首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
This paper proposes a blind watermarking scheme based on wavelet tree quantization for copyright protection. In such a quantization scheme, there exists a large significant difference while embedding a watermark bit 1 and a watermark bit 0; it then does not require any original image or watermark during watermark extraction process. As a result, the watermarked images look lossless in comparison with the original ones, and the proposed method can effectively resist common image processing attacks; especially for JPEG compression and low-pass filtering. Moreover, by designing an adaptive threshold value in the extraction process, our method is more robust for resisting common attacks such as median filtering, average filtering, and Gaussian noise. Experimental results show that the watermarked image looks visually identical to the original, and the watermark can be effectively extracted.  相似文献   

2.
Du  Meng  Luo  Ting  Xu  Haiyong  Song  Yang  Wang  Chunpeng  Li  Li 《Multimedia Tools and Applications》2022,81(23):33375-33395
Multimedia Tools and Applications - In order to protect the copyright of the high dynamic range (HDR) video, a robust HDR video watermarking method based on the human visual system (HVS) model and...  相似文献   

3.
An adaptive image watermarking algorithm based on Watson's perceptual model is proposed in this paper. The proposed watermarking algorithm fully considers image regional characteristic. First, the cover image is divided into different smooth regions according to its gray value. Then watermark adjustment factors of those different regions are calculated respectively based on Watson's perceptual model. The watermark is embedded by the adjustment factors at last. Experiments show that the proposed algorithm has excellent imperceptibility and has little influence upon the eigenvalue of the cover image.  相似文献   

4.
1 Introduction Compared with relevant analog data, digital media (digital audio, image, video, etc.) have some significant properties: high quality, easy manipulation, perfect copying and easy transmission. Because of these good properties, the development and application of digital media are growing explosively. However, these properties also pose a threat of unauthorized possession and illegal usage of digital media. An additional threat is the illegal tampering and modification of digital m…  相似文献   

5.
一种基于变长位平面的自适应视频水印算法研究*   总被引:1,自引:0,他引:1  
针对视频水印嵌入强度在平衡水印系统的鲁棒性和不可见性时存在的问题,提出了一种变长位平面分解的视频水印算法。该算法根据8位灰度水印图像在位平面分解后各位平面在重构水印图像时的权值不同,将不同的位平面嵌入在不同数量的DCT中低频系数中,并利用HVS和Watson视觉模型的亮度掩蔽特性自适应的调整水印嵌入的强度从而实现了自适应地嵌入水印。实验表明,该视频水印系统在满足鲁棒性的同时具有高度的透明性。  相似文献   

6.
数字水印技术是视频版权保护的一种重要方法。研究了一种新的鲁棒型视频水印算法,水印嵌入时,对原始视频亮度分量的帧图像整体做DCT变换,将扩频序列叠加在其低频系数段上。水印检测时,首先基于运动估计对水印视频做帧间预测,把得到的运动补偿帧与当前帧相减,并对该残差图像整体做DCT变换,取相应低频系数段作为估计序列,将该序列与原始水印序列的相关性作为水印是否存在的判决依据。实验证明该算法具有良好的鲁棒性。  相似文献   

7.
Multimedia Tools and Applications - Medical images exchanged over vulnerable networks are sensitive to modifications or tampering which could lead to misdiagnosis, risking the lives of the...  相似文献   

8.
根据视频水印系统和通信系统的相似性,提出一种基于LDPC-OFDM的块均值视频水印算法。实验结果表明,该算法对视频质量影响小,可以很好地保证视频质量,实现水印的盲提取,且对高斯低通滤波、剪切攻击、高斯白噪声、椒盐噪声攻击及MPEG-2压缩、视频帧同步攻击具有较强的鲁棒性,是一种性能良好的盲视频水印算法。  相似文献   

9.
王龙  伍淳华  袁开国  马玉洁 《软件》2012,(11):181-185
由于H.264标准视频的流行,对数字视频水的版权保护和认证的需求在不断增加。本文提出了一种基于H.264视频编解码标准的鲁棒视频水印算法。水印经过了增加帧同步信息,扩频编码和纠错编码的预处理后有着很强的鲁棒性。在嵌入过程中,选择了残差的DCT系数与参考块像素的DCT系数和作为嵌入载体,而不是通常的残差DCT系数,该处理可以很好的提高水印算法对视频攻击,如帧率攻击和码率攻击的鲁棒性,同时在嵌入的过程中,通过应用一个针对4*4的DCT的人类视觉系统来控制嵌入强度,使得水印算法对视频的视觉质量的影响降到最小。实验结果表明:本算法对多种攻击,如分辨率攻击、帧率攻击、码率攻击和重编码都有很好的鲁棒性,同时能保持很高的视觉质量。  相似文献   

10.
Digital video watermarking provides means for carrying information targeted for synchronization, error resilience or copyright protection. However, it is difficult to get a good trade-off between the embedding capacity, imperceptibility and efficiency. In this paper, a novel digital video watermarking algorithm based on intra prediction modes of AVS (audio video coding standard) is proposed. The algorithm hides one bit in each qualified intra 8 × 8 luma block by modifying intra 8 × 8 prediction modes based on the mapping rules between the modes and hidden bits. The specific positions of the host 8 × 8 blocks are determined by the features of every block and a position template indicated by the key. Watermark information can be retrieved by decoding the intra prediction modes from bitstream, requiring neither original media nor complete video decoding. Experimental results show that the proposed algorithm has little impact on video quality and video stream features. A comparatively high embedding rate is obtained with little impact on bit rate.  相似文献   

11.
张明辉  冯桂 《计算机应用》2015,35(9):2531-2534
针对现有基于高效视频编码的视频水印算法鲁棒性不足的问题,提出一种基于纹理方向的鲁棒视频水印算法。算法根据水印值将帧内角度预测模式分为水平方向和垂直方向两组,计算N×N分割编码时每个预测单元的纹理方向。当纹理方向与水印所表示的方向一致时,将当前预测单元的33种角度预测模式截断为水平方向或者垂直方向的预测模式,随后根据率失真代价函数决策出最优的预测模式,并判断水印是否嵌入。记录最终水印嵌入位置作为密钥,用于解码端提取。实验结果表明,该算法具有较小的码率增长和视频失真,在历经噪声、滤波和重编码等攻击后能保持较低的误码率(BER),说明该方案能用于视频版权保护。  相似文献   

12.
视频水印技术综述   总被引:7,自引:0,他引:7  
张江  赵黎  杨士强 《计算机应用》2005,25(4):850-852
介绍了视频水印技术的原理和主要应用领域,分析了视频水印技术的特点和面临的挑 战,阐述了视频水印的模型及算法分类,探讨了视频水印的发展趋势。  相似文献   

13.
Commonly used security mechanisms such as cryptography and steganography suffer from weaknesses when used in a standalone manner. Extra efforts in the form of additional permutations/diffusions etc. result in higher ciphering/deciphering time complexity. Thus, there is a requirement for a security mechanism(s) which can provide adequate security without putting a considerable burden on ciphering/deciphering time complexity. This paper is an effort in this direction. The paper proposes a hybrid mechanism that employs chaotic based encryption scheme to encrypt data and an improved Bit-Plane Complexity Segmentation Steganography algorithm to embed the data. The proposed mechanism uses two new complexity measures to differentiate between noisy regions and simple ones appropriately. The scheme was implemented in MATLAB, and the simulation results show that the proposed mechanism has high embedding capacity, high security with a moderate decrease in PSNR value and is computationally fast.  相似文献   

14.

Medical images are more typical than any other ordinary images, since it stores patient’s information for diagnosis purpose. Such images need more security and confidentiality as total diagnosis depends on it. In telemedicine applications, transmission of medical image via open channel, demands strong security and copyright protection. In our proposed robust watermarking model, a double layer security is introduced to ensure the robustness of embedded data. The embedded data is scrambled using a unique key and then a transform domain based hybrid watermarking technique is used to embed the scrambled data into the transform coefficients of the host image. The data embedding in medical images involves more attention, so that the diagnosis part must not be affected by any modification. Therefore, Support Vector Machine (SVM) is used as a classifier, which classify a medical image into two regions i.e. Non Region of Interest (NROI) and Region of Interest (ROI) to embed watermark data into the NROI part of the medical image, using the proposed embedding algorithm. The objective of the proposed model is to avoid any quality degradation to the medical image. The simulation is performed to measure the Peak Signal to Noise Ratio (PSNR) for imperceptibility and Structural Similarity Index (SSIM) to test the robustness. The experimented result shows, robustness and imperceptibility with SSIM of more than 0.50 and PSNR of more than 35 dB for proposed watermarking model.

  相似文献   

15.
16.
Heterogeneity among the end using display devices and corresponding varying system requirements make scalable version of H.264/AVC standard more popular. Existing watermarking based authentication system may not be suitable well for this new extension, because the scalability property of the codec may itself is perceived as an attack popularly known as content adaptation attack. In this paper, a blind scalable video watermarking scheme is proposed, which is robust against quality and temporal scalability. In the proposed scheme, Discrete Cosine Transform (DCT) based temporal filtering and wavelet based spatial filtering is used for choosing suitable watermark embedding zone. Experimental evidences are provided to justify the improved robustness of the proposed scheme over existing related watermarking schemes. The visual quality of the watermarked video has also been evaluated to show the efficiency of the proposed scheme.  相似文献   

17.
针对多视点加深度格式的3D视频中深度图鲁棒性不足的问题,提出了一种基于深度图的3D鲁棒视频水印算法。首先,将深度图不重叠的划分为4×4大小的块,计算每一块像素域的均方差,并设置一个阈值来区分纹理块和平坦块;其次,对纹理块计算区域块的能量值,根据计算的能量值设置一个阈值来选择性嵌入水印比特位;最后,获取每个块变换量化后的DC系数,根据获取的DC系数值构造3×3的可逆矩阵,对可逆矩阵进行QR分解,将水印嵌入在分解后的Q矩阵中。所提算法保证了平均峰值信噪比不变,且不同量化参数(QP)值(25、30、35、40)的重编码攻击下的平均误码率为14.9%。从测试的结果来看,该算法具有较好鲁棒性和嵌入容量,同时对视频的质量影响很小。  相似文献   

18.
This paper proposes an adaptively imperceptible video watermarking algorithm using the entropy model for local motion characterization. The algorithm firstly combines Human Visual System (HVS) with the block- matching techniques to get the motion-related information. Then it utilizes the entropy model to statistically analyze above motion-related information to obtain the motion entropy of frame. Successively, this algorithm divides every frame into local regions, and then local motion entropy can be obtained according to the motion-related information in local region. By combining the local motion entropy with the motion entropy of frame, the motion characteristics visual masking is adaptively calculated. Based on the motion characteristics visual masking and the contents of video frames, the maximum strength of watermarking is calculated in every block. Experiments indicate that using entropy to local motion characteristics can significantly improve the watermarking imperceptibility, effectively resist common attacks for video watermarking and consequently achieve higher robustness.  相似文献   

19.
针对MPEG-2视频压缩标准,提出一种具备快速实现能力的鲁棒性视频水印嵌入方案。利用视频帧分块DCT系数与整体DCT系数间的映射关系,在水印嵌入和提取过程中避免对视频进行完全解码,减小计算量,提高水印算法实时嵌入、实时检测能力。实验结果表明,该方法能抵抗缩小攻击、高斯白噪声攻击、MPEG-2重编码压缩攻击,而且能够快速实现。  相似文献   

20.
Multimedia Tools and Applications - Video watermarking technique aims at resolving insecurity problems. Recently, many approaches have been proposed in order to satisfy the new constraints of video...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号