共查询到20条相似文献,搜索用时 15 毫秒
1.
Xiang-Yang Wang Tian-Xiao Ma Pan-Pan NiuAuthor vitae 《Computers & Electrical Engineering》2011,37(4):425-443
Desynchronization attack is known as one of the most difficult attacks to resist, for it can desynchronize the location of the watermark and hence causes incorrect watermark detection. It is a challenging work to design a robust audio watermarking scheme against desynchronization attacks. Based on pseudo-Zernike moment and synchronization code, we propose a new digital audio watermarking algorithm with good auditory quality and reasonable resistance toward desynchronization attacks in this paper. Firstly, the origin digital audio is segmented and then each segment is cut into two parts. Secondly, with the spatial watermarking technique, synchronization code is embedded into the statistics average value of audio samples in the first part. And then, map 1D digital audio signal in the second part into 2D form, and calculate its pseudo-Zernike moments. Finally, the watermark bit is embedded into the average value of modulus of the low-order pseudo-Zernike moments. Meanwhile combining the two adjacent synchronization code searching technology, the algorithm can extract the watermark without the help from the origin digital audio signal. Simulation results show that the proposed watermarking scheme is not only inaudible and robust against common signals processing such as MP3 compression, noise addition, resampling, re-quantization, etc., but also robust against the desynchronization attacks such as random cropping, amplitude variation, pitch shifting, jittering, etc. 相似文献
2.
Xiang-Yang Wang Jun Wu 《国际自动化与计算杂志》2007,4(4):428-432
In this paper,a new content-based image watermarking scheme is proposed.The Harris-Laplace detector is adopted to extract feature points,which can survive a variety of attacks.The local characteristic regions (LCRs) are adaptively constructed based on scale-space theory.Then,the LCRs are mapped to geometrically invariant space by using image normalization technique.Finally, several copies of the digital watermark are embedded into the nonoverlapped LCRs by quantizing the magnitude vectors of discrete Fourier transform (DFT) coefficients.By binding a watermark with LCR,resilience against desynchronization attacks can be readily obtained.Simulation results show that the proposed scheme is invisible and robust against various attacks which includes common signals processing and desynchronization attacks. 相似文献
3.
Sibaji Gaj Anoop Kumar Rathore Arijit Sur Prabin Kumar Bora 《Multimedia Tools and Applications》2017,76(20):20755-20779
Camcorder based video copy attack has become a serious threat to the electronic movie distribution services. Although watermarking is used to authenticate against such camcorder based copy attack, in the camcorder recorded videos, the embedded watermark suffers from several geometric distortions and temporal de-synchronizations. This paper proposes a watermarking scheme which is robust against the distortion due to cam-cordering process. Firstly, a comprehensive literature survey has been done on the watermarking schemes resilient to the cam-cording attack. Based on the existing limitations of the state-of-art literature, a watermarking scheme is devised to embed a watermark which is robust against to frame blending and projection attacks which are the major distortions caused during cam-cording. A comprehensive set of experiments has been carried out to show the applicability of the proposed scheme over the existing literature. 相似文献
4.
提出了一种能够有效抵抗旋转、平移、缩放等基本几何攻击的鲁棒图像水印方案,在其嵌入方案中,提出一种几何不变量——基于图像圆区域内的统计特征不变性。利用该不变性,可以较好地矫正几何形变。在嵌入方案中,实现了在一个嵌入点上嵌入2比特水印信息量,并且利用HVS特性,把水印自适应地嵌入在视觉不敏感区域的纹理方向上。在水印提取方案中,利用特征圆形区域矫正形变,然后在DCT变换域中盲提取水印。实验结果表明,该水印方案具有很好的透明性,同时具有较强的抵抗基本几何形变能力,并且对于一般的图像处理、JPEG压缩等攻击具有较好的鲁棒性。 相似文献
5.
6.
如何有效抵抗几何攻击是目前水印技术研究的难点之一,且已有抗几何攻击水印算法的嵌入容量有限。提出了一种利用尺度不变特征变换(SIFT)特征点确定的局部特征区域(LFRs)嵌入水印的大容量抗几何攻击的水印算法。算法首先从图像的非抽样的Contourlet域(NSCT)低频分量中提取出SIFT中等尺度的稳定特征点,并通过最小生成树聚类算法的选择策略获得一组分布均匀且彼此独立的圆形特征区域;然后对每个圆形区域进行等角度的扇形分割和等面积的同心圆环分割,划分成等面积的子块;最后采用奇偶量化将经过混沌加密的水印嵌入到 相似文献
7.
提出了一种基于Blakley密钥共享方案的音频水印分存算法。算法将密钥分存的思想引入到音频水印算法中,将水印分存到音频数据的不同段中,检测时只需提取出部分水印信息就可以恢复出原始水印。算法同时采用了Bark码来解决剪切攻击带来的同步问题,并利用逼近信号统计特征和纠错码技术来提高算法的鲁棒性。实验证明,算法具有较强的抗剪切攻击能力。 相似文献
8.
针对传统基于经验模式分解(EMD)的音频水印算法鲁棒性不强的问题,提出一种基于固有模态函数(IMF)极值的盲音频水印算法.首先对音频信号进行分帧,每个音频帧经过EMD后得到IMF; 接着利用均匀量化的方法将水印信息和同步码嵌入到最后一个IMF的极值中.所提算法的数据嵌入率是46.9~50.3 b/s,且携水印音频保持了原始音频的感知质量.对携水印音频进行加噪、MP3压缩、重新采样、滤波、剪切和重采样攻击后,提取出的水印信息变化不大,算法鲁棒性较好.与时间域和小波域算法相比,提出的算法在保证高数据嵌入率的同时,可以抵抗32 kb/s的MP3压缩攻击. 相似文献
9.
以图像归一化和不变质心理论为基础提出了两种安全性较高的数字图像水印算法。为了增加水印的隐秘性及抗干扰能力,水印在嵌入前均进行了置乱和混沌加密处理,然后两种方案分别根据其归一化图像的不变质心确定出相应的重要区域,并在该区域实施水印的嵌入。实验结果表明,提出的两种数字图像水印算法均具有较好的不可感知性和抗攻击的鲁棒性,且在抵抗常规信号处理和几何攻击下各具优势。 相似文献
10.
Based on scale space theory and an image normalization technique, a new feature-based image watermarking scheme robust to general geometric attacks is proposed in this paper. First, the Harris–Laplace detector is utilized to extract steady feature points from the host image; then, the local feature regions (LFR) are ascertained adaptively according to the characteristic scale theory, and they are normalized by an image normalization technique; finally, according to the predistortion compensation theory, several copies of the digital watermark are embedded into the nonoverlapped normalized LFR by comparing the DFT mid-frequency magnitudes. Experimental results show that the proposed scheme is not only invisible and robust against common signals processing methods such as median filtering, sharpening, noise adding, and JPEG compression etc., but also robust against the general geometric attacks such as rotation, translation, scaling, row or column removal, shearing, local geometric distortion and combination attacks etc. 相似文献
11.
提出了一种鲁棒的数字音频水印方案,该方案主要特点:(1)应用双重置乱机制,保证水印的安全性;(2)利用心理声学模型算法,确定水印嵌入强度;(3)应用同步机制,实现水印的自同步检测;(4)在离散小波变换(DWT)域嵌入水印,提高水印的抗攻击能力;(5)利用高效的嵌入算法,提高水印的检测效率。仿真实验表明,该方案不但具有良好的不可感知性,还对诸如重采样、重量化、叠加噪声、低通滤波、MP3压缩等攻击具有较好的鲁棒性。 相似文献
12.
提出基于小波包的离散小波变换和均值量化的音频水印算法。该算法的主要特点是:1)将音频信号根据嵌入的水印图像大小自适应地分段。利用Arnold变换对水印图像进行预处理,消除水印图像的相关性,提高图像的抗攻击性。2)采用小波包的离散小波变换,增加嵌入和提取效率,提高水印的透明性。3)水印信息嵌入到均值中,有较好的不可感知性。仿真实验表明:嵌入水印后音频的不可感知性较高,能够有效地抗击有损压缩、低通滤波和剪切等攻击。 相似文献
13.
14.
Chun-Yuan Hsiao Ming-Feng Tsai Ching-Yu Yang 《Multimedia Tools and Applications》2018,77(23):30419-30435
In this paper, we present a simple and robust watermarking scheme for color images. The scheme is based on the square-root-modulus technique employed in the integer wavelet domain, which allows a large number of data bits to be embedded in a host image. Simulations confirmed that marked images generated by the proposed scheme are tolerant to various attacks such as blurring, brightness, contrast, cropping, edge sharpening, inversion, JPEG/JPEG2000 compressions, noise-additions, and truncation. Additionally, the payload of the proposed method is significantly larger than that of existing watermarking techniques and the resulting perceived quality is not bad. Because the code is quite simple, it is suitable for the proposed method implemented in the mobile equipments or smart devices. 相似文献
15.
This paper presents a new semi-blind reference watermarking scheme based on discrete wavelet transform(DWT) and singular value decomposition(SVD) for copyright protection and authenticity. We are using a gray scale logo image as watermark instead of randomly generated Gaussian noise type watermark. For watermark embedding, the original image is transformed into wavelet domain and a reference sub-image is formed using directive contrast and wavelet coefficients. We embed watermark into reference image by modifying the singular values of reference image using the singular values of the watermark. A reliable watermark extraction scheme is developed for the extraction of watermark from distorted image. Experimental evaluation demonstrates that the proposed scheme is able to withstand a variety of attacks. We show that the proposed scheme also stands with the ambiguity attack also. 相似文献
16.
M. Heidari S. Samavi S. M. R. Soroushmehr S. Shirani N. Karimi K. Najarian 《Multimedia Tools and Applications》2017,76(22):23459-23479
With the widespread internet usage, digital contents are easily distributed throughout the world. To eliminate concerns of producers and owners of digital contents, watermarking techniques are extensively being used. Robustness against intentional and unintentional attacks is a major quality of watermarking systems. Since different attacks tend to target different parts of the frequency spectrum, in this paper we propose a framework for blind watermarking which determines the type of attack that the image has gone through before extracting the watermark. Within this framework, we propose an attack classification method to identify the region of the frequency spectrum that is less damaged. The watermark which is redundantly spread throughout the spectrum can be extracted from the less damaged regions. Experimental results show functionality of the framework by producing better results in comparison with well-known blind watermarking techniques. 相似文献
17.
Multimedia Tools and Applications - Image watermarking provides a promising solution to digital media copyright protection. However, the robust performance of the watermarking scheme should be... 相似文献
18.
以改进的伪Zernike矩相关知识为基础,提出了一种改进的抗几何攻击的数字水印算法。该算法首先计算载体图像的伪Zernike矩,然后对其进行归一化处理。最后选择部分低阶矩幅值量化嵌入水印。实验结果表明该数字水印算法不仅可以抵抗常规的数字信号处理,而且较基于伪Zernike矩的抗几何攻击的数字水印算法有对旋转和缩放的联合攻击具有较好的抵抗能力。 相似文献
19.
提出了一种基于对象传播神经网络的抗TSM攻击音频水印算法。利用CPN自学习和自适应的特征,通过自适应改变段长的分段算法,选用具有较强稳定性的小波低频系数方差作为输入向量训练CPN,建立音频特征与水印信号的对应关系,以达到嵌入水印的目的。实验结果表明,该算法对常规音频信号处理和TSM等同步攻击具有很强的鲁棒性。 相似文献
20.
利用Harris特征点并结合图像的归一化原理提出了一种新的数字水印方案。由于Harris算子的算法简单,稳健性较好,图像的特征点在经过几何攻击后仍然可以保持。而且,归一化的图像对图像的旋转不太敏感,所以首先对每一个以特征点为圆心的互不重叠的圆归一化以确定水印的嵌入点,然后把水印嵌入到原来的图像中,这样,可以很好地解决水印嵌入和检测的同步问题。实验证明,该算法能很好地抵抗如旋转,缩放,剪切等形式的几何攻击与常规信号处理攻击。 相似文献