首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 343 毫秒
1.
A hybrid watermarking scheme for authentication is presented, which demonstrates robustness against various attacks. Due to the different nature of filtering and geometrical attacks, two different watermarks are used in this scheme. The first one is embedded in frequency domain combined with a chaotic function and is based on the correlation method. The second watermark is embedded in luminosity histogram of the image. In this way, this hybrid watermarking scheme combines the robustness of chaotic domain against filtering, noise and compression attacks with the robustness of histogram domain against geometrical attacks.  相似文献   

2.
块奇异值分解和量化实现的图像数字水印算法   总被引:3,自引:2,他引:1  
李旭东 《光电子.激光》2011,(12):1847-1851
讨论了当前将水印嵌入在块奇异值分解(SVD,singular value decomposition)后最大奇异值中的图像数字水印算法不足,进而提出了两种新的将水印嵌入在块SVD后最大奇异值除外的其余奇异值中的图像数字水印算法。两种新算法均采用了量化嵌入策略,从而使两种算法在提取水印时无需任何原始信息的帮助。实验结果表...  相似文献   

3.
基于几何矩的抵抗RST攻击的数字图像水印   总被引:8,自引:0,他引:8  
目前大多数的数字图像水印方案不能有效抵抗几何形变的攻击,这一弱点已成为数字水印技术走上商用的瓶颈。在各种几何形变中,RST(旋转、缩放、平移)是最为常见的攻击方式。该文提出了一种具有普适性的能够抵抗RST攻击的多比特数字图像水印方案,采用的主要措施有:(1)提出一种基于几何矩的图像标准化方案以抵抗几何攻击;(2)采用扩谱方法构造二维CDMA水印信号,实现多比特水印嵌入;(3)根据HVS特性自适应调整水印的嵌入强度,在鲁棒性和不可见性之间达到平衡;(4)利用MAP和相关方法估计和检测水印信号。实验表明该方案对RST具有很高的鲁棒性,对压缩、滤波等常见的图像处理攻击同样具有良好的鲁棒性。  相似文献   

4.
Circularly symmetric watermark embedding in 2-D DFT domain   总被引:9,自引:0,他引:9  
In this paper, a method for digital image watermarking is described that is resistant to geometric transformations. A private key, which allows a very large number of watermarks, determines the watermark, which is embedded on a ring in the DFT domain. The watermark possesses circular symmetry. Correlation is used for watermark detection. The original image is not required in detection. The proposed method is resistant to JPEG compression, filtering, noise addition, scaling, translation, cropping, rotation, printing and rescanning. Experimental results prove the robustness of this method against the aforementioned attacks.  相似文献   

5.
如何有效地抵抗组合几何攻击,并且提高水印的嵌入容量,一直是数字水印领域一个具有挑战性的课题.针对此种状况,本文提出了一种抗组合几何攻击,且嵌入容量较大的水印算法.首先利用SURF算法从受攻击的图像提取特征点,并与原图像中的少量鲁棒性较强的特征点匹配,根据特征点对间的坐标关系准确估计出仿射矩阵;然后根据仿射矩阵对失真的图像进行几何校正,恢复水印的重同步.由于几何攻击与还原过程中的像素插值仍会导致变换域水印的位置发生细微的误差,本文在空间域嵌入一层定位水印以便精准地同步;最后,考虑到LT码具有良好的纠删性能,因而先将变换域水印信息进行LT码编码,以尽量提高算法的抗剪切性能.实验结果表明,该算法不仅实现了较高容量的嵌入,而且对于剪切、组合几何攻击具有较好的鲁棒性.  相似文献   

6.
抵抗几何攻击的数字图像水印   总被引:8,自引:1,他引:7  
桑茂栋  赵耀 《电子与信息学报》2004,26(12):1875-1881
该文实现了一种抵抗几何攻击的数字图像水印方案。水印信号为根据密钥产生的服从正态分布的实数序列,对水印信号作预处理并进行周期化之后在空域将其嵌入数字图像中。检测端不需要原始图像,根据预测水印的自相关函数(ACF)判断水印图像遭受的几何变换攻击并进行逆变换,然后进行水印检测。实验表明该方案对压缩、滤波、剪切等常见的图像处理攻击同样具有很高的鲁棒性。  相似文献   

7.
为了克服水印鲁棒性和图像视觉质量之间的矛盾,提出了一种脊波变换域自适应盲水印算法.利用脊波变换对图像特征的稀疏表示特性,找出各区域块中视觉重要信息的位置,并将水印嵌入其中.算法中水印嵌入强度依据图像块的内容属性变化,采用了系数可容忍的最大误差作为水印嵌入强度因子,较好地解决了水印鲁棒性和图像视觉质量之间的矛盾.实验结果表明,该算法能够抵抗JPEG压缩、加噪和任意裁剪等攻击,具有很强的鲁棒性,是一种自适应盲水印算法.  相似文献   

8.
一种小波域自适应鲁棒闭环数字盲水印技术   总被引:11,自引:1,他引:10       下载免费PDF全文
张力  韦岗  张基宏 《电子学报》2003,31(10):1476-1480
本文提出了一种基于小波域的闭环自适应图像鲁棒数字盲水印技术.水印的嵌入过程是一个闭环过程,且其嵌入的位置及强度均与原始图像有关.水印嵌入的初始强度由小波域图像压缩的量化因子决定,并根据检测要求不断的进行调整,从而达到水印的最佳嵌入.本文证明了这种闭环系统的收敛性,并且给出了水印检测过程中正确检测概率和虚警检测概率的求解公式,可用于闭环系统的检测性能判决条件.水印的检测过程中不需要任何原始图像和原始水印信号的信息,采用独立分量分析实现对水印信号的盲检测.检测过程中不仅可以检测到水印的存在,而且可以提取出嵌入到图像中的多个水印信号.实验结果证实了本文提出的闭环自适应数字盲水印技术优于传统的自适应水印技术,水印检测过程中在不需要考虑水印图像所经历的攻击类型及攻击参数的情况下可以正确的提取水印信号.本文提出的水印算法对通用水印测试软件Stirmark具有很好的鲁棒性.  相似文献   

9.
Linear chirps, a special case of polynomial phase exponentials, have recently been proposed for digital watermarking. In this work, we propose a known-host-state methodology for designing image watermarks that are robust to compression. We use a two-dimensional frequency-modulated chirp as a spreading function in a block-based spatial watermarking scheme. In each block, the chirp is used to embed binary phase information. Chirp parameters allow for spectral shaping of the watermark to match host content. Since host state is known to the embedder, it is possible to tune the chirp for optimum performance, particularly against compression. In contrast to existing chirp watermarking where only a single watermark is generally embedded, the proposed block chirp watermarking allows for a much higher payload. Detection is done using chirp transform subject to key exchange for security. We show that the proposed method significantly outperforms non-adaptive watermarking across all compression factors under variety of attacks.  相似文献   

10.
抵抗几何攻击的鲁棒性是目前数字水印技术中的热点亦是难点。文中以Harris检测算子和伪Zernike矩为理论基础,提出一种有效抵抗几何攻击的鲁棒水印算法。通过提取归一化图像的Harris特征点,选取部分稳定特征点确定圆形区域并计算伪Zernike矩,并量化调制伪Zernike矩的幅值来嵌入水印信息。实验结果表明,本算法对于抗几何攻击具有较好的鲁棒性,同时也能抵抗常规的信号处理攻击。  相似文献   

11.
Copyright protection and proof of ownership are two of the main important applications of the digital image watermarking. The challenges faced by researchers interested in digital image watermarking applications lie in the creation of new algorithms to serve those applications and to be resistant to most types of attacks, especially the geometrical attacks. Robustness, high imperceptibility, security, and large capacity are four essential requirements in any watermarking scheme. This paper presents a new image watermarking scheme based on the Redundant Discrete Wavelet Transform (RDWT) and the Singular Value Decomposition (SVD). The gray scale image watermark was embedded directly in the singular values of the RDWT sub-bands of the host image. The scheme achieved a large capacity due to the redundancy in the RDWT domain and at the same time preserved high imperceptibility due to SVD properties. Embedding the watermarking pixel's values without any modification inside the wavelet coefficient of the host image overcomes the security issue. Furthermore, the experimental results of the proposed scheme showed a high level of robustness not only against the image processing attacks but also against the geometrical attacks which are considered as difficult attacks to resist.  相似文献   

12.
In digital watermarking, robustness is still a challenging problem if different sets of attacks need to be tolerated simultaneously. In this paper, we deal with this problem by using an integrated solution involving side-informed embedding, moment normalization, and content-dependent watermarks. First, a new image watermarking method based on the concept of communications with side information is proposed. We investigate the characteristics of mean filtering in formulating new watermark embedding and extraction processes. Second, regarding resistance to geometrical attacks, we do not rely on the concept of pilot signals because they are vulnerable to synchronization removal attacks. We instead use block-based watermarking and moment normalization mechanisms to recover geometrical distortions. Third, regarding resistance to the copy attack, the content-dependent watermark is employed to avoid treating an un-watermarked image as one that has been watermarked. The robustness of our approach has been verified using both the StirMark and the copy attack.  相似文献   

13.
Tchebichef矩在图像数字水印技术中的应用   总被引:6,自引:0,他引:6  
张力  韦岗  张基宏 《通信学报》2003,24(9):10-18
提出了一种利用原始图像的Tchebichef矩来增加水印顽健性的方法,即利用原始图像的一个或多个Tchebichef矩的值来估计水印图像所经过的几何变换的参数以及图像增强等图像处理操作的参数,并将这一过程作为水印检测的预处理过程。实验中将多种不同的水印信息在不同的图像处理域(包括DWT、DCT、FFT以及空间域等)实现水印信息的嵌入。为了检测这种估计算法的顽健性,本文实验中的几何攻击是由Stirmark产生的。计算机模拟实验证明这种估计方法简单,估计精度很高,增加了图像水印技术对几何攻击的顽健性,而且可在任何处理域中实现,具有很好的实用价值。1  相似文献   

14.
In this article we introduce a new public digital watermarking technique for video copyright protection working in the discrete wavelet transform domain. The scheme uses binary images as watermarks. These are embedded in the detail wavelet coefficients of the middle wavelet sub-bands. The method is a combination of spread spectrum and quantisation-based watermarking. Every bit of the watermark is spread over a number of wavelet coefficients with the use of a secret key. The resilience of the watermarking algorithm was tested against a series of eight different attacks using different videos. To improve the resilience of the algorithm we use error correction codes and embed the watermark with spatial and temporal redundancy. The proposed method achieves a very good perceptual quality with mean peak signal-to-noise ratio values of the watermarked videos of more than 40 dB and high resistance to a large spectrum of attacks.  相似文献   

15.
基于QR码的Contourlet域数字水印算法   总被引:13,自引:6,他引:7  
针对目前数字水印技术无法有效抵抗几何攻击的问题,本文提出了一种基于QR码的Contourlet域数字水印算法。将文字信息进行QR码编码作为水印信息。首先,将载体图像进行Contourlet变换;然后,将得到的低频逼近图像进行分块;最后,将每一位QR码水印信息以量化的方式对应嵌入到每一个子块中。实验结果表明,本算法可以抵抗任意角度旋转和任意等比例缩放攻击,同时对高斯噪声、Speckle噪声、均值滤波、高斯滤波和JPEG压缩攻击具有很强的鲁棒性,并且算法复杂度低;水印提取时不需要借助原始图像,属于盲水印。因此,本文提出的数字水印技术可以广泛应用在数字产品的版权保护中。  相似文献   

16.
基于ICA的智能数字水印技术   总被引:3,自引:0,他引:3  
该文提出了一种基于智能信息分析方法--独立分量分析的智能数字水印新算法。水印嵌入之前先对其进行预处理,嵌入过程可以在图像任意作用域中实现,并给出了小波域中的一种闭环嵌入方法。水印嵌入的强度由小波域视觉模型决定。在不需要任何原始图像、水印和攻击类型等信息的情况下,该算法不仅可以检测到水印而且可以完全提取水印,实现了真正意义上的水印盲检测,并对多个水印嵌入的情况也可以进行水印提取。水印检测的精确程度取决于图像与水印之间的独立性以及所采用的密钥。实验过程中攻击由通用水印测试软件Stirmark产生,实验数据证明本文提出的水印算法对Stirmark提供的各种攻击剪切、滤波、图象压缩、删行、删列、几何攻击以及多种攻击同时存在时都具有很好的鲁棒性。  相似文献   

17.
Digital watermarking is a helpful technology for providing copyright protection for valuable multimedia data. In particular, video watermarking deals with several issues, which are unique to various types of media watermarking. In this paper, these issues, including compressed domain watermarking, real-time detection, bit-rate control, and resistance to watermark estimation attacks, will be addressed. Since video sequences are usually compressed before they are transmitted over networks, we first describe how watermark signals can be embedded into compressed video while keeping the desired bit-rate nearly unchanged. In the embedding process, our algorithm is designed to operate directly in the variable length codeword (VLC) domain to satisfy the requirement of real-time detection. We describe how suitable positions in the VLC domain can be selected for embedding transparent watermarks. Second, in addition to typical attacks, the peculiar attacks that video sequences encounter are investigated. In particular, in order to deal with both collusion and copy attacks that are fatal to video watermarking, the video frame-dependent watermark (VFDW) is presented. Extensive experimental results verify the excellent performance of the proposed compressed video watermarking system in addressing the aforementioned issues.  相似文献   

18.
Generally, in watermarking techniques the size of the watermark is very small when compared to the host image. On the contrary, this is an attempt in which a new facet in watermarking framework is presented where the size of host image is very small when compared to the watermark image. The core idea of the proposed technique is to first scale up the size of host image equal to the size of watermark using chaotic map and Hessenberg decomposition followed by the redundant wavelet transform. A meaningful gray scale watermark is embedded in the low frequency sub-band at the finest level using singular value decomposition. To prevent ambiguity and enhance the security, a binary watermark is also embedded in loss-less manner which ensures the authenticity of the watermarked image. Finally, a reliable watermark extraction scheme is developed for extracting both the watermarks. The experimental results demonstrate better visual imperceptibility and resiliency of the proposed scheme against intentional or un-intentional variety of attacks.  相似文献   

19.
In this dissertation, sereral key problems in the field of steganographic image security are mainly studied and discussed: (1) A novel kind of image cryptosystem is studied. The encrypted information of secret image is embedded into an ordinary image, which can be transmitted publicly, and it will not cause attention of illegal eavesdropper. The following results are achieved: (a) The image hiding algorithm and its improved algorithm based on wavelet transform and vector quantization are propo…  相似文献   

20.
基于奇异值分解的半易损水印算法   总被引:21,自引:0,他引:21  
随着数字图像在报刊杂志、医院、法庭中的广泛应用,越来越需要一种有效的图像认证方法,数字水印技术为上述问题提供了一个潜在的解决方案。本文提出了一种基于分组奇异值分解(SVD)的半易损水印技术,算法将经过伪随机排序的二值图像通过量化策略嵌入到分组SVD分解中最大的奇异值点,提取水印信号无需使用原始图像。仿真实验表明水印是不可察觉的,可将JPEG有损压缩同恶意攻击区分开来,能够准确地定位被篡改的图像内容。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号