首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.

Automatic localization of tampered regions of a JPEG image has attracted lots of attention in recent times. It is known that the statistical signatures of single and Double JPEG (DJPEG) compression are distinct, and the presence of both the signatures inside an image is proof of manipulation. Automatic localization of tampered regions is carried out by segregating the singly and doubly compressed regions of an image. However, the robustness of the localization process is questionable as very few attempts are made to highlight their vulnerabilities. Here, we propose an adversarial framework, known as jForge, through which one can create a DJPEG compressed image that only bears the signatures of a single compression, and it renders the localization process ineffective. jForge removes the footprints of JPEG compression using model-based approximation techniques. Arguably, this is the first successful attempt to model the DC coefficients of an image, and it employs polynomial regression of two variables to accomplish the same. Similarly, AC coefficients have been approximated using low degree polynomials. We have mounted jForge on three popular forgery localization schemes, and none of them is effective against it. This raises serious doubt regarding the efficacy of the statistical signature-based paradigm of forgery localization.

  相似文献   

2.
In this paper we present a blind audio watermarking algorithm based on the vector norm and the logarithmic quantization index modulation (LQIM) in the wavelet domain, integrating the robustness of the vector norm with the imperceptibility of the logarithmic quantization index modulation based on μ-Law (or mu-Law) companding. Firstly μ-Law companding is adopted to transform the vector norm of the segmented wavelet approximation components of the original audio signal. And then a binary image scrambled by the chaotic sequence as watermark is embedded in the transformed domain with a uniform quantization scheme. Experimental results demonstrate that even if the capacity of the proposed algorithm is high, up to 102.4 bps, this algorithm can still maintain a high quality of the audio signal, and achieve a better performance, such as imperceptibility, robustness and complexity in comparison with the uniform quantization based algorithms against common attacks. What’s more, it can resist amplitude scaling attack effectively.  相似文献   

3.

Steganography has been a great interest since long time ago. There are a lot of methods that have been widely used since long past. Recently, there has been a growing interest in the use of sparse representation in signal processing. Sparse representation can efficiently model signals in different applications to facilitate processing. Much of the previous work was focused on image and audio sparse representation for steganography. In this paper, a new steganography scheme based on video sparse representation (VSR) is proposed. To exploit proper dictionary, KSVD algorithm is applied to DCT coefficients of Y component related to video (cover) frames. Both I and Q components of video frames are used for secure message insertion. The aim is to hide secret messages into non-zero coefficients of sparse representation of DCT called, I and Q video frames. Several experiments are performed to evaluate the performance of the proposed algorithm, in case of some metrics such as pick signal to noise ratio (PSNR), the hiding ratio (HR), bit error rate (BER) and similarity (Sim) of secret message, and also runtime. The simulation results show that the proposed method exhibits appropriate invisibility and robustness.

  相似文献   

4.

Steganography is a very useful technique which aims at preventing loss of privacy during the process of data communication, especially over the internet. It can involve different forms of media like image, video (i.e., image sequence), audio etc. We propose a novel steganographic approach in spatial domain using pixel value differencing (PVD) or sample value differencing (SVD) technique and Galois field (GF (28)) operations in order to provide a two layered security for hiding message bits. Our method not only has a very high embedding capacity, but is also capable of withstanding statistical attacks. The proposed method embeds from 2 to 6 bits of the message per pixel in each image component, whereas it can embed a minimum of 6 bits and a maximum of 13 bits of message per sample in audio component at the expense of no perceivable distortion and loss of the cover media quality.

  相似文献   

5.
The singular value decomposition (SVD) mathematical technique is utilized, in this paper, for audio watermarking in time and transform domains. Firstly, the audio signal in time or an appropriate transform domain is transformed to a 2-D format. The SVD algorithm is applied on this 2-D matrix, and an image watermark is added to the matrix of singular values (SVs) with a small weight, to guarantee the possible extraction of the watermark without introducing harmful distortions to the audio signal. The transformation of the audio signal between the 1-D and 2-D formats is performed in the well-known lexicographic ordering method used in image processing. A comparison study is presented in the paper between the time and transform domains as possible hosting media for watermark embedding. Experimental results are in favor of watermark embedding in the time domain if the distortion level in the audio signal is to be kept as low as possible with a high detection probability. The proposed algorithm is utilized also for embedding chaotic encrypted watermarks to increase the level of security. Experimental results show that watermarks embedded with the proposed algorithm can survive several attacks. A segment-by-segment implementation of the proposed SVD audio watermarking algorithm is also presented to enhance the detectability of the watermark in the presence of severe attacks.  相似文献   

6.
图像复原研究由来已久。一种比较传统的图像复原方法是假设系统的脉冲响应,即事先知道点扩散函数。然而,在大多数实际情况下,很难具体确定点扩散函数,我们仅能通过退化之后的图像来恢复图像,即图像盲复原法。图像盲复原法是在已经观测到的退化图像的基础上,根据特定条件建立合适的数学模型,从而在一定条件下获得最接近原始图像的逼近值。文章通过Split Bregman算法对灰度图和LAB图进行图像复原,并进行了对比实验。  相似文献   

7.
In this paper we modify a multigrid technique introduced for illconditioned symmetric positive definite Toepliltz linear systems [22] in order to deal with the nondefinite case. This kind of linear systems arises in important applications such as image restoration, harmonic retrieval etc. We prove that the cost per iteration isO(nlog2 n) ops andO(log2 n) parallel steps while the convergence speed seems to be independent of the problem matrix-size. Therefore this technique results to be competitive with respect to the fast direct method devised by Chan and Hansen [16] and is alternative to the PCG-based algorithm introduced in [33, 32, 37].  相似文献   

8.

The Secret Sharing Scheme plays a vital role in cryptography which allows to transmit the secret digital information (image, video, audio, handwriting, etc.,) over a communication channel. This cryptographic technique involves encrypting the secret images into noisy shares and transmitted. The transmitted image shares are reconstructed using simple logical computation. In this paper, we propose a secure (n, n)- Multi-Secret-Sharing (MSS) scheme using image scrambling algorithm which is based on the logistic chaotic sequence generated using the secret key which is retrieved from the geometric pattern named as spirograph which drawn by the users with their private values. Also, decomposition and recombination of image pixels which points to change the position and values of the pixels. The experimental results estimate that the standard metrics NPCR, UACI, Entropy, Coefficient Correlation values proves the rigidness of the implemented algorithm.

  相似文献   

9.

Digital image watermarking has become more popular due to its applications in copyright protection and secret communication. Most of the image watermarking algorithms reported till date involve modification of the host contents for embedding a secret data, leading to a reduced robustness and a limited embedding capacity. In the present work, a novel spatial domain watermarking scheme called Pixel Value Search Algorithm (PVSA) is proposed using a linear search operation to achieve high robustness and a theoretically unlimited embedding capacity. In the proposed scheme, secret data are embedded into a host image by mapping their intensity values into row and column locations. Due to this linear mapping of secret data, the host structural content is not altered. In addition, multiple watermarks can be mapped into a single host image using the PVSA technique. The proposed algorithm is verified using MATLAB® simulations and its performance characteristics are assessed using a standard benchmark tool called strimark. Experimental results illustrate the robustness of the PVSA technique against the attacks of Gaussian blurring, Gaussian noise, salt and pepper noise, Poisson noise, speckle noise, mean and median filtering, histogram equalization, image sharpening, intensity transformation, unsharp filtering, JPEG attack, etc. Subsequently an ASIC implementation of the PVSA algorithm is carried out using Verilog HDL and various modules of the Cadence® EDA tool so as to integrate the chip as a watermark co-processor. The ASIC implementation using a 0.18 μm technology at an operating frequency of 100 MHz consumes a power of 326.34 μW for the complete hardware architecture.

  相似文献   

10.

Recently, with the advent of Convolutional Neural Network (CNN) era, Neural style transfer on images has become a very active research topic and the style of an image can be transferred to another image through a CNN so that the image retains both its own content and another style of image. In this work, we propose an algorithm for audio style transfer that uses the force of CNN to generate a new audio from a style audio. We use Continuous Wavelet Transfer(CWT) to convert the audio into a spectrogram and then use the spectrogram as the representation of the audio image through image style transfer method to obtain a new image, and finally, generate an audio using iterative phase reconstruction with Griffin-Lim. We succeed in transferring audio such as light music but had difficulty in transferring audio that has lyrics and high-level metrics such as emotion or tone. We propose several measures to improve the quality of audio and a lot of experimental results shows that our method is better than other methods in terms of sound quality.

  相似文献   

11.
基于调和模型的快速神经网络图像复原算法   总被引:3,自引:0,他引:3  
针对传统神经网络图像复原算法在复原过程中模糊图像边缘,收敛速度慢等不足,提出一种基于调和模型的快速神经网络图像复原算法.在该算法中,图像复原模型的正则化项采用调和模型,并在每次网络状态更新时引入最陡下降方法,使得网络能量迅速减小.实验表明,提出的算法能够很好复原图像的边缘特征,并具有快速收敛等优点.  相似文献   

12.
针对数字音频版权保护和内容认证的问题, 提出了一种用于版权保护和内容认证的自适应双重音频水印算法。算法对每段原始音频信号进行离散小波变换和离散余弦变换, 分别提取混合变换域的低频系数和中低频系数作为水印的构造和嵌入域, 利用音频载体的统计特性自适应地构造零水印和嵌入半脆弱水印, 实现音频版权保护和内容认证。实验结果表明, 该算法的不可感知性很好, 在抵抗多种攻击时具有良好的鲁棒性, 并且能够对恶意窜改进行定位。  相似文献   

13.

The task of audio and music generation in the waveform domain has become possible due to recent advances in deep learning. Generative Adversarial Networks (GANs) are a type of generative model that has achieved success in areas such as image, video and audio generation. However, realistic audio generation with GANs is still a challenge, thanks to the specific characteristics inherent to this kind of data. In this paper we propose a GAN model that employs the self-attention mechanism and produces small chunks of music conditioned by instrument. We compare our model to a baseline and run ablation studies in order to demonstrate its superiority. We also suggest some applications of the model, particularly in the area of computer assisted composition.

  相似文献   

14.
Based on the spectral decomposition theory, this paper presents a unified analysis of higher degree total variation (HDTV) model for image restoration. Under this framework, HDTV is reinterpreted as a family of weighted L1L2 mixed norms of image derivatives. Due to the equivalent formulation of HDTV, we construct a modified functional for HDTV-based image restoration. Then, the minimization of the modified functional can be decoupled into two separate sub-problems, which correspond to the deblurring and denoising. Thus, we design a fast and efficient image restoration algorithm using an iterative Wiener deconvolution with fast projected gradient denoising (IWD-FPGD) scheme. Moreover, we show the convergence of the proposed IWD-FPGD algorithm for the special case of second-degree total variation. Finally, the systematic performance comparisons of the proposed IWD-FPGD algorithm demonstrate the effectiveness in terms of peak signal-to-noise ratio, structural similarity and convergence rate.  相似文献   

15.
Jia  Zhao-hong  Cui  Yu-fei  Li  Kai 《Applied Intelligence》2022,52(2):1752-1769

In this paper, a production–distribution scheduling problem with non-identical batch machines and multiple vehicles is considered. In the production stage, n jobs are grouped into batches, which are processed on m parallel non-identical batch machines. In the distribution stage, there are multiple vehicles with identical capacities to deliver jobs to customers after the jobs are processed. The objective is to minimize the total weighted tardiness of the jobs. Considering the NP-hardness of the studied problem, an algorithm based on ant colony optimization is presented. A new local optimization strategy called LOC is proposed to improve the local exploitation ability of the algorithm and further search the neighborhood solution to improve the quality of the solution. Moreover, two interval candidate lists are proposed to reduce the search for the feasible solution space and improve the search speed. Furthermore, three objective-oriented heuristics are developed to accelerate the convergence of the algorithm. To verify the performance of the proposed algorithm, extensive experiments are carried out. The experimental results demonstrate that the proposed algorithm can provide better solutions than the state-of-the-art algorithms within a reasonable time.

  相似文献   

16.
We propose in this paper a total variation based restoration model which incorporates the image acquisition model z=h * U+n (where z represents the observed sampled image, U is the ideal undistorted image, h denotes the blurring kernel and n is a white Gaussian noise) as a set of local constraints. These constraints, one for each pixel of the image, express the fact that the variance of the noise can be estimated from the residuals zh * U if we use a neighborhood of each pixel. This is motivated by the fact that the usual inclusion of the image acquisition model as a single constraint expressing a bound for the variance of the noise does not give satisfactory results if we wish to simultaneously recover textured regions and obtain a good denoising of the image. We use Uzawa’s algorithm to minimize the total variation subject to the proposed family of local constraints and we display some experiments using this model.  相似文献   

17.
针对彩色图像复原提出了基于网络能量递减收敛的调和模型神经网络图像复原方法,研究了该方法在运动模糊图像复原上的应用。利用待复原图像重构出多幅模糊图像用于算法的实现,并首次提出基于图像局部方差的自适应正则化算子的实现方法。实验结果表明,该方法是有效的,复原效果优于有约束的最小二乘复原法和已有的传统神经网络图像复原法,对复原图像的信噪比有一定的提高。  相似文献   

18.
带彩色恢复的多尺度视网膜皮层( MSRCR)去雾算法是解决雾、霾等恶劣天气下拍摄的图像的对比度下降和图像特征退化问题的一类算法,可以有效改善图像的视觉效果,但由于算法复杂度较高,实时处理困难。通过时域到频域的转化和基于TM320DM642本身硬件特性对MSRCR去雾算法进行了优化,并通过模拟仿真,实现了1024×1024视频的实时处理,得到令人满意的视觉效果。  相似文献   

19.
In video processing, a common first step is to segment the videos into physical units, generally called shots. A shot is a video segment that consists of one continuous action. In general, these physical units need to be clustered to form more semantically significant units, such as scenes, sequences, programs, etc. This is the so-called story-based video structuring. Automatic video structuring is of great importance for video browsing and retrieval. The shots or scenes are usually described by one or several representative frames, called key-frames. Viewed from a higher level, key frames of some shots might be redundant in terms of semantics. In this paper, we propose automatic solutions to the problems of: (i) video partitioning, (ii) key frame computing, (iii) key frame pruning. For the first problem, an algorithm called “net comparison” is devised. It is accurate and fast because it uses both statistical and spatial information in an image and does not have to process the entire image. For the last two problems, we develop an original image similarity criterion, which considers both spatial layout and detail content in an image. For this purpose, coefficients of wavelet decomposition are used to derive parameter vectors accounting for the above two aspects. The parameters exhibit (quasi-) invariant properties, thus making the algorithm robust for many types of object/camera motions and scaling variances. The novel “seek and spread” strategy used in key frame computing allows us to obtain a large representative range for the key frames. Inter-shot redundancy of the key-frames is suppressed using the same image similarity measure. Experimental results demonstrate the effectiveness and efficiency of our techniques.  相似文献   

20.
在傅里叶频域中,由于逆滤波对加性噪声特别敏感,使得恢复后的图像仍然非常模糊.针对这一问题,我们提出了一种基于维纳滤波器和生成对抗网络的动态模糊图像处理方法.首先使用维纳滤波去模糊算法,通过均方差最小化去除噪声,但由于无法判断拍摄装置的移动范围并未得到预期效果.再考虑使用自由性强、不受预定条件分布的生成对抗网络模型(GAN).定义一个类生成器Gy)和类判别器Dx),通过机器学习的方式进行反复学习和反馈,直至达到模型无法判别生成数据样本Sy)和真实数据样本rx)时,图像近似还原成功.同时,引入“模糊核”概念,模拟图像的模糊轨迹,进行精确还原.最后,由于肉眼很难对图像的还原程度做定量判断.因此我们利用三个评价指标对这些图像进行客观评价——峰值性噪比PSNR、模糊系数KBlur、质量因素Q.实验结果表明,在该方法下的图像的三个评价指标在一定程度上有所改善,从而得到图像还原较为成功的结论.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号