首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
提出了一种新的基于秘密共享方案的数字图像水印算法,其主要特点是将原始水印分成两份,一份嵌入载体图像增加系统安全性.通过载体图像生成一个辅助矩阵(极性矩阵),第二份和极性矩阵用来产生一个主密钥和若干个普通密钥.在此系统中,只有拥有主密钥的用户才能直接恢复出真正的水印,其他拥有普通密钥的用户只能恢复阴影水印,将那些阴影水印联合起来,才能恢复出真正的水印,所以算法具有一定的实用价值.实验结果证明:所提出的水印算法对JPEG压缩、椒盐噪声、剪切等图像处理攻击具有很好的鲁棒性.  相似文献   

2.
结合块截短编码与秘密共享,提出一种新的鲁棒图像水印算法。该算法利用BTC编码由原图像构建特征共享,利用水印图像与特征共享一起生成私有共享。由待验证图像构建的特征共享与私有共享一起恢复水印图像。私有共享的生成与特征共享有关,可实现对同一图像的多水印注册。特征共享的稳健性确保了算法的水印鲁棒性,水印嵌入没有引起图像质量的改变。实验结果表明该算法对一般信号处理攻击有较高的鲁棒性。  相似文献   

3.
针对彩色数字图像局部区域内容保护和认证,研究了彩色数字图像的脆弱数字水印.为了保证水印的安全性,利用三维二值混沌序列对原始二值水印图像进行加密,对提取的加密二值水印图像进行解密.嵌入载体图像的水印和从嵌入水印的图像中提取的水印均是加密水印.将彩色数字图像中被保护区域的三个分量的小波变换域分别嵌入加密水印,以保护其内容的完整性和不可篡改性.采用模运算实现水印的嵌入和盲提取.理论分析和实验结果表明,该脆弱水印算法对彩色数字图像保护区域内的任何篡改,都能够正确地检测和定位.  相似文献   

4.
数字水印是数字作品版权保护的重要技术手段,不可察觉性和鲁棒性是图象水印中基本要求,但它们却是一对互相制约的因素.该算法提出了一种新的数字水印嵌入和提取方法,以一幅图象作为水印,信息量大,优于通常把文本,字符作为水印的方法;分块随机嵌入提高了水印嵌入的顽健性;根据图象局部特征确定水印的嵌入强度,使水印的嵌入强度随图象局部特征变化而变化.针对典型攻击的实验结果表明该算法具有很好的鲁棒性.  相似文献   

5.
局部化数字水印算法   总被引:10,自引:1,他引:9       下载免费PDF全文
数字水印是一种嵌入到图象,视频或音频数据中的不可见标志,可以用于多媒体数字的版权保护,认证和标注等,为了提高在频率域嵌入水印抵抗裁剪攻击的能力,提出一种局部化的图象数字水印算法,该算法利用图象中相对稳定的特征点标示水印嵌入的位置,并在与每个特征点对应的局部区域中独立地嵌入水印,这样,当只有部分图象时,仍能通过这些特下点来定位并提取水印,此算法中,水印的嵌入是在局部图象的小波域中进行的,并采用对小波系数进行特殊量化的方法来隐藏水印比特,而水印的提取不需要原始图象参与,实验结果证明,算法对裁剪有很强的抵抗能力,同时对压缩,滤波,噪声,StirMark攻击等也有较好的鲁棒性。  相似文献   

6.

This paper offers a medical image watermarking approach based on Wavelet Fusion (WF), Singular Value Decomposition (SVD), and Multi-Level Discrete Wavelet Transform (M-DWT) with scrambling techniques for securing the watermarks images. The proposed approach can be used for providing multi-level security in various applications such as military, copyright protection, and telemedicine systems. The key idea of the projected approach is to first combine two digital watermark images into a single fused watermark to increase the embedded information payload. Then, the fused watermark is scrambled using Arnold and Chaotic algorithms. Finally, the scrambled fused watermark is embedded in the cover image using the SVD and three-level DWT algorithms. The selection of the Arnold and chaotic for watermark encryption is attributed to confirm robustness which resists several types of multimedia attacks and upturn the security level. This paper also presents a comparative study of the proposed approach for different digital images to determine its robustness and stability. Several simulation results reveal that the proposed system improves the capacity and security of embedded medical watermarks without affecting the cover image quality. In conclusion, the proposed approach achieved not only precise acceptable perceptual quality with admired Peak Signal-to-Noise Ratio (PSNR) values but similarly high Correlation Coefficient (Cr) and SSIM values in the existence of severe attacks.

  相似文献   

7.
为了嵌入更多的水印数据和减小数字图像的失真,提出了一种新颖的空间域和频率域相结合的数字水印方法。根据使用者的需求和数据重要性,将水印图像分成两部分,分别嵌入到原始图像的空间域和频率域,并对嵌入不同尺寸的水印图像的结果进行比较。提出的水印方法具有以下优点:更多的水印数据被嵌入到原始图像中,因此容量增加;水印被分成两部分,使得安全性增加。对水印分离策略的复杂化,可增加攻击者重构水印的难度。另外,为了增强鲁棒性可对水印数据进行随机置乱操作以抵抗剪切等信号处理操作。  相似文献   

8.
基于小波变换的双水印算法   总被引:1,自引:1,他引:1       下载免费PDF全文
结合数字水印空间域和频域算法的特点,本文提出一种在图像小波变换域嵌入双水印的算法。在图像变换域低频分量嵌入识别水印,高频分量嵌入确认水印,图像版权所有者拥有单一密钥。试验结果表明,该水印算法具有良好的不可见性和稳健性,能够有效地保护图像版权。  相似文献   

9.
In order to provide more watermarks and to minimize the distortion of the watermarked image, a novel technique using the combinational spatial and frequency domains is presented in this paper. The splitting of the watermark image into two parts, respectively, for spatial and frequency insertion relies on the user's preference and data importance. Experimental results provide the comparisons when different sized watermarks are embedded into a grayscale image. The proposed combinational image watermarking possesses the following advantages. More watermark data can be inserted into the host image, so that the capacity is increased. The splitting of the watermark into two parts makes the degree of protection double. The splitting strategy can be designed even more complicated to be unable to compose. Furthermore, to enhance robustness, a random permutation of the watermark is used to defeat the attacks of signal processing, such as image crops.  相似文献   

10.
一种兼具版权保护及窜改认证双重功能的数字水印算法   总被引:1,自引:0,他引:1  
针对目前较多数字水印功能单一的不足,提出了一种新的具有双重功能的数字图像水印,首先在原始图像的小波中频区域中,通过比较中心系数与邻域系数均值关系来嵌入版权水印;其次在低频区域中自适应地嵌入半脆弱水印作为认证水印,实现版权保护和窜改认证的双重功能。两种水印的检测和提取都不需要原始图像。采用常规的图像处理操作和恶意窜改操作进行实验,结果表明,该方法透明性好, 版权保护水印对JPEG压缩、裁剪、噪声等攻击抵抗力强, 内容认证水印能够精确地定位窜改,具有很好的应用前景。  相似文献   

11.
Shi  Hui  Wang  Xianghai  Li  Mingchu  Bai  Jun  Feng  Bin 《Multimedia Tools and Applications》2017,76(5):6941-6972

Since existing watermarking schemes usually cannot recover the tampered position, a secure variable-capacity self-recovery watermarking scheme is proposed. Both watermark embedding capacity and security are taken into account. The original image is divided into texture blocks and smooth blocks, and the texture blocks not only save traditional information, and save the “details” information. The so-called “details” information refers to the texture information, which not only can effectively resist mean attack, but also help to improve the quality of the recovered image to meet the needs of practical work. And then according to the characteristics of different blocks, the different length compound watermarks are produced. The so-called “compound watermarks” include the authentication watermarks and information watermarks. Authentication watermarks are used to detect the tampered region, and the information watermarks which include basic watermark and additional watermark are used to recover image. Then the compound watermarks are inserted into the other blocks based on the new proposed scheme called three level secret-key embedding scheme (TLSES). And then detect the tamper blocks and recover them by the three level tamper detection scheme (TLTDS). The experimental results show that the paper can not only accurately detect the tamper region and recover image, but also can effectively resist mean attack and collage attack.

  相似文献   

12.
针对现有水印算法大多无法准确定位并恢复被篡改区域的问题,兼顾水印嵌入容量和安全性,提出了一种安全的变容量恢复水印算法.该算法首先将原始图像分成纹理块和平滑块,纹理块除了保存常规信息外,还保存了“细节”信息,不同块将根据自身特点产生不同长度的“复合水印”.所谓“复合水印”是指水印由认证水印和信息水印构成,其中认证水印用于检测篡改区域,信息水印用于恢复图像.然后采用新提出的“3级秘钥嵌入方案”(three level secret-key embedding scheme, TLSES)将图像块的“复合水印”随机嵌入在其他图像块中,再利用“3级篡改检测方案”(three level tamper detection scheme, TLTDS)定位被篡改图像块并进行恢复.实验结果表明,所提出的水印算法不仅能够准确检测篡改区域并恢复图像,而且能够有效地抵抗均值攻击和拼贴攻击.  相似文献   

13.
We introduce a set theoretic framework for watermarking. Multiple requirements, such as watermark embedding strength, imperceptibility, robustness to benign signal processing, and fragility under malicious attacks are described as constraint sets and a watermarked image is determined as a feasible solution satisfying these constraints. We illustrate that several constraints can be formulated as convex sets and develop a watermarking algorithm based on the method of projections onto convex sets. The framework allows flexible incorporation of different constraints, including embedding strength requirements for multiple watermarks that share the same spatial context and different imperceptibility requirements based on frequency-weighted error and local texture perceptual models. We illustrate the effectiveness of the framework by designing a hierarchical semifragile watermark that is tolerant to mild compression, allows tamper localization, and is fragile under aggressive compression. Using a quad-tree representation, a spatial resolution hierarchy is established on the image and a watermark is embedded corresponding to each node of the hierarchy. The spatial hierarchy of watermarks provides a graceful tradeoff between robustness and localization under mild JPEG compression, where watermarks at coarser levels demonstrate progressively higher immunity to JPEG compression. Under aggressive compression, watermarks at all hierarchy levels vanish, indicating a lack of trust in the image data. The constraints implicitly partition watermark power in the resolution hierarchy as well as among image regions based on robustness and invisibility requirements. Experimental results illustrate the flexibility and effectiveness of the method  相似文献   

14.
一种基于HVS的彩色图像水印算法   总被引:7,自引:0,他引:7       下载免费PDF全文
刘利田  常建平 《计算机工程》2007,33(24):144-145
讨论了一种将彩色水印图像嵌入到原始彩色图像中的数字水印算法。它利用人眼视觉系统特性,采用了在DWT域下按照频带重要性来嵌入水印的规则,即:水印应当首先嵌入图像小波低频系数,若有剩余,再按图像小波频带重要性的排序嵌入高频带。实验结果表明,提取的水印表现出较好的鲁棒性,且主观视觉失真较小。  相似文献   

15.
吴杰 《数字社区&智能家居》2007,(9):1424-1424,1427
数字水印是数字作品版权保护的重要技术手段,不可察觉性和鲁棒性是图象水印中基本要求,但它们却是一对互相制约的因素。该算法提出了一种新的数字水印嵌入和提取方法,以一幅图象作为水印,信息量大,优于通常把文本,字符作为水印的方法;分块随机嵌入提高了水印嵌入的顽健性;根据图象局部特征确定水印的嵌入强度,使水印的嵌入强度随图象局部特征变化而变化。针对典型攻击的实验结果表明该算法具有很好的鲁棒性。  相似文献   

16.
基于特征子空间的数字水印技术   总被引:9,自引:0,他引:9  
钟桦  焦李成 《计算机学报》2003,26(3):378-383
根据特五子空间的原理,提出了一种新颖的基于特征子空间的数字水印算法,水印可以嵌入到不同的子空间中从而可以发展为多水印算法,由于特征子空间之间的正交特性,不同子空间中的水印相互独立,其稳健性不随水印数目的增加而变化,水印强度参数根据视觉系统的照度掩蔽和纹理掩蔽特性适当地进行调整,从而同时保证二值水印图像的稳健性和不可见性,该文就单水印,双水印以及多水印情形进行了仿真并进行JPEG压缩,图像缩放,剪切等失真测试,实验结果表明该算法具有很好的感知质量和稳健性并验证了以上分析。  相似文献   

17.
Secret image sharing is a technique to share a secret image among a set of n participants. A trusted third party embeds the secret image into the cover image to generate shadow images such that at least t or more shadow images can reconstruct the secret image. In this paper, we consider an extreme and real-world situation, in which there is no one who is trusted by anyone else. In the proposed scheme, the participants can act as a dealer and communicate with each other in a secret channel. Each participant can generate her/his own shadow image independently, according to the cover image and the secret image. Experimental results are provided to show that the shadow images have satisfactory quality. In addition, our scheme has a large embedding capacity, and the secret image can be reconstructed losslessly.  相似文献   

18.
A reversible and visible image watermarking scheme extracts a visibly embedded binary watermark image and recovers the original cover image. This paper presents a reversible and visible image watermarking scheme that embeds visible watermarks into a part of the cover image, called the embedded region R, and embeds required binary strings into the whole image through the conventional difference-expansion method. The size of the embedded visible watermark is determined by the coefficient k; a large k value leads to a large embedded region for the visible watermark. The embedded region R is first segmented to non-overlapped k×k blocks, and each block is related to one bit of the watermark image. For those blocks that are related to the logo bits of the watermark image, these k×k blocks are adjusted by the proposed dynamic pixel value mapping method for highly visual detection. The binary bit string S, composed of the binary watermark image and LSB bits of the logo watermark bits’ corresponding k×k blocks, is embedded into the cover image using the conventional difference-expansion method. Experimental results show that the watermark is clearly embedded into the embedded region R and that the distortion of the reversible embedding is limited.  相似文献   

19.
一种用于版权通知和保护的遥感图像水印算法   总被引:1,自引:0,他引:1  
本文提出了一种用于版权通知和保护的遥感图像数字水印算法。算法以灰度图像作为可见水印及不可见水印,首先在空域中对遥感图像进行可见水印的嵌入,以实现版权通知功能;然后对图像进行小波变换,在小波域中嵌入不可见水印,以实现版权保护功能。水印提取采用与嵌入相同的逆过程,得到置乱的水印图像,采用一种新的Arnold反变换方法对水印进行反置乱,最终得到嵌入的水印图像。实验表明,嵌入的可见水印很难去除,不可见水印对图像的质量影响很小,并对常规处理具有较好的鲁棒性。  相似文献   

20.
祝莹  邵利平 《计算机应用》2015,35(9):2535-2541
传统水印通常对水印嵌入后掩体视觉质量较为关注,而对水印嵌入环节的安全性较为忽视,一些算法尽管提供了水印加密环节,但位置固定,导致嵌入水印易受攻击,而基于参数化小波的水印敏感性在实际中难以应用。针对以上问题,提出一种结合多级小波系数加权均值和量化的可公开敏感水印。在该算法中,首先将掩体图像的消息摘要算法5(MD5)值、用户密钥和初始参数与Logistic映射绑定,用于对水印加密和嵌入环节的多级小波系数进行随机选择;然后通过联合图像专家组(JPEG)压缩的各级小波系数绝对变化量的算术平均值来估算小波系数权重,调整小波系数加权均值以嵌入水印;最后通过孤立黑点滤除策略来提高水印提取质量。理论和实验表明,所提方法具有较好的明文敏感性和密钥敏感性,嵌入水印后图像峰值信噪比(PSNR)可达到45 dB,即使公开水印嵌入环节,嵌入的水印也难以篡改和提取,同时依然对图像剪裁、白噪声、JPEG压缩、覆盖和涂鸦等常规图像攻击具有鲁棒性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号