首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 140 毫秒
1.
基于小波变换的数字水印算法   总被引:6,自引:2,他引:6  
提出了一种基于小波变换的数字水印隐藏算法.在该算法中,原图像的小波分解区域与水印的小波分解区域相互匹配,水印隐蔽性强,对原始图像的影响基本上察觉不出来.叠加了水印的图像在经过多种强干扰及各种信号处理的变换之后,使用该算法仍能正确检测出水印的存在.  相似文献   

2.
王小明  颜斌  吕文红 《计算机应用》2010,30(7):1821-1824
在语音信息隐藏中,语音载体严重影响隐密信息的隐藏容量。为了消除语音宿主干扰,提出一种适应于色噪声载体的扩展线性干扰抵消隐藏算法。首先建立语音残差嵌入模型,然后在语音残差空间内,对水印信号作预先抵消处理,最后将处理后的水印信号嵌入至语音残差中去。理论分析和实验结果表明,与普通语音隐藏算法相比,该算法可以有效地消除语音宿主干扰,显著地提高解码性能,并且对于常见的语音处理和攻击具有较强的鲁棒性。  相似文献   

3.
数字音频信号的水印嵌入算法   总被引:4,自引:0,他引:4  
文中主要研究了数字音频信号嵌入数字水印的基本原理。在此基础上应用小波变换实现数字音频信号完全可恢复数字水印算法。这种算法所隐藏的水印具有隐蔽性,基本上觉察不出对原始音频信号的影响。嵌入水印的数字音频信号经过信号处理后,仍能正确地提取数字水印。  相似文献   

4.
目前的数字水印算法,主要集中在针对图像和视频,对音频、语音数据产品的数字水印算法研究仍然较少,需要提出更多的有效的针对音频、语音数据的数字水印算法。该文以二值图像作为数字水印信息,以音频为嵌入对象,在离散傅立叶变换域的系数上嵌入水印。在离散余弦变换域,采用扩频技术通过对变换域系数进行量化来嵌入水印信息,在水印的提取过程中不需要原始音频信号的参与。  相似文献   

5.
一种基于矢量共享方案的DCT域上数字水印分存算法   总被引:8,自引:0,他引:8  
数字水印分存是将秘密共享的思想用于数字水印,将原始水印信息分解成n份分存水印信息,获得其中部分分存水印信息就能恢复出原始水印信息.该文提出一种基于矢量共享方案的DCT域上的数字水印分存算法.它将矢量共享的思想用于数字水印.原始载体图像分块后,在DCT变换的低频域上加载分存后的水印数据.水印信息隐藏前,对原始水印和分块水印都进行扰乱处理,同时分存也具有加密作用.算法具有很高的安全性和较好的稳健性.实验表明,算法还具有较好的隐藏效果和很好的抗剪切、抗压缩等功能.  相似文献   

6.
本文讨论了利用混沌序列对图像信号加密和解密的方法,提出了基于混沌特性的小波数字水印技术,具体包括水印嵌入算法与实现步骤、水印提取原理与过程、算法参数分析等;设计了基于混沌特性的小波数字水印仿真系统并进行了相关实验.结果表明,本文提出的数字水印技术具有良好的隐藏性、稳定性和鲁棒性.水印检测时不需要原始载体和原始水印图像,是一种比较理想的变换域盲水印算法.  相似文献   

7.
基于DWT的盲音频水印算法研究   总被引:5,自引:0,他引:5  
曹建春  沈淑娟 《计算机应用》2006,26(10):2326-2327
提出了一种基于离散小波变换的盲音频数字水印算法,该算法采取分段重复嵌入方式在能量最强的小波系数内隐藏水印信号。仿真实验结果表明,该算法具有较强的鲁棒性和不可感知性,能有效抵御各种常见攻击,并且在水印检测时不需要原始的音频信号。  相似文献   

8.
为了提高数字水印算法的安全性和鲁棒性,在研究了各种常见的水印算法优缺点的基础上,提出了一种改进的基于魔方概念的数字水印算法。首先通过魔方混沌算法将原始水印转化为噪声信号,以提高水印安全性。再结合离散余弦变换(DCT)、离散小波变换(DWT)和矩阵奇异值分解(SVD)嵌入水印,以提高水印的不可见性和鲁棒性。实验结果表明,在确保不可见性的基础上,水印信息在噪声干扰、图像处理、图像压缩下具有很好的鲁棒性。  相似文献   

9.
基于小波变换的数字水印技术是当前的一个研究热点。本文把扩频通信的理论和方法引入到小波域数字水印系统中,提高了数字水印的隐蔽性和稳健性。水印信号经过伪随机序列调制扩频后,结合人眼视觉系统的纹理掩蔽特性和刚刚可分辨门限嵌入到载体图像的小波变换域。水印信息的检测不需要原始载体图像。该水印算法嵌入水印后难以察觉,对裁剪、噪声干扰、JPEG有损压缩和低通滤波有较强的鲁棒性。  相似文献   

10.
神经网络检测的数字语音水印算法   总被引:1,自引:0,他引:1  
研究数字水印提高抗击性能,由于音频水印容量有限,同时盲检测方案中抗攻击能力普遍较弱,针对上述问题提出了一种在小波域中利用神经网络检测的数字语音水印算法.在数字语音载体的重要小波系数中隐藏了一幅不可感知的二值数字图像,通过二值数字图像中附加的模板对神经网络进行训练,经过训练后的神经网络几乎能够完全恢复嵌入到数字语音中的水印数据.仿真结果表明,小波域水印容量得到提高,算法对抗高斯噪声攻击、压缩、重采样等攻击,具有较强的鲁棒性,可以为实际应用提供依据.  相似文献   

11.
基于Fisher判别分析的彩色图像水印算法   总被引:5,自引:0,他引:5  
提出了一种在彩色图像的红绿蓝三基色分量中隐入数字水印的改进思路,该算法的水印嵌入模块简单,而且在水印复原阶段用Fisher判别法能准确地抽取水印信号,实现水印盲复原.实验结果也表明,用该方法实现的水印具有较强的隐健性.  相似文献   

12.
On the basis of support vector regression (SVR), a new adaptive blind digital audio watermarking algorithm is proposed. This algorithm embeds the template information and watermark signal into the original audio by adaptive quantization according to the local audio correlation and human auditory masking. The procedure of watermark extraction is as follows. First, the corresponding features of template and watermark are extracted from the watermarked audio. Then, the corresponding feature of template is selected as training sample to train SVR and an SVR model is returned. Finally, the actual outputs are predicted according to the corresponding feature of watermark, and the digital watermark is recovered from the watermarked audio by using the well-trained SVR. Experimental results show that our audio watermarking scheme is not only inaudible, but also robust against various common signal processing (such as noise adding, resampling, requantization, and MP3 compression), and also has high practicability. In addition, the algorithm can extract the watermark without the help of the original digital audio signal, and the performance of it is better than other SVM audio watermarking schemes.  相似文献   

13.
一种相移键控数字图像水印算法   总被引:2,自引:1,他引:2  
根据相移键控原理.提出了一种不可逆DWT域二相相位键控数字图像水印算法.水印信号为二值图像,用不同相位的正弦信号将水印调制后嵌入到数字图像DWT变换系数中;用提取的同频率正弦信号的相位进行水印提取;该方法嵌入的水印具有非常好的安全性,且水印提取不需要原始未加水印的图像.实验结果表明该方法具有很好的不可见性;对JPEG压缩、图像加噪声和图像滤波等常见的图像处理具有极强的鲁棒性.  相似文献   

14.
This paper proposes an improved semi-fragile speech watermarking scheme by quantization of linear prediction (LP) parameters, i.e., the inverse sine (IS) parameters. The spectral distortion due to watermark embedding is controlled to meet the ‘transparency’ criterion in speech coding. A modified bit allocation algorithm combined with watermarking is developed to determine the quantization step so that the ‘transparency’ requirement is satisfied. Due to the statistical nature, the LP coefficients estimated from the watermarked speech signal are different from the watermarked LP coefficients even in the absence of attacks. This effect is the cause of increase in decoding error and minimum authentication length. To tackle this problem, an Analysis by Synthesis (AbS) scheme is developed to reduce the difference between the estimated LP coefficients and the watermarked ones. The watermark detection threshold and minimum authentication length are then derived according to the probability of error and the signal to noise ratio (SNR) requirements. Experimental results show that the proposed AbS based method can effectively reduce the difference between the watermarked IS parameter and the extracted IS parameter when there is no attacks. In addition, the modified bit allocation algorithm can automatically find the appropriate quantization step used in the odd-even modulation so that the transparency requirement is satisfied.  相似文献   

15.
In a recent paper presented by Lin et al., a block-based hierarchical watermarking algorithm for digital images is proposed. It adopts parity check and the intensity-relation check to conduct the experiment of image tamper detection. Their experimental results indicate that the precision of tamper detection and localization is 99.6% and 100% after level-2 and level-3 inspections, respectively. The proposed attacks demonstrate that this watermarking algorithm is fundamentally flawed in that the attacker can tamper a watermarked image easily without being detected. In this paper, a four-scanning attack aimed to Lin et al.'s watermarking method is presented to create tampered images. Furthermore, in case they use encryption to protect their 3-tuple-watermark, we proposed a blind attack to tamper watermarked images without being detected. Experimental results are given to support and enhance our conclusions, and demonstrate that our attacks are successful in tampering watermarked images.  相似文献   

16.
基于Radon变换不变矩的鲁棒性数字水印技术   总被引:1,自引:0,他引:1       下载免费PDF全文
现有的大多数数字水印算法在设计时过分地强调载体数据中嵌入水印以及在遭受几何攻击之后水印的不可感知性和鲁棒性,而对水印在检测时数字水印的虚警率和漏检率实验分析甚少。如果一个数字水印算法在水印检测时它的虚警率和漏检率很高,即使这种算法具有很好的鲁棒性那么也不能有效地解决版权保护,相反却会引入新的版权纠纷。针对以上提出的问题,提出一种基于Radon变换不变矩的抗几何攻击鲁棒性数字水印可以有效地减少水印的漏检和误检问题。本算法使用Radon变换构建矩不变量,首先使用小波变换的多尺度分析的特性,提取小波分解后的低频逼近子图;其次采用图像置乱的方法消除低频逼近子图像素之间的空间相关性,并通过零像素值模板背景图像代替图像尺度大小归一化;然后将置乱后的低频子图加载到零像素值模板背景图像上;最后使用Radon变换不变矩来设计水印和检测水印。经过仿真实验证明,该方法对于旋转,缩放,平移等攻击具有很好鲁棒性的同时,对于普通的加噪,滤波,JPEG压缩攻击也具有很好的鲁棒性,且具有极低误检率。  相似文献   

17.
This work is a connecting link between the field of digital transmission and (3 Dimension) 3D watermarking. In fact, we propose in this paper a blind and robust watermarking algorithm for 3D multiresolution meshes. This data type, before being watermarked, is divided into GOTs (Group Of Triangles) using a spiral scanning method. At every instant, only one GOT is loaded into memory. It undergoes a wavelet transform. Embedding modifies the wavelet coefficients vector thus generated after being presented in a cylindrical coordinate system. After being watermarked, the current GOT will be released from memory to upload the next GOT. Information is coded using a turbo encoder to generate the codeword to be inserted. Once the entire mesh is scanned, the watermarked mesh is reconstructed. During extraction, the same steps are applied only on the watermarked mesh: our algorithm is then blind. Extracted data are decoded using Error-Correcting Code (turbocode) to correct errors that occurred. The results show that our algorithm preserves mesh quality even with a very large insertion rate while significantly minimizing used memory. Data extraction was done correctly despite the application of various attacks. Our algorithm is robust against most popular attacks such as similarity transformation, noise addition, smoothing, coordinate quantization, simplification and compression.  相似文献   

18.
张新红  张帆  尚东方 《计算机工程与设计》2011,32(12):3973-3975,3988
提出了一种基于Kalman滤波的数字水印算法,利用图像融合的思想和Kalman滤波对数字水印进行了研究.嵌入水印的过程可以视为宿主图像和水印图像的图像融合的过程.假设嵌水印图像作为目标状态,在图像融合过程中,采用Kal-man滤波对观测状态进行最优估计.根据宿主图像和水印图像进行建模,得到观测方程和状态方程,在估计误差...  相似文献   

19.
针对数字音频作品版权保护的实际需要,提出一种利用二值图像作为版权标识的音频水印算法。利用伪随机序列对作为版权标识的二值图像进行置乱,同时对音频信号进行离散小波分解,然后根据置乱后的水印信息对所选取的小波系数进行量化处理,最后进行小波逆变换得到含水印信息的音频信号。实验表明,本算法对各种常见的水印攻击均具有较强的鲁棒性,可以有效解决数字音频作品版权保护等问题,具有一定的实用价值。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号