首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
数字图像水印研究综述   总被引:119,自引:2,他引:117  
本文对当前数字图像水印技术的背景、现有方法、发展应用和存在的问题做了一综述,以期进一步推动我国在此前沿领域的研究工作。  相似文献   

2.
数字水印技术作为数字媒体版权保护的重要手段之一,近年来已成为国内外研究的热点.与传统的嵌入一个无意义的一维或二维伪随机序列以及可视的二值图像相比,嵌入灰度图像水印不仅嵌入信息量大,而且更加有意义.对灰度级数字图像水印技术的最新发展情况进行了介绍,主要内容包括:空域及变换域的灰度数字图像水印技术,其中变换域水印主要讨论了DCF域和DWT域两类灰度数字水印;自适应灰度级数字水印技术;灰度数字图像水印的性能评价.最后展望了该技术的进一步研究前景及可能的研究热点.  相似文献   

3.
Access to multimedia data has become much easier due to the rapid growth of the Internet. While this is usually considered an improvement of everyday life, it also makes unauthorized copying and distributing of multimedia data much easier, therefore presenting a challenge in the field of copyright protection. Digital watermarking, which is inserting copyright information into the data, has been proposed to solve the problem. In this paper, we first discuss the features that a practical digital watermarking system for ownership verification requires. Besides perceptual invisibility and robustness, we claim that the private control of the watermark is also very important. Second, we present a novel wavelet-based watermarking algorithm. Experimental results and analysis are then given to demonstrate that the proposed algorithm is effective and can be used in a practical system.  相似文献   

4.
This paper presents a novel method for the secure management of digital images formulated within the mathematical theory of polynomial interpolation. As main innovative features, our approach is based on a hierarchical joint ownership of the image by a trusted layered authority and on a deterministic watermarking procedure, embedding a short meaningful or random signature into the image. Experimental results show that the inserted signature can almost always be fully recovered even in presence of a reasonable amount of image degradation due to image processing operators, such as filtering, geometric distortions and compression.  相似文献   

5.
随着网络、无线通信和摄像机便携设备的快速发展,带来了数字图像很容易散布、复制和修改.针对此类问题,提出一种以手机IMEI/IMSI码为水印信息并嵌入到手机图像的数字水印算法,从而达到手机图像的版权保护.首先获取手机IMEI/IMSI,使用BCD编码将其转换成二进制向量,再使用BCH编码转换成64 ×64水印位图作为水印信息;然后采用离散余弦变换、离散小波变换和奇异值分解结合的算法将水印信息嵌入到手机图像;最后提取水印信息来获取用户的手机信息.实验表明该算法能够实现盲提取,具有良好的不可见性、鲁棒性,能够抵抗一定的压缩、噪声等攻击.  相似文献   

6.
The majority of known methods for correction of multispectral images distorted by nonuniform illumination use the following distortion model: a certain part of the scene close to a directed light source is illuminated much brighter than the rest of the scene. However, another serious problem often arises in practice in the case of nonuniform illumination of 3D objects of the scene: extended heavily shadowed regions with a small area of transition from light to shadow are formed. In this study, a method for the locally adaptive correction of nonuniform illumination of multispectral digital images, which is based on an algorithm that imitates human visual perception, is proposed. The performance of the proposed method is compared to that of available algorithms for correction of color images distorted by both nonuniform illumination and the presence of shadow regions.  相似文献   

7.
The concept of digital rights management architecture for multimedia will be presented in this paper, with focus on robust digital image watermarking, which is able to undergo geometrical attacks performed against the embedded watermarks. Geometrical attacks are still an open problem for many digital watermarking algorithms used in present time. Most of geometrical attacks can be described by using affine transforms. A new approach to improve robustness against geometrical attacks is presented. The discrete Fourier transform and log-polar mapping are used for watermark embedding and for watermark detection. Some attacks against the embedded watermarks are performed and the results are given. Also two modifications, usage of the proposed method as a synchronization template and implementation for the color images, are presented and experimental results are given too.  相似文献   

8.
A wavelet based multiresolution watermarking method using the human visual system (HVS) is proposed, with the number of watermarks embedded proportional to the energy contained in each band. Experiments show that the proposed three-level wavelet based watermarking method is robust to some attacks such as, for example, joint photographic experts group (JPEG) compression, smoothing, cropping and collusion  相似文献   

9.
This paper is focused on digital image and video authentication, considered as the process of evaluating the integrity of image contents relative to the original picture and of being able to detect, in an automatic way, malevolent content modifications. Generic models, corresponding to current approaches for content integrity evaluation – labeling and watermarking – are described, providing a common basis to compare existing techniques. Two labeling implementations are put forward. The first one is based on second-order image moments. It can be thought of as a low-level approach, where the emphasis is put on computational simplicity. The second one relies on image edges and tackles the problem of image/video integrity evaluation from a semantic, higher-level point of view. The viability of both methods, as a means of protecting the content, is assessed under JPEG and MPEG2 compression and non-authorized image modifications.  相似文献   

10.
With the rapid development of Internet technology, the copyright protection of color images has become more and more important. In order to fulfill this purpose, this paper designs a blind color digital image watermarking method based on image correction and eigenvalue decomposition (EVD). Firstly, all the eigenvalues of the pixel block in the color host image are obtained by EVD. Then, the sum of the absolute value of the eigenvalues is quantified by the variable quantization steps to embed the color watermark image that encrypted by affine transform and encoded by the Hamming code. If the watermarked image is processed by geometric attack, then the attacked image can be corrected by using the geometric attributes. Finally, the inverse embedding process is performed to extract the color watermark. Moreover, the advantages of the proposed method are shown as follows: (1) all Peak Signal-to-noise Ratio (PSNR) values are greater than 42 dB; (2) the average Structural Similarity Index Metric (SSIM) values are greater than 0.97; (3) the maximum embedded capacity is 0.25bpp; (4) whole running-time is less than 20 s; (5) the key space is more than 2450; (6) most Normalized Cross-correlation (NC) values are more than 0.9. Compared with the related methods, the experimental results show that the proposed method not only has better watermark invisibility and larger watermark capacity, but also has higher security and stronger robustness against geometric attacks.  相似文献   

11.
信息隐藏与数字水印   总被引:7,自引:0,他引:7  
杨波 《信息技术》2003,27(5):30-33
作为信息隐藏技术的一个主要分支 ,数字水印技术已逐渐成为保护数字产品版权的重要手段 ,得到了广泛的研究和应用。本文第一部分简要介绍了现代信息隐藏技术的产生背景 ;第二部分介绍了信息隐藏技术的研究内容、发展及研究现状 ,并给出了信息隐藏系统的一个通用模型 ;第三部分首先给出了数字水印技术的定义及模型 ,然后对数字水印技术的应用领域、分类及特征进行了系统介绍 ,最后简要介绍了数字水印技术的一些主要的研究及应用情况  相似文献   

12.
数字音频水印技术综述   总被引:44,自引:1,他引:43  
介绍了数字音频水印技术的发展背景以及在音频水印系统中广泛应用的音频掩蔽现象和MPEG心理声学模型 I。综述了典型的顽健性和脆弱性音频水印技术,顽健性算法进一步在时间域、频域、压缩域上分别阐述。分析了对数字音频水印系统的攻击,特别是在时间域能够以很小代价击败绝大多数音频水印算法的同步攻击,并讨论了几种可能的解决策略。最后总结了当前存在的问题并对其发展进行了展望。  相似文献   

13.
温媛媛  龙伟  高政 《电光与控制》2006,13(4):103-106
现有许多数字水印算法基本上都是针对灰度图像的,彩色图像数字水印算法尚未得到充分研究,且所能嵌入水印的容量也不够大。本文提出的大容量多通道数字水印算法对这一问题进行了研究。该算法以彩色图像作为原始载体,通过数字水印压缩编码,载体图像颜色空间转换,彩色分量分块离散余弦变换,结合人眼视觉系统确定水印嵌入位置等措施,将二维水印图像嵌入到原始彩色载体图像中,且能嵌入较大容量的水印图像。实验结果表明,该算法不仅提高了水印容量,且对剪切、模糊、锐化等有损攻击具有良好的健壮性。  相似文献   

14.
This paper proposes a tamper detection and correction technique using semi-fragile data hiding that aims to achieve high perceptual quality of images at the user-end even after malicious modifications. A binary signature and an image digest are embedded by modulating integer wavelet coefficients using dither modulation based quantization index modulation. Half-toning technique is used to obtain image digest from the low-resolution version of the host image itself. Decoder extracts the binary signature from the watermarked image for tamper detection, while the extracted image digest is used to correct the tamper region. Unlike previously proposed techniques, this novel approach distinguishes malicious changes from various common image processing operations more efficiently and also correct tapered regions effectively. Experimental results show that the proposed technique provides a superior performance in terms of probability of miss and false alarm as well as in tamper correction, compared to several existing semi-fragile watermarking techniques.  相似文献   

15.
数字水印的应用及需求分析   总被引:1,自引:0,他引:1  
给出了一个完整的数字图像水印通信系统模型,对其中各个功能模块进行了分析。从应用的角度给出了数字水印的分类方法,给出了包括数字版权保护,数字指纹在内的数字水印技术的几个典型应用,在这些应用环境下对水印算法的具体要求进行了详细的分析。研究具体的数字水印技术的应用及其环境,分析其对数字水印技术的要求,对设计相应的数字水印算法将具有一定指导作用。  相似文献   

16.
Information retrieval in digital watermarking   总被引:2,自引:0,他引:2  
Digital watermarking, the art of robust information hiding in images, has gained a large interest in both research and industry in the past few years. Every watermarking system has two main parts: watermark embedding and watermark extraction/detection. Previous developments in the theoretical analysis of digital watermarking schemes have shown that there is a direct link between digital watermarking and communication theory. These parallels are extremely helpful when it comes to designing efficient and optimal watermark detectors. We focus on this issue and investigate how to design good watermark detectors taking into account the basics of communication theory. Furthermore, we discuss different ways to achieve robustness to geometrical attacks and elaborate on watermark attacks  相似文献   

17.
VQ-based digital image watermarking method   总被引:15,自引:0,他引:15  
A vector-quantisation (VQ)-based watermarking method is presented which utilises the codebook expansion technique. This method is efficient, provides enhanced security and the watermarked image is robust against the effects of VQ compression. Moreover, the watermark extraction can be performed without the original image. Experimental results are presented which demonstrate the effectiveness of this algorithm.  相似文献   

18.
可证安全的数字水印方案   总被引:1,自引:0,他引:1  
袁征 《通信学报》2008,29(9):91-96
应用水印、密码学和编码技术,提出了一个可证安全的数字水印方案,包括嵌入水印方案和提取验证水印方案.方案中水印包含了身份标识(ID)、作品描述和水印密钥,便于认证和身份鉴别,方案具有较高的安全性可以抵抗目前所有的水印协议攻击,并用RO模型证明其安全性,特别是提供了独特的验证纠正恢复能力,具有很好的性能.  相似文献   

19.
基于DCT域的图像数字水印技术   总被引:4,自引:0,他引:4  
采用了DCT离散余弦变换的算法,对图像这种多媒体数字作品进行了数字水印的嵌入和检测研究。并且使用了MATLAB来介绍了一种DCT域的图像数字水印嵌入和提取的实例,在最后对嵌入水印的图像进行了攻击实验,验证了该算法的鲁棒性和不可见性。  相似文献   

20.
Data hiding watermarking for halftone images   总被引:11,自引:0,他引:11  
In many printer and publishing applications, it is desirable to embed data in halftone images. We proposed some novel data hiding methods for halftone images. For the situation in which only the halftone image is available, we propose data hiding smart pair toggling (DHSPT) to hide data by forced complementary toggling at pseudo-random locations within a halftone image. The complementary pixels are chosen to minimize the chance of forming visually undesirable clusters. Our experimental results suggest that DHSPT can hide a large amount of hidden data while maintaining good visual quality. For the situation in which the original multitone image is available and the halftoning method is error diffusion, we propose the modified data hiding error diffusion (MDHED) that integrates the data hiding operation into the error diffusion process. In MDHED, the error due to the data hiding is diffused effectively to both past and future pixels. Our experimental results suggest that MDHED can give better visual quality than DHSPT. Both DHSPT and MDHED are computationally inexpensive.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号