首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到16条相似文献,搜索用时 171 毫秒
1.
基于Krawtchouk不变矩的仿射攻击不变性局部水印算法   总被引:4,自引:1,他引:3       下载免费PDF全文
张力  肖薇薇  钱恭斌  纪震 《电子学报》2007,35(7):1403-1408
本文提出了一种基于原始图像Krawtchouk不变矩实现的仿射攻击不变性局部水印算法.具体介绍了Krawtchouk不变矩的构造方法,水印是事先产生的且与原始图像无关,通过将水印嵌入到图像的Krawtchouk不变矩中实现仿射攻击不变性.这种基于Krawtchouk矩的水印算法是局部水印技术,即水印的嵌入只是影响到部分原始图像,因此该算法对剪切攻击具有很好的鲁棒性.检测过程中采用独立分量分析技术实现真正意义上的盲检测.文中具体分析了所提出算法的计算复杂度,实验数据说明这种水印算法对通用水印测试软件Stirmark具有很好的鲁棒性.  相似文献   

2.
针对目前基于图像不变特征水印算法不能同时有效抵抗常规图像处理和几何攻击这一问题,提出了一种基于局部Tchebichef矩(LTMs)的图像水印新算法。首先,利用Harris-Laplace检测算子提取载体图像多尺度空间中的特征点,并通过特征选择策略获得稳定且分离的局部圆形特征区域;然后,结合主方向对齐,得到具有旋转、缩放和平移(RST)不变性的局部圆形特征区域;最后,计算局部特征区域的Tchebichef矩,采用量化调制Tchebichef低阶矩幅值将水印嵌入到局部特征区域中。实验结果表明,本文算法在获得很好的不可见性的同时,对常规图像处理、几何攻击及组合攻击具有较好的鲁棒性。  相似文献   

3.
Tchebichef矩在图像数字水印技术中的应用   总被引:6,自引:0,他引:6  
张力  韦岗  张基宏 《通信学报》2003,24(9):10-18
提出了一种利用原始图像的Tchebichef矩来增加水印顽健性的方法,即利用原始图像的一个或多个Tchebichef矩的值来估计水印图像所经过的几何变换的参数以及图像增强等图像处理操作的参数,并将这一过程作为水印检测的预处理过程。实验中将多种不同的水印信息在不同的图像处理域(包括DWT、DCT、FFT以及空间域等)实现水印信息的嵌入。为了检测这种估计算法的顽健性,本文实验中的几何攻击是由Stirmark产生的。计算机模拟实验证明这种估计方法简单,估计精度很高,增加了图像水印技术对几何攻击的顽健性,而且可在任何处理域中实现,具有很好的实用价值。1  相似文献   

4.
针对目前通信技术中,鲁棒性水印技术面临的抗几何攻击这一难题,且现有鲁棒性水印算法不足,文中提出归一化鲁棒性的盲水印算法,以恢复水印同步性为目的,通过整合图像归一化技术、小波变换、加密置乱和盲水印等处理方法,并利用图像归一化所具有的几何不变性,研究能抵抗几何攻击的鲁棒性水印算法。实验结果表明:嵌入水印图像对常规的信号处理和几何攻击有很强的鲁棒性,尤其在同步攻击的放缩和拉伸攻击及旋转攻击方面效果更为显著。文中所提出的水印算法大大提高了现有水印算法对于旋转攻击的鲁棒性,有很重要的现实意义。  相似文献   

5.
基于ICA的智能数字水印技术   总被引:3,自引:0,他引:3  
该文提出了一种基于智能信息分析方法--独立分量分析的智能数字水印新算法。水印嵌入之前先对其进行预处理,嵌入过程可以在图像任意作用域中实现,并给出了小波域中的一种闭环嵌入方法。水印嵌入的强度由小波域视觉模型决定。在不需要任何原始图像、水印和攻击类型等信息的情况下,该算法不仅可以检测到水印而且可以完全提取水印,实现了真正意义上的水印盲检测,并对多个水印嵌入的情况也可以进行水印提取。水印检测的精确程度取决于图像与水印之间的独立性以及所采用的密钥。实验过程中攻击由通用水印测试软件Stirmark产生,实验数据证明本文提出的水印算法对Stirmark提供的各种攻击剪切、滤波、图象压缩、删行、删列、几何攻击以及多种攻击同时存在时都具有很好的鲁棒性。  相似文献   

6.
提出了一种新的多比特水印算法。该算法把基于图像自身的水印信息嵌入到图像的DC系数中,通过视觉模型控制DC系数的改变程度,在保证水印不可见性的同时,提高了水印的鲁棒性。为实现水印的盲检测,采用Gold码序列对水印信息进行了扩频。在检测阶段,充分利用Gold序列良好的相关性恢复出水印。应用所提出算法,把水印信息嵌入到一幅512×512的灰度图像中。实验表明,该算法对常规信号处理攻击和几何攻击具有很强的鲁棒性。  相似文献   

7.
基于几何矩的抵抗RST攻击的数字图像水印   总被引:8,自引:0,他引:8  
目前大多数的数字图像水印方案不能有效抵抗几何形变的攻击,这一弱点已成为数字水印技术走上商用的瓶颈。在各种几何形变中,RST(旋转、缩放、平移)是最为常见的攻击方式。该文提出了一种具有普适性的能够抵抗RST攻击的多比特数字图像水印方案,采用的主要措施有:(1)提出一种基于几何矩的图像标准化方案以抵抗几何攻击;(2)采用扩谱方法构造二维CDMA水印信号,实现多比特水印嵌入;(3)根据HVS特性自适应调整水印的嵌入强度,在鲁棒性和不可见性之间达到平衡;(4)利用MAP和相关方法估计和检测水印信号。实验表明该方案对RST具有很高的鲁棒性,对压缩、滤波等常见的图像处理攻击同样具有良好的鲁棒性。  相似文献   

8.
为了增强水印的抗几何攻击能力,提出了一种基于归一化和Bessel-Fourier矩的鲁棒水印算法。首先对图像进行归一化,使图像的Bessel-Fourier矩具有旋转、缩放和平移(RST)不变性;然后通过使用Bessel-Fourier多项式直接将水印添加到图像的空域强度中,嵌入强度由一个迭代特征修改和验证程序控制,可以避免在水印嵌入和检测过程中引入错误。大量的实验结果表明,本文提出的水印算法对几何攻击以及一般的信号处理具有很好的鲁棒性。  相似文献   

9.
一种小波域自适应鲁棒闭环数字盲水印技术   总被引:11,自引:1,他引:10       下载免费PDF全文
张力  韦岗  张基宏 《电子学报》2003,31(10):1476-1480
本文提出了一种基于小波域的闭环自适应图像鲁棒数字盲水印技术.水印的嵌入过程是一个闭环过程,且其嵌入的位置及强度均与原始图像有关.水印嵌入的初始强度由小波域图像压缩的量化因子决定,并根据检测要求不断的进行调整,从而达到水印的最佳嵌入.本文证明了这种闭环系统的收敛性,并且给出了水印检测过程中正确检测概率和虚警检测概率的求解公式,可用于闭环系统的检测性能判决条件.水印的检测过程中不需要任何原始图像和原始水印信号的信息,采用独立分量分析实现对水印信号的盲检测.检测过程中不仅可以检测到水印的存在,而且可以提取出嵌入到图像中的多个水印信号.实验结果证实了本文提出的闭环自适应数字盲水印技术优于传统的自适应水印技术,水印检测过程中在不需要考虑水印图像所经历的攻击类型及攻击参数的情况下可以正确的提取水印信号.本文提出的水印算法对通用水印测试软件Stirmark具有很好的鲁棒性.  相似文献   

10.
提出一种基于时域同步的音频水印算法,在音频信号的时间域上检索满足一定信号强度的区域作为同步区域,把水印图像分块,每个水印分块及其编号嵌入到一个同步区域,水印按照分块顺序循环嵌入到检索到的同步区域;水印比特嵌入在同步区域的小波变换域上,通过拼凑法修改低频系数的幅度值实现水印比特的嵌入。水印检测不需要原始音频信号,是一种盲检测水印算法。仿真实验证明了算法对一般的音频信号处理具有较好的鲁棒性和透明性,对同步攻击、抖动攻击具有较好的鲁棒性。  相似文献   

11.
Geometric Invariance in image watermarking   总被引:19,自引:0,他引:19  
Surviving geometric attacks in image watermarking is considered to be of great importance. In this paper, the watermark is used in an authentication context. Two solutions are being proposed for such a problem. Both geometric and invariant moments are used in the proposed techniques. An invariant watermark is designed and tested against attacks performed by StirMark using the invariant moments. On the other hand, an image normalization technique is also proposed which creates a normalized environment for watermark embedding and detection. The proposed algorithms have the advantage of being robust, computationally efficient, and no overhead needs to be transmitted to the decoder side. The proposed techniques have proven to be highly robust to all geometric manipulations, filtering, compression and slight cropping which are performed as part of StirMark attacks as well as noise addition, both Gaussian and salt & pepper.  相似文献   

12.
基于局部Zernike矩的RST不变水印   总被引:1,自引:0,他引:1  
旋转、缩放和平移(RST)等几何攻击能够破坏水印检测的同步性,而使常规水印检测失败,提出了一种基于图像局部Zernike矩的RST不变水印算法.利用图像归一化后的Zernike矩幅度具有RST不变的性质,将由Zernike矩重构的水印图像在空域嵌入原始图像的局部中,并提取该区域的Zernike矩幅度矢量作为水印矢量.水印检测时,计算局部区域的Zernike矩,并与已知Zernike矩矢量计算均方误差根(RMSE)判断水印存在与否.与使用图像全局Zernike矩相比,使用局部矩使得水印具有更好的旋转不变性,同时水印对于缩放、JPEG压缩和噪声等攻击也具有较好的检测性能.  相似文献   

13.
In this article, a novel robust image watermarking scheme is presented to resist rotation, scaling, and translation (RST). Initially, the original image is scale normalized, and the feature points are then extracted. Furthermore, the locally most stable feature points are used to generate several nonoverlapped circular regions. These regions are then rotation normalized to generate the invariant regions. Watermark embedding and extraction are implemented in the invariant regions in discrete cosine transform domain. In the decoder, the watermark can be extracted without the original image. Simulation results show that the proposed scheme is robust to traditional signal processing attacks, RST attacks, as well as some combined attacks.  相似文献   

14.
In this work, we propose a robust image watermarking algorithm using local Zernike moments, which are computed over circular patches around feature points. The proposed algorithm locally computes Zernike moments and modifies them to embed watermarks, achieving robustness against cropping and local geometric attacks. Moreover, to deal with scaling attacks, the proposed algorithm extracts salient region parameters, which consist of an invariant centroid and a salient scale, and transmits them to the decoder. The parameters are used at the decoder to normalize a suspect image and detect watermarks. Extensive simulation results show that the proposed algorithm detects watermarks with low error rates, even if watermarked images are distorted by various geometric attacks as well as signal processing attacks.  相似文献   

15.
Geometrically robust image watermarking based on Jacobi-Fourier moments   总被引:1,自引:0,他引:1  
Rotation, scaling and translation (RST) attacks can desynehronize the watermark detection so that many watermark systems failed. A geometrically robust image watermarking strategy based on Jacobi-Fourier moments (JFMs) is proposed. The Jacobi moments of the original image are first extracted as original moments; then the watermark image is embedded into the global or local area of the original image, and the Jacobi moments of the area are extracted. When the watermarked image is not attacked, the watermark can be retrieved by using the margin of the original moments and the moments of the embedded area. When it is attacked, the watermark can also be got in that way, and the original moments need to be transformed. It can be concluded that Jacobi- Fourier moments perform better than Zemike moments (ZMs) for small images. Meanwhile, the watermark is also robust to scaling and rotation as well as regular attacks such as added noises.  相似文献   

16.
This paper proposes a novel robust video watermarking scheme based on local affine invariant features in the compressed domain. This scheme is resilient to geometric distortions and quite suitable for DCT-encoded compressed video data because it performs directly in the block DCTs domain. In order to synchronize the watermark, we use local invariant feature points obtained through the Harris-Affine detector which is invariant to affine distortions. To decode the frames from DCT domain to the spatial domain as fast as possible, a fast inter-transformation between block DCTs and sub-block DCTs is employed and down-sampling frames in the spatial domain are obtained by replacing each sub-blocks DCT of 2×2 pixels with half of the corresponding DC coefficient. The above-mentioned strategy can significantly save computational cost in comparison with the conventional method which accomplishes the same task via inverse DCT (IDCT). The watermark detection is performed in spatial domain along with the decoded video playing. So it is not sensitive to the video format conversion. Experimental results demonstrate that the proposed scheme is transparent and robust to signal-processing attacks, geometric distortions including rotation, scaling, aspect ratio changes, linear geometric transforms, cropping and combinations of several attacks, frame dropping, and frame rate conversion.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号