首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Abstract

The digital property of multimedia has received significant attention in recent years. Robust watermarking of digital images and video for copyright protection is an important and challenging topic. In this paper, a watermarking method is presented which is based on vector quantization (VQ). In the proposed method, the watermark is related to the codebook that is permuted by an owner-specific random sequence. Also, the extraction of the watermark does not require the existence of the original image. The proposed method exploits the relation of VQ indices to provide the property of invisibility and robustness for various attacks. The experimental results in this work demonstrate the effectiveness of the proposed method.  相似文献   

2.
Abstract

An image watermarking model based on visual secret sharing (VSS) is proposed for protection of ownership. In the embedding phase, the watermark is first divided by VSS into two parts: a hiding watermark and a secret watermark. Then only the hiding watermark is embedded into the original image and the secret watermark is reserved for watermark extracting by the owner. In the extracting phase, the hiding watermark is extracted from the watermarked image first and then directly superimposed on the secret watermark to recover the watermark information.  相似文献   

3.
ABSTRACT

Watermarking provides an efficient mechanism for copyright protection of digital media by embedding information in the object to identify the owner. This paper proposed a watermarking technique that can successfully embed a grey-scale image in a 3D mesh object. In our proposed technique, each three vertices of the 3D object can hide one pixel from the secret image. The experimental results showed that the proposed technique has better visual quality on both the watermarked object and the extracted secret image.  相似文献   

4.
目的提出了一种彩色图像数字水印技术,解决数字水印在大数据量水印、不可见性和鲁棒性之间的关系。方法该算法对彩色QR码水印和彩色载体图像分别进行RGB三通道分解,彩色水印单通图像进行混沌加密;对彩色载体单通道图像进行Contourlet变换;按对应通道将水印嵌入到载体图像低频经奇异值分解后的对角矩阵。结果该算法在水印嵌入和提取仿真实验结果为PSNR50 d B;鲁棒性仿真实验结果表明,该算法在抵抗任意旋转攻击和基本图像处理操作的攻击下,提取出来的彩色QR码颜色未失真,并且均能够成功解码和自动识别。结论该算法具有较强的鲁棒性和较好的不可见性,能够很好地将彩色水印嵌入彩色图像,可应用到实际的数字版权保护中。  相似文献   

5.
《成像科学杂志》2013,61(2):241-251
Abstract

Image hashing is an emerging technology in multimedia security. It uses a short string called image hash to represent an input image and finds applications in image authentication, tamper detection, digital watermark, image indexing, content-based image retrieval and image copy detection. This paper presents a hashing algorithm based on the observation that block entropies are approximately linearly changed after content-preserving manipulations. This is done by converting the input image to a fixed size, dividing the normalised image into non-overlapping blocks, extracting entropies of image blocks and applying a single-level 2D discrete wavelet transform to perform feature compression. Correlation coefficient is exploited to evaluate similarity between hashes. Experimental results show that the proposed algorithm is robust against content-preserving operations, such as JPEG compression, watermark embedding, Gamma correction, Gaussian low-pass filtering, adjustments of brightness and contrast, scaling and small angle rotation. Similarity values between hashes of different images are small, indicating good performances in discriminative capability.  相似文献   

6.
基于计算全息的Contourlet域数字水印算法   总被引:1,自引:0,他引:1  
白韬韬  刘真  卢鹏 《包装工程》2014,35(21):76-79,85
目的提出一种基于计算全息的contourlet域数字水印算法。方法首先,利用共轭对称延拓傅里叶计算全息方法,将原始二值水印图像生成全息水印图像;然后,将原始图像进行二级contourlet变换,得到8个中频方向子带系数;最后,将全息水印嵌入在其中频系数中。结果该方法可以有效抵抗高斯滤波、中值滤波和均值滤波以及打印-扫描攻击,同时,对噪声攻击、裁切攻击和JPEG压缩攻击也有很强的抵抗能力。在水印提取时无需原始图像,属于盲水印算法。结论该算法可以广泛应用于数字图像的版权保护中。  相似文献   

7.
The widespread use of Internet and other communication technologies has brought about ease in reproducing, disclosing and distributing digital content. In addition to getting the benefits of information exchange, the digital community is confronted with authentication, forgery and copyright protection issues. Text is the most frequently used medium travelling over the Internet, along with images, audio and video. Majority of the content of books, newspapers, web pages, advertisements, research papers, legal documents and many other documents is basically, plain text. Therefore, copyright protection of plain text is a most important issue. In this article, we propose a robust zero-watermarking algorithm based on prepositions and double letters for copyright protection of plain text. The embedding algorithm uses occurrences of prepositions and double letters in the text to generate a key based on watermark. The extraction algorithm extracts the watermark from the noisy text to identify the original owner. Experimental results illustrate the effectiveness of the proposed algorithm on text encountering combined insertion, deletion and re-ordering attacks, both in the dispersed and localized forms. The results are also compared to a recent work on text watermarking.  相似文献   

8.
基于 QR 码的抗几何攻击数字水印   总被引:11,自引:10,他引:1  
白韬韬  刘真  卢鹏 《包装工程》2013,34(11):113-116
针对目前数字水印无法抵抗几何攻击的问题,提出了一种基于 QR 码的抗几何攻击数字水印算法。 将文字信息进行了 QR 码编码,所得 QR 码作为水印信息。 将载体图像进行一级离散小波变换,在变换后的低频子图中分块嵌入了水印信息。 实验结果表明,本方法可以抵抗常见的旋转、等比例和不等比列缩放攻击,同时对 JPEG 压缩也具有很好的鲁棒性,此数字水印技术能够广泛应用到数字作品的版权保护中。  相似文献   

9.
In order to improve the robustness of the watermarking algorithm, a dual watermarking method is proposed to prove copyright ownership. Visible watermarking is important for protecting online resources from unauthorized reproduction. However robust, visible watermarks are vulnerable to illegal removal and other common signal processing and geometric attacks. Multiple invisible watermarks can enhance the protection of the visibly watermarked image. When the ownership of tampered image is in question, the invisible watermark can be extracted to provide appropriate ownership information. We have proposed dual watermarking scheme with multiple biometric watermarks in which it embeds speech and face biometric traits of owner invisibly and lastly offline signature is overlaid translucently on image. Before embedding, speech is compressed using Linear Predictive Coding (LPC) and Gabor face is created from face biometric trait. All three watermarks Gabor face, LPC coefficients and offline signature are the biometric characteristics of the owner and hence they are highly related with copyright holder. The proposed scheme is robust enough, Gabor face and LPC coefficients can be extracted from the signature marked image or even from the tampered image from which signature is removed illegally or legally. As multiple watermarks are embedded at least one watermark survives under different attacks. It can find application for joint ownership or to address single ownership multiple times.  相似文献   

10.
一种用于印刷图像防伪的水印算法设计与实现   总被引:4,自引:4,他引:0  
代小红  王光利 《包装工程》2011,32(15):118-122
阐述了基于DCT变换域的数字水印理论和算法,并根据相关理论模型,提出了一种在离散傅里叶变换中实现的、可用于印刷品防伪的数字水印嵌入算法。研究表明与传统的LSB算法和Patchwork算法相比,该算法有较好的抗攻击能力。给出了系统的水印嵌入算法和水印提取流程设计的过程。实践证明,基于DCT变换域的数字水印算法能确保水印的不可见性,并保持较好的鲁棒性,实现了印刷图像载体数字版权的保护,并可检测出用此算法嵌入印刷图像中的不可见标记。最后通过实验验证了此算法的可行性、可靠性和有效性,为印刷品版权保护提供参考和借鉴。  相似文献   

11.
视频水印技术研究   总被引:8,自引:0,他引:8  
介绍了多媒体数字水印技术研究方向中当前的一个重点和难点——视频水印技术。它利用数据隐藏技术将特定的信息嵌入到视频数据中,以起到版权保护、秘密通信、数据文件的真伪鉴别和产品标志等作用。视频水印技术可以借鉴图像水印技术大量的研究成果,但又由于视频与图像某些本质的差异,因而在许多方面具有与图像水印不同的技术特征。讨论了视频水印技术的特点,介绍了视频水印技术的发展现状,具体分析了几种视频水印算法方案,并对视频水印技术的发展趋势进行了展望。  相似文献   

12.
基于奇异值分解的Contourlet域水印算法   总被引:3,自引:3,他引:0  
余勇 《包装工程》2017,38(7):202-205
目的提高数字水印算法抗信号处理攻击能力,提升水印鲁棒性。方法提出一种基于Contourlet变换和奇异值分解(SVD)相结合的水印算法。对水印图像进行多次Arnold置乱处理,实现置乱加密;选择Contourlet域变换系数的方向子带作为水印嵌入区域;在Contourlet系数构建矩阵中进行SVD分解,并结合人类视觉系统进行嵌入强度的自适应选择。结果实验结果得出图像的峰值信噪比为54.1279 d B,表明所述算法具有很好的透明性、隐蔽性。结论所述图像数字水印算法具有很好的鲁棒性、不可见性以及抵抗各种攻击的能力,对数字产品的版权保护具有促进作用。  相似文献   

13.
Image processing networks have gained great success in many fields, and thus the issue of copyright protection for image processing networks has become a focus of attention. Model watermarking techniques are widely used in model copyright protection, but there are two challenges: (1) designing universal trigger sample watermarking for different network models is still a challenge; (2) existing methods of copyright protection based on trigger s watermarking are difficult to resist forgery attacks. In this work, we propose a dual model watermarking framework for copyright protection in image processing networks. The trigger sample watermark is embedded in the training process of the model, which can effectively verify the model copyright. And we design a common method for generating trigger sample watermarks based on generative adversarial networks, adaptively generating trigger sample watermarks according to different models. The spatial watermark is embedded into the model output. When an attacker steals model copyright using a forged trigger sample watermark, which can be correctly extracted to distinguish between the piratical and the protected model. The experiments show that the proposed framework has good performance in different image segmentation networks of UNET, UNET++, and FCN (fully convolutional network), and effectively resists forgery attacks.  相似文献   

14.
With increasing use of digital media, need for digital rights management has arisen. Watermarking is used to hide copyright protection information in the host medium. Hiding information to ensure digital right protection must ensure high imperceptibility and an acceptable level of robustness. In the watermark embedding, appropriate watermark strength and place selection in the host image is the most critical aspect of the whole process. Both watermark strength and place selection are considered as optimisation problems and are optimised using genetic algorithm (GA) and particle swarm optimisation (PSO). The watermark is embedded in the wavelet domain. With the proposed method optimal wavelet family, band, watermark strength and wavelet depth level are selected to ensure higher robustness and imperceptibility. The watermark is embedded in the selected bands of the wavelet packets. The band and wavelet depth is selected using GA and watermark strength is optimised using PSO method. The proposed method shows promising results against attacks on a variety of filters, i.e. low pass, high pass and median filters. Robustness results on JPEG compression and gaussian noise are also improved compared with the current approaches in practice.  相似文献   

15.
数字水印技术广泛应用于多媒体产品的版权保护。本文提出并实现了一种位图水印的嵌入和检测的思想。这种方法采用DCT算法,对图像进行分块处理,同时充分考虑人类视觉特性降低计算量,从图像实验结果可以看出其嵌入与检测的效果比较良好,同时水印的隐蔽性很好,直观性很强,而且可以很好的抵抗剪切、压缩、平滑等图像处理操作。  相似文献   

16.
Web dual watermarking technology using an XML document   总被引:1,自引:0,他引:1  
A novel dual watermark technology based on digital copyright technology is proposed, which, making full use of the advances of the web, stores the correlation information including the keys and the dual watermarks in an XML document. A new image watermarking technology to spread a digital image with copyright protection is realised successfully on the Internet. The arithmetic has very good robustness against the most common, non-malevolent data manipulations, including digital-to-analogue conversion and digital format conversion. Finally, the experimental results confirm that the two watermarks embedded by the proposed algorithm are invisible and robust against commonly used image-processing manipulations such as JPEG compression, adding noise, cropping, and rescaling and soon. The proposed algorithm is shown to provide very good results in term of image imperceptibility too  相似文献   

17.
一种新的彩色图像变换域全息水印算法   总被引:6,自引:4,他引:2  
提出了一种变换域中改善全息水印抗几何攻击和滤波攻击性能的彩色图像全息水印算法。 取彩色 RGB载体图像的蓝色通道,分块后做一级小波分解转换到变换域,取低频子带,然后进行奇异值分解嵌入数字全息水印。 实验结果表明:该算法水印隐蔽性好,重建的水印与原始水印相似度高;算法鲁棒性强,可以抵抗常见的各种攻击,尤其改善了全息水印的抗几何攻击和滤波攻击性能,满足了数字防伪、版权保护的需要。  相似文献   

18.
《成像科学杂志》2013,61(2):120-133
Abstract

Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper, an adaptive, scalable, blind and robust wavelet-based watermarking approach is proposed. The proposed approach enables scalable watermark detection and provides robustness against progressive wavelet image compression. A multiresolution decomposition of the binary watermark is inserted into the selected coefficients of the wavelet-decomposed image that represent the high activity regions of the image. The watermark insertion is started from the lowest frequency sub-band of the decomposed image and each decomposed watermark sub-band is inserted into its counterpart sub-band of the decomposed image. In the lowest frequency sub-band, coefficients with maximum local variance and in the higher frequency sub-bands, coefficients with maximum magnitude are selected. The watermarked test images are transparent according to the human vision system characteristics and do not show any perceptual degradation. The experimental results very efficiently prove the robustness of the approach against progressive wavelet image coding even at very low bit rates. The watermark extraction process is completely blind and multiple spatial resolutions of the watermark are progressively detectable from the compressed watermarked image. This approach is a suitable candidate for providing efficient authentication for progressive image transmission applications especially over heterogeneous networks, such as the Internet.  相似文献   

19.
Watermarking is a widely used solution to the problems of authentication and copyright protection of digital media especially for images, videos, and audio data. Chaos is one of the emerging techniques adopted in image watermarking schemes due to its intrinsic cryptographic properties. This paper proposes a new chaotic hybrid watermarking method combining Discrete Wavelet Transform (DWT), Z-transform (ZT) and Bidiagonal Singular Value Decomposition (BSVD). The original image is decomposed into 3-level DWT, and then, ZT is applied on the HH3 and HL3 sub-bands. The watermark image is encrypted using Arnold Cat Map. BSVD for the watermark and transformed original image were computed, and the watermark was embedded by modifying singular values of the host image with the singular values of the watermark image. Robustness of the proposed scheme was examined using standard test images and assessed against common signal processing and geometric attacks. Experiments indicated that the proposed method is transparent and highly robust.  相似文献   

20.
基于Logistic混沌加密的NSCT-SVD抖动调制盲水印算法   总被引:1,自引:1,他引:0  
马婷  高大鹏  王欣 《包装工程》2016,37(5):156-160,166
目的提出一种既安全又具高稳健性的盲水印算法。方法首先通过Logistic映射混沌置乱对图像加密,然后对载体图像进行三层非采样Contourlet变换(NSCT),提取低频部分进行8×8分块,最后对低频带的子块进行奇异值分解(SVD),将混沌变换的水印图像嵌入在进行抖动调制的奇异值中。结果该算法解决了奇异值分解引起的False positive问题即虚警率,在提取水印的算法过程中没有用到原载体图像,实现了水印的嵌入及盲检测。实验结果显示,该算法提高了水印的防伪性,耐常见攻击的抵抗能力也较强。结论该算法满足了数字水印技术要求的隐蔽性和稳健性,并且可以对数字产品起到版权保护的作用。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号