首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 625 毫秒
1.
基于提升小波的多重数字音频水印   总被引:9,自引:0,他引:9  
该文提出了一种在提升小波域同时嵌入鲁棒水印和易损水印的音频水印算法。原始音频信号经过提升小波变换后,将低频小波系数进行均值量化嵌入鲁棒水印,具有较好的鲁棒性和不可感知性;对高频小波系数直接进行单个系数量化嵌入易损水印,当音频内容发生篡改时,这些水印信息会发生相应的改变,从而可以鉴定原始音频的完整性。水印的提取不需要原始音频信号。实验结果表明,鲁棒水印对MP3压缩、低通滤波、加噪、重量化、重采样等信号处理攻击具有很强的鲁棒性;而易损水印对上述攻击则具有很强的敏感性。  相似文献   

2.
A hybrid watermarking scheme for authentication is presented, which demonstrates robustness against various attacks. Due to the different nature of filtering and geometrical attacks, two different watermarks are used in this scheme. The first one is embedded in frequency domain combined with a chaotic function and is based on the correlation method. The second watermark is embedded in luminosity histogram of the image. In this way, this hybrid watermarking scheme combines the robustness of chaotic domain against filtering, noise and compression attacks with the robustness of histogram domain against geometrical attacks.  相似文献   

3.
The concept of digital rights management architecture for multimedia will be presented in this paper, with focus on robust digital image watermarking, which is able to undergo geometrical attacks performed against the embedded watermarks. Geometrical attacks are still an open problem for many digital watermarking algorithms used in present time. Most of geometrical attacks can be described by using affine transforms. A new approach to improve robustness against geometrical attacks is presented. The discrete Fourier transform and log-polar mapping are used for watermark embedding and for watermark detection. Some attacks against the embedded watermarks are performed and the results are given. Also two modifications, usage of the proposed method as a synchronization template and implementation for the color images, are presented and experimental results are given too.  相似文献   

4.
针对目前的图像水印难以同时抵抗常规攻击和几 何攻击的不足,提出一种新的轮廓波 水印算法。水印嵌入阶段,该方法将宿主图像进行离散小波变换和非下采样轮廓波变换,并 将水印嵌入到熵值最大的高频子带,解决了将水印嵌入低频无法抵抗几何攻击及高频不能 很好抵抗滤波等常规攻击的问题。在水印嵌入前对嵌入区域进行加密处理,提高算法的安全 性。水印提取阶段,利用Zernike矩对含水印图像进行几何校正再进行提取,进一步提高了 算法的抗几何攻击能力。最后利用峰值信噪比和归一化系数对算法进行评价,验证算法的不 可感知性和鲁棒性。仿真实验结果表明,算法在不同的宿主图像和水印图像上均表现良好。 该算法在具有较好不可见性的基础上,除了对常规攻击具有很好的抵抗力,对几何攻击也具 有强鲁棒性,归一化系数(normalization coefficient,NC)均达到了0.99  相似文献   

5.
传统的基于DCT变换的二值水印嵌入算法通常是在分块系数矩阵中选择一对中频系数实现1bit水印信息的嵌入,水印嵌入容量有限,为提高载体图像的安全性,提出了一种新的基于DCT的大容量二值水印嵌入算法.本算法首先对二值水印图像进行Arnold置乱加密处理,其次对所选取的载体图像进行分块DCT变换,然后选择4个中频系数进行排序,充分利用两两之间的3个差值关系实现水印的嵌入.若待嵌入水印位为0,通过改变系数值使得差值大于或等于阈值A,若待嵌入水印位为1,通过改变系数值使得差值等于阈值B,最终使得每块选择4个系数值实现了3bit二值水印信息的嵌入,水印嵌入容量大大优于传统方法.仿真实验表明,本算法实现了大容量水印的嵌入与提取且抵抗图像裁剪、图像加噪、JPEG压缩等攻击效果较好.  相似文献   

6.
一种基于DWT-DCT变换域的全息水印技术   总被引:5,自引:3,他引:2  
在研究傅里叶全息技术基础上,提出了一种结合离 散小波变换和离散波变换(DWT-DCT)变换的彩色图像数字水印算法,使得水印 拥有强鲁棒性和不可见性。首先,对水印信息进行傅里叶变换,并生成全息水印图; 其次,将载体图 像在RGB空间内的蓝色B分量进行小波分解,对其低频部分进行DCT;最后, 将水印全息图嵌入其高频系数 中。实验结果发现,以k=0.05的强度嵌入水印后,含水印图像的峰值 信噪比(PSNR)达到47,能有效抵抗 信号处理和裁切攻击,同时提取出的水印和原始水印的相似性(NC值)能保持在0. 75以上,说明本文水印 算法有较强的鲁棒性和不可见性。本文算法能够抵抗裁切、滤波、噪声和JPEG压缩攻击,可 用于数字图像版权保护方面。  相似文献   

7.
A robust region-adaptive dual image watermarking technique   总被引:1,自引:0,他引:1  
Despite the progress in digital image watermarking technology, the main objectives of the majority of research in this area remain to be the improvement in robustness to attack. In this paper, a novel watermarking technique is proposed using a region-adaptive approach to further improve upon criteria. Watermark data is embedded on different regions of the host image using a combination of Discrete Wavelet Transform and Singular Value Decomposition techniques. The technique is derived from an earlier hypothesis that the robustness of a watermarking process can be improved by using watermark data which frequency spectrum not dissimilar to that of the host data. To facilitate this, the technique utilises dual watermarking technologies and embed parts of the watermark images into selected regions in the host image. Our experiment shows our technique has improved the robustness of the watermark data to image processing attacks and geometric attacks, thus validating the earlier hypothesis.  相似文献   

8.
Watermark robustness to geometric attacks is still a challenging research field. In this paper, a novel robust image watermarking scheme is proposed for resisting such attacks. Watermark synchronization is first achieved by local invariant regions which can be generated using scale normalization and image feature points. The watermark is embedded into all the local regions repeatedly in spatial domain. During embedding, each circular region is first divided into homocentric cirque regions. Then the watermark bits are embedded by quantizing each cirque region into an “odd” or “even” region using odd–even quantization. In the decoder, an odd–even detector (OED) is designed to extract the watermark from the distorted image directly. Localized embedding achieves good invisibility and repeated insertion enhances watermark robustness. Simulation results show that the proposed scheme is robust to both geometric attacks and traditional signal processing attacks.  相似文献   

9.
A new blind digital image watermarking algorithm with watermark embedded in discrete cosine transform (DCT) coefficients is presented in this paper. The proposed scheme exploits correlation between DCT coefficients in neighborhood blocks for embedding. The watermark is embedded by modifying two DCT coefficients, one pertaining to a block in which watermark bit (0 or 1) is to be embedded and the other corresponding to the selected neighborhood block. Both the selected coefficients are modified by a modification factor so that the difference between the pair of coefficients is brought to a predefined zone. This difference between two DCT coefficients is used to extract watermark. The proposed technique has been tested for different attacks like JPEG compression, rotation, cropping, filtering, gaussian noise, salt and pepper noise, histogram equalization etc. It has been observed that the scheme is highly robust not only for the above mentioned attacks used singularly, but also for different possible combinations of simultaneous attacks. A comparison of the proposed technique with some state of art existing algorithms reveals that our scheme provides better results in terms of quality of watermarked images, payload and robustness.  相似文献   

10.
提出了一种使用置乱技术置乱水印图像,然后将Gold码用于水印结构设计的扩频数字水印算法。通过置乱技术提高了抽取数字水印的视觉效果,并可以在一定程度上弥补数字水印在嵌入、传输和抽取过程中的损耗。利用Gold码具有较多独立码的特性,以多位二进制信息为单位对置乱后的二值图像水印进行扩频调制,然后将调制信号自适应地加入到载体图像离散余弦变换域的低频分量系数中。应用Gold码使得算法可以采用较长的扩频序列,相应提高了鲁棒性。这种结合置乱和扩频的水印算法对于抵抗各种噪声、滤波和压缩等合法攻击以及其他非法攻击都具有很好的鲁棒性。  相似文献   

11.
12.
抗仿射变换的扩频图像水印算法   总被引:10,自引:1,他引:9  
稳健性是数字水印算法的重要性能指标之一.本文提出了一个抗仿射变换攻击的图像水印盲检测算法.该算法从影响水印稳健性的因素-嵌入策略、水印结构和水印检测的同步三个方面(特别是水印检测同步)来提高水印的稳健性.有意义的水印经过直接序列扩频调制后与一个训练序列一起嵌入于图像DWT域的低频子带.在图像DFT域的中频我们嵌入一个匹配模板.检测时,先检测匹配模板,得到图像所受几何攻击的参数并作几何校正,然后在DWT域根据训练序列作平移同步后检测水印信息.应用所提出的算法,我们把一个由44个字符构成的水印(264 bits)嵌入到一幅512×512×8的图像中,实验结果表明所提出算法在隐藏数据量、对抗常规信号处理和线性几何变换的稳健性方面大大优于已报道的算法.  相似文献   

13.
Circularly symmetric watermark embedding in 2-D DFT domain   总被引:9,自引:0,他引:9  
In this paper, a method for digital image watermarking is described that is resistant to geometric transformations. A private key, which allows a very large number of watermarks, determines the watermark, which is embedded on a ring in the DFT domain. The watermark possesses circular symmetry. Correlation is used for watermark detection. The original image is not required in detection. The proposed method is resistant to JPEG compression, filtering, noise addition, scaling, translation, cropping, rotation, printing and rescanning. Experimental results prove the robustness of this method against the aforementioned attacks.  相似文献   

14.
为了达到数字产品产权保护的目的,在此提出了一种基于小波域的扩频水印算法。该算法采用二值图像作为水印,首先对原始载体图像进行DWT一级分解,然后用2个不相关的伪随机序列分别代表水印信息中的0和1,嵌入到小波分解后的LH,HL和HH三个子图上,最后’进行逆向小波变换生成嵌入水印后的图像。通过在开发工具Matlab下的模拟实验,得出了该算法对滤波、噪声和剪切等攻击显示出较强的鲁棒性,取得了隐蔽性和鲁棒性的良好折衷。  相似文献   

15.
王晶  董海鹰 《通信技术》2007,40(11):327-328,331
文中提出了一种基于离散小波变换的同步数字音频盲水印算法.嵌入的水印为视觉上可辨的二值图像.算法中引入了嵌入同步信号的思想,利用同步信号定位水印的嵌入位置,为了提高信号的鲁棒性,把同步信号与水印隐藏在DWT域的低频系数中;同时,检测水印时不需要原始音频.仿真实验表明:所提出的方法具有较强的鲁棒性和不可感知性,并能有效抵御各种常见攻击.  相似文献   

16.
基于Krawtchouk不变矩的仿射攻击不变性局部水印算法   总被引:4,自引:1,他引:3       下载免费PDF全文
张力  肖薇薇  钱恭斌  纪震 《电子学报》2007,35(7):1403-1408
本文提出了一种基于原始图像Krawtchouk不变矩实现的仿射攻击不变性局部水印算法.具体介绍了Krawtchouk不变矩的构造方法,水印是事先产生的且与原始图像无关,通过将水印嵌入到图像的Krawtchouk不变矩中实现仿射攻击不变性.这种基于Krawtchouk矩的水印算法是局部水印技术,即水印的嵌入只是影响到部分原始图像,因此该算法对剪切攻击具有很好的鲁棒性.检测过程中采用独立分量分析技术实现真正意义上的盲检测.文中具体分析了所提出算法的计算复杂度,实验数据说明这种水印算法对通用水印测试软件Stirmark具有很好的鲁棒性.  相似文献   

17.
为了增强水印的安全性,采用混沌理论对水印信息进行加密,在无法获知加密密钥的情况下,水印信息不能被完全获取。基于时域能量特点自适应选取嵌入帧,针对音频信号倒谱变换后倒谱系数的特征,利用统计均值调制的方法进行嵌入,提高了水印的不可感知性。并引入了多重水印的思想,在抵抗多重水印攻击的情况下,也给数字音频版权保护带来帮助。实验证明,该算法在随机剪切、抖动攻击等同步攻击下具有良好的鲁棒性。  相似文献   

18.
为了提高数字水印抗击各种图像攻击的性能和保持图像的稳健性和不可见性,提出了一种基于离散小波变换(DWT),SVD(singular value decomposition)奇异值分解水印图像和原始载体图像的离散余弦变换(DCT)的自适应水印嵌入算法,主要是将水印图像的两次小波变换后的低频分量潜入到原始图像分块经过SVD分解的S分量矩阵中,同时根据图像的JPEG压缩比的不同计算各个图像块的水印调节因子。实验证明该算法在抗击JPEG压缩、中值滤波、加噪等均具有很好的鲁棒性,嵌入后的图像的PSNR达到38,具有良好的视觉掩蔽性  相似文献   

19.
基于几何矩的抵抗RST攻击的数字图像水印   总被引:8,自引:0,他引:8  
目前大多数的数字图像水印方案不能有效抵抗几何形变的攻击,这一弱点已成为数字水印技术走上商用的瓶颈。在各种几何形变中,RST(旋转、缩放、平移)是最为常见的攻击方式。该文提出了一种具有普适性的能够抵抗RST攻击的多比特数字图像水印方案,采用的主要措施有:(1)提出一种基于几何矩的图像标准化方案以抵抗几何攻击;(2)采用扩谱方法构造二维CDMA水印信号,实现多比特水印嵌入;(3)根据HVS特性自适应调整水印的嵌入强度,在鲁棒性和不可见性之间达到平衡;(4)利用MAP和相关方法估计和检测水印信号。实验表明该方案对RST具有很高的鲁棒性,对压缩、滤波等常见的图像处理攻击同样具有良好的鲁棒性。  相似文献   

20.
孙悦 《电子设计工程》2012,20(19):171-173,177
文中提出了一种基于均值量化的小波域自同步数字音频水印算法。该算法是一种盲水印算法,水印提取不需要原始音频信号的参与。算法设计中运用了均值量化的策略,音频信号小波分解后,在低频系数中隐藏水印信息;引入了同步信号的思想,利用同步信号定位水印隐藏位置。实验表明,该算法具有较强的鲁棒性、抗攻击性、抗裁剪性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号