共查询到20条相似文献,搜索用时 31 毫秒
1.
图像隐形水印是解决数字媒体版权保护的有效手段.目前的大多数水印算法采用伪随机序列构成水印,因而只能给出"Yes"(有水印)或"No"(无水印)的回答.嵌入有意义的水印在一些应用场合更加重要,但同时也带来了更多的困难.嵌入有意义的水印必须解决二个问题:(1)嵌入的水印具有一定的数据量;(2)从有失真的水印图像中正确地提取嵌入的水印.本文应用数字通信的理论和方法,提出了一个嵌入有意义字符串的DCT域隐形水印算法.该算法采用BCH编码和匹配滤波来降低误码率.应用所提出的算法,把一个32个字符组成的水印嵌入到256×256的图像中并达到了较好的稳健性.在水印图像信噪比受Gaussian加性噪声干扰下降到26dB时,仍实现了对嵌入水印零错误概率的检测. 相似文献
2.
An Anti-Cutting Watermarking Algorithm Based on Matrix Multiplication Secret Sharing Scheme 总被引:1,自引:0,他引:1
1 IntroductionWiththedevelopmentofcomputersandinter net,therehasbeenarapidgrowthindigitalmulti mediainrecentyears.Itiseasytoduplicateal thoughitisfastandefficientforsignalprocessing .Anunlimitednumberofperfectcopiescanbeillegal lyproduced ,whichisaseriousthreattothecopyrightofauthors.Watermarkingcanbeusedforowneridentification ,royaltypayment,etc,byde terminingwhetherthedataisaltered ,orholdingthespecificinformationoftheowner[1~ 3] .Watermark ingtechnologyisaneffectiveapproachtosettlingil l… 相似文献
3.
介绍了离散余弦变换的系数特征,提出了一种基于离散余弦变换的彩色图像置乱数字水印算法。算法是将数字水印置乱加密后微小的扰动原始彩色图像经离散余弦变换后的对应系数,从而达到数字水印嵌入的目的。仿真实验表明算法简单高效,原图像与嵌入水印后图像差异小,水印提取准确,能较好的保证数字水印不可感知性,在对嵌入水印图像进行各种加噪、裁剪、旋转、锐化等处理后,水印仍有较强的鲁棒性。 相似文献
4.
基于重叠正交变换的自适应图像水印 总被引:1,自引:0,他引:1
本文提出了一种基于重叠正交变换(LOT)的自适应图像水印算法,给出了水印嵌簇检测的详细算法设计,数字图像水印是最近发展起来的一项新技术,它为图像的版权保护问题提供了一种新的解决思路,本文首次在水印算法中采用了LOT以代替传统的离散余弦变换(DCT),从而有效地避免了DCT的块效应,同时,本文还利用人的视觉系统(HVS)特性,在对图像块进行分类的基础上完成水印的自适应嵌入,实验结果表明,本文所提出的图像水印算法有效地提高了水印的鲁棒性和透明性。 相似文献
5.
In this paper, a new multiscale fragile watermarking scheme based on the Gaussian mixture model (GMM) is presented. First, a GMM is developed to describe the statistical characteristics of images in the wavelet domain and an expectation-maximization algorithm is employed to identify GMM model parameters. With wavelet multiscale subspaces being divided into watermarking blocks, the GMM model parameters of different watermarking blocks are adjusted to form certain relationships, which are employed for the presented new fragile watermarking scheme for authentication. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. A secret embedding key is designed to securely embed the fragile watermarks so that the new method is robust to counterfeiting, even when the malicious attackers are fully aware of the watermark embedding algorithm. It is shown that the presented new method can securely embed a message bit stream, such as personal signatures or copyright logos, into a host image as fragile watermarks. Compared with conventional fragile watermark techniques, this new statistical model based method modifies only a small amount of image data such that the distortion on the host image is imperceptible. Meanwhile, with the embedded message bits spreading over the entire image area through the statistical model, the new method can detect and localize image tampering. Besides, the new multiscale implementation of fragile watermarks based on the presented method can help distinguish some normal image operations such as JPEG compression from malicious image attacks and, thus, can be used for semi-fragile watermarking. 相似文献
6.
Hidden digital watermarks in images 总被引:146,自引:0,他引:146
Chiou-Ting Hsu Ja-Ling Wu 《IEEE transactions on image processing》1999,8(1):58-68
An image authentication technique by embedding digital "watermarks" into images is proposed. Watermarking is a technique for labeling digital pictures by hiding secret information into the images. Sophisticated watermark embedding is a potential method to discourage unauthorized copying or attest the origin of the images. In our approach, we embed the watermarks with visually recognizable patterns into the images by selectively modifying the middle-frequency parts of the image. Several variations of the proposed method are addressed. The experimental results show that the proposed technique successfully survives image processing operations, image cropping, and the Joint Photographic Experts Group (JPEG) lossy compression. 相似文献
7.
Watermarking on Colored Images 总被引:3,自引:2,他引:1
MUSSA Bshara NIU Xin xin LUO Shou shan YANG Yi xian Foundation item: Project Supported by National Foundation of Natural Sciences 《中国邮电高校学报(英文版)》2001,8(1)
1 IntroductionInthelastfew years,manyschemesofwater markinghavebeenintroduced ,andtheresearchersalwaystrytheirbesttofindanalgorithmwhichal lowsthemtoembedarobustwatermarkwithoutaf fectingthequalityoftheimage.Uptillnow ,therehasbeennoschemegoodenoughtobead… 相似文献
8.
9.
10.
11.
12.
Multiple watermarking based techniques are receiving more attention in recent times for its wide variety of applications in different fields. To protect the copyright ownership and validate the authenticity of multiple owners, in this paper a color multiple watermarking method based on DCT (Discrete Cosine Transform) and repetition code is proposed and simulated. Initially, green and blue components of color host image are selected for inserting multiple watermarks. Then, each green and blue component of the image is decomposed into non overlapping blocks and subsequently DCT is employed on each block. In this technique, a binary bit of watermark is embedded into green/blue component’s transformed block by modifying some middle significant AC coefficients using repetition code. During multiple watermarks embedding in green and blue components of the proposed method, DC and some higher AC coefficients are kept intact after zigzag scanning of each DCT block to ensure the imperceptibility of the watermarked host image. The proposed scheme is experimented to establish the validity by extracting adequate multiple watermark data from the restructured cover image after applying common geometric transformation attacks (like rotation, cropping, scaling and deletion of lines/columns etc.), common enhancement technique attacks (like lowpass filtering, histogram equalization, sharpening, gamma correction, noise addition etc.) and JPEG compression attacks. 相似文献
13.
14.
Blind and robust audio watermarking scheme based on SVD-DCT 总被引:1,自引:0,他引:1
Singular value decomposition (SVD) is a new and important transform technique in robust digital watermarking due to its different properties from the traditional transforms such as Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). In this paper, we propose a new, blind and robust audio watermarking scheme based on SVD-DCT with the synchronization code technique. We embed a binary watermark into the high-frequency band of the SVD-DCT block blindly. Chaotic sequence is adopted as the synchronization code and inserted into the host signal. Experimental results show that the proposed watermarking method is comparable to, if not, better than SVD based method and several selected typical audio watermarking methods, even in the presence of various common signal processing attacks. 相似文献
15.
一种改进的数字图像扩频水印技术 总被引:2,自引:0,他引:2
提出了一种改进的数字图像扩频水印技术。该算法将水印序列经过伪随机序列扩展频谱后,根据图像本身的亮度掩盖特性和DCT域的频率掩盖特性,计算出图像子块不同部分的最小掩盖阈值,由此在图象的不同部分嵌入不同强度的水印,从而在保证水印不可视的前提下,提高了算法的鲁棒性,使其对JPEG压缩、中值滤波等攻击具有很好的抵抗能力。 相似文献
16.
本文提出了一类基于DCT特性的鲁棒加半脆弱的双水印算法.首先根据图像的纹理特性将原始图像分块,然后,利用不同的嵌入因子将可见水印嵌入到原始图像以显示所有权,然后通过混沌序列确定不可见水印的嵌入位置,将它嵌入到高纹理区以认证图像,从而达到防篡改的目的.经验证,此双水印系统能够有效达到标识认证图像所有权的目的,有较高的鲁棒性和实效性. 相似文献
17.
提出了一种将离散小波变化与离散余弦变换相结合的音频数字水印技术。利用离散小波变换的多分辨率特性和离散余弦变换的能量压缩能力,通过修改变换域的低中频系数,把降维后的二值图像嵌入到原始数字音频信号中。该算法可同时应用两种变换,而且嵌入和提取水印的方法简单。实验结果表明该算法水印不易破坏,对数字音频信号的低通滤波、叠加噪声等攻击均具有很好的隐蔽性和稳健性。 相似文献
18.
This paper studies the methods of image digital watermarking based on wavelet transform. Firstly, the characteristics of image digital watermarking as well as its processing procedure are introduced. On this basis, the discrete wavelet transform (DWT) is selected to achieve the embedding and distilling of image digital watermarking. Simulation test proves that this algorithm can embed or distill digital watermark effectively. Meanwhile it also proves that this watermark has better abilities of hiding and anti-interference. This method results in significant amount of computational savings as well. 相似文献
19.
In this article we introduce a new public digital watermarking technique for video copyright protection working in the discrete wavelet transform domain. The scheme uses binary images as watermarks. These are embedded in the detail wavelet coefficients of the middle wavelet sub-bands. The method is a combination of spread spectrum and quantisation-based watermarking. Every bit of the watermark is spread over a number of wavelet coefficients with the use of a secret key. The resilience of the watermarking algorithm was tested against a series of eight different attacks using different videos. To improve the resilience of the algorithm we use error correction codes and embed the watermark with spatial and temporal redundancy. The proposed method achieves a very good perceptual quality with mean peak signal-to-noise ratio values of the watermarked videos of more than 40 dB and high resistance to a large spectrum of attacks. 相似文献
20.
一种基于离散余弦变换与奇异值分解的数字图像水印算法 总被引:2,自引:1,他引:2
结合奇异值分解(SVD)和离散余弦变换(OCT)的特点,提出了一种基于离散余弦交换与奇异值分解的数字图像水印算法.该算法能够很好地解决透明性和鲁棒性之间的矛盾.算法中采用经过置乱变换的灰度图作为水印,不仅增加了嵌入的信息量,而且提高了水印的安全性.实验结果表明,该算法不仅具有较好的透明性,而且对常见攻击如:叠加噪声、JPEG压缩、滤波以及几何攻击等具有较好的鲁棒性. 相似文献