共查询到20条相似文献,搜索用时 0 毫秒
1.
Pal Pabitra Jana Biswapati Bhaumik Jaydeb 《Multimedia Tools and Applications》2021,80(14):21651-21678
Multimedia Tools and Applications - Secure reversible watermarking schemes are essential for image authentication and tamper detection in medical, military and government applications. In this... 相似文献
2.
Chen Chien-Chang Tsai Yao-Hong Yeh Hsin-Cheng 《Multimedia Tools and Applications》2017,76(6):8497-8516
Multimedia Tools and Applications - A reversible image watermarking scheme recovers the original cover image after extracting the embedded watermarks. A visible image watermarking scheme embeds... 相似文献
3.
Chien-Chang ChenAuthor Vitae Yao-Hong TsaiAuthor Vitae 《Journal of Systems and Software》2011,84(3):428-434
This paper presents an adaptive block sized reversible image watermarking scheme. A reversible watermarking approach recovers the original image from a watermarked image after extracting the embedded watermarks. Without loss of generality, the proposed scheme segments an image of size 2N × 2N adaptively to blocks of size 2L × 2L, where L starts from a user-defined number to 1, according to their block structures. If possible, the differences between central ordered pixel and other pixels in each block are enlarged to embed watermarks. The embedded quantity is determined by the largest difference in a block and watermarks are embedded into LSB bits of above differences. Experimental results show that the proposed adaptive block size scheme has higher capacity than conventional fixed block sized method. 相似文献
4.
Geometric distortion is known as one of the most difficult attacks to resist. Geometric distortion desynchronizes the location of the watermark and hence causes incorrect watermark detection. In this paper,we propose a geometrically invariant digital watermarking method for color images. In order to synchronize the location for watermark insertion and detection,we use a multi-scale Harris-Laplace detector,by which feature points of a color image can be extracted that are invariant to geometric distortions. ... 相似文献
5.
Multimedia Tools and Applications - With the rapid development of computer technology, the copyright protection of color image is becoming a more and more urgent problem. In this paper, an improved... 相似文献
6.
Naik Kshiramani Trivedy Saswati Pal Arup Kumar 《Multimedia Tools and Applications》2018,77(11):13721-13752
Multimedia Tools and Applications - In this paper, the authors have proposed a binary watermark embedding approach for protecting the copyright ownership of the gray-scale images. The proposed... 相似文献
7.
8.
This study suggests a novel watermarking technique that uses artificial immune recognition system to protect color image’s intellectual property rights. The watermark is embedded in the blue channel of a color image. m-bit binary sequence embedded into the color image is used to train artificial immune recognition system. With this composed technique, extracting the watermark which is embedded into the color image is carried out using artificial immune recognition system. It is observed that the composed technique achieves high performance to process of extracting this watermark. The watermark is extracted successfully from the watermarked image after various image processing attacks as well. 相似文献
9.
Patvardhan C. Kumar Pragyesh Vasantha Lakshmi C. 《Multimedia Tools and Applications》2018,77(10):12655-12677
Multimedia Tools and Applications - A digital image watermarking technique is proposed to hide the relevant information in color digital images. The image is converted from RGB color space to YCbCr... 相似文献
10.
提出了一种基于离散余弦变换(DCT)的彩色盲水印算法,首先将彩色图像由RGB彩色空间转换到YCbCr彩色空间,利用其良好的空间独立性,分别对三个空间进行DCT,并根据人眼视觉特性自适应选择嵌入量,嵌入水印.实验结果表明,嵌入算法容易实现,且该水印算法具有很好的不可见性,并对剪切和JPEG压缩等图像处理都有很好的鲁棒性. 相似文献
11.
《Computer Standards & Interfaces》2007,29(5):561-570
This paper presents a novel color image watermarking scheme for both tamper detection and tampered image recovery. The proposed scheme embeds watermarks consisting of the authentication data and the recovery data into image blocks. In the tamper detection process, instead of independently examining each embedded authentication data, we take all the authentication data embedded in an image into account and utilize a majority-voting technique to determine the legitimacy of image blocks. Experimental results show that the proposed scheme can effectively thwart collage attack and vector quantization (VQ) attack, while sustaining superior accuracy of tamper localization. Furthermore, the results reveal that the tampered images can be successfully recovered with acceptable visual quality. 相似文献
12.
Pan-Pan Niu Xiang-Yang Wang Yi-Ping Yang Ming-Yu Lu 《Expert systems with applications》2011,38(3):2081-2098
Geometric distortion is known as one of the most difficult attacks to resist, for it can desynchronize the location of the watermark and hence causes incorrect watermark detection. It is a challenging work to design a robust color image watermarking scheme against geometric distortions. Based on the support vector regression (SVR) and nonsubsampled contourlet transform (NSCT), we propose a new color image watermarking algorithm with good visual quality and reasonable resistance toward geometric distortions in this paper. Firstly, the geometrically invariant space is constructed by using color image normalization, and a significant region is obtained from the normalized color image by utilizing the invariant centroid theory. Then, the NSCT is performed on the green channel of the significant region. Finally, the digital watermark is embedded into host color image by modifying the low frequency NSCT coefficients, in which the HVS masking is used to control the watermark embedding strength. In watermark detection, according to the high correlation among different channels of the color image, the digital watermark can be recovered by using SVR technique. Experimental results show that the proposed color image watermarking is not only invisible and robust against common image processing operations such as filtering, noise adding, and JPEG compression etc., but also robust against the geometrical distortions. 相似文献
13.
14.
Multimedia Tools and Applications - Reversible image watermarking schemes are used to protect ownership and copyrights of digital images. This paper proposes a novel reversible image watermarking... 相似文献
15.
In the present paper, an advanced encryption technique commonly known as Elliptic Curve Cryptography (ECC) is used to embed a binary image as a watermark in five grayscale host images in a semi-blind manner. The ECC algorithm is a fast encryption technique which successfully encrypts the subject with significantly less number of bits as compared to other popular encryption algorithms such as Rivest-Shamir-Adleman (RSA) and Direct Selling Association (DSA). In the proposed watermarking scheme, embedding in the grayscale host images is carried out in DWT-SVD domain. First, entropy based Human Visual System (HVS) parameters are computed block wise to identify the most appropriate blocks in spatial domain. First level DWT is computed for these selected blocks and watermark embedding is carried out by using the calculated Singular Value Decomposition (SVD) parameters. Preliminary results of this work show that proposed scheme outperforms the other similar schemes carried out in DCT-SVD domain without using any encryption method. It is concluded that the use of DWT-SVD hybrid architecture along with the fast encryption technique ECC is responsible for better performance in present case. In the second part of this simulation, an established HVS model working in DCT domain is implemented and compared with the entropy based HVS model implemented in transform domain to embed the ECC encrypted binary watermark in images. In this case also, proposed scheme performs better both in terms of visual imperceptibility and robustness as compared to other scheme. It is concluded that HVS parameters – Luminance, Contrast and Edge Sensitivity are better placed in comparison to entropy parameters to examine image features and characteristics for watermarking purpose. 相似文献
16.
Kahlessenane Fares Khaldi Amine Kafi Med Redouane Euschi Salah 《Multimedia Tools and Applications》2021,80(13):19827-19844
Multimedia Tools and Applications - In order to contribute to the security of medical image, we present in this paper a blind and robust watermarking technique that allows the integration of the... 相似文献
17.
提出一种基于多通道及小波变换的彩色图像公开数字水印技术方案,该方案充分考虑彩色图像中人类视觉(HVS)的掩蔽特性,将彩色图像由RGB彩色空间转换到YCbCr彩色空间,利用YcbCr良好的空间独立性获取3个相对较为独立的颜色通道Y,Cb,Cr.对每个独立颜色通道中的宿主图像进行充分的内容信息挖掘,并计算其视觉阈值矩阵JND(just noticeabledifference).将宿主图像分块后在离散小波域内进行水印的嵌入.实验结果表明,该算法不仅具有较好的透明性,而且对诸如叠加噪声、JPEG压缩、几何剪切、图像增强、分色攻击等攻击性实验中均具有较好的鲁棒性. 相似文献
18.
在小波变换域内,将水印嵌入在特定的小波系数中,对图像带来的失真影响很小,同时可以准确地检测和篡改定位,因此目前实现认证的脆弱水印和半脆弱水印大多在小波域内.提出了一种使用提升小波变换的半脆弱水印方法.在原始宿主图像经过提升小波变换之后的低频子带,根据水印和小波系数的特征自适应地修改小波系数,嵌入过程实现了很好的不可见性和鲁棒性,实现了盲提取,并能准确地实现篡改的检测和定位. 相似文献
19.
数字水印技术是多媒体信息安全领域的一个重要的研究课题.提出了一种基于DCT域的盲水印算法,该算法将图像经DCT变换后进行8×8分块,然后将二值水印嵌入到每一个图像分块的中频系数中.在嵌入过程中利用每一块的中频系数的性质,自适应的确定嵌入强度,从而保证了所嵌入的水印对一些常用的图像处理操作具有很强的鲁棒性.实验结果验证了提出方法的有效性. 相似文献
20.
为解决单一水印加密算法安全性差,单一变换域的水印嵌入、提取算法在抵抗攻击上各有侧重,难以抵抗所有常见攻击类型的问题,提出基于DWT-DCT联合变换与二次加密技术的文本图像水印算法。利用DWT、DCT对滤波、JPEG压缩等攻击的抵抗优势和特性,将经过二次加密的水印进行差错控制编码,嵌入到DWT-DCT联合变换域的中频区域,加强安全性,抵抗常见攻击,特别是剪切攻击和噪声攻击。实验结果表明,该算法可有效保证水印算法的不可见性,提高水印抵抗JPEG压缩、噪声、滤波、剪切等攻击的鲁棒性和安全性。 相似文献