首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
刘文  何迪 《信息技术》2008,32(4):35-39
提出了一种新的基于离散小波变换和复倒谱的音频水印算法.将音频信号进行3级小波分解,在第3级上对小波系数加回声,根据不同的水印值选择不同的回声延迟,然后重构音频信号.检测时采用复倒谱变换,实现了水印的盲检测.实验表明,该算法具有很好的透明性和鲁棒性,能抵抗重采样,低通滤波等常见攻击和抖动,随机剪切等同步攻击.  相似文献   

2.
基于格的灰度级水印技术   总被引:1,自引:0,他引:1  
李晓强 《电子学报》2006,34(B12):2438-2442
提出一个新的灰度级水印算法.首先,使用量化技术对灰度级水印进行预处理,实现灰度级水印的数据压缩;然后,对原始图像进行小波分解,在小波域中使用格矢量量化技术构造水印的嵌人和提取算法.提取水印不需要原图像.为增强水印的安全性,使用混沌序列作为密钥对水印序列进行调制.实验结果表明,与同类算法相比该算法在获得较好感知质量含水印图像的同时提高了水印的鲁棒性.  相似文献   

3.
With the sharp blossoming of the Internet, itbecomes more and more important to protect theintelligent property rights (IPR). Watermarking is aneffective solution. It takes advantage of the redundancyof the human visual system (HVS) and auditory system(HAS) to identify the copyright by embedding somesecret information relevant to IPR holders. The invisible watermarking algorithm shouldsatisfy the demands on imperceptivity, low complexity,robustness, determinacy and safety. However,imperc…  相似文献   

4.
提出了一种基于小波变换的多分辨率数字水印隐藏与检测新算法,算法的优点在于其算法简单。利用小波变换的快速、简单和多分辨率特点,将水印信号隐藏在第1、2、3级的详细分量(细节信号)中保证了水印的稳健性,具有很强的抵御各种信号处理变换的能力,适用于数字语音等信号的版权保护。最后给出了计算机仿真实验结果,证明了本算法的有效性。  相似文献   

5.
在音频水印领域,嵌入大量水印而不影响宿主音 频的听觉质量,同时具有良好的鲁棒 性,仍然是一项具有挑战的工作。针对这一问题,本文提出了一种大容量,透明,鲁棒的音 频水印算法。首先对音频应用2级离散小波变换(DWT),并选取低频分量作奇异值分解(SV D),然后将水印嵌入在奇异值矩阵的非对角线元素中,可同时提高算法的透明性和嵌入容 量。另外,利用汉明码编码提升水印的鲁棒性和安全性。仿真实验结果表明,所提算法在平 均信噪比37.75 dB的情况下,可以达到5512 bps 的嵌入容量,对噪声添加、滤波、剪切、压缩等各种信号处理攻击具有良好的鲁棒性。  相似文献   

6.
能区分图像或水印篡改的脆弱水印方案   总被引:15,自引:2,他引:15       下载免费PDF全文
和红杰  张家树  田蕾 《电子学报》2005,33(9):1557-1561
针对现有脆弱型水印方案不能区分是图像内容还是水印被篡改的问题,提出一种能区分图像或水印篡改的脆弱水印方案.该方案用原始图像高7位的小波低频系数非均匀量化后生成的低频压缩图像作为水印,并用混沌系统对水印进行置乱加密,将安全性得到增强的水印直接嵌入到图像的LSB位;认证时通过差值图像定位图像内容被篡改的位置并指出图像中的水印是否被篡改.理论分析和仿真实验表明:该算法不但能精确定位图像内容被篡改的位置,而且能区分是图像内容被篡改、水印被篡改还是两者同时被篡改.  相似文献   

7.
针对小波变换在表示二维图像时的局限性,提出了一种抗几何攻击的数字水印算法。该算法先用混沌系列对水印信息进行加密,再对原始图像进行Contourlet变换,然后对分解后的子带进行分块计算,选择能量较大的分块并嵌入加密后的水印信息,最后经过Contourlet逆变换得到嵌入水印后的图像。实验结果证明:该算法不仅对常规图像处理具有很好的鲁棒性,同时对抵抗几何攻击也具有很好的鲁棒性。  相似文献   

8.
A scheme jointly exploring the rational dither modulation (RDM) and auditory masking properties in the discrete wavelet transform (DWT) domain is proposed to achieve effective blind audio watermarking. The embedding of binary information is carried out by modulating coefficient vectors in the 5th-level approximation subband using the quantization steps estimated from past watermarked vectors. The robustness and payload capacity of the proposed scheme are maneuverable by varying vector dimensions, while the imperceptibility is ensured by constraining quantization noise below the auditory masking threshold. Furthermore, the periodic characteristic inherited in the RDM formulation can be used to re-establish synchronization for accurate watermark extraction. Experimental results show that the proposed DWT–RDM approach renders a near-zero objective difference grade in the perceptual evaluation of audio quality even when the signal-to-noise ratio maintains at a level near 20 dB. In most digital signal processing attacks, the bit error rates of retrieved watermarks are sufficiently low as compared to other recently developed methods with fewer payload capacities.  相似文献   

9.
Watermarking scheme of colour image based on chaotic sequences   总被引:1,自引:0,他引:1  
The proposed perceptual mask is based on the singularity of cover image and matches very well with the properties of the human visual system. The cover colour image is decomposed into several subbands by the wavelet transform. The watermark composed of chaotic sequence and the covert image is embedded into the subband with the largest energy. The chaos system plays an important role in the security invisibility and robustness of the proposed scheme. The parameter and initial state of chaos system can directly influence the generation of watermark information as a key. Moreover, the watermark information has the property of spread spectrum signal by chaotic sequence to improve the invisibility and security of watermarked image. Experimental results and comparisons with other watermarking techniques prove that the proposed algorithm is effective and feasible, and improves the security, invisibility and robustness of watermarking information.  相似文献   

10.
Multiscale fragile watermarking based on the Gaussian mixture model.   总被引:5,自引:0,他引:5  
In this paper, a new multiscale fragile watermarking scheme based on the Gaussian mixture model (GMM) is presented. First, a GMM is developed to describe the statistical characteristics of images in the wavelet domain and an expectation-maximization algorithm is employed to identify GMM model parameters. With wavelet multiscale subspaces being divided into watermarking blocks, the GMM model parameters of different watermarking blocks are adjusted to form certain relationships, which are employed for the presented new fragile watermarking scheme for authentication. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. A secret embedding key is designed to securely embed the fragile watermarks so that the new method is robust to counterfeiting, even when the malicious attackers are fully aware of the watermark embedding algorithm. It is shown that the presented new method can securely embed a message bit stream, such as personal signatures or copyright logos, into a host image as fragile watermarks. Compared with conventional fragile watermark techniques, this new statistical model based method modifies only a small amount of image data such that the distortion on the host image is imperceptible. Meanwhile, with the embedded message bits spreading over the entire image area through the statistical model, the new method can detect and localize image tampering. Besides, the new multiscale implementation of fragile watermarks based on the presented method can help distinguish some normal image operations such as JPEG compression from malicious image attacks and, thus, can be used for semi-fragile watermarking.  相似文献   

11.
In this work, a semi-fragile watermarking scheme, for grayscale image authentication and tamper detection, is proposed. The proposed watermarking scheme is based on implementing a modified DWT quantization-based algorithm by embedding a random watermark bit sequence into the DWT domain using an expanded-bit multiscale quantization-based technique with adjusted watermarked location. Here, the watermark bit is expanded into three similar bits and embedded in a multiscale fashion into the DWT low-frequency subbands of the 2nd DWT levels (LL2, LLHL1 and LLLH1). An adjustment of the quantized coefficients is provided based on modifying their values to fall in more secure locations within the quantization interval. Several designed criteria were used to judge the received image by classifying it into: authenticated, incidentally or maliciously attacked with high accuracy in detecting and classifying attacks. Experimental results have shown the suitability of the proposed approach for tamper detection and accurate authentication.  相似文献   

12.
Digital watermarking, means of hiding/inserting a message, which can be an image, audio, video or text within the digital media. This hidden/inserting message can be later being extracted or detected for a variety of purposes. In this paper, a novel multi-resolution logo watermarking scheme using fractional M-band wavelet transform (Fr-M-band-WT) is proposed. The watermark is embedded in the multiresolution Fr-M-band-WT coefficients of low frequency bands of the host image using singular value decomposition (SVD). A multi-resolution nature of Fr-M-band-WT is exploited in the process of edge detection. Experimental results of the proposed logo watermarking scheme are compared with the previously available watermarking algorithms, fractional Fourier transform (FrFT), fractional wavelet transform (FrWT). Further, the proposed watermark extraction scheme is also tested on different attacks. The results after being investigated the proposed watermarking scheme shows a significant improvement as compared to other existing methods.  相似文献   

13.
结合人耳听觉模型,利用人耳掩蔽特性,提出了一种基于小波分解和复倒谱变换的音频数字水印算法。该算法通过对原始语音信号进行三级小波分解,提取出小波近似分量,从近似分量中选取重要系数。利用复倒谱变换系数的不相关性.对重要系数进行复倒谱变换实现解相关运算,最终把水印嵌入到语音复倒谱域中,实现了在语音信号中嵌入二值图像,提高了水印嵌入算法的不可听性。实验证明该方法在抗常见的信号处理如加噪、滤波、重采样、有损压缩等方面具有较好的稳健性。  相似文献   

14.
A novel semi-fragile audio watermarking algorithm in DWT domain is proposed in this paper. This method transforms the original audio into 3-layer wavelet domain and divides approximation wavelet coefficients into many groups. Through computing mean quantization of per group, this algorithm embeds the watermark signal into the average value of the wavelet coefficients. Experimental results show that our semi-fragile audio watermarking algorithm is not only inaudible and robust against various common images processing, but also fragile to malicious modification. Especially, it can detect the tampered regions effectively.  相似文献   

15.
基于小波变换的双水印算法   总被引:2,自引:0,他引:2  
数字音频水印是水印技术中重要的组成部分。而近年来对音频水印的研究远远少于图像水印,双水印的研究则更加少。因此提出了一种基于小波变换的双水印算法,在音频信号的小波变换域嵌入两个不同作用的水印,对一些音频处理有很好的鲁棒性的同时又能有效地判别音频信号的真实性和完整性。实验证明本算法的两水印分别具有很好的鲁棒性和敏感性,并实现了水印的盲提取。  相似文献   

16.
基于提升小波的多重数字音频水印   总被引:9,自引:0,他引:9  
该文提出了一种在提升小波域同时嵌入鲁棒水印和易损水印的音频水印算法。原始音频信号经过提升小波变换后,将低频小波系数进行均值量化嵌入鲁棒水印,具有较好的鲁棒性和不可感知性;对高频小波系数直接进行单个系数量化嵌入易损水印,当音频内容发生篡改时,这些水印信息会发生相应的改变,从而可以鉴定原始音频的完整性。水印的提取不需要原始音频信号。实验结果表明,鲁棒水印对MP3压缩、低通滤波、加噪、重量化、重采样等信号处理攻击具有很强的鲁棒性;而易损水印对上述攻击则具有很强的敏感性。  相似文献   

17.
针对在基于DWT-DCT进行数字音频水印嵌入,在已嵌入水印的音频受到噪声干扰、低通滤波、重采样等常见的攻击时,其鲁棒性差以及安全性弱的情况.提出了一种新的的盲水印嵌入算法.该算法对原始音频信号完成分帧预处理后,对每帧信号应用离散小波变换(DWT),选取三级低频分量进行离散余弦变换(DCT),先把得到的一维信号平均分解为两个片段,然后进行奇异值分解(SVD),根据奇异值的特性将水印信息嵌入到奇异矩阵.在水印图像的预处理上,采用了以Arnold变换为基础,将水印图像降维,方便水印信息的嵌入.并且通过添加密匙来提升数字音频水印的安全性.使用5个不同种类的音乐类型,进行仿真实验.实验结果表明:其误码率(BER)在0.0896以下,相关系数(NC)在0.9708以上.本算法对噪声干扰、低通滤波、重采样、重量化、剪切、压缩等常见的攻击方法具有良好的鲁棒性.  相似文献   

18.
图像高逼真度的自适应盲水印算法   总被引:3,自引:0,他引:3  
王沛  余松煜 《电子与信息学报》2003,25(10):1349-1354
随着计算机和网络技术的飞速发展,数字图像、音频和视频产品越来越需要一种有效的版权保护方法,所谓数字水印就是一种嵌入到图像、视频或音频数据中的不可见标志,可以用于多媒体数据的版权保护、认证和标注等。该文提出了一个有效的自适应育水印算法,在水印检测过程中不需要原始图像。原始图像经小波变换后,选择内嵌水印所需要的子带,水印根据邻居特征平均值法和奇偶判决法内嵌到频域中所选择的子带上。实验结论和攻击测试表明,该文所提议的算法能得到高逼真度的加水印图像,对如 JPEG有损压缩、中值滤波、附加噪声、伸缩、裁剪等各种图像处理的攻击有较强的稳健性。  相似文献   

19.
基于听觉掩蔽效应和小波变换的数字音频水印   总被引:7,自引:0,他引:7  
提出了一种基于听觉掩蔽效应和小波变换相结合的音频数字水印算法。根据人耳听觉系统的掩蔽效应,计算载体音频信号的掩蔽阈值,利用小波变换将掩蔽门限映射到小波系数中,然后将水印信号嵌入到中低频子波系数中.嵌入强度由掩蔽阈值自适应控制。实验结果表明:该算法隐藏水印具有很强的掩蔽性;叠加了水印的音频信号对数据压缩、加噪、重采样、低通滤波等常用音频信号处理技术具有很好的鲁棒性。  相似文献   

20.
一种基于DWT与SVD的数字图像水印算法   总被引:3,自引:2,他引:1  
利用小波变换和矩阵奇异值的固有特性,提出了一种基于小波变换和奇异值分解的数字图像水印算法.算法对原始载体图像进行小波变换和奇异值分解;对水印图像进行Arnold变换和奇异值分解;把分解后的水印信息嵌入到分解后的原始载体图像中,再进行相应的变换处理,得到嵌有水印的图像.实验结果表明,该算法具有良好的安全性和鲁棒性.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号