首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
为了设计更加鲁棒的数字水印算法,在对水印的嵌入过程、提取过程及其抗攻击性能进行分析的基础上,提出了一种图像灰度水印自适应嵌入与自适应提取新方案。该方案基于小波变换的多分辨率特性,利用人眼的亮度感觉及对比灵敏度阈值等人类视觉系统特性,并结合图像各个局部小波子块的亮度与纹理特征,在嵌入的过程中,通过动态地计算各个局部块的自适应嵌入强度因子来嵌入水印。提取时,则根据从不同区域提取出的水印信息自适应计算最佳的水印提取结果,这就从提取的角度大大改善了水印系统的性能。实验结果表明,该算法对多种攻击具有较强的鲁棒性,尤其对平滑、滤波、JPEG压缩、JPEG2000压缩以及位平面去除等攻击,其鲁棒性更明显。  相似文献   

2.
小波域鲁棒自适应图像水印嵌入方案   总被引:7,自引:0,他引:7  
以图像反色、图像置乱、离散小波变换和人眼视觉特性为基础,提出了一种新的采用灰度图像作为水印的自适应嵌入方案。实验结果表明,该算法不仅具有较好的透明性,而且对缩放、剪切、JPEG或JPEG2000压缩等图像退化处理或攻击均具有较强的鲁棒性。  相似文献   

3.
提出一个基于JPEG2000感兴趣区域(ROI)的自适应水印算法。该算法结合了感兴趣区域的编码特点及HVS特性,在量化的ROI区域中筛选高频系数实现水印嵌入,使嵌入图保持良好的视觉效果,也使嵌入的水印信息在经历了JPEG2000压缩后仍具有较强的鲁棒性。  相似文献   

4.
This paper proposes a novel scalable authentication scheme that utilizes the progressive enhancement functionality in JPEG 2000 scalable image coding. The proposed method first models the wavelet-based quality scalable coding to identify the effect of the quantization and de-quantization on wavelet coefficient magnitudes and the data embedded within such coefficients as a watermark. A relationship is then established between the watermark extraction rule and the embedding rule, using the magnitudes of the reconstructed and original coefficients. It ranks the wavelet coefficients according to their ability to retain the embedded watermark data intact under various quantization levels corresponding to quality enhancements. Then watermark data is embedded into wavelet coefficients according to their rank followed by JPEG 2000 embedded coding. At the decoder as more and more quality and resolution layers are decoded the authentication metric is improved, thus resulting in gradually increasing complexity of the authentication process according to the number of quality and resolution enhancements. The low complexity authentication is available at low quality low resolution decoding, enabling real-time authentication for resource constrained applications without affecting the authentication metric. Compared to the existing methods, the proposed method results in highly robust scalable authentication of JPEG 2000 coded images.  相似文献   

5.
In this paper, a robust watermark scheme for copyright protection is proposed. By modifying the original image in transform domain and embedding a watermark in the difference values between the original image and its reference image, the proposed scheme overcomes the weak robustness problem of embedding a watermark in the spatial domain. Besides, the watermark extraction does not require the original image so it is more practical in real application. The experimental results show that the proposed scheme provides not only good image quality, but is also robust against various attacks, such as JPEG lossy compression, filtering and noise addition.  相似文献   

6.
This paper developed new and efficient image watermarking scheme for copyright protection based on Lifting wavelet transform (LWT) and Bi- dimensional Empirical Mode Decomposition (BEMD). A LWT has been selected because it is fast, less computational cost and maintains the integrity of the recovered watermark. The BEMD transform can separate the image from the most robust to the least sensitive or fragile frequency bands. This advantage is utilised in this study for the purpose of embedding the watermark in the robust part of BEMD, i.e. the residue (r). In addition, the embedding process has been performed in the low sub-band of LWT decomposed image as the low sub-band is more robust to image processing such as JPEG compression. The robust watermark which is grey scale image is decomposed using DWT to enhance the security and select only high sub-band as it has less impact on the quality of the watermarked image. As a result, the original image’s visual quality can be preserved and the concealed watermark could be successfully retrieved even if the watermarked images have undergone severe attacks like JPEG, rotation, Gamma correction, filtering, additive noise, translation, shearing, and scaling. Furthermore, the improved scheme offers greater robustness against many image processing operations, in comparison to the current schemes about copyright protection.  相似文献   

7.
In this paper, we present a secure and robust content-based digital signature scheme for verifying the authenticity of JPEG2000 images quantitatively, in terms of a unique concept named lowest authenticable bit rates (LABR). Given a LABR, the authenticity of the watermarked JPEG2000 image will be protected as long as its final transcoded bit rate is not less than the LABR. The whole scheme, which is extended from the crypto data-based digital signature scheme, mainly comprises signature generation/verification, error correction coding (ECC) and watermark embedding/extracting. The invariant features, which are generated from fractionalized bit planes during the procedure of embedded block coding with optimized truncation in JPEG2000, are coded and signed by the sender's private key to generate one crypto signature (hundreds of bits only) per image, regardless of the image size. ECC is employed to tame the perturbations of extracted features caused by processes such as transcoding. Watermarking only serves to store the check information of ECC. The proposed solution can be efficiently incorporated into the JPEG2000 codec (Part 1) and is also compatible with Public Key Infrastructure. After detailing the proposed solution, system performance on security as well as robustness will be evaluated.  相似文献   

8.
提出了一种基于排序的直接在JPEG码流中嵌入水印的算法,该方法在保证嵌完水印后图像无失真的条件下提高了嵌入容量.根据对JPEG图像中可变长度码使用情况的统计分析,通过将一幅图像中没有使用过的可变长度码映射为使用过的可变长度码来嵌入水印.在建立映射关系之前,首先对码流中出现过的可变长度码依据其在码漉中出现的频率进行排序,然后使用排序后的结果建立映射关系,从而提高可变长度码的利用率,进而提高嵌入容量.在水印嵌入过程中,根据相应的映射关系和水印信息将码流中出现的可变长度码替换为映射的可变长度码.分析和实验结果表明,这种方法能够实现较高容量的水印嵌入,并且嵌完水印后图像无失真.  相似文献   

9.
We propose a robust digital watermarking algorithm for copyright protection.A stable feature is obtained by utilizing QR factorization and discrete cosine transform(DCT) techniques,and a meaningful watermark image is embedded into an image by modifying the stable feature with a quantization index modulation(QIM) method.The combination of QR factorization,DCT,and QIM techniques guarantees the robustness of the algorithm.Furthermore,an embedding location selection method is exploited to select blocks with small modifications as the embedding locations.This can minimize the embedding distortion and greatly improve the imperceptibility of our scheme.Several standard images were tested and the experimental results were compared with those of other published schemes.The results demonstrate that our proposed scheme can achieve not only better imperceptibility,but also stronger robustness against common signal processing operations and lossy compressions,such as filtering,noise addition,scaling,sharpening,rotation,cropping,and JPEG/JPEG2000 compression.  相似文献   

10.
This paper proposes a blind watermarking scheme based on wavelet tree quantization for copyright protection. In such a quantization scheme, there exists a large significant difference while embedding a watermark bit 1 and a watermark bit 0; it then does not require any original image or watermark during watermark extraction process. As a result, the watermarked images look lossless in comparison with the original ones, and the proposed method can effectively resist common image processing attacks; especially for JPEG compression and low-pass filtering. Moreover, by designing an adaptive threshold value in the extraction process, our method is more robust for resisting common attacks such as median filtering, average filtering, and Gaussian noise. Experimental results show that the watermarked image looks visually identical to the original, and the watermark can be effectively extracted.  相似文献   

11.
介绍了使用Wavelet过滤参数作为提高许多水印算法安全性的一种方法,并且这种依靠Wavelet过滤器的密钥的方法能很容易成为一种安全框架。本文还提供了一种新颖的水印算法,能适合独立的码组进程的新图像编号标准。两种应用脚本——版权保护和图像的真实性能够被认同,并且基于量子化的嵌入技术,可以成功地加密和解密在JPEG2000编码处理中高速运转的一个二进制水印。  相似文献   

12.
提出了基于人工神经网络的半脆弱零水印技术。首先在宿主图像中随机选择像素点,然后利用神经网络构建所选择像素点与其3×3邻域像素之间的关系,并与二值水印图像进行异或运算得到水印检测密钥,作为所构造的零水印。由于仅从宿主图像中抽取特征构造水印,而没有向图像中嵌入信息,避免了嵌入水印所导致的图像变形。该技术可以用于图像真实性、完整性认证,并可定位篡改发生的位置,且对于JPEG图像压缩具有一定的稳健性。实验结果证明了算法的有效性。  相似文献   

13.
提出了一种基于图像特征的二值水印嵌入和盲检测算法。将原始图像及待检测的图像进行离散小波变换,通过提取低频子带变换系数的均差与设定的阈值相比较,根据不同的结果选择不同的算法从而实现水印序列的嵌入和盲提取。该算法的优点在于在水印检测时,不需要原始图像的参与。实验结果表明,算法对JPEG压缩具有强的抵抗能力,同时,对噪声、滤波等也具有较好的鲁棒性。  相似文献   

14.
ABSTRACT

This paper proposes a novel scheme that integrates quality access control and tracking of illicit distribution of digital image(s) in a single platform. The goal is achieved by (1) modulating some of the valuable Discrete Cosine Transform (DCT) coefficients of the compressed data followed by (2) embedding a binary watermark (fingerprint) as tracking information using Quantization Index Modulation (QIM). The data modulation process serves the purpose of access control so that an unauthorized user is unable to enjoy proper visual quality. On the other hand, embedded watermark tracks illicit distribution. The coefficients to be modulated are selected pseudo randomly using a secret key (K). Before embedding, the watermark is encoded by applying convolution coding that reliably identifies colluder(s) involved in time varying (intelligent) collusion operation. Simulation results have shown the validity of the above claims without affecting compatibility with standard JPEG coding scheme.  相似文献   

15.
提出一种基于GHM多小波变换域上的模糊自适应水印算法。利用多小波系数块的能量、重要系数对小波块进行分类,结合图像自身的局部特性,在多小波系数中的两个相关的细节子图像中自适应地嵌入一幅二值水印图像;为了增强水印的鲁棒性,采用冗余嵌入方法;水印的提取不需要原始图像。实验结果证明,该算法对剪切、JPEG压缩、锐化等多种图像处理具有很好的鲁棒性。  相似文献   

16.
基于小波变换的图像自适应灰度水印嵌入算法   总被引:4,自引:0,他引:4  
本文以图像反色、离散小波变换和人眼视觉特性为基础,提出了一种图像自适应水印嵌入新算法。该算法适用于水印采用灰度图像、宿主图像采用灰度或彩色图像的水印系统。实验结果表明,该算法很好地兼顾了水印的不可见性和鲁棒性。  相似文献   

17.
基于DWT-SVD的奇异向量量化水印算法   总被引:1,自引:1,他引:0  
胡青  龙冬阳 《计算机科学》2011,38(11):30-33,53
提出了一种新颖的可用于版权保护的小波奇异值分解的量化水印算法。与传统的水印比特信息直接嵌入小波系数不同,水印信息被量化嵌入原始图像小波低频子带分块奇异值分解得到的奇异向量中。水印提取无需原始图像,可在密钥和量化阂值控制下实现盲提取。实验表明,含水印图像质量好且能较好地抵抗常规的图像处理,对JPEG压缩具有优异的鲁棒性。  相似文献   

18.
The drawbacks of the current authentication watermarking schemes for JPEG images, which are inferior localization and the security flaws, are firstly analyzed in this paper. Then, two counterferiting attacks are conducted on them. To overcome these drawbacks, a new digital authentication watermarking scheme for JPEG images with superior localization and security is proposed. Moreover, the probabilities of tamper detection and false detection are deduced under region tampering and collage attack separately. For each image block, the proposed scheme keeps four middle frequency points fixed to embed the watermark, and utilizes the rest of the DCT coefficients to generate 4 bits of watermark information. During the embedding process, each watermark bit is embedded in another image block that is selected by its corresponding secret key. Since four blocks are randomly selected for the watermark embedding of each block, the non-deterministic dependence among the image blocks is established so as to resist collage attack completely. At the receiver, according to judging of the extracted 4 bits of watermark information and the corresponding 9-neighbourhood system, the proposed scheme could discriminate whether the image block is tampered or not. Owing to the diminishing of false detection and the holding of tamper detection, we improve the accuracy of localization in the authentication process. Theoretic analysis and simulation results have proved that the proposed algorithm not only has superior localization, but also enhances the systematic security obviously. Supported by the National Natural Science Foundation of China (Grant No. 60572027), the Program for New Century Excellent Talents in University of China (Grant No. NCET-05-0794), the Sichuan Youth Science & Technology Foundation (Grant No. 03ZQ026-033), the National Defense Pre-research Foundation of China (Grant No. 51430804QT2201) and the Application Basic Foundation of Sichuan Province, China (Grant No. 2006 J13-10)  相似文献   

19.
In this paper, a novel blind image watermarking scheme based on QR decomposition is proposed to embed color watermark image into color host image, which is significantly different from using the binary or gray image as watermark. When embedding watermark, the 24-bits color host image with size of 512?×?512 is divided into non-overlapping 4?×?4 pixel blocks and each pixel block is decomposed by QR. Then, according to the watermark information and the relation between the second row first column coefficient and the third row first column coefficient in the unitary matrix Q, the 24-bits color watermark image with size of 32?×?32 is embedded into the color host image. In addition, the new element compensatory method is used in the upper-triangle matrix R for reducing the visible distortion. When extracting watermark, only the watermarked image is needed. Compared with other SVD-based methods, the proposed method does not have the false-positive detection problem and has lower computational complexity, that is, the average running time of the proposed method only needs 1.481403 s. The experimental results show that the proposed method is robust against most common attacks including JPEG compression, JPEG 2000 compression, low-pass filtering, cropping, adding noise, blurring, rotation, scaling and sharpening et al. Compared with some related existing methods, the proposed algorithm has stronger robustness and better invisibility.  相似文献   

20.
一种新的自适应盲数字水印算法   总被引:1,自引:1,他引:1  
本文提出了一种新颖的基于DCT域的自适应盲数字水印算法,该算法由三个阶段组成。首先,根据人眼视觉系统(HVS)和图像的局部特性来选择水印嵌入区域;然后充分利用JPEG压缩量化阶段的舍入误差;第三个阶段是采用一组公式来嵌入多个版本的水印,水印是经位扩展和二值随机序列调制得到的。水印的检测不需要原始图像。实验结果表明,该算法在保证水印不可见性的同时,对常见的几种图像处理如缩放、椒盐噪声、滤波特别是JPEG压缩和剪切有很高的鲁棒性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号