共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
块奇异值分解和量化实现的图像数字水印算法 总被引:3,自引:2,他引:1
讨论了当前将水印嵌入在块奇异值分解(SVD,singular value decomposition)后最大奇异值中的图像数字水印算法不足,进而提出了两种新的将水印嵌入在块SVD后最大奇异值除外的其余奇异值中的图像数字水印算法。两种新算法均采用了量化嵌入策略,从而使两种算法在提取水印时无需任何原始信息的帮助。实验结果表... 相似文献
4.
基于奇异值分解的特征跟踪方法 总被引:1,自引:0,他引:1
在传统的基于模板匹配的跟踪方法中,均是给定一个模板,然后从图像中各个位置取出一个个与模板大小一致的区域进行相似性度量,找出与模板距离最小的一个区域作为当前模板,以便进行下一步的匹配跟踪工作。在景象匹配和相关跟踪过程中,由于所面临的大多数是变化的场景,实时获取的图像与预存模板之间存在比较大的差异,传统相关匹配方法的应用就会受到限制;而且在跟踪过程中,随时更新模板会造成跟踪性能对扰动过分敏感,从而产生漂移。首先拍摄目标不同角度的图像(尽可能包含目标可能出现的所有情况),构成目标图像训练集合,抽取出特征矩阵,对它进行奇异值分解,构成一个关于目标的多维空间。然后再用匹配方法在全局范围搜索,找出目标的大致位置,并利用收敛方法在确定的大致位置内进行搜索,确定目标的仿射变换系数,从而得到一个目标位置的确切描述。 相似文献
5.
6.
A robust audio watermarking scheme based on reduced singular value decomposition and distortion removal 总被引:1,自引:0,他引:1
This paper presents a blind audio watermarking algorithm based on the reduced singular value decomposition (RSVD). A new observation on one of the resulting unitary matrices is uncovered. The proposed scheme manipulates coefficients based on this observation in order to embed watermark bits. To preserve audio fidelity a threshold-based distortion control technique is applied and this is further supplemented by distortion suppression utilizing psychoacoustic principles. Test results on real music signals show that this watermarking scheme is in the range of imperceptibility for human hearing, is accurate and also robust against MP3 compression at various bit rates as well as other selected attacks. The data payload is comparatively high compared to existing audio watermarking schemes. 相似文献
7.
This paper presents a fragile watermarking scheme for tamper localization using Singular Value Decomposition (SVD) and logistic map. The proposed scheme divides the image into blocks of size 2 × 2 pixels and generates an 8-bit watermark from each block. The watermark is computed by permuting the six Most Significant Bits (MSBs) of each pixel in the block using the logistic map, followed by SVD. To secure, the watermark thus generated is further encrypted using the logistic map. This encrypted watermark is embedded into 2 Least Significant Bits (LSBs) of each pixel to enable tamper detection and localization. The experimental results demonstrate that the proposed scheme can precisely locate tampered regions under copy-paste, content removal, text addition, noise addition, vector quantization, collage, content only, and constant feature attacks. Tamper localization accuracy is better or comparable to the state-of-the-art tamper localization algorithms. 相似文献
8.
《AEUE-International Journal of Electronics and Communications》2014,68(9):816-834
This study analyzes the recent image watermarking schemes based on redundant discrete wavelet transform (RDWT) and singular value decomposition (SVD), and shows that in fact they are insecure and cannot be used for protecting the rightful ownership. The RDWT-SVD watermarking directly embeds a grayscale watermark image of the same size with the host image into the singular value matrix of the RDWT-transformed host image, then produces the left and right orthogonal matrices as side information which is later used in the watermark extraction stage. The RDWT-SVD approach enjoys the advantage of the RDWT redundancy to achieve a high embedding capacity, and preserves the watermark imperceptibility by exploiting the SVD stability properties. It is claimed that RDWT-SVD watermarking is robust against several common image processing and geometrical attacks, yet a fundamental flaw in the RDWT-SVD scheme is found, which leads to severe the false positive issue. Three vulnerable attacks should be considered in the RDWT-SVD scheme: (1) An attacker can easily claim the owner watermarked image; (2) the owner has the ambiguity because of the wrong side information usage, and (3) the owner can extract the correct watermark from arbitrary image. Thus, it is important to highlight these attacks when implementing the RDWT-SVD watermarking scheme. 相似文献
9.
《Journal of Visual Communication and Image Representation》2014,25(7):1625-1630
We describe a new no-reference blur index for still images based on a singular value curve (SVC). The algorithm is composed of two steps. First, the singular value decomposition is performed on the image to be blur-assessed. Then an image blur index is constructed from the singular value curve. Experimental results obtained on four simulated blur databases and on the Real Blur Image Database show that the proposed SVC algorithm achieves high correlation against human judgments when assessing the blur distortion of images. 相似文献
10.
基于奇异值分解的图像目标跟踪算法 总被引:1,自引:0,他引:1
传统相关跟踪方法是利用模板图像与目标图像对应像素的灰度差异信息进行跟踪,它对旋转变化敏感,且存在跟踪累积误差,容易导致模板漂移而丢失目标。文中提出基于奇异值分解的跟踪算法,算法首先建立模板图像训练集合,利用奇异值分解方法,张成模板图像特征空间,然后求出模板图像在特征空间里的投影值,代替传统算法中灰度对两幅待匹配图像进行的全局搜索定位。在进行投影值间的相似性度量时,欧氏距离同等对待所有的特征向量不移合理,文中采用了一种鲁棒估计方法,可以对不同距离的值做不同处理。匹配跟踪实验效果良好。 相似文献
11.
Saliency detection has gained popularity in many applications, and many different approaches have been proposed. In this paper, we propose a new approach based on singular value decomposition (SVD) for saliency detection. Our algorithm considers both the human-perception mechanism and the relationship between the singular values of an image decomposed by SVD and its salient regions. The key concept of our proposed algorithms is based on the fact that salient regions are the important parts of an image. The singular values of an image are divided into three groups: large, intermediate, and small singular values. We propose the hypotheses that the large singular values mainly contain information about the non-salient background and slight information about the salient regions, while the intermediate singular values contain most or even all of the saliency information. The small singular values contain little or even none of the saliency information. These hypotheses are validated by experiments. By regularization based on the average information, regularization using the leading largest singular values or regularization based on machine learning, the salient regions will become more conspicuous. In our proposed approach, learning-based methods are proposed to improve the accuracy of detecting salient regions in images. Gaussian filters are also employed to enhance the saliency information. Experimental results prove that our methods based on SVD achieve superior performance compared to other state-of-the-art methods for human-eye fixations, as well as salient-object detection, in terms of the area under the receiver operating characteristic (ROC) curve (AUC) score, the linear correlation coefficient (CC) score, the normalized scan-path saliency (NSS) score, the F-measure score, and visual quality. 相似文献
12.
提出了一种多分辨奇异值分解(MSVD)的新框架,并把它应用于多聚焦图像融合中.首先,基于分块算法原理,利用奇异值分解获得具有不同分辨率的一幅近似和三幅细节图像.然后结合重构算法,给出了图像的融合框架.其次,对比基于离散小波变换(DWT)的融合算法,基于MSVD的融合效果更好,而且 MSVD的基向量只依赖于图像本身而不像小波需要固定的基.最后,采用客观性能指标对结果图像进行评价.实验结果表明,本文的方法不仅简单易行,而且图像表现出良好的视觉效果,清晰度和空间频率都有很大提高. 相似文献
13.
14.
15.
《Signal Processing: Image Communication》2014,29(10):1149-1157
The reciprocal singular value curves of natural images resemble inverse power functions. The bending degree of the reciprocal singular value curve varies with distortion type and severity. We describe two new general blind image quality assessment (IQA) indices that respectively use the area and curvature of image reciprocal singular value curves. These two methods almost require very little prior knowledge of any image or distortion nor any process of training, and they can handle multiple unknown distortions, hence they are no-training methods. Experimental results on five simulated databases show that the proposed algorithms deliver quality predictions that have high correlation with human subjective judgments, and that are competitive with other blind IQA models. 相似文献
16.
现有基于奇异值分解(SVD)的彩色信息加密系统提供了一种光学矩阵分解方案、安全的密文和敏感的密钥。高维张量奇异值分解(HOSVD)是SVD矩阵的自然线性延伸,提出了一种基于HOSVD的彩色图像加密算法。在加密过程中,HOSVD比SVD提供了更多的密文乘法组合次序。这些乘法组合次序可以有效地增加未经授权的解密难度。在解密过程中,HOSVD的重建精度比SVD更高。这些优点提高了准确性、安全性和鲁棒性。通过对100个图像测试数据集的计算机仿真验证了该算法的可行性。 相似文献
17.
18.
基于SVD的小波变换图像去噪方法 总被引:1,自引:0,他引:1
针对传统SVD图像去噪方法的不足,提出了一种基于SVD分解的小波分解图像去噪方法。通过对小波变换的系数矩阵进行奇异值分解,将其中的信号特征成分和噪声分解到不同的正交子空间中,在子空间中选取集成信号特征成分的奇异值矢量进行重构,从而提取出淹没在噪声中的信号成分。实验结果表明该文提出的方法适用于图像信号的提取,与传统的SVD去噪方法相比,它提取出的信号特征成分更完整,信噪比更高。 相似文献
19.
The security of anonymous method based on singular value decomposition (SVD) in the privacy preserving of weighted social network was analyzed.The reconstruction method in network with integer weights and the inexact reconstruction method in network with arbitrary weighted were proposed.The -tolerance was definited to measure its safety.It was also pointed out that the upper bound of ε (the reconfigurable coefficient) obtained in current spectral theories was so conservative that lacks of guidance.The reconfigurable coefficients of random networks,Barabasi-Albert networks,small world networks and real networks were calculated by experiment.Moreover,the reconfigurable coefficients of double perturbation strategies based on SVD were also tested.Experimental results show that weighted social networks have different tolerances on spectrum loss,and there is a close relationship between its tolerance and network parameters. 相似文献
20.
针对常见证据冲突度量方法适应性差、准确性低的问题,提出了一种基于Pignistic概率转换和奇异值分解的证据冲突度量方法。首先通过Pignistic概率转换将证据焦元差异映射到信度差异上,构建证据复合信任函数矩阵。然后采用奇异值分解的方法提取矩阵特征,根据奇异值特性将矩阵特征空间划分为相似子空间和冲突子空间,综合考虑证据矩阵相似特性和冲突特性,将冲突子空间奇异值与相似子空间奇异值之比作为新的冲突度量因子。最后在全冲突场景、变信度场景、变焦元场景、焦元嵌套场景等多种证据冲突场景下将所提方法与常见方法进行了对比分析,结果表明所提方法具有适应性广、准确性高、稳定性好的特点。 相似文献