首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In this paper, a robust semi-blind watermarking scheme for color images, based on multiple decompositions is proposed to preserve the copyrights of the owner. Using multiple decompositions, the gray watermark is embedded into a host color image. Prior to that, to enhance security the gray watermark is encrypted with Arnold transform and SVD by generating secret keys. The luminance component of the given host image is subjected to discrete wavelet transform(DWT), contourlet transform(CT), Schur decomposition and singular value decomposition(SVD) in sequence and finally the watermark is embedded. In the semi-blind extraction process, the watermark is extracted without the help of the original host image. Experimental results show that the proposed watermarking scheme has better visual imperceptibility and high robustness against image & signal processing attacks compared to other methods.  相似文献   

2.
为了设计更加鲁棒的数字水印算法,在对水印的嵌入过程、提取过程及其抗攻击性能进行分析的基础上,提出了一种图像灰度水印自适应嵌入与自适应提取新方案。该方案基于小波变换的多分辨率特性,利用人眼的亮度感觉及对比灵敏度阈值等人类视觉系统特性,并结合图像各个局部小波子块的亮度与纹理特征,在嵌入的过程中,通过动态地计算各个局部块的自适应嵌入强度因子来嵌入水印。提取时,则根据从不同区域提取出的水印信息自适应计算最佳的水印提取结果,这就从提取的角度大大改善了水印系统的性能。实验结果表明,该算法对多种攻击具有较强的鲁棒性,尤其对平滑、滤波、JPEG压缩、JPEG2000压缩以及位平面去除等攻击,其鲁棒性更明显。  相似文献   

3.
Robust and transparent watermarking scheme for colour images   总被引:1,自引:0,他引:1  
In this study, a robust and transparent watermarking scheme for colour images is proposed. The colour features for the human visual system are utilised to design the colour watermarking scheme. Through the exploitation of the perceptual redundancy of colour images, the proposed watermarking scheme is perceptually tuned to embed and detect the watermark in the perceptually significant sub-bands of luminance and chrominance components of colour images in the wavelet domain. The employment of the uniformity in the uniform colour space and the masking effect mainly due to local variations in luminance magnitude leads to that the perceptual redundancy of colour images can be measured. By using the estimated perceptual redundancy in the form of error visibility thresholds of wavelet coefficients of the colour image, high strength watermarks are invisibly embedded into coefficients of the host colour image for resisting compression and malicious attacks. Simulation results show that the estimation of perceptual redundancy is helpful to the design of the watermarking scheme for colour images. The performance in terms of robustness and transparency of the proposed watermarking scheme is superior to that of the existing scheme.  相似文献   

4.
为了提高数字水印的鲁棒性和安全性,利用人眼对彩色图像视敏度特性的分析,提出了一种基于FRFT及HVS的自适应彩色数字水印算法。利用谱度量构造纹理掩蔽因子,并将它与图像的亮度及边缘掩蔽因子结合,构造彩色图像自适应掩蔽因子,将其作为嵌入强度,通过改变载体图像的FRFT中频系数进行水印嵌入。实验结果表明,该算法具有自适应能力强、隐蔽性好、安全性高等特点。  相似文献   

5.
虽然小波域加性水印算法具有较好的不可感知性,但其鲁棒性较弱。因此,结合小波域视觉模型,提出了一种基于小波视觉模型的乘性图像水印算法。在水印嵌入过程中,为平衡水印的不可感知性和鲁棒性,以中频子带作为水印嵌入空间,并根据图像的频域敏感度、亮度敏感度、纹理复杂度确定水印的嵌入强度。在水印检测过程中,采用广义高斯分布(GGD)对小波系数的统计特性进行刻画,并通过奈曼-皮尔逊(NP)准则确定水印系统的检测阈值,给出了水印系统的虚警概率和检测概率之间的接收者操作特征(ROC)曲线关系。最后通过实验测试了该算法在抗压缩、叠加噪声、缩放和剪切等攻击时的鲁棒性能。仿真结果表明:该算法具有较好的检测性能以及在抗攻击时具有较强的鲁棒性。  相似文献   

6.
基于SVD的灰度水印单色通道嵌入算法   总被引:2,自引:0,他引:2       下载免费PDF全文
为了更有效地进行多媒体数据的版权保护,提出了一种在真彩色宿主图像中利用奇异值分解实现的灰度水印嵌入的鲁棒算法。该算法首先利用奇异值的特征来对灰度水印图像进行编码预处理,编码后的水印信息存储为二值数字序列,并选择视觉掩蔽性高的宿主图像区域进行隐藏。为了保证水印的不可察觉性,该水印算法先提取宿主图像RGB彩色空间中的蓝色通道分量,然后选择其中具有高活动因子的图像分块作为水印的嵌入区域。用该算法对灰度水印图像进行处理,不仅实现了水印的盲提取,而且在保证隐藏灰度水印大容量生动信息的同时,对宿主图像的视觉效果影响很小。实验结果表明,该水印算法不仅较传统方法有更高的鲁棒性,而且灰度水印图像的提取结果受常见的图像处理攻击操作的影响非常小。  相似文献   

7.
目的 为协调水印算法不可见性与鲁棒性之间的矛盾,提高水印算法抵抗几何攻击的能力,提出一种图像块的不可见性与鲁棒性均衡水印算法。方法 将宿主图像分成互不重叠的图像块,利用人类视觉系统的掩蔽特性对每个图像块的纹理特征和边缘特征进行分析,选择掩蔽性好的图像块作为嵌入子块。对嵌入子块作2级离散小波变换,将其低频子带进行奇异值分解,通过修改U矩阵第1列元素间的大小关系嵌入Arnold置乱后的水印信息。在水印提取前,对几何失真含水印图像利用图像尺度不变特征变换(SIFT)特征点的坐标关系和尺度特征进行几何校正,恢复水印的同步性。结果 对标准灰度图像进行实验,含水印图像的峰值信噪比都可以达到44 dB以上。对含水印图像进行常规攻击和几何攻击,提取出的水印图像与原始水印图像的归一化互相关系数大部分都能达到0.99以上,说明该算法不仅具有良好的不可见性,对常见攻击和几何攻击都具有较强的鲁棒性。结论 选择掩蔽性好的图像块作为水印嵌入位置能够充分保证水印算法的不可见性,特别是水印提取前利用SIFT特征点具有旋转、缩放和平移不变性对几何失真含水印图像实现有效校正,提高了含水印图像抵抗几何攻击的能力,较好地协调水印算法不可见性与鲁棒性之间的矛盾。  相似文献   

8.
水印的不可感知性是评价水印算法性能优劣的重要指标之一,传统图像质量评价模型PSNR不能很好地评价水印化图像的质量.本文通过分析彩色图像中背景亮度、纹理、频率以及颜色对人类视觉的掩蔽,提出了一个基于DWT的彩色图像视觉掩蔽强度计算方法,并据此为彩色图像中各像素设置视觉质量掩蔽权值,得到了一个彩色图像水印不可感知性评价模型.实验结果表明新模型优于传统模型PSNR,其评价结果更接近人的视觉感觉.  相似文献   

9.
Image watermarking has emerged as a useful method for solving security issues like authenticity, copyright protection and rightful ownership of digital data. Existing watermarking schemes use either a binary or grayscale image as a watermark. This paper proposes a new robust and adaptive watermarking scheme in which both the host and watermark are the color images of the same size and dimension. The security of the proposed watermarking scheme is enhanced by scrambling both color host and watermark images using Arnold chaotic map. The host image is decomposed by redundant discrete wavelet transform (RDWT) into four sub-bands of the same dimension, and then approximate sub-band undergoes singular value decomposition (SVD) to obtain the principal component (PC). The scrambled watermark is then directly inserted into a principal component of scrambled host image, using an artificial bee colony optimized adaptive multi-scaling factor, obtained by considering both the host and watermark image perceptual quality to overcome the tradeoff between imperceptibility and robustness of the watermarked image. The hybridization of RDWT-SVD provides an advantage of no shift-invariant to achieve higher embedding capacity in the host image and preserving the imperceptibility and robustness by exploiting SVD properties. To measure the imperceptibility and robustness of the proposed scheme, both qualitative and quantitative evaluation parameters like peak signal to noise ratio (PSNR), structural similarity index metric (SSIM) and normalized cross-correlation (NC) are used. Experiments are performed against several image processing attacks and the results are analyzed and compared with other related existing watermarking schemes which clearly depict the usefulness of the proposed scheme. At the same time, the proposed scheme overcomes the major security problem of false positive error (FPE) that mostly occurs in existing SVD based watermarking schemes.  相似文献   

10.
In this paper, a tailored blended image adaptive watermarking scheme has been presented, which is based on DWT and SVD. Through this paper an attempt has been made to solve the problem of false positive while maintaining the robustness and imperceptibility with the help of principal component and perceptual tuning of the image. Perceptual tuning is a non-blind technique and based on the objective quality of image. The embedding strength is made dependent on watermark features as well as of host in wavelet domain by using tuning parameter which is user specific. The idea of embedding the principal component of intermediate frequency sub-bands of watermark image into singular values of perceptually tuned intermediate frequency sub-bands of host image have been exploited. The proposed algorithm is providing the adaptive behavior towards the image content for perceptual transparency and at the same time avoiding the possibility of false watermark extraction well supported by a private key, which is necessary at the time of extraction. Thus the proposed watermarking algorithm is a kind of non-blind, image adaptive and suitable for rightful ownership. Various comparative results make the algorithm superior in terms of intentional and non-intentional attacks. Also the algorithm is strong against the print and scan attack.  相似文献   

11.
目的 针对奇异值分解算法存在的对角线失真、虚警错误等问题,引入一个寻找最抗攻击缩放比例的参数,提出基于增强奇异值分解的零水印算法。方法 首先将离散小波变换作用于原始图像,对分离出的低频逼近子图进行不重叠分块,对分块后的低频逼近子图作离散余弦变换得到低频系数矩阵,再分别对每个块矩阵进行增强奇异值分解,将得到的最大奇异值与最大奇异值均值作比较构成特征向量;然后对水印图像进行Arnold变换和Logistic映射得到置乱加密后的水印图像;最后将特征向量和置乱加密后的水印图像分别作为细胞神经网络的起始值和控制输入值,通过设定细胞神经网络的反馈模板、控制模板以及阈值来确定具体的可逆逻辑运算。经过可逆逻辑运算处理后的细胞神经网络输出图像即为零水印的注册图像。将注册图像保存到认证中心以证明对图像作品的版权。结果 在JPEG压缩、噪声、滤波、旋转以及剪切等各种攻击下,提取的水印和原始水印的归一化相关值都在96%以上,算法平均运行时间为2.389 s,性能较高。结论 通过利用参数对奇异值矩阵进行调整的方法,不仅增强了算法的鲁棒性,而且解决了奇异值分解(SVD)出现的对角线失真和虚警错误问题。同时通过结合零水印的思想,解决了传统水印算法需在载体图像中嵌入水印而导致的水印不可见性与鲁棒性之间的矛盾。  相似文献   

12.
This paper presents a robust watermarking approach for hiding grayscale watermarks into digital images. Plugging the codebook concept into the singular value decomposition (SVD), the proposed method embeds the singular values (SVs) of the original image into the watermark one to attain the lossless objective. The experimental results show that the proposed scheme guarantees the extracted watermark on an average and the worst PSNR values of 24.91 and 19.96 dB, respectively. In addition to the guarantee of the quality of extracted watermark image, the security of the referenced watermark is further strengthened by applying chaos permutation on it in advance. The proposed scheme leads to satisfactory robustness to various attacks and is compared to other well-known grayscale watermarking methods to reveal its efficiency for practical applications.  相似文献   

13.
Increasing illegal exploitation and imitation of digital images in the field of image processing has led to the urgent development of copyright protection methods. Digital watermarking has proved to be the most effectivemethod for protecting illegal authentication of data. In this article, we propose a hybrid digital-image watermarking scheme based on computational intelligence paradigms such as a genetic algorithm (GA) and particle swarm optimization (PSO). The watermark image is embedded into the host image using discrete wavelet transform (DWT). During the extraction process, GA, PSO, and the hybrid combination of GA and PSO are applied to improve the robustness and fidelity of the watermarked image by evaluating the fitness function. The perceptual transparency and the robustness of both the watermarked and the extracted images is evaluated by applying filtering attacks, additive noise, rotation, scaling, and JPEG compression attacks to the watermarked image. From the simulation results, the performance of the hybrid particle swarm optimization technique is proved best, based on the computed robustness and transparency measures, as well as the evaluated parameters of elapsed time, computation time, and fitness value. The performance of the proposed scheme was evaluated with a set of 50 textures images taken from online resources of Tampere University of Technology, Finland, and the entire algorithm for different stages was simulated using MATLAB R2008b.  相似文献   

14.
图像内容可恢复的半脆弱水印技术研究   总被引:1,自引:0,他引:1       下载免费PDF全文
提出了一种图像内容可恢复的半脆弱水印技术,采用自适应水印对图像进行认证、定位篡改,再利用零水印技术从第三方处提取篡改处的恢复水印,重构被篡改作品。认证方案采用基于非抽样Contourlet域奇异值分解的自适应水印认证方法,该方法具有更高的篡改定位精度,能有效区分有意攻击与无意攻击。恢复水印是通过将原始图像分块、置乱后,分别进行4×4编码,再对码流加密后交给第三方获得的。实验结果表明,本算法能够在容许一定压缩比的情况下检测发生的篡改,并有效地恢复被篡改的区域。  相似文献   

15.
提出了一种基于幅度调制的盲检测彩色图像水印算法,为了改善可见性,根据人眼视觉特性(HVS)自适应选择其嵌入位置。水印嵌入是通过修改图像中像素蓝色通道信息来实现的,而水印提取是基于对嵌入水印位置的邻域像素值的线性组合的预测而完成的。在嵌入过程中通过高斯模板来均衡调整嵌入水印后对宿主图像影响的强度。仿真实验证明该文算法不仅具有非常好的透明性,而且对诸如叠加噪声、JPEG压缩、平滑滤波、几何变换、图像增强等攻击具有很好的鲁棒性。  相似文献   

16.
This paper presents a new semi-blind reference watermarking scheme based on discrete wavelet transform(DWT) and singular value decomposition(SVD) for copyright protection and authenticity. We are using a gray scale logo image as watermark instead of randomly generated Gaussian noise type watermark. For watermark embedding, the original image is transformed into wavelet domain and a reference sub-image is formed using directive contrast and wavelet coefficients. We embed watermark into reference image by modifying the singular values of reference image using the singular values of the watermark. A reliable watermark extraction scheme is developed for the extraction of watermark from distorted image. Experimental evaluation demonstrates that the proposed scheme is able to withstand a variety of attacks. We show that the proposed scheme also stands with the ambiguity attack also.  相似文献   

17.
A new robust reference logo watermarking scheme   总被引:1,自引:1,他引:0  
In this paper, a new yet simple reference logo watermarking scheme based on fractional Fourier transform (FrFT) and singular value decomposition (SVD) is proposed. The core idea of the proposed scheme is to segment host image into non-overlapping blocks by the means of Hilbert space filling curve and a reference image is formed by considering Human visual system (HVS). First, reference image is transformed into FrFT domain and embedding is done by modifying singular values of the reference image using singular values of watermark. After embedding, modified reference image is segmented into blocks and these modified blocks are mapped into their original places for constructing watermarked image. For extraction, a reliable watermark extraction scheme is proposed. The experimental results demonstrate better visual imperceptibility and resiliency of the proposed scheme against intentional or un-intentional variety of attacks.  相似文献   

18.
基于幅度调制的彩色图像水印   总被引:2,自引:0,他引:2  
卢伟  卢宏涛 《计算机工程》2005,31(18):140-142
提出了一种基于幅度调制的彩色数字图像水印方案.通过改变蓝色通道的信息,实现了在空域嵌入水印.水印的嵌入位置通过一个密钥控制来实现随机的选取.为了提高鲁棒性,每一位水印被多次嵌入在不相关的多个位置中.同时,在有效水印的前面增加了一个模式序列,形成一个完整的水印序列,这个模式能够在水印提取过程中生成一个自适应的阈值,提高了水印提取的鲁棒性.水印提取不需要原始的宿主图像.试验结果显示该方案具有较强的抵御信号处理和几何攻击的鲁棒性.  相似文献   

19.
提出一种应用于医学图像的半脆弱水印算法.首先时RGB图像进行可逆颜色转换,再对亮度分量进行一维整数harr小波变换,然后通过自适应地修改高频系数以嵌入水印.实验表明,该算法具有较高的透明性,对非恶意攻击具有一定鲁棒性,同时能较好地对恶意攻击进行检测与定位,能方便地应用于医学图像管理与保护.  相似文献   

20.
提出了一种基于Baker变换加密技术的多小波域自适应图像水印算法,充分利用了多小波变换、混沌序列的优点和人眼的视觉特性,使嵌入的水印具有很好的鲁棒性和很强的隐蔽性。实验证明该算法具有很好的抗剪切、滤波、旋转和JPEG压缩等优良性能。较好地解决了水印透明性与鲁棒性之间的矛盾。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号