共查询到20条相似文献,搜索用时 11 毫秒
1.
We investigate the dynamic watermarking scheme for quantum images using quantum wavelet transform (QWT) proposed by Song et al. (Quantum Inf Process 12(12):3689–3706, 2013). It is aimed to embed the watermark image into the wavelet coefficients of the quantum carrier image. However, in our opinion, the key procedures of the protocol are wrong. At last, a possible improvement strategy is presented. 相似文献
2.
In this paper, a novel watermarking scheme for quantum images based on Hadamard transform is proposed. In the new scheme, a unitary transform controlled by a classical binary key is implemented on quantum image. Then, we utilize a dynamic vector, instead of a fixed parameter as in other previous schemes, to control the embedding process. The dynamic embedding vector is decided by both the carrier quantum image and the watermark image, which is only known by the authorized owner. The proposed scheme is analyzed from visual quality, computational complexity, and payload capacity. Analysis and results show that the proposed scheme has better visual quality under a higher embedding capacity and lower complexity compared with other schemes proposed recently. 相似文献
3.
Neural Computing and Applications - Most existing extraction techniques in audio watermarking use conventional techniques in which some sets of special rules based on reverse embedding rules are... 相似文献
4.
为了使图像水印算法拥有更好的鲁棒性和不可感知性,以双树复小波变换(DTCWT)为基础,提出了一种新的彩色图像盲水印算法。本算法将彩色图像颜色空间由RGB转换到YIQ,选取亮度分量Y进行双树复小波变换,得到低频子带,然后将加密后的水印信息嵌入到低频子带中。在水印提取过程中,使用了新颖的基于四元数PHT的最小二乘支持向量(LS-SVM)几何校正方法。实验结果表明,本算法具有更好的鲁棒性和不可感知性。 相似文献
5.
为了扩大数字水印的适用范围,提出了一种彩色图像盲水印算法。在嵌入过程中,将宿主图像从RGB空间转换到YIQ空间,对其进行小波分解后再进行分块DFT变换,结合一个嵌入模板矩阵和两个伪随机序列,将Arnold置乱以后的二值图像水印嵌入到宿主图像中;在提取过程中,根据嵌入模板矩阵提取出嵌入到每一图像小块的序列,分别计算该序列和两个伪随机序列的相关性,根据相关性的大小关系恢复水印信息。实验结果表明,算法具有良好的不可见性和鲁棒性。 相似文献
6.
The traditional watermarking algorithms prove the rightful ownership via embedding of independent watermarks like copyright logos, random noise sequences, text etc into the cover images. Coupling biometrics with watermarking evolved as new and secure approach as it embeds user specific biometric traits and thus, narrows down the vulnerability to impostor attacks. A multimodal biometric watermarking system has been proposed in this paper in the redundant discrete wavelet transform(RDWT). Two biometric traits of the user i.e. the iris and facial features are embedded independently into the sub-bands of the RDWT of cover image taking advantage of its translation invariant property and sufficient embedding capacity. The ownership verification accuracy of the proposed system is tested based on the individual biometric traits as well as the fused trait. The accuracy was enhanced while using the fused score for evaluation. The security of the scheme is strengthened with usage of non-linear chaotic maps, randomization via Hessenberg decomposition, Arnold scrambling and multiple secret keys. The robustness of the scheme has been tested against various attacks and the verification accuracy evaluated based on false acceptance rate, false rejection rate, area under curve and equal error rate to validate the efficacy of the proposed scheme. 相似文献
7.
A new quantum gray-scale image watermarking scheme by using simple and small-scale quantum circuits is proposed. The NEQR representation for quantum images is used. The image sizes for carrier and watermark are assumed to be \(2n \times 2n\) and \(n \times n\), respectively. At first, a classical watermark with \(n \times n\) image size and 8 bits gray scale is expanded to an image with \(2n \times 2n\) image size and 2 bits gray scale. Then the expanded image is scrambled to be a meaningless image by the SWAP gates that controlled by the keys only known to the operator. The scrambled image is embedded into the carrier image by the CNOT gates (XOR operation). The watermark is extracted from the watermarked image by applying operations in the reverse order. Simulation-based experimental results show that our proposed scheme is excellent in terms of three items, visual quality, robustness performance under noises, and computational complexity. 相似文献
8.
提出了一种基于小波域的彩色图像双水印算法:把 RGB 彩色图像转化为 YIQ 空间模型图像,并提取其亮度分量Y;对亮度分量Y进行一级离散小波变换,对所得到的第一级逼近(LL1),水平(LH1)和垂直(LV1)细节子图分别进行细化,选取适当的嵌入位置进行双水印的嵌入;对不同类型的水印(二值和灰度)采用不同的嵌入算法.理论分析与仿真结果表明,应用该算法实现的水印具有很好的不可见性和鲁棒性. 相似文献
9.
It is a challenging work to design a robust audio watermarking scheme against various attacks. Wavelet moment invariances are new features combining the moment invariant features and the wavelet features, and they have some excellent characteristics, such as the ability to capture local information, robustness against common signal processing, and the linear relationship between a signal and its wavelet moments etc. Based on wavelet moment and synchronization code, we propose a new digital audio watermarking algorithm with good auditory quality and reasonable resistance against most attacks in this paper. Firstly, the origin digital audio is segmented and then each segment is cut into two parts. Secondly, with the spatial watermarking technique, synchronization code is embedded into the statistics average value of audio samples in the first part. And then, map 1D digital audio signal in the second part into 2D form, and calculate its wavelet moments. Finally, the watermark bit is embedded into the average value of modulus of the low-order wavelet moments. Meanwhile combining the two adjacent synchronization code searching technology, the algorithm can extract the watermark without the help from the origin digital audio signal. Simulation results show that the proposed watermarking scheme is not only inaudible and robust against common signals processing such as MP3 compression, noise addition, resampling, and re-quantization etc., but also robust against the desynchronization attacks such as random cropping, amplitude variation, pitch shifting, and jittering etc. 相似文献
10.
In this paper, a novel semi-fragile watermarking scheme for authenticating an audio signal based on dual-tree complex wavelet transform (DT-CWT) and discrete cosine transform (DCT) is proposed. Specifically, the watermark data are efficiently inserted into the coefficients of the low-frequency sub-band of DT-CWT taking advantages of both DCT and quantization index modulation (QIM). First, the original digital audio signal is segmented and then performed with DT-CWT. Second, based on the energy compression property, the low-frequency sub-band coefficients of the DT-CWT domain are performed with DCT, and the DC component is utilized to embed one distorted watermark bit by the QIM technique. Finally, inverse DCT and DT-CWT are orderly implemented on the watermarked coefficients of each audio segment to get a watermarked audio signal. Simulation results show that the hybrid embedding domain constructed by DT-CWT and DCT is effective, and the proposed watermarking scheme is not only inaudible, but also robust against content persistent non-malicious audio signal processing operations, such as MP3 compression, noise addition, re-sampling, re-quantization, etc. Furthermore, the proposed scheme can effectively authenticate the veracity and integrity of audio content and greatly expands the applicability of the audio watermarking scheme. 相似文献
11.
The present paper proposes a digital image watermarking scheme using the characteristics of the human visual system (HVS), spread transform technique and statistical information measure. Spread transform (ST) scheme is implemented using the transform coefficients of both the host and the watermark signal. Watermark embedding strength is adaptively adjusted using frequency sensitivity, luminance, contrast and entropy masking of HVS model. The choice of Hadamard transform as watermark embedding domain offers several advantages, such as low loss in image information (higher image fidelity), greater reliability of watermark detection and higher data hiding capacity at high degree of compression. Performance of the proposed method is compared with a number of recently reported watermarking schemes based on spread spectrum (SS) and quantization index modulation (QIM). 相似文献
12.
Multimedia Tools and Applications - Illegal camcording as the most common source of video piracy, is the main concern of the film production companies. With the increased speed and convenience of... 相似文献
13.
本文提出了一种基于小波变换的采用灰度图像作为水印的盲水印算法,水印经过图像置乱后,把水印分解成8个二值位平面,选择高4位二值位平面嵌入到原始图像的中频子带.实验结论和攻击测试表明,本文所提议的算法对JPEG有损压缩和加性噪声等图像攻击有较强的鲁棒性. 相似文献
14.
The need for a robust reversible watermarking method has recently attracted more attention. This paper presents a novel robust reversible watermarking scheme based on using the Slantlet transform matrix to transform small blocks of the original image and hiding the watermark bits by modifying the mean values of the carrier subbands. The problem of overflow/underflow has been avoided by using histogram modification process. Extensive experimental tests based on 100 general images and 100 medical images demonstrate the efficiency of the proposed scheme. The proposed scheme has robustness against different kinds of attacks and the results prove that it is completely reversible with improved capacity, robustness, and invisibility in comparison with the previous methods. 相似文献
15.
为解决单一水印加密算法安全性差,单一变换域的水印嵌入、提取算法在抵抗攻击上各有侧重,难以抵抗所有常见攻击类型的问题,提出基于DWT-DCT联合变换与二次加密技术的文本图像水印算法。利用DWT、DCT对滤波、JPEG压缩等攻击的抵抗优势和特性,将经过二次加密的水印进行差错控制编码,嵌入到DWT-DCT联合变换域的中频区域,加强安全性,抵抗常见攻击,特别是剪切攻击和噪声攻击。实验结果表明,该算法可有效保证水印算法的不可见性,提高水印抵抗JPEG压缩、噪声、滤波、剪切等攻击的鲁棒性和安全性。 相似文献
16.
Neural Computing and Applications - The protection and authentication of multimedia contents and copyright have become a great concern in the fast-growing Internet environment. This paper presents... 相似文献
17.
In this paper, an optimized and robust digital image watermarking technique based on lifting wavelet transform (LWT) and firefly algorithm is proposed. LWT is newer and faster generation of former wavelet transforms and firefly algorithm is an efficient optimizing algorithms. In current technique, base image decomposed by LWT into 4 sub bands then the first sub band separated into non overlapping blocks. After that blocks are sorted in order of descending based on standard derivation of each block. Selecting suitable blocks for special embedding process seems to be an optimization problem due to existence of a trade-off between imperceptibility and robustness. Firefly algorithm used to solve this trade-off while selecting primary blocks causes high robustness and low imperceptibility and vice versa. For improving security, Arnold transform applied to watermark and achieved scrambled image bits used as condition for embedding process. The proposed technique evaluated by variety of attacks like additive noise, average filter, median filter, sharpening filter and some other geometric and non-geometric attacks and experimental results showed its good imperceptibility and high robustness. 相似文献
18.
Multimedia Tools and Applications - This paper presents a new blind image watermarking scheme using binary decimal sequence (d-sequence) and lifting wavelet transform (LWT) for copyright... 相似文献
19.
A semi-fragile watermarking scheme for multiple band images is presented. We propose to embed a mark into remote-sensing images applying a tree-structured vector quantization approach to the pixel signatures, instead of processing each band separately. The signature of the multi- or hyperspectral image is used to embed the mark into it in order to detect any significant modification of the original image. The image is segmented into three-dimensional blocks and a tree-structured vector quantizer (TSVQ) is built for each block. These trees are manipulated using an iterative algorithm until the resulting block satisfies a required criterion which establishes the embedded mark. The method is shown to be able to preserve the mark under lossy compression (above a given threshold) but, at the same time, it detects possibly forged blocks and their position in the whole image. 相似文献
20.
Nowadays, the communication progression is turn out to be easy and effectual than previous days because of the development of science and technology, which is supplying numerous advantages to the consumer. Consequently, the consumer can access and preserve their data in the effectual manner. However, some of the difficulties are presented to transmit the data from one place to another. To overcome the problem in this paper an effective secure data transmission is proposed using optimal discrete wavelet transform (ODWT) and sanitization Algorithm. The proposed work consist of two module namely, embedding and extraction. For embedding process, the secrete image bit is inserted into the original image. Similarly, in extraction process, the inserted bit is extracted from the watermarked image without any information loss. Here, sanitization approach is applied to secrete image to attain the secrete bit. The performance of the proposed scheme is analyzed through various constraints namely peak signal to noise ratio (PSNR) and normalized correlation (NC). 相似文献
|