共查询到20条相似文献,搜索用时 31 毫秒
1.
Xiao-bing Kang Fan Zhao Guang-feng Lin Ya-jun Chen 《Multimedia Tools and Applications》2018,77(11):13197-13224
To optimize the tradeoff between imperceptibility and robustness properties, this paper proposes a robust and invisible blind image watermarking scheme based on a new combination of discrete cosine transform (DCT) and singular value decomposition (SVD) in discrete wavelet transform (DWT) domain using least-square curve fitting and logistic chaotic map. Firstly cover image is decomposed into four subbands using DWT and the low frequency subband LL is partitioned into non-overlapping blocks. Then DCT is applied to each block and several particular middle frequency DCT coefficients are extracted to form a modulation matrix, which is used to embed watermark signal by modifying its largest singular values in SVD domain. Optimal embedding strength for a specific cover image is obtained from an estimation based on least-square curve fitting and provides a good compromise between transparency and robustness of watermarking scheme. The security of the watermarking scheme is ensured by logistic chaotic map. Experimental results demonstrate the better effectiveness of the proposed watermarking scheme in the perceptual quality and the ability of resisting to conventional signal processing and geometric attacks, in comparison with the related existing methods. 相似文献
2.
一种新的基于奇异值分解的小波域盲水印* 总被引:3,自引:1,他引:2
目前,如何增强鲁棒性水印抵抗几何攻击尤其是旋转攻击的鲁棒性,仍是水印研究者研究的难点。为此,结合奇异值分解的特性和小波变换的优点,提出一种新的基于奇异值分解的小波域盲水印算法,对于常见的几何攻击具有很强的鲁棒性。首先对小波分解后的低频子带分块以提高水印的嵌入容量,再对各子块进行奇异值分解,将Arnold置乱后的水印嵌入到奇异值中,并使用量化方法增强水印的鲁棒性。实验表明,该算法对于常见的几何攻击特别是旋转攻击具有很强的鲁棒性,也能够抵抗JPEG2000压缩等信号处理。 相似文献
3.
Mona M. Soliman Aboul Ella Hassanien Hoda M. Onsi 《Neural computing & applications》2016,27(2):469-481
In this paper, we propose a novel optimal singular value decomposition (SVD)-based image watermarking approach that uses a new combination of weighted quantum particle swarm optimization (WQPSO) algorithm and a human visual system (HVS) model for both the hybrid discrete wavelet transform and discrete cosine transform (DCT). The proposed SVD-based watermarking approach initially decomposes the host image into sub-bands; afterwards, singular values of the DCT of the lower sub-band of the host image are quantized using a set of optimal quantization steps deduced from a combination of the WQPSO algorithm and the HVS model. To evaluate the performance of the proposed approach, we present tests on different images. The experimental results show that the proposed approach yields a watermarked image with good visual definition; at the same time, the embedded watermark was robust against a wide variety of common attacks, including JPEG compression, Gaussian noise, salt and pepper noises, Gaussian filters, median filters, image cropping, and image scaling. Moreover, the results of various experimental analyses demonstrated the superiority of the WQPSO approach over other optimization techniques, including classical PSO and QPSO in terms of local convergence speed, resulting in a better balance between global and local searches of the watermarking algorithm. 相似文献
4.
Amel Ali Alhussan Hanaa A. Abdallah Sara Alsodairi Abdelhamied A. Ateya 《计算机系统科学与工程》2023,46(1):403-416
Securing medical data while transmission on the network is required because it is sensitive and life-dependent data. Many methods are used for protection, such as Steganography, Digital Signature, Cryptography, and Watermarking. This paper introduces a novel robust algorithm that combines discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD) digital image-watermarking algorithms. The host image is decomposed using a two-dimensional DWT (2D-DWT) to approximate low-frequency sub-bands in the embedding process. Then the sub-band low-high (LH) is decomposed using 2D-DWT to four new sub-bands. The resulting sub-band low-high (LH1) is decomposed using 2D-DWT to four new sub-bands. Two frequency bands, high-high (HH2) and high-low (HL2), are transformed by DCT, and then the SVD is applied to the DCT coefficients. The strongest modified singular values (SVs) vary very little for most attacks, which is an important property of SVD watermarking. The two watermark images are encrypted using two layers of encryption, circular and chaotic encryption techniques, to increase security. The first encrypted watermark is embedded in the S component of the DCT components of the HL2 coefficients. The second encrypted watermark is embedded in the S component of the DCT components of the HH2 coefficients. The suggested technique has been tested against various attacks and proven to provide excellent stability and imperceptibility results. 相似文献
5.
目前,大多数鲁棒图像水印所面临的最大问题就是几何攻击,而现有水印技术大都难以抵抗几何变换类攻击,如旋转、尺度变换等,由于几何攻击破坏了水印分量的同步,即使微小幅度的图像旋转或尺度变换都可能导致水印检测过程失败.提出了一种基于奇异值分解和小波变换的方法来盲提取受到几何攻击后的图像中的水印,即利用了奇异值对几何失真的稳健性,又利用了小波变换对一般攻击的稳健性.实验证明,提出的方法对几何攻击具有很好的鲁棒性. 相似文献
6.
The drawbacks of SVD-based image watermarking are false positive, robust and transparency. The former can be overcome by embedding the principal components of the watermark into the host image, the latter is dependent on how much the quantity (i.e., scaling factor) of the principal components is embedded. For the existing methods, the scaling factor is a fixed value; actually, it is image-dependent. Different watermarks need the different scaling factors, although they are embedded in the same host image. In this paper, two methods are proposed to improve the reliability and robustness. To improve the reliability, for the first method, the principal components of the watermark are embedded into the host image in discrete cosine transform (DCT); and for the second method, those are embedded into the host image in discrete wavelets transform (DWT). To improve the robustness, the particle swarm optimization (PSO) is used for finding the suitable scaling factors. The experimental results demonstrate that the performance of the proposed methods outperforms than those of the existing methods. 相似文献
7.
8.
《Expert systems with applications》2014,41(17):7858-7867
This paper presents an optimized watermarking scheme based on the discrete wavelet transform (DWT) and singular value decomposition (SVD). The singular values of a binary watermark are embedded in singular values of the LL3 sub-band coefficients of the host image by making use of multiple scaling factors (MSFs). The MSFs are optimized using a newly proposed Firefly Algorithm having an objective function which is a linear combination of imperceptibility and robustness. The PSNR values indicate that the visual quality of the signed and attacked images is good. The embedding algorithm is robust against common image processing operations. It is concluded that the embedding and extraction of the proposed algorithm is well optimized, robust and show an improvement over other similar reported methods. 相似文献
9.
Prasanth Vaidya S. Chandra Mouli P. V. S. S. R. 《Multimedia Tools and Applications》2017,76(24):25623-25656
In this paper, a robust semi-blind watermarking scheme for color images, based on multiple decompositions is proposed to preserve the copyrights of the owner. Using multiple decompositions, the gray watermark is embedded into a host color image. Prior to that, to enhance security the gray watermark is encrypted with Arnold transform and SVD by generating secret keys. The luminance component of the given host image is subjected to discrete wavelet transform(DWT), contourlet transform(CT), Schur decomposition and singular value decomposition(SVD) in sequence and finally the watermark is embedded. In the semi-blind extraction process, the watermark is extracted without the help of the original host image. Experimental results show that the proposed watermarking scheme has better visual imperceptibility and high robustness against image & signal processing attacks compared to other methods. 相似文献
10.
11.
一种基于SVD分解的小波域数字水印算法 总被引:1,自引:0,他引:1
本文提出了一种基于离散小波变换和奇异值分解的数字水印算法。该算法充分利用了离散小波分解和矩阵奇异值分解(SVD)的固有特征,对Arnold置乱后的水印的多层小波分解子带做奇异值分解,把分解后的奇异值嵌入到原始图像的多层小波分解的相应子带中。水印的提取是嵌入算法的逆过程。Matlab仿真试验表明了算法的透明性、稳健性和安全性。 相似文献
12.
Nidaa Hasan Abbas Sharifah Mumtazah Syed Ahmad Sajida Parveen Wan Azizun Wan Abd. Rahman Bin Ramli 《Multimedia Tools and Applications》2018,77(19):24593-24614
This paper developed new and efficient image watermarking scheme for copyright protection based on Lifting wavelet transform (LWT) and Bi- dimensional Empirical Mode Decomposition (BEMD). A LWT has been selected because it is fast, less computational cost and maintains the integrity of the recovered watermark. The BEMD transform can separate the image from the most robust to the least sensitive or fragile frequency bands. This advantage is utilised in this study for the purpose of embedding the watermark in the robust part of BEMD, i.e. the residue (r). In addition, the embedding process has been performed in the low sub-band of LWT decomposed image as the low sub-band is more robust to image processing such as JPEG compression. The robust watermark which is grey scale image is decomposed using DWT to enhance the security and select only high sub-band as it has less impact on the quality of the watermarked image. As a result, the original image’s visual quality can be preserved and the concealed watermark could be successfully retrieved even if the watermarked images have undergone severe attacks like JPEG, rotation, Gamma correction, filtering, additive noise, translation, shearing, and scaling. Furthermore, the improved scheme offers greater robustness against many image processing operations, in comparison to the current schemes about copyright protection. 相似文献
13.
In this article, a new DWT-SVD and DCT with Arnold Cat Map encryption based robust and blind watermarking scheme is proposed for copyright protection. The proposed scheme solves the most frequently occurring watermarking security problems in Singular Value Decomposition (SVD) based schemes which are unauthorized reading and false-positive detection. This scheme also optimizes fidelity and robustness characteristics. The grey image watermark splits into two parts using four bits MSBs and four bits LSBs of each pixel. Discrete Cosine Transform (DCT) coefficients of these MSBs and LSBs values are embedded into the middle singular value of each block having size 4 × 4 of the host image’s one level Discrete Wavelet Transform (DWT) sub-bands. The reason for incorporating Arnold Cat Map in the proposed scheme is to encode the watermark image before embedding it in the host image. The proposed scheme is a blind scheme and does not require the choice of scaling factor. Thus, the proposed scheme is secure as well as free from the false positive detection problem. The proposed watermarking scheme is tested for various malicious and non-malicious attacks. The experimental results demonstrate that the scheme is robust, imperceptible and secure to several attacks and common signal processing operations. 相似文献
14.
15.
The paper presents a novel blind watermarking scheme for image copyright protection, which is developed in the discrete wavelet transform (DWT) and is based on the singular value decomposition (SVD) and the support vector regression (SVR). Its embedding algorithm hides a watermark bit in the low–low (LL) subband of a target non-overlap block of the host image by modifying a coefficient of U component on SVD version of the block. A blind watermark-extraction is designed using a trained SVR to estimate original coefficients. Subsequently, the watermark bit can be computed using the watermarked coefficient and its corresponding estimate coefficient. Additionally, the particle swarm optimization (PSO) is further utilized to optimize the proposed scheme. Experimental results show the proposed scheme possesses significant improvements in both transparency and robustness, and is superior to existing methods under consideration here. 相似文献
16.
一种新的基于DWT、DCT和SVD的鲁棒水印算法 总被引:1,自引:0,他引:1
本文提出一种新的基于离散小波变换(DWT)、离散余弦变换(DCT)和矩阵奇异值分解(SVD)的鲁棒水印算法.首先按照本文提出的小波分解准则对载体图像进行四层小波分解,取第四层的低频子图与三个高频子图;同样对水印图像进行小波分解得到低频子图与三个高频子图.然后用DCT、SVD方法,结合本文提出的相互嵌入准则将水印图像的低... 相似文献
17.
基于混沌置乱和混合变换域的扩频水印方案 总被引:1,自引:0,他引:1
本文基于混沌置乱和DWT和DCT混合变换域提出了一种扩频数字水印方案,首先对原始水印信息进行混沌置乱预处理,然后应用扩频技术,选取m-序列作为扩频码,对置乱预处理后的水印信息进行扩频,产生扩频水印信息,在充分考虑人眼视觉特性的基础上确定扩频水印在DWT和DCT混合变换域的嵌入位置和强度,扩频增益因子的选取大小取决于所选用的DWT和DCT混合变换域系数的个数以及水印大小。实验结果表明,应用文中提出的基于混沌置乱和混合变换域的扩频水印方案,不但水印的安全性有了很大程度提高,而且对剪切、旋转等各种几何失真攻击和常见的信号处理如噪音、JPEG压缩和滤波攻击具有很强的鲁棒性,即使嵌有水印的图像遭受攻击后受损较严重,水印信息还是能够完好地提取出来。 相似文献
18.
抗几何攻击的量化鲁棒视频水印技术研究 总被引:1,自引:0,他引:1
能有效抵抗信号处理又能抵抗几何攻击是当今数字水印研究的热点和难点之一,提出一种能够抵抗信号处理、旋转、缩放和平移的鲁棒视频水印.嵌入方案中,提出几何不变量--基于圆区域内的统计特征不变性;再依据离散余弦变换域(DCT)系数特性,自适应地在DCT域量化嵌入有意义的水印.提取方案中,利用同步信息定位,若发生几何形变则先矫正形变,然后在DCT域中盲提取水印.结果表明,该方案具有较好的透明性,同时具有较强的抗几何形变能力,对MPEG压缩和去帧等攻击具有很强的鲁棒性. 相似文献
19.
离散小波变换(DWT)和奇异值分解都可以作为数字水印算法有效的工具.提出了一种基于离散小波变换和奇异值分解联合的数字水印算法,先将整个图像分成4个区域,然后再对每个区域运用奇异值分解方法,通过修改奇异值来嵌入水印信息.实验结果表明,该算法具有很好的稳健性,在经过了一般的信号处理操作和JPEG压缩后,嵌入的水印能被可靠的提取和检测. 相似文献
20.
针对目前数字水印算法存在的不足,本文将离散小波变换和奇异值分解相结合,提出了一种基于机器学习的图像数字水印算法.首先将载体图像进行一级小波变换,提取其低频子带图像对其进行4×4分块处理,然后对每一分块进行奇异值分解后嵌入水印,并提取特征向量用于最小二乘支持向量机的训练,训练好的最小二乘支持向量机用于自适应最大水印嵌入强度的计算以及水印的盲提取.实验选取三张512×512的标准测试图像以及64×64的二值水印图像对算法的透明性与鲁棒性进行测试.实验结果证明,图像具有很好的透明性,PSNR达到了63.71dB,针对旋转、剪切、JPEG压缩、高斯噪声等常规攻击手段时,算法能保持较强的鲁棒性. 相似文献