by deciding the validity of extracted thumbnail patterns. The second stage of integrity verification for a face image is done by one-to-one matching between the thumbnail feature vectors extracted from a face image and the thumbnail one of the received face image. Experimental results showed that the proposed method has a high detection rate of the forged biometric data and guarantees the security assurance. 相似文献
17.
Yaqing Niu Matthew Kyan Sridhar Krishnan Qin Zhang 《Signal, Image and Video Processing》2011,5(4):517-526
Perceptual watermarking should take full advantage of the results from human visual system (HVS) studies. Just noticeable
distortion (JND), which refers to the maximum distortion that the HVS does not perceive, gives us a way to model the HVS accurately.
In this paper, we exploit a combined JND model, which represents an additional, accurate, perceptual visibility threshold
profile to guide watermarking for digital images. The combined JND model-guided watermarking scheme, where visual models are
fully used to determine image-dependent upper bounds on watermark insertion, allows us to provide the maximum strength transparent
watermark. Experimental results confirm the improved performance of our combined JND model. Our combined JND model is capable
of yielding higher injected-watermark energy without introducing noticeable distortion to the original image and outperforms
the relevant existing visual models. Simulation results show that the proposed JND model-guided image watermarking scheme
is more robust than other algorithms based on the relevant existing perceptual models while retaining the watermark transparency.
At the same time, the proposed combined JND model has much lower computational complexity compared with the relevant existing
perceptual models. 相似文献
18.
抵抗几何攻击的数字图像水印 总被引:8,自引:1,他引:7
该文实现了一种抵抗几何攻击的数字图像水印方案。水印信号为根据密钥产生的服从正态分布的实数序列,对水印信号作预处理并进行周期化之后在空域将其嵌入数字图像中。检测端不需要原始图像,根据预测水印的自相关函数(ACF)判断水印图像遭受的几何变换攻击并进行逆变换,然后进行水印检测。实验表明该方案对压缩、滤波、剪切等常见的图像处理攻击同样具有很高的鲁棒性。 相似文献
19.
Giannoula A. Boulgouris N.V. Hatzinakos D. Plataniotis K.N. 《Circuits and Systems II: Express Briefs, IEEE Transactions on》2006,53(5):359-363
In this brief, the case where the watermark is detected in a noisy interpolated version of the originally watermarked image is investigated. Polyphase decomposition is utilized at the detection side in order to enable the flexible formation of a fused image, which is appropriate for watermark detection. The optimal fused correlator, obtained by combining information from different image components, is derived through a statistical analysis of the correlation detector properties, followed by Lagrange optimization. It is shown that it is preferable to perform detection in a fused image rather than the original image. 相似文献
20.
《IEEE transactions on image processing》2009,18(8):1782-1796