共查询到20条相似文献,搜索用时 93 毫秒
1.
水印检测错误会严重损害水印系统的可信度.在水印实用化过程中,一个必须解决的问题是如何使水印检测器的错误率达到最小.本文提出在水印检测过程中采用智能信息处理技术-独立分量分析技术来实现智能水印检测器.利用独立分量分析的盲源分离能力,在水印检测过程中不需要任何关于原始图象、水印信号以及可能的攻击信息的情况下不仅可以检测到水印信号的存在而且可以精确的提取水印信号,提取的水印精确度取决于水印与原始图象、密钥之间的独立程度.实验过程中的攻击由Stirmark产生,实验数据证明这种智能水印检测器对Stirmark提供的各种攻击(如剪切、滤波、图象压缩、删行、删列、旋转、尺度变换以及多种攻击同时存在时都具有很好的鲁棒性,还可以进行多个水印的提取.这种新型的智能水印检测器的性能比现有的检水印测器优越很多. 相似文献
2.
水印检测错误会严重损害水印系统的可信度。该文提出基于双谱和能量检测的双通道检测来实现最优盲水印检测器的设计,并给出了一种在小波域中的具体实现。传统检测方法检测概率会随着信噪比的下降而急剧下降。双通道检测时信噪比很小时只要有足够大的双谱信息,即可得到较高的检测概率。即使双谱信息很小时双通道检测系统退化为似然比检测系统,仍是最优的。检测器检测到指定的水印后利用独立分量分析技术进行水印盲恢复。实验过程中攻击由通用水印测试软件Stirmark产生,实验数据证明所设计的最优盲检测器对Stirmark提供的各种攻击(如剪切、JPEG压缩、删行/列、旋转、尺度变换、随机几何攻击等)具有很好的鲁棒性。实验结果说明这种最优检测器的性能优越于现有的水印检测器。 相似文献
3.
4.
5.
6.
7.
数字水印是一种将版权信息隐蔽地嵌入到原始数据中的技术,在过去的几年中得到了广泛的研究和应用。每个水印系统都包含两个主要组成部分:水印嵌入和水印提取/检测。近年来对水印的理论分析表明。数字水印与通信系统有着直接的联系。这种联系在设计高效优化的水印检测器时显得尤为重要。着重讨论在通信理论的基础上怎样设计优良的水印检测器。 相似文献
8.
9.
数字水印技术作为版权保护的有效手段已经成为研究的热点.结合倒谱分析法在音频水印中的成功应用,文中提出了一种倒谱域图像水印算法,将二值随机序列作为水印信号嵌入在图像的双倒谱变换系数的相位成分中,并利用相关检测器进行水印检测.实验证明,该算法具有较好的透明性,对通常的图像攻击,如噪声、中值滤波、剪切、JPEE压缩等都具有较强的鲁棒性. 相似文献
10.
11.
Digital watermarking robust to geometric distortions. 总被引:23,自引:0,他引:23
Ping Dong Jovan G Brankov Nikolas P Galatsanos Yongyi Yang Franck Davoine 《IEEE transactions on image processing》2005,14(12):2140-2150
In this paper, we present two watermarking approaches that are robust to geometric distortions. The first approach is based on image normalization, in which both watermark embedding and extraction are carried out with respect to an image normalized to meet a set of predefined moment criteria. We propose a new normalization procedure, which is invariant to affine transform attacks. The resulting watermarking scheme is suitable for public watermarking applications, where the original image is not available for watermark extraction. The second approach is based on a watermark resynchronization scheme aimed to alleviate the effects of random bending attacks. In this scheme, a deformable mesh is used to correct the distortion caused by the attack. The watermark is then extracted from the corrected image. In contrast to the first scheme, the latter is suitable for private watermarking applications, where the original image is necessary for watermark detection. In both schemes, we employ a direct-sequence code division multiple access approach to embed a multibit watermark in the discrete cosine transform domain of the image. Numerical experiments demonstrate that the proposed watermarking schemes are robust to a wide range of geometric attacks. 相似文献
12.
Digital watermark technology is now drawing attention as a new method of protecting digital content from unauthorized copying. This paper presents a novel audio watermarking algorithm to protect against unauthorized copying of digital audio. The proposed watermarking scheme includes a psychoacoustic model of MPEG audio coding to ensure that the watermarking does not affect the quality of the original sound. After embedding the watermark, our scheme extracts copyright information without access to the original signal by using a whitening procedure for linear prediction filtering before correlation. Experimental results show that our watermarking scheme is robust against common signal processing attacks and it introduces no audible distortion after watermark insertion. 相似文献
13.
基于几何矩的抵抗RST攻击的数字图像水印 总被引:8,自引:0,他引:8
目前大多数的数字图像水印方案不能有效抵抗几何形变的攻击,这一弱点已成为数字水印技术走上商用的瓶颈。在各种几何形变中,RST(旋转、缩放、平移)是最为常见的攻击方式。该文提出了一种具有普适性的能够抵抗RST攻击的多比特数字图像水印方案,采用的主要措施有:(1)提出一种基于几何矩的图像标准化方案以抵抗几何攻击;(2)采用扩谱方法构造二维CDMA水印信号,实现多比特水印嵌入;(3)根据HVS特性自适应调整水印的嵌入强度,在鲁棒性和不可见性之间达到平衡;(4)利用MAP和相关方法估计和检测水印信号。实验表明该方案对RST具有很高的鲁棒性,对压缩、滤波等常见的图像处理攻击同样具有良好的鲁棒性。 相似文献
14.
This study presents a supplementary cepstrum-based scheme to achieve blind audio watermarking via the mean-value manipulation. The proposed scheme can work with the conventional statistical mean manipulation to double the watermark capacity under the same framework. As these two cepstral schemes affect the spectrum in low frequencies in a superposition manner, the developed watermarking system employs the conventional scheme to initiate a start and the new one to actually embed watermark bits. During the embedding phase, the rapid variations between frames caused by the watermarking process are avoided by adding a transition space. In addition, the watermarking system maintains data synchronization through the insertion of a sinusoid-like signal which keeps synchronization with the frame rate. Experimental results confirm the robustness of the proposed scheme against various attacks, including time-scaling and time-shifting that many other watermarking techniques failed to survive through. 相似文献
15.
Robust image watermarking based on multiband wavelets and empirical mode decomposition. 总被引:5,自引:0,他引:5
Ning Bi Qiyu Sun Daren Huang Zhihua Yang Jiwu Huang 《IEEE transactions on image processing》2007,16(8):1956-1966
In this paper, we propose a blind image watermarking algorithm based on the multiband wavelet transformation and the empirical mode decomposition. Unlike the watermark algorithms based on the traditional two-band wavelet transform, where the watermark bits are embedded directly on the wavelet coefficients, in the proposed scheme, we embed the watermark bits in the mean trend of some middle-frequency subimages in the wavelet domain. We further select appropriate dilation factor and filters in the multiband wavelet transform to achieve better performance in terms of perceptually invisibility and the robustness of the watermark. The experimental results show that the proposed blind watermarking scheme is robust against JPEG compression, Gaussian noise, salt and pepper noise, median filtering, and ConvFilter attacks. The comparison analysis demonstrate that our scheme has better performance than the watermarking schemes reported recently. 相似文献
16.
17.
It is a challenging work to design a blind color image watermarking scheme for protecting copyright, which is different from the existing schemes used binary image or grayscale image as watermark and is also different from other non-blind watermarking schemes. In this paper, we analyze the feature of the upper Hessenberg matrix, and propose a blind color image watermarking scheme using upper Hessenberg matrix of Hessenberg transform. Arnold transform is used to improve the security, and the MD5-based Hash pseudo-random algorithm is also used to improve the robustness. In the process of watermark embedding, the encrypted watermark information is embedded into the biggest energy element of the Hessenberg matrix by quantization technique. In the process of watermark extraction, the watermark is extracted from the attacked host image with blind manner. Simulation results show that the proposed scheme outperforms other related methods in the aspects of the invisibility, robustness, capacity and computational complexity. 相似文献
18.
The homomorphic cryptosystems create a great opportunity for secure signal processing (SSP). Watermarking in the encrypted domain provides a promising solution to the security of watermarking. However, the robust performance of the watermarking scheme in the encrypted domain should be carefully considered. In this paper, we propose a robust watermarking scheme in the encrypted domain, which protects the original images from the third party embedders. The hybrid discrete wavelet transform (DWT) and discrete cosine transform (DCT) based method improves the robust performance of the encrypted domain watermarking scheme. The watermark extraction can be performed on both the plaintext and the encrypted domains. We also give an estimation of the expanding factor after watermark embedding in the encrypted domain. At last, we discuss the watermark attacks that are available in the encrypted domain. Taking Haar wavelet transform for example, we conduct the experiments on the visual quality and the robustness of our watermarking scheme, which demonstrate that the entire performance is satisfactory. 相似文献
19.
Contourlet-based image adaptive watermarking 总被引:2,自引:0,他引:2
Haohao Song Songyu Yu Xiaokang Yang Li Song Chen Wang 《Signal Processing: Image Communication》2008,23(3):162-178
In the contourlet transform (CT), the Laplacian pyramid (LP) decomposes an image into a low-frequency (LF) subband and a high-frequency (HF) subband. The LF subband is created by filtering the original image with 2-D low-pass filter. However, the HF subband is created by subtracting the synthesized LF subband from the original image but not by 2-D high-pass filtering the original image. In this paper, we propose a contourlet-based image adaptive watermarking (CIAW) scheme, in which the watermark is embedded into the contourlet coefficients of the largest detail subbands of the image. The transform structure of the LP makes the embedded watermark spread out into all subbands likely in which the LF subbands are included when we reconstruct the watermarked image based on the watermarked contourlet coefficients. Since both the LF subbands and the HF subbands contain watermarking components, our watermarking scheme is expected to be robust against both the LF image processing and the HF image processing attacks. The corresponding watermarking detection algorithm is proposed to decide whether the watermark is present or not by exploiting the unique transform structure of LP. With the new proposed concept of spread watermark, the watermark is detected by computing the correlation between the spread watermark and the watermarked image in all contourlet subbands fully. The proposed CIAW scheme is particularly superior to the conventional watermarking schemes when the watermarked image is attacked by some image processing methods, which destroy the HF subbands, thanks to the watermarking components preserved in the LF subbands. Experimental results show the validity of CIAW in terms of both the watermarking invisibility and the watermarking robustness. In addition, the comparison experiments prove the high-efficiency of CIAW again. 相似文献
20.
This paper proposes a self-embedding watermarking scheme for digital images. It exploits a digital halftoning technique to
transform the host image to a halftone image, in which the content features of the host image are well preserved. This halftone
image is utilized as an approximate or compressed version of the host image and further adopted as a watermark. Unlike most
available self-embedding watermarking techniques, in which watermark embedding, tamper detection and image recovery are block-wise-based,
our scheme is a pixel-wise and block-wise composite scheme. That is, the watermark is pixel-wise permuted and embedded in
the least-significant-bit plane of the host image, while in tamper detection and image recovery, a block-wise strategy is
employed. This pixel-wise and block-wise complementary mechanism can overcome a common disadvantage of previous block-wise-based
self-embedding watermarking techniques. Our scheme can be used for tamper detection and alteration location. Moreover, the
tampered area can be approximately recovered using the extracted watermark. Experimental results demonstrate the effectiveness
of the proposed scheme. 相似文献