首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 343 毫秒
1.
徐国银  朱建银  沈海斌  时晓东   《电子器件》2007,30(2):546-549
为实现图像完整性认证,在分析现有各种脆弱水印算法的基础上,一种新的变换域脆弱水印算法被提出.该算法利用离散余弦变换(DCT)系数查表生成水印,嵌入的水印不可见性好,水印图像能有效检测各种攻击,具有良好的认证效果.此外该算法适用于硬件实现,且能方便地嵌入到现有的JPEG压缩器中,具有速度快、面积小的特点.  相似文献   

2.
应用于实时通信版权保护的BTC图像水印技术   总被引:1,自引:1,他引:0  
郎永祥  秦拯 《电视技术》2011,35(17):12-14
现有BTC图像水印方案多为脆弱水印技术或数据隐藏技术,不能应用于数字图像版权保护.为保护数字电视实时通信图像版权,结合Haar小波变换,提出一种稳健的BTC域图像水印算法.算法首先对载体图像BTC域两重建电平进行Haar小波变换,然后通过修改低频系数以嵌入稳健水印.水印提取时无须原始载体图像参与.仿真实验表明,算法具有...  相似文献   

3.
一种基于QR分解的脆弱水印算法   总被引:3,自引:0,他引:3  
赵辉  陈卫红 《电子工程师》2003,29(12):13-15
提出了一种基于QR分解的脆弱水印算法。该算法运用矩阵的QR分解技术,把原始图像信息转化为很短的二进制比特串,并把其作为水印嵌入到原始图像中随机选取的某些像素的LSB位。该算法不仅能检测到水印图像的任何改动,同时还保证了水印图像的质量。为了对水印图像的变化像素进行定位,提出了一种运用分块技术的扩展算法,并对此扩展算法进行改进,使其能够抵抗剪切一粘贴攻击。实验证明,该算法对水印图像的改变非常敏感,定位算法也有很好的效果。  相似文献   

4.
文章提出一种基于小波变换的新颖的鲁棒语音扩谱水印算法。算法对原始语音进行离散小波变换.利用扩谱水印技术将水印隐藏到小波域。根据检测与估计理论,运用新的检测统计量进行相关检测。同时,通过引入抗异步攻击的机制和倒谱滤波,增强了算法的鲁棒性。实验结果表明,该算法对噪声、中值滤波、低通滤波、异步攻击等有较强的鲁棒性。  相似文献   

5.
基于压缩传感的半脆弱水印的视频篡改检测算法   总被引:1,自引:0,他引:1  
现针对目前的视频水印算法在篡改检测方面存在不足,提出一种基于压缩传感的半脆弱水印的视频篡改检测算法.通过压缩传感算法提取I帧的图像特征,生成半脆弱的内容认证水印,嵌入到I帧图像的中高频系数中,实现帧内篡改检测.通过对P帧的序号进行哈希运算,生成完整性水印,嵌入到P帧的运动矢量中,实现帧间篡改检测.仿真实验表明,算法对视...  相似文献   

6.
基于色调处理技术的图像认证算法   总被引:3,自引:0,他引:3  
基于色调处理技术,该文给出了一种有效可行且具有自修复能力的图像认证算法。首先,基于误差扩散色调处理技术将水印图像4bit色调量化,井依据混沌置乱算子,将色调结果置乱,然后构造平均误差最小的特征集合C,最后依据误差扩散数据隐藏算法将置乱后水印图像隐藏于原始图像中;在认证端,从接收到的图像提取其中所隐藏水印信息并进行逆置乱,比较接收到的图像和反置乱后的隐藏信息,判断内容发生变化的位置,并依据所提取的水印信息修复被篡改图像。实验结果表明,该算法对删除、替换、篡改等破坏图像内容的恶意操作有精确的检测和定位,以及自修复能力。  相似文献   

7.
针对张量积小波数字图像水印算法在几何攻击下鲁棒性较差的问题,提出一种将不可分小波、奇异值分解以及Arnold置乱变换相结合的数字图像水印算法。该算法首先构造了二维不可分小波滤波器组,其次对水印图像进行Arnold置乱变换,对原始图像用不可分小波进行多尺度分析,然后分别对其低频部分和置乱后的水印进行奇异值分解,最后在两者的奇异值矩阵中嵌入水印。实验结果表明,该算法能实现水印的嵌入和准确提取,并且水印的不可见性好,与张量积小波相比,该方法在对滤波、噪声、剪切、旋转、加噪的攻击下,鲁棒性较强。  相似文献   

8.
提出了一种在小波域中同时嵌入鲁棒水印和脆弱水印的算法。根据相邻小波系数间的关系在JPEG压缩后大多不发生变化的事实,首先对原始载体图像进行一级小波分解,然后将鲁棒水印嵌入到小波的低频系数LL中,脆弱水印嵌入到小波的高频子带HL中,水印提取和图像认证均不需要原始图像参与,很好实现了水印的盲检测。实验结果表明:本文算法对常见的非恶意攻击提取的鲁棒水印和半脆弱水印的归一化相关系数(NC)值几乎都在0.8以上;对恶意的图像操作可以精确检测和定位;算法嵌入容量大,抗JPEG压缩性能高和计算简单,可以集成于CMOS图像传感器芯片中。  相似文献   

9.
基于压缩感知的交互支持双水印算法   总被引:5,自引:0,他引:5       下载免费PDF全文
赵春晖  刘巍 《电子学报》2012,40(4):681-687
 针对一般水印算法功能单一,而双水印算法中两种水印互相干扰的问题,提出了一种交互支持双水印算法.首先将鲁棒水印嵌入图像中,然后从鲁棒水印的密钥中抽取出一部分形成观测矩阵,使用该观测矩阵对图像进行分块压缩感知(Compressive Sensing,CS),观测值即为半脆弱水印,将半脆弱水印作为零水印注册保存.零水印的使用减少了双水印对原始图像视觉效果的影响,可以有效避免两种水印之间的干扰.压缩感知理论的引入实现了两种水印之间的交互支持,一方面,鲁棒水印为半脆弱水印的生成提供观测矩阵及保密支持,另一方面半脆弱水印可以增强鲁棒水印的性能并验证其密钥的真实性.  相似文献   

10.
胡云  郭芬红  杨义先 《信号处理》2003,19(Z1):153-156
针对Wong提出的系列水印算法,本文给出了一种有效的协议攻击并提出了一种新的能够抵抗该协议攻击的脆弱水印算法.新算法将鲁棒性水印与脆弱性水印相结合来构造图像完整性和认证性水印.实验表明新算法不但能抵抗协议攻击,而且具有隐蔽性,能检测图像大小和像素值的改变,并能定位被改变的像素.此外,由于有了鲁棒性水印,增加了对版权的认证能力.  相似文献   

11.
李昌利 《无线电工程》2007,37(3):17-18,55
有望解决数字媒体版权纠纷的数字水印技术须满足3个相互冲突的基本要求:不可见性、健壮性和嵌入容量。应用信息论中多维无记忆加性高斯信道容量公式,提出一种基于图像内容的高容量算法。算法在保证水印不可见性的前提下,尽可能多地嵌入强度大的水印信息。水印的检测不需要原始图像,属于盲水印算法。仿真结果表明,运用该算法在图像中能嵌入较多的水印信息,同时具有很好的健壮性。  相似文献   

12.
Most proposed digital watermarking algorithms are sensitive to geometric attacks because the synchronization information of watermark embedding and detection is destroyed. In this letter a novel synchronization recovery scheme based on image normalization is proposed. The presented scheme does not require the original image and can be applied to various watermark systems. A wavelet-based watermarking scheme is proposed as an example and experimental results show that it is robust to geometric attacks.  相似文献   

13.
本文提出了一种基于频域的文档图像自适应可见水印加密算法。利用文档图像的纹理特性将原始图像分块,根据不同的嵌入强度将可见水印图像嵌入原始图像的频域中以显示所有权。实验表明,可见水印以自适应方式嵌入,想在不损坏图像使用质量的前提下,去除或毁坏图像中的可见水印是很困难的,具有较强的鲁棒性。  相似文献   

14.
This article proposes a blind discrete wavelet transform-discrete cosine transform (DWT-DCT) composite watermarking scheme that is robust against print and scan distortions. First, two-dimensional DWT is applied to the original image to obtain the mid-frequency subbands. Then, a one-dimensional DCT is applied to the selected mid-frequency subbands to extract the final coefficients for embedding the watermark. To specify watermarking parameters, we utilize a Genetic Algorithm to achieve a predefined image quality after watermark insertion. Suitable locations for watermarking are determined by analyzing the effect of a modeling algorithm. This model simulates noise and nonlinear attacks in printers and scanners through noise estimation and system identification methods. The experimental results demonstrate that the proposed algorithm has a high robustness against print and scan attack such that its robustness is higher than related watermarking algorithms.  相似文献   

15.
In this work, a semi-fragile watermarking scheme, for grayscale image authentication and tamper detection, is proposed. The proposed watermarking scheme is based on implementing a modified DWT quantization-based algorithm by embedding a random watermark bit sequence into the DWT domain using an expanded-bit multiscale quantization-based technique with adjusted watermarked location. Here, the watermark bit is expanded into three similar bits and embedded in a multiscale fashion into the DWT low-frequency subbands of the 2nd DWT levels (LL2, LLHL1 and LLLH1). An adjustment of the quantized coefficients is provided based on modifying their values to fall in more secure locations within the quantization interval. Several designed criteria were used to judge the received image by classifying it into: authenticated, incidentally or maliciously attacked with high accuracy in detecting and classifying attacks. Experimental results have shown the suitability of the proposed approach for tamper detection and accurate authentication.  相似文献   

16.
Contourlet-based image adaptive watermarking   总被引:2,自引:0,他引:2  
In the contourlet transform (CT), the Laplacian pyramid (LP) decomposes an image into a low-frequency (LF) subband and a high-frequency (HF) subband. The LF subband is created by filtering the original image with 2-D low-pass filter. However, the HF subband is created by subtracting the synthesized LF subband from the original image but not by 2-D high-pass filtering the original image. In this paper, we propose a contourlet-based image adaptive watermarking (CIAW) scheme, in which the watermark is embedded into the contourlet coefficients of the largest detail subbands of the image. The transform structure of the LP makes the embedded watermark spread out into all subbands likely in which the LF subbands are included when we reconstruct the watermarked image based on the watermarked contourlet coefficients. Since both the LF subbands and the HF subbands contain watermarking components, our watermarking scheme is expected to be robust against both the LF image processing and the HF image processing attacks. The corresponding watermarking detection algorithm is proposed to decide whether the watermark is present or not by exploiting the unique transform structure of LP. With the new proposed concept of spread watermark, the watermark is detected by computing the correlation between the spread watermark and the watermarked image in all contourlet subbands fully. The proposed CIAW scheme is particularly superior to the conventional watermarking schemes when the watermarked image is attacked by some image processing methods, which destroy the HF subbands, thanks to the watermarking components preserved in the LF subbands. Experimental results show the validity of CIAW in terms of both the watermarking invisibility and the watermarking robustness. In addition, the comparison experiments prove the high-efficiency of CIAW again.  相似文献   

17.
针对数字水印技术均不考虑版权图像共享场景中用户的预览需求,以及软件控制方法和附加信息方法的局限性,该文提出一个支持直接从加密图像预览原图像部分视觉内容的版权图像共享方案。为此,将缩略图保持加密的思想引入到用户端嵌入的水印方案中,通过像素调整在加密图像上呈现原图像内容的模糊版本。用于调整的像素位被事先以信息隐藏的方法嵌入隐藏区域中,以保证解密的正确性。此外,用户水印被在解密的同时嵌入到图像中,用于实现对未授权重分发行为的追踪。这样一来,不仅满足了共享过程中用户的预览需求还同时保护了图像的版权。理论分析和实验测试的结果展现了所提方案的安全性、可行性、高效性和鲁棒性。  相似文献   

18.
基于自适应频带选择的数字水印技术   总被引:3,自引:1,他引:2  
如何选择水印的隐藏区域是水印算法中的关键问题。该文提出了一种自适应DCT域水印算法,利用了人眼视觉系统(HVS)和图像局部特性自适应地选择水印隐藏区域,有效地实现了水印的稳定性和不可见性的折衷。与其它水印算法比较,该文提出的自适应算法适合于具有不同总体特性和局部特性的图像。实验结果表明该算法具有很好的感知质量,水印稳健性好,可以抵制各种图像处理操作诸如加性白噪声(AWGN),JPEG压缩以及裁剪,中值滤波,缩放等。  相似文献   

19.
基于压缩感知的鲁棒可分离的密文域水印算法   总被引:2,自引:0,他引:2  
为了满足密文域水印嵌入的需要,该文基于压缩感知技术,提出一种鲁棒可分离的密文域水印算法。首先,内容拥有者将图像进行不重叠分块,利用边缘检测手段划分重要块和非重要块。重要块用传统加密方式进行加密,非重要块用压缩感知技术进行加密,同时为水印嵌入留出一定空间,然后根据嵌入密钥,实现二值水印的密文嵌入。在接收端获取图像内容和水印的方式是可分离的,同时根据含水印的密文图像块的像素分布特性可重新判断块的属性,避免了传输块属性信息。此外,水印信息重复4次嵌入在密文图像的不同区域,保证了水印的鲁棒性。实验结果显示所提方案在抵抗适度攻击时具有鲁棒性和安全性。  相似文献   

20.
Local image features have been widely applied in feature-based watermarking schemes. The feature invariance is exploited to achieve robustness against attacks, but the leakage of information about hidden watermarks from publicly known locations and sizes of features are often unconsidered in security. This paper, therefore, proposes a novel image watermarking approach, which adopts invariant feature regions to jointly enhance its robustness and security. Initially, circular feature regions are determined by the scale-adapted auto-correlation matrix and the Laplacian-of-Gaussian operation. Leakage of secret information is also controlled carefully during feature detection procedure. An optimal selection process formulated as a multidimensional knapsack problem is then proposed to select robust non-overlapping regions from those circular feature regions to resist various attacks. This process is implemented by a genetic algorithm-based approach, and incorporates randomization to mitigate the security risk. Finally, each selected region is normalized to obtain a geometrically invariant feature region, and embedded with a region-dependent watermark to overcome the weakness of multiple-redundant watermarks. The evaluation results based on the StirMark benchmark present the proposed scheme can tolerate various attacks, including noise-like signal processing and geometric distortions. A security analysis in terms of differential entropy also confirms the security improvement of the proposed method.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号