共查询到20条相似文献,搜索用时 968 毫秒
1.
A. Keskinarkaus 《Journal of Visual Communication and Image Representation》2012,23(3):507-515
In this paper we propose a content based multibit watermarking method robust to print-scan attack. A method to extract feature points, robust in terms of watermarking, is proposed. The location of the watermark is tied to a coordinate system defined by robust feature points. A message sequence is mapped to a directional angle of periodic patterns, which are scattered and embedded into triangles in permuted locations. In watermark extraction, an interplay between feature extraction and watermarking ensures reliability and a multibit message can be decoded blindly from the locations pointed by the key. By detecting the alignment of the autocorrelations peaks and using a coding table, a multibit message can be extracted. Experiments show that the method provides robust and blind extraction of watermark information after a print-scan attack and a set of compound attacks. 相似文献
2.
In this paper, a new multiscale fragile watermarking scheme based on the Gaussian mixture model (GMM) is presented. First, a GMM is developed to describe the statistical characteristics of images in the wavelet domain and an expectation-maximization algorithm is employed to identify GMM model parameters. With wavelet multiscale subspaces being divided into watermarking blocks, the GMM model parameters of different watermarking blocks are adjusted to form certain relationships, which are employed for the presented new fragile watermarking scheme for authentication. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. A secret embedding key is designed to securely embed the fragile watermarks so that the new method is robust to counterfeiting, even when the malicious attackers are fully aware of the watermark embedding algorithm. It is shown that the presented new method can securely embed a message bit stream, such as personal signatures or copyright logos, into a host image as fragile watermarks. Compared with conventional fragile watermark techniques, this new statistical model based method modifies only a small amount of image data such that the distortion on the host image is imperceptible. Meanwhile, with the embedded message bits spreading over the entire image area through the statistical model, the new method can detect and localize image tampering. Besides, the new multiscale implementation of fragile watermarks based on the presented method can help distinguish some normal image operations such as JPEG compression from malicious image attacks and, thus, can be used for semi-fragile watermarking. 相似文献
3.
Screen-shooting resistant image watermarking based on lightweight neural network in frequency domain
Currently, digital mobile devices, especially smartphones, can be used to acquire information conveniently through photograph taking. To protect information security in this case, we propose an efficient screen-shooting resistant watermarking scheme via deep neural network (DNN) in the frequency domain to achieve additional information embedding and source tracing. Specifically, we enhance the imperceptibility of watermarked images and the robustness against various attacks in real scene by computing the residual watermark message and encoding it with the original image using a lightweight neural network in the DCT domain. In addition, a noise layer is designed to simulate the photometric and radiometric effects of screen-shooting transfer. During the training process, the enhancing network is used to highlight the coding features of distorted images and improve the accuracy of extracted watermark message. Experimental results demonstrate that our scheme not only effectively ensures the balance between the imperceptibility of watermark embedding and the robustness of watermark extraction, but also significantly improves computational efficiency compared with some state-of-the-art schemes. 相似文献
4.
We describe a new watermarking system based on the principles of informed coding and informed embedding. This system is capable of embedding 1380 bits of information in images with dimensions 240 x 368 pixels. Experiments on 2000 images indicate the watermarks are robust to significant valumetric distortions, including additive noise, low-pass filtering, changes in contrast, and lossy compression. Our system encodes watermark messages with a modified trellis code in which a given message may be represented by a variety of different signals, with the embedded signal selected according to the cover image. The signal is embedded by an iterative method that seeks to ensure the message will not be confused with other messages, even after addition of noise. Fidelity is improved by the incorporation of perceptual shaping into the embedding process. We show that each of these three components improves performance substantially. 相似文献
5.
基于盲源分离的小波域多重音频水印方法 总被引:3,自引:1,他引:2
该文利用盲源分离理论,提出一种小波域的多重音频水印方法。为了解决多水印嵌入过程中经常需要考虑的嵌入顺序问题,同时增强水印方法的安全性,本文将两路水印信号与一路等长的混沌序列进行混合,得到嵌入水印信号。然后,利用线性混合方法,将嵌入水印信号与选定的小波系数进行混合,得到隐秘信号。水印提取时,利用独立分量分析算法,提取嵌入水印信号,再经过后处理过程,得到原始水印。该水印方案是一种盲水印方法,可以将多个作者信息同时嵌入到音频作品中,而不需要考虑水印的嵌入顺序。实验结果表明,该方法对常规的信号处理操作具有良好的鲁棒性,以及良好的抵抗时间轴同步攻击的能力。 相似文献
6.
文中提出了一种基于聚类模版匹配的抗聚类的数字水印算法。首先对要嵌入的消息进行RS纠错编码,以增加水印提取时的抗噪能力,然后在傅立叶普中频使用90。水印嵌入法嵌入水印,利用混沌系统产生随机数来确定图像DFT变换后水印嵌入的具体位置,最后进行对数极坐标变换,在其中嵌入聚类模板。实验结果表明,该算法对JPEG压缩和各种几何攻击都具有较好的鲁棒性。 相似文献
7.
提出了一种基于图像压缩系数量化的自适应数字图像水印算法。该算法利用图像压缩中量化系数的特性,在其中嵌入水印。为增强水印的安全性用LFSR将置乱后的二值水印图像量化嵌入到载体图像的系数中,水印检测过程不需要原始图像的参与。实验结果表明,该算法不仅具有良好的不可见性,而且对常见攻击如JPEG压缩、噪声、滤波和几何攻击等具有较强的稳健性。 相似文献
8.
《Journal of Visual Communication and Image Representation》2014,25(5):1149-1163
The need of copyright protection and rightful ownership become very urgent in the fast growing Internet environment. The watermarking offers a convenient way to hide specific information via an imaging system for the consumer electronic devices such as digital camera, scanner, and printer. Numerous efforts have been devoted in the Singular Value Decomposition (SVD)-based image watermarking schemes which embed the visual watermark image into the host image before publishing for public usage. However, the main drawback of the SVD-based image watermarking is its false positive problem of which an attacker can easily claim and obtain the correct watermark from an unauthorized image. In this paper, we proposed a new SVD-based image watermarking by embedding the principal component of a watermark into the host image of block based manner using spread spectrum concept. The experimental results demonstrate that the proposed method overcomes the false positive problem, achieves a high payload, and outperforms the former reliable SVD-based watermarking. 相似文献
9.
为提高彩色图像的量子水印效果,本文提出一种基于新颖的增强量子描述(NEQR)的彩色图像水印嵌入及提取方法。首先将水印图像的幅度调整为与载体图像同样大小,然后采用NEQR方案将载体图像量子化,将水印图像嵌入到载体图像中。两幅图像独立存在,采用一个辅助比特进行切换。通过对水印图像中像素灰度值的24个量子比特实施相位旋转实现对水印图像的置乱。嵌入的水印图像被置乱后,每个像素的灰度信息为一个均衡的量子叠加态,测量后整幅图像为一个均匀的白噪声。水印图像的提取过程为嵌入的逆过程,只需采用嵌入过程所用算子的共轭转置即可。该方法的优点是,可在将来的量子计算机上运行,水印的嵌入不影响载体图像的视觉效果,且嵌入的水印图像具有很好的安全性。 相似文献
10.
基于信号合成与分离方法的数字图像灰度水印算法 总被引:1,自引:0,他引:1
根据图像DCT交流系数的统计特性,基于直流和交流信号的合成和分离方法,探索了一条频率域鲁棒水印的新思路。在载体DCT中频域中建立近似直流信号,把灰度水印图像置乱并调制成交流信号,水印的嵌入和检测过程转化为直流和交流信号的合成和分离过程。仿真分析表明,提出的算法具有嵌入水印信息量大、鲁棒性强和实现水印盲检测等优点。 相似文献
11.
图像隐形水印是解决数字媒体版权保护的有效手段.目前的大多数水印算法采用伪随机序列构成水印,因而只能给出"Yes"(有水印)或"No"(无水印)的回答.嵌入有意义的水印在一些应用场合更加重要,但同时也带来了更多的困难.嵌入有意义的水印必须解决二个问题:(1)嵌入的水印具有一定的数据量;(2)从有失真的水印图像中正确地提取嵌入的水印.本文应用数字通信的理论和方法,提出了一个嵌入有意义字符串的DCT域隐形水印算法.该算法采用BCH编码和匹配滤波来降低误码率.应用所提出的算法,把一个32个字符组成的水印嵌入到256×256的图像中并达到了较好的稳健性.在水印图像信噪比受Gaussian加性噪声干扰下降到26dB时,仍实现了对嵌入水印零错误概率的检测. 相似文献
12.
数字图像水印嵌入强度的最优估计 总被引:5,自引:0,他引:5
提出了一种在数字图像中水印嵌入强度的最优估计方法.对基于一次Bézier曲线融合方式的嵌入规则进行了研究.在水印图像的提取过程中,水印强度因子的选择是基于极大似然估计方法.对基于一次Bézier曲线融合方式的嵌入规则与加法、乘法嵌入规则的峰值信噪比进行比较,可以看出前者嵌入水印的峰值信噪比高于另外两种嵌入方法,人类视觉系统不能发觉嵌入了水印的隐秘图像与原始图像的差别;在不知道嵌入水印强度因子的前提下,可根据对水印强度因子的估计,从隐秘图像中将水印提取出来,而且提取效果令人满意;水印图像由二值图像推广到非二值图像. 相似文献
13.
Altun H.O. Orsdemir A. Sharma G. Bocko M.F. 《IEEE transactions on image processing》2009,18(2):371-387
We consider optimal formulations of spread spectrum watermark embedding where the common requirements of watermarking, such as perceptual closeness of the watermarked image to the cover and detectability of the watermark in the presence of noise and compression, are posed as constraints while one metric pertaining to these requirements is optimized. We propose an algorithmic framework for solving these optimal embedding problems via a multistep feasibility approach that combines projections onto convex sets (POCS) based feasibility watermarking with a bisection parameter search for determining the optimum value of the objective function and the optimum watermarked image. The framework is general and can handle optimal watermark embedding problems with convex and quasi-convex formulations of watermark requirements with assured convergence to the global optimum. The proposed scheme is a natural extension of set-theoretic watermark design and provides a link between convex feasibility and optimization formulations for watermark embedding. We demonstrate a number of optimal watermark embeddings in the proposed framework corresponding to maximal robustness to additive noise, maximal robustness to compression, minimal frequency weighted perceptual distortion, and minimal watermark texture visibility. Experimental results demonstrate that the framework is effective in optimizing the desired characteristic while meeting the constraints. The results also highlight both anticipated and unanticipated competition between the common requirements for watermark embedding. 相似文献
14.
本文提出了一种基于小波域的闭环自适应图像鲁棒数字盲水印技术.水印的嵌入过程是一个闭环过程,且其嵌入的位置及强度均与原始图像有关.水印嵌入的初始强度由小波域图像压缩的量化因子决定,并根据检测要求不断的进行调整,从而达到水印的最佳嵌入.本文证明了这种闭环系统的收敛性,并且给出了水印检测过程中正确检测概率和虚警检测概率的求解公式,可用于闭环系统的检测性能判决条件.水印的检测过程中不需要任何原始图像和原始水印信号的信息,采用独立分量分析实现对水印信号的盲检测.检测过程中不仅可以检测到水印的存在,而且可以提取出嵌入到图像中的多个水印信号.实验结果证实了本文提出的闭环自适应数字盲水印技术优于传统的自适应水印技术,水印检测过程中在不需要考虑水印图像所经历的攻击类型及攻击参数的情况下可以正确的提取水印信号.本文提出的水印算法对通用水印测试软件Stirmark具有很好的鲁棒性. 相似文献
15.
16.
17.
A new video watermarking method for the Audio Video coding Standard (AVS) is proposed. According to human visual masking properties,
this method determines the region of interest for watermark embedding by analyzing video semantics, and generates dynamic
robust watermark according to video motion semantics, and embeds watermarks in the Intermediate Frequency (IF) Discrete Cosine
Transform (DCT) coefficients of the luminance sub-block prediction residual in the region of interest. This method controls
watermark embedding strength adaptively by video textures semantics. Experiments show that this method is robust not only
to various conventional attacks, but also to re-frame, frame cropping, frame deletion and other video-specific attacks. 相似文献
18.
19.