首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
To optimize the tradeoff between imperceptibility and robustness properties, this paper proposes a robust and invisible blind image watermarking scheme based on a new combination of discrete cosine transform (DCT) and singular value decomposition (SVD) in discrete wavelet transform (DWT) domain using least-square curve fitting and logistic chaotic map. Firstly cover image is decomposed into four subbands using DWT and the low frequency subband LL is partitioned into non-overlapping blocks. Then DCT is applied to each block and several particular middle frequency DCT coefficients are extracted to form a modulation matrix, which is used to embed watermark signal by modifying its largest singular values in SVD domain. Optimal embedding strength for a specific cover image is obtained from an estimation based on least-square curve fitting and provides a good compromise between transparency and robustness of watermarking scheme. The security of the watermarking scheme is ensured by logistic chaotic map. Experimental results demonstrate the better effectiveness of the proposed watermarking scheme in the perceptual quality and the ability of resisting to conventional signal processing and geometric attacks, in comparison with the related existing methods.  相似文献   

2.
一种新的基于奇异值分解的小波域盲水印*   总被引:3,自引:1,他引:2  
目前,如何增强鲁棒性水印抵抗几何攻击尤其是旋转攻击的鲁棒性,仍是水印研究者研究的难点。为此,结合奇异值分解的特性和小波变换的优点,提出一种新的基于奇异值分解的小波域盲水印算法,对于常见的几何攻击具有很强的鲁棒性。首先对小波分解后的低频子带分块以提高水印的嵌入容量,再对各子块进行奇异值分解,将Arnold置乱后的水印嵌入到奇异值中,并使用量化方法增强水印的鲁棒性。实验表明,该算法对于常见的几何攻击特别是旋转攻击具有很强的鲁棒性,也能够抵抗JPEG2000压缩等信号处理。  相似文献   

3.
In this paper, we propose a novel optimal singular value decomposition (SVD)-based image watermarking approach that uses a new combination of weighted quantum particle swarm optimization (WQPSO) algorithm and a human visual system (HVS) model for both the hybrid discrete wavelet transform and discrete cosine transform (DCT). The proposed SVD-based watermarking approach initially decomposes the host image into sub-bands; afterwards, singular values of the DCT of the lower sub-band of the host image are quantized using a set of optimal quantization steps deduced from a combination of the WQPSO algorithm and the HVS model. To evaluate the performance of the proposed approach, we present tests on different images. The experimental results show that the proposed approach yields a watermarked image with good visual definition; at the same time, the embedded watermark was robust against a wide variety of common attacks, including JPEG compression, Gaussian noise, salt and pepper noises, Gaussian filters, median filters, image cropping, and image scaling. Moreover, the results of various experimental analyses demonstrated the superiority of the WQPSO approach over other optimization techniques, including classical PSO and QPSO in terms of local convergence speed, resulting in a better balance between global and local searches of the watermarking algorithm.  相似文献   

4.
Securing medical data while transmission on the network is required because it is sensitive and life-dependent data. Many methods are used for protection, such as Steganography, Digital Signature, Cryptography, and Watermarking. This paper introduces a novel robust algorithm that combines discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD) digital image-watermarking algorithms. The host image is decomposed using a two-dimensional DWT (2D-DWT) to approximate low-frequency sub-bands in the embedding process. Then the sub-band low-high (LH) is decomposed using 2D-DWT to four new sub-bands. The resulting sub-band low-high (LH1) is decomposed using 2D-DWT to four new sub-bands. Two frequency bands, high-high (HH2) and high-low (HL2), are transformed by DCT, and then the SVD is applied to the DCT coefficients. The strongest modified singular values (SVs) vary very little for most attacks, which is an important property of SVD watermarking. The two watermark images are encrypted using two layers of encryption, circular and chaotic encryption techniques, to increase security. The first encrypted watermark is embedded in the S component of the DCT components of the HL2 coefficients. The second encrypted watermark is embedded in the S component of the DCT components of the HH2 coefficients. The suggested technique has been tested against various attacks and proven to provide excellent stability and imperceptibility results.  相似文献   

5.
目前,大多数鲁棒图像水印所面临的最大问题就是几何攻击,而现有水印技术大都难以抵抗几何变换类攻击,如旋转、尺度变换等,由于几何攻击破坏了水印分量的同步,即使微小幅度的图像旋转或尺度变换都可能导致水印检测过程失败.提出了一种基于奇异值分解和小波变换的方法来盲提取受到几何攻击后的图像中的水印,即利用了奇异值对几何失真的稳健性,又利用了小波变换对一般攻击的稳健性.实验证明,提出的方法对几何攻击具有很好的鲁棒性.  相似文献   

6.
An improved SVD-based watermarking technique for copyright protection   总被引:4,自引:0,他引:4  
The drawbacks of SVD-based image watermarking are false positive, robust and transparency. The former can be overcome by embedding the principal components of the watermark into the host image, the latter is dependent on how much the quantity (i.e., scaling factor) of the principal components is embedded. For the existing methods, the scaling factor is a fixed value; actually, it is image-dependent. Different watermarks need the different scaling factors, although they are embedded in the same host image. In this paper, two methods are proposed to improve the reliability and robustness. To improve the reliability, for the first method, the principal components of the watermark are embedded into the host image in discrete cosine transform (DCT); and for the second method, those are embedded into the host image in discrete wavelets transform (DWT). To improve the robustness, the particle swarm optimization (PSO) is used for finding the suitable scaling factors. The experimental results demonstrate that the performance of the proposed methods outperforms than those of the existing methods.  相似文献   

7.
基于小波—奇异值分解的数字水印新算法*   总被引:9,自引:5,他引:4  
为了有效地保护数字作品的版权,提出了一种以离散小波多级分解与奇异值分解相结合的数字水印新算法。该算法充分利用小波与奇异值的固有性质,对原始图像进行多级小波分解,并对部分子带作奇异值分解。将水印置乱来保证一定的安全性,再对其进行分块离散余弦变换,然后将它嵌入到中间奇异值及其周围的部分矩阵块中。实验表明,该方法不仅有较好的透明性,而且能抗大多数处理攻击,有较好的鲁棒性。  相似文献   

8.
This paper presents an optimized watermarking scheme based on the discrete wavelet transform (DWT) and singular value decomposition (SVD). The singular values of a binary watermark are embedded in singular values of the LL3 sub-band coefficients of the host image by making use of multiple scaling factors (MSFs). The MSFs are optimized using a newly proposed Firefly Algorithm having an objective function which is a linear combination of imperceptibility and robustness. The PSNR values indicate that the visual quality of the signed and attacked images is good. The embedding algorithm is robust against common image processing operations. It is concluded that the embedding and extraction of the proposed algorithm is well optimized, robust and show an improvement over other similar reported methods.  相似文献   

9.
In this paper, a robust semi-blind watermarking scheme for color images, based on multiple decompositions is proposed to preserve the copyrights of the owner. Using multiple decompositions, the gray watermark is embedded into a host color image. Prior to that, to enhance security the gray watermark is encrypted with Arnold transform and SVD by generating secret keys. The luminance component of the given host image is subjected to discrete wavelet transform(DWT), contourlet transform(CT), Schur decomposition and singular value decomposition(SVD) in sequence and finally the watermark is embedded. In the semi-blind extraction process, the watermark is extracted without the help of the original host image. Experimental results show that the proposed watermarking scheme has better visual imperceptibility and high robustness against image & signal processing attacks compared to other methods.  相似文献   

10.
一个基于DWT的自适应数字水印算法   总被引:2,自引:0,他引:2  
黄松  张伟  陈军  杨华千 《计算机科学》2006,33(7):155-157
本文提出了一个新的DWT域自适应数字水印算法。该算法利用小波域高、低频部分嵌入水印的优势互补特点,在载体图像的高频和低频子带分别嵌入相同水印来增强水印抵抗多种攻击的能力;水印的嵌入采用量化调制方式,其量化步长可根据人类视觉系统和载体图像的局部特点自适应地调整。此外,由于奇异值分解具有良好的性能,因而被用于高频部分水印的嵌入以提高其鲁棒性。实验结果表明水印具有良好的鲁棒性和不可见性,与相近算法相比,本文方法可以有效抵抗更多的攻击。  相似文献   

11.
一种基于SVD分解的小波域数字水印算法   总被引:1,自引:0,他引:1  
本文提出了一种基于离散小波变换和奇异值分解的数字水印算法。该算法充分利用了离散小波分解和矩阵奇异值分解(SVD)的固有特征,对Arnold置乱后的水印的多层小波分解子带做奇异值分解,把分解后的奇异值嵌入到原始图像的多层小波分解的相应子带中。水印的提取是嵌入算法的逆过程。Matlab仿真试验表明了算法的透明性、稳健性和安全性。  相似文献   

12.
This paper developed new and efficient image watermarking scheme for copyright protection based on Lifting wavelet transform (LWT) and Bi- dimensional Empirical Mode Decomposition (BEMD). A LWT has been selected because it is fast, less computational cost and maintains the integrity of the recovered watermark. The BEMD transform can separate the image from the most robust to the least sensitive or fragile frequency bands. This advantage is utilised in this study for the purpose of embedding the watermark in the robust part of BEMD, i.e. the residue (r). In addition, the embedding process has been performed in the low sub-band of LWT decomposed image as the low sub-band is more robust to image processing such as JPEG compression. The robust watermark which is grey scale image is decomposed using DWT to enhance the security and select only high sub-band as it has less impact on the quality of the watermarked image. As a result, the original image’s visual quality can be preserved and the concealed watermark could be successfully retrieved even if the watermarked images have undergone severe attacks like JPEG, rotation, Gamma correction, filtering, additive noise, translation, shearing, and scaling. Furthermore, the improved scheme offers greater robustness against many image processing operations, in comparison to the current schemes about copyright protection.  相似文献   

13.
In this article, a new DWT-SVD and DCT with Arnold Cat Map encryption based robust and blind watermarking scheme is proposed for copyright protection. The proposed scheme solves the most frequently occurring watermarking security problems in Singular Value Decomposition (SVD) based schemes which are unauthorized reading and false-positive detection. This scheme also optimizes fidelity and robustness characteristics. The grey image watermark splits into two parts using four bits MSBs and four bits LSBs of each pixel. Discrete Cosine Transform (DCT) coefficients of these MSBs and LSBs values are embedded into the middle singular value of each block having size 4 × 4 of the host image’s one level Discrete Wavelet Transform (DWT) sub-bands. The reason for incorporating Arnold Cat Map in the proposed scheme is to encode the watermark image before embedding it in the host image. The proposed scheme is a blind scheme and does not require the choice of scaling factor. Thus, the proposed scheme is secure as well as free from the false positive detection problem. The proposed watermarking scheme is tested for various malicious and non-malicious attacks. The experimental results demonstrate that the scheme is robust, imperceptible and secure to several attacks and common signal processing operations.  相似文献   

14.
研究了一种基于DWT与SVD相结合的半盲彩色数字水印算法,鉴于嵌入水印的实用性,原始图像与水印图像采用的都是彩色图像。在置乱变换系数和半盲水印的双重保护下,提高了水印的安全性,奇异值分解对常见的几何失真是稳健的,而小波分解可以把图像的主要能量集中到低频域中,结合它们的优点可以更好地提高水印的抗攻击性。实验结果表明,嵌入水印后的图像在加噪、滤波(如模糊、锐化)、缩放、旋转、剪切和有损压缩等攻击后,其提取水印与原始水印仍有较高的相似度与峰值信噪比,该算法具有较好的鲁棒性。  相似文献   

15.
The paper presents a novel blind watermarking scheme for image copyright protection, which is developed in the discrete wavelet transform (DWT) and is based on the singular value decomposition (SVD) and the support vector regression (SVR). Its embedding algorithm hides a watermark bit in the low–low (LL) subband of a target non-overlap block of the host image by modifying a coefficient of U component on SVD version of the block. A blind watermark-extraction is designed using a trained SVR to estimate original coefficients. Subsequently, the watermark bit can be computed using the watermarked coefficient and its corresponding estimate coefficient. Additionally, the particle swarm optimization (PSO) is further utilized to optimize the proposed scheme. Experimental results show the proposed scheme possesses significant improvements in both transparency and robustness, and is superior to existing methods under consideration here.  相似文献   

16.
一种新的基于DWT、DCT和SVD的鲁棒水印算法   总被引:1,自引:0,他引:1  
本文提出一种新的基于离散小波变换(DWT)、离散余弦变换(DCT)和矩阵奇异值分解(SVD)的鲁棒水印算法.首先按照本文提出的小波分解准则对载体图像进行四层小波分解,取第四层的低频子图与三个高频子图;同样对水印图像进行小波分解得到低频子图与三个高频子图.然后用DCT、SVD方法,结合本文提出的相互嵌入准则将水印图像的低...  相似文献   

17.
基于混沌置乱和混合变换域的扩频水印方案   总被引:1,自引:0,他引:1  
本文基于混沌置乱和DWT和DCT混合变换域提出了一种扩频数字水印方案,首先对原始水印信息进行混沌置乱预处理,然后应用扩频技术,选取m-序列作为扩频码,对置乱预处理后的水印信息进行扩频,产生扩频水印信息,在充分考虑人眼视觉特性的基础上确定扩频水印在DWT和DCT混合变换域的嵌入位置和强度,扩频增益因子的选取大小取决于所选用的DWT和DCT混合变换域系数的个数以及水印大小。实验结果表明,应用文中提出的基于混沌置乱和混合变换域的扩频水印方案,不但水印的安全性有了很大程度提高,而且对剪切、旋转等各种几何失真攻击和常见的信号处理如噪音、JPEG压缩和滤波攻击具有很强的鲁棒性,即使嵌有水印的图像遭受攻击后受损较严重,水印信息还是能够完好地提取出来。  相似文献   

18.
抗几何攻击的量化鲁棒视频水印技术研究   总被引:1,自引:0,他引:1  
能有效抵抗信号处理又能抵抗几何攻击是当今数字水印研究的热点和难点之一,提出一种能够抵抗信号处理、旋转、缩放和平移的鲁棒视频水印.嵌入方案中,提出几何不变量--基于圆区域内的统计特征不变性;再依据离散余弦变换域(DCT)系数特性,自适应地在DCT域量化嵌入有意义的水印.提取方案中,利用同步信息定位,若发生几何形变则先矫正形变,然后在DCT域中盲提取水印.结果表明,该方案具有较好的透明性,同时具有较强的抗几何形变能力,对MPEG压缩和去帧等攻击具有很强的鲁棒性.  相似文献   

19.
离散小波变换(DWT)和奇异值分解都可以作为数字水印算法有效的工具.提出了一种基于离散小波变换和奇异值分解联合的数字水印算法,先将整个图像分成4个区域,然后再对每个区域运用奇异值分解方法,通过修改奇异值来嵌入水印信息.实验结果表明,该算法具有很好的稳健性,在经过了一般的信号处理操作和JPEG压缩后,嵌入的水印能被可靠的提取和检测.  相似文献   

20.
针对目前数字水印算法存在的不足,本文将离散小波变换和奇异值分解相结合,提出了一种基于机器学习的图像数字水印算法.首先将载体图像进行一级小波变换,提取其低频子带图像对其进行4×4分块处理,然后对每一分块进行奇异值分解后嵌入水印,并提取特征向量用于最小二乘支持向量机的训练,训练好的最小二乘支持向量机用于自适应最大水印嵌入强度的计算以及水印的盲提取.实验选取三张512×512的标准测试图像以及64×64的二值水印图像对算法的透明性与鲁棒性进行测试.实验结果证明,图像具有很好的透明性,PSNR达到了63.71dB,针对旋转、剪切、JPEG压缩、高斯噪声等常规攻击手段时,算法能保持较强的鲁棒性.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号