共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
A wavelet-based watermarking algorithm for ownership verificationof digital images 总被引:18,自引:0,他引:18
Access to multimedia data has become much easier due to the rapid growth of the Internet. While this is usually considered an improvement of everyday life, it also makes unauthorized copying and distributing of multimedia data much easier, therefore presenting a challenge in the field of copyright protection. Digital watermarking, which is inserting copyright information into the data, has been proposed to solve the problem. In this paper, we first discuss the features that a practical digital watermarking system for ownership verification requires. Besides perceptual invisibility and robustness, we claim that the private control of the watermark is also very important. Second, we present a novel wavelet-based watermarking algorithm. Experimental results and analysis are then given to demonstrate that the proposed algorithm is effective and can be used in a practical system. 相似文献
4.
Hierarchical ownership and deterministic watermarking of digital images via polynomial interpolation
《Signal Processing: Image Communication》2006,21(7):573-585
This paper presents a novel method for the secure management of digital images formulated within the mathematical theory of polynomial interpolation. As main innovative features, our approach is based on a hierarchical joint ownership of the image by a trusted layered authority and on a deterministic watermarking procedure, embedding a short meaningful or random signature into the image. Experimental results show that the inserted signature can almost always be fully recovered even in presence of a reasonable amount of image degradation due to image processing operators, such as filtering, geometric distortions and compression. 相似文献
5.
随着网络、无线通信和摄像机便携设备的快速发展,带来了数字图像很容易散布、复制和修改.针对此类问题,提出一种以手机IMEI/IMSI码为水印信息并嵌入到手机图像的数字水印算法,从而达到手机图像的版权保护.首先获取手机IMEI/IMSI,使用BCD编码将其转换成二进制向量,再使用BCH编码转换成64 ×64水印位图作为水印信息;然后采用离散余弦变换、离散小波变换和奇异值分解结合的算法将水印信息嵌入到手机图像;最后提取水印信息来获取用户的手机信息.实验表明该算法能够实现盲提取,具有良好的不可见性、鲁棒性,能够抵抗一定的压缩、噪声等攻击. 相似文献
6.
V. I. Kober V. N. Karnaukhov 《Journal of Communications Technology and Electronics》2016,61(12):1419-1425
The majority of known methods for correction of multispectral images distorted by nonuniform illumination use the following distortion model: a certain part of the scene close to a directed light source is illuminated much brighter than the rest of the scene. However, another serious problem often arises in practice in the case of nonuniform illumination of 3D objects of the scene: extended heavily shadowed regions with a small area of transition from light to shadow are formed. In this study, a method for the locally adaptive correction of nonuniform illumination of multispectral digital images, which is based on an algorithm that imitates human visual perception, is proposed. The performance of the proposed method is compared to that of available algorithms for correction of color images distorted by both nonuniform illumination and the presence of shadow regions. 相似文献
7.
The concept of digital rights management architecture for multimedia will be presented in this paper, with focus on robust digital image watermarking, which is able to undergo geometrical attacks performed against the embedded watermarks. Geometrical attacks are still an open problem for many digital watermarking algorithms used in present time. Most of geometrical attacks can be described by using affine transforms. A new approach to improve robustness against geometrical attacks is presented. The discrete Fourier transform and log-polar mapping are used for watermark embedding and for watermark detection. Some attacks against the embedded watermarks are performed and the results are given. Also two modifications, usage of the proposed method as a synchronization template and implementation for the color images, are presented and experimental results are given too. 相似文献
8.
Young-Sik Kim O-Hyung Kwon Rae-Hong Park 《Electronics letters》1999,35(6):466-468
A wavelet based multiresolution watermarking method using the human visual system (HVS) is proposed, with the number of watermarks embedded proportional to the energy contained in each band. Experiments show that the proposed three-level wavelet based watermarking method is robust to some attacks such as, for example, joint photographic experts group (JPEG) compression, smoothing, cropping and collusion 相似文献
9.
《Signal Processing: Image Communication》2001,16(5):461-475
This paper is focused on digital image and video authentication, considered as the process of evaluating the integrity of image contents relative to the original picture and of being able to detect, in an automatic way, malevolent content modifications. Generic models, corresponding to current approaches for content integrity evaluation – labeling and watermarking – are described, providing a common basis to compare existing techniques. Two labeling implementations are put forward. The first one is based on second-order image moments. It can be thought of as a low-level approach, where the emphasis is put on computational simplicity. The second one relies on image edges and tackles the problem of image/video integrity evaluation from a semantic, higher-level point of view. The viability of both methods, as a means of protecting the content, is assessed under JPEG and MPEG2 compression and non-authorized image modifications. 相似文献
10.
With the rapid development of Internet technology, the copyright protection of color images has become more and more important. In order to fulfill this purpose, this paper designs a blind color digital image watermarking method based on image correction and eigenvalue decomposition (EVD). Firstly, all the eigenvalues of the pixel block in the color host image are obtained by EVD. Then, the sum of the absolute value of the eigenvalues is quantified by the variable quantization steps to embed the color watermark image that encrypted by affine transform and encoded by the Hamming code. If the watermarked image is processed by geometric attack, then the attacked image can be corrected by using the geometric attributes. Finally, the inverse embedding process is performed to extract the color watermark. Moreover, the advantages of the proposed method are shown as follows: (1) all Peak Signal-to-noise Ratio (PSNR) values are greater than 42 dB; (2) the average Structural Similarity Index Metric (SSIM) values are greater than 0.97; (3) the maximum embedded capacity is 0.25bpp; (4) whole running-time is less than 20 s; (5) the key space is more than 2450; (6) most Normalized Cross-correlation (NC) values are more than 0.9. Compared with the related methods, the experimental results show that the proposed method not only has better watermark invisibility and larger watermark capacity, but also has higher security and stronger robustness against geometric attacks. 相似文献
11.
12.
13.
14.
Amit Phadikar 《Journal of Visual Communication and Image Representation》2012,23(3):454-466
This paper proposes a tamper detection and correction technique using semi-fragile data hiding that aims to achieve high perceptual quality of images at the user-end even after malicious modifications. A binary signature and an image digest are embedded by modulating integer wavelet coefficients using dither modulation based quantization index modulation. Half-toning technique is used to obtain image digest from the low-resolution version of the host image itself. Decoder extracts the binary signature from the watermarked image for tamper detection, while the extracted image digest is used to correct the tamper region. Unlike previously proposed techniques, this novel approach distinguishes malicious changes from various common image processing operations more efficiently and also correct tapered regions effectively. Experimental results show that the proposed technique provides a superior performance in terms of probability of miss and false alarm as well as in tamper correction, compared to several existing semi-fragile watermarking techniques. 相似文献
15.
16.
Information retrieval in digital watermarking 总被引:2,自引:0,他引:2
《Communications Magazine, IEEE》2001,39(8):110-116
Digital watermarking, the art of robust information hiding in images, has gained a large interest in both research and industry in the past few years. Every watermarking system has two main parts: watermark embedding and watermark extraction/detection. Previous developments in the theoretical analysis of digital watermarking schemes have shown that there is a direct link between digital watermarking and communication theory. These parallels are extremely helpful when it comes to designing efficient and optimal watermark detectors. We focus on this issue and investigate how to design good watermark detectors taking into account the basics of communication theory. Furthermore, we discuss different ways to achieve robustness to geometrical attacks and elaborate on watermark attacks 相似文献
17.
VQ-based digital image watermarking method 总被引:15,自引:0,他引:15
Zhe-Ming Lu Jeng-Shyang Pan Sheng-He Sun 《Electronics letters》2000,36(14):1201-1202
A vector-quantisation (VQ)-based watermarking method is presented which utilises the codebook expansion technique. This method is efficient, provides enhanced security and the watermarked image is robust against the effects of VQ compression. Moreover, the watermark extraction can be performed without the original image. Experimental results are presented which demonstrate the effectiveness of this algorithm. 相似文献
18.
可证安全的数字水印方案 总被引:1,自引:0,他引:1
应用水印、密码学和编码技术,提出了一个可证安全的数字水印方案,包括嵌入水印方案和提取验证水印方案.方案中水印包含了身份标识(ID)、作品描述和水印密钥,便于认证和身份鉴别,方案具有较高的安全性可以抵抗目前所有的水印协议攻击,并用RO模型证明其安全性,特别是提供了独特的验证纠正恢复能力,具有很好的性能. 相似文献
19.
20.
Data hiding watermarking for halftone images 总被引:11,自引:0,他引:11
In many printer and publishing applications, it is desirable to embed data in halftone images. We proposed some novel data hiding methods for halftone images. For the situation in which only the halftone image is available, we propose data hiding smart pair toggling (DHSPT) to hide data by forced complementary toggling at pseudo-random locations within a halftone image. The complementary pixels are chosen to minimize the chance of forming visually undesirable clusters. Our experimental results suggest that DHSPT can hide a large amount of hidden data while maintaining good visual quality. For the situation in which the original multitone image is available and the halftoning method is error diffusion, we propose the modified data hiding error diffusion (MDHED) that integrates the data hiding operation into the error diffusion process. In MDHED, the error due to the data hiding is diffused effectively to both past and future pixels. Our experimental results suggest that MDHED can give better visual quality than DHSPT. Both DHSPT and MDHED are computationally inexpensive. 相似文献