首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
基于指纹生物统计数据的变换,介绍一种信息安全应用的数字水印自适应隐藏技术。把指纹的节点数据隐藏到视频图像中,并可以安全地传输到接收端。通过密钥,隐藏的指纹数据可以从被传输的图像中精确提取出来。当视频信号是面部图像时,该技术附加一个标识来管理用户。与其它方法比较,该技术能抗击多种干扰信号的篡改攻击。  相似文献   

2.
With the growing accessibility and usability of internet there is a growing concern over content protection of digital images. Recently, to eliminate the traditional use of passwords and to ensure that the access to the image is restricted only to legitimate users, security solutions are increasingly combined with biometrics. Consequently, biometric-based watermarking algorithms, that involve embedding the identity of the owner, are proposed to solve ownership disputes. This paper presents a new scheme for protecting and authenticating invisibly watermarked digital images. It applies Independent Component Analysis to the cover image and enables the insertion of two independent watermarks based on fingerprint and iris biometrics. In this approach biometric techniques are used for watermarks generation and for owners authentication. The main advantage of proposed algorithm is construction of ICA based watermarking domain to enable insertion of two independent watermarks, that improve authentication accuracy and makes scheme more robust.  相似文献   

3.
In the present work, a novel image watermarking algorithm using vector quantization (VQ) approach is presented for digital image authentication. Watermarks are embedded in two successive stages for image integrity verification and authentication. In the first stage, a key based approach is used to embed robust zero level watermark using properties of indices of vector quantized image. In the second stage, semifragile watermark is embedded by using modified index key based (MIKB) method. Random keys are used to improve the integrity and security of the designed system. Further, to classify an attack quantitatively as acceptable or as a malicious attack, pixel neighbourhood clustering approach is introduced. Proposed approach is evaluated on 250 standard test images using performance measures such as peak signal to noise ratio (PSNR) and normalized hamming similarity (NHS). The experimental results shows that propose approach achieve average false positive rate 0.00024 and the average false negative rate 0.0012. Further, the average PSNR and tamper detection/localization accuracy of watermarked image is 42 dB and 99.8% respectively; while tamper localization sensitivity is very high. The proposed model is found to be robust to common content preserving attacks while fragile to content altering attacks.  相似文献   

4.
In this paper, a halftoning-based watermarking method is presented. This method enables high pixel-depth watermark embedding, while maintaining high image quality. This technique is capable of embedding watermarks with pixel depths up to 3 bits without causing prominent degradation to the image quality. To achieve high image quality, the parallel oriented high-efficient direct binary search (DBS) halftoning is selected to be integrated with the proposed orientation modulation (OM) method. The OM method utilizes different halftone texture orientations to carry different watermark data. In the decoder, the least-mean-square-trained filters are applied for feature extraction from watermarked images in the frequency domain, and the na?ve Bayes classifier is used to analyze the extracted features and ultimately to decode the watermark data. Experimental results show that the DBS-based OM encoding method maintains a high degree of image quality and realizes the processing efficiency and robustness to be adapted in printing applications.  相似文献   

5.
In this paper, a new rotation and scaling invariant image watermarking scheme is proposed based on rotation invariant feature and image normalization. A mathematical model is established to approximate the image based on the mixture generalized Gaussian distribution, which can facilitate the analysis of the watermarking processes. Using maximum a posteriori probability based image segmentation, the cover image is segmented into several homogeneous areas. Each region can be represented by a generalized Gaussian distribution, which is critical for the analysis of the watermarking processes mathematically. The rotation invariant features are extracted from the segmented areas and are selected as reference points. Subregions centered at the feature points are used for watermark embedding and extraction. Image normalization is applied to the subregions to achieve scaling invariance. Meanwhile, the watermark embedding and extraction schemes are analyzed mathematically based on the established mathematical model. The watermark embedding strength is adjusted adaptively using the noise visibility function and the probability of error is analyzed mathematically. The mathematical relationship between fidelity and robustness is established. The experimental results show the effectiveness and accuracy of the proposed scheme.  相似文献   

6.
提出了一种新的脆弱盲水印生成算法用于图像完整性证明和内容篡改证明。首先将原始图像分块,对各分块进行一次整数小波变换;计算4个子带(LL,HL,LH,HH)小波系数绝对值的均值,分别映射为混沌初值,经过迭代、量化生成二值水印信息;最后将水印信息随机嵌入到4个子带中。实验结果表明,所提出的算法提高了篡改检测率,对图像的篡改具有高度敏感性和准确的篡改定位能力。水印提取为盲提取,篡改检测只用到了篡改后的水印图像。  相似文献   

7.
It is a challenging work to design a robust halftone image watermarking scheme against desynchronization attacks. In this paper, we propose a feature-based digital watermarking method for halftone images with low computational complexity, good visual quality and reasonable resistance toward desynchronization attacks. Firstly, the feature points are extracted from host halftone image by using multi-scale Harris–Laplace detector, and the local feature regions (LFRs) are constructed according to the feature scale theory. Secondly, discrete Fourier transform (DFT) is performed on the LFRs, and the embedding positions (DFT coefficients) are selected adaptively according to the magnitude spectrum information. Finally, the digital watermark is embedded into the LFRs by quantizing the magnitudes of the selected DFT coefficients. By binding the watermark with the geometrically invariant halftone image features, the watermark detection can be done without synchronization error. Simulation results show that the proposed scheme is invisible and robust against common signals processing such as median filtering, sharpening, noise adding, and JPEG compression, etc., and desynchronization attacks such as rotation, scaling, translation (RST), cropping, local random bend, and print-scan, etc.  相似文献   

8.
针对现有一些彩色图像自适应水印算法在自适应过程中未充分考虑色彩信息或者在嵌入过程中未考虑彩色载体图像分量的整体性等不足,该文提出一种基于分数阶四元数傅里叶变换(FrQFT)的彩色图像自适应数字水印算法。首先利用人类视觉系统(HVS)提取彩色载体图像块的纹理、边缘和色调掩蔽特性,并依据这些特性对适合嵌入图像块自适应分配嵌入强度,然后在FrQFT域以自适应强度采用量化索引调制算法和冗余嵌入策略嵌入水印。实验结果表明,该算法优于现有的基于四元数傅里叶变换(QFT)的算法以及基于分数阶傅里叶变换(FrFT)的算法,具有较好的不可见性和鲁棒性。  相似文献   

9.
An Integrated Approach to Image Watermarking and JPEG-2000 Compression   总被引:4,自引:0,他引:4  
A scheme which integrates image compression and image watermarking in an effective way is proposed in this research. The image compression scheme under consideration is EBCOT (Embedded Block Coding with Optimized Truncation) which has been adopted in the verification model (VM) of the emerging JPEG-2000 image compression standard. The watermark is embedded during the process when the compressed bit-stream is formed, and can be detected on the fly in image decoding. Thus, watermark embedding and retrieval can be done very efficiently in comparison with other existing watermarking schemes. In addition to efficiency, the proposed scheme has many interesting features. The embedded watermark is robust against various signal processing attacks such as coding and filtering while the watermarked image maintains good perceptual quality. The watermark retrieval procedure does not require the knowledge of the original image. Furthermore, the watermark can be detected progressively and region of interest (ROI) watermarking can be accomplished easily.  相似文献   

10.
This letter presents a method for digital image watermarking for copyright protection. This technique produces a watermarked image that closely retains the quality of the original host image while concurrently surviving various image processing operations such as lowpass/highpass filtering, lossy JPEG compression, and cropping. This image watermarking algorithm takes full advantage of permutation and 2-D barcode (PDF417). The actual watermark embedding in spatial domain is followed using permutated image for improving the resistance to image cropping. Much higher watermark robustness is obtainable via a simple forward error correction technique, which is the main feature of PDF417 codes. Additional features of this technique include the easy determination of the existence of the watermark and that the watermark verification procedure does not need the original host image. The experimental results demonstrate its effectiveness.  相似文献   

11.
申静 《液晶与显示》2018,33(6):511-519
利用人眼对比敏感度视觉特性和图像的纹理特征,提出了一种彩色图像的水印算法。算法首先依据图像的纹理特征,将图像进行分割;再将水印嵌入到图像纹理复杂的部分,并利用人眼对比敏感阈值控制水印的嵌入量,从而实现水印的嵌入;最后利用逆过程实现水印的提取。同时对3幅不同复杂纹理的图像进行仿真实验,并对3幅含水印图进行5种方式的攻击测试,且与近些年国内外报道的8种水印算法进行对比分析。结果表明,在中间剪切1/4区域、质量因子为20%的压缩和旋转90°较强的攻击下,提取水印的NC值和含水印图的SSIM值均仍能达到0.8以上,且比8种水印算法具有更好的鲁棒性。综合结果表明,在水印嵌入过程中,提出的算法能够有效解决水印容量与视觉透明性、鲁棒性之间的平衡,是一种行之有效的图像水印算法。  相似文献   

12.
It is a challenging work to design a blind color image watermarking scheme for protecting copyright, which is different from the existing schemes used binary image or grayscale image as watermark and is also different from other non-blind watermarking schemes. In this paper, we analyze the feature of the upper Hessenberg matrix, and propose a blind color image watermarking scheme using upper Hessenberg matrix of Hessenberg transform. Arnold transform is used to improve the security, and the MD5-based Hash pseudo-random algorithm is also used to improve the robustness. In the process of watermark embedding, the encrypted watermark information is embedded into the biggest energy element of the Hessenberg matrix by quantization technique. In the process of watermark extraction, the watermark is extracted from the attacked host image with blind manner. Simulation results show that the proposed scheme outperforms other related methods in the aspects of the invisibility, robustness, capacity and computational complexity.  相似文献   

13.
基于ICA的智能数字水印技术   总被引:3,自引:0,他引:3  
该文提出了一种基于智能信息分析方法--独立分量分析的智能数字水印新算法。水印嵌入之前先对其进行预处理,嵌入过程可以在图像任意作用域中实现,并给出了小波域中的一种闭环嵌入方法。水印嵌入的强度由小波域视觉模型决定。在不需要任何原始图像、水印和攻击类型等信息的情况下,该算法不仅可以检测到水印而且可以完全提取水印,实现了真正意义上的水印盲检测,并对多个水印嵌入的情况也可以进行水印提取。水印检测的精确程度取决于图像与水印之间的独立性以及所采用的密钥。实验过程中攻击由通用水印测试软件Stirmark产生,实验数据证明本文提出的水印算法对Stirmark提供的各种攻击剪切、滤波、图象压缩、删行、删列、几何攻击以及多种攻击同时存在时都具有很好的鲁棒性。  相似文献   

14.
15.
MPEG-2压缩域的视频数字水印新算法   总被引:7,自引:0,他引:7  
视频数字水印技术是当前水印研究中的一个热点.本文提出一种视频数字水印新算法,直接对压缩后的视频数据流进行操作,根据运动矢量的特征值,将水印信息嵌入到运动矢量上,不需要完全解码和再编码过程.所提出的水印算法简单、有效,实现了水印盲检.与嵌入水印前的原视频图像相比,嵌入水印后的视频图像信噪比损失很小.  相似文献   

16.
基于奇异值分解的向量替换数字盲水印   总被引:1,自引:0,他引:1  
文章在分析图像的奇异值分解特性的基础上,提出了一种基于奇异值分解的载体奇异向量与水印奇异向量替换的盲水印算法。将载体图像分块进行奇异值分解,用水印分块奇异值分解的左右奇异向量和奇异值向量替换载体的对应向量。根据载体与水印的大小关系将水印循环嵌入,提取时进行平均判决。算法简单易于实现,提取的水印相似度高,可应用于高品质图像的版权保护与认证。  相似文献   

17.
This paper proposes a novel multicarrier spread spectrum (SS) watermarking scheme for the application of image error concealment using multicarrier-code division multiple access (MC-CDMA) with binary phase shift keying (BPSK) transmission in Rayleigh fading channel. The goal is achieved by embedding important information (image digest) which is extracted from the original image itself, and is used to introduce sufficient redundancy in the transmitted image. Half-toning technique is applied to obtain image digest from its low-resolution version. At the decoder side, data demodulation as well as watermark decoding are done using minimum mean square error combining (MMSEC) strategy. The extracted image digest is used to correct the damaged regions. The integration of SS watermarking with the existing SS modulation not only simplifies the design but also offers significant performance improvement for error concealment in fading channel. Authorized users having the knowledge of code patterns for SS watermarking can only perform the error concealment operation and the method is secured. Experimental results duly support the effectiveness of the proposed scheme.  相似文献   

18.
基于关键熵的双树复小波域盲图像水印算法   总被引:2,自引:2,他引:0  
设计了一种基于关键熵的盲数字图像水印算法.首先,使用尺度不变特征变换(SIFT)方法,从图像中提取特征点;其次,以特征点为中心构造局部不变圆形区域,并对其进行归一化处理;然后,选取大于图像平均熵的图像区域作为关键熵图像区域;最后,结合量化调制策略及双树复小波变换(DTCWT)技术,将水印嵌入到关键熵图像区域中.实验分析...  相似文献   

19.
A feature-based robust digital image watermarking scheme   总被引:15,自引:0,他引:15  
A robust digital image watermarking scheme that combines image feature extraction and image normalization is proposed. The goal is to resist both geometric distortion and signal processing attacks. We adopt a feature extraction method called Mexican hat wavelet scale interaction. The extracted feature points can survive a variety of attacks and be used as reference points for both watermark embedding and detection. The normalized image of an image (object) is nearly invariant with respect to rotations. As a result, the watermark detection task can be much simplified when it is applied to the normalized image. However, because image normalization is sensitive to image local variation, we apply image normalization to nonoverlapped image disks separately. The disks are centered at the extracted feature points. Several copies of a 16-bit watermark sequence are embedded in the original image to improve the robustness of watermarks. Simulation results show that our scheme can survive low-quality JPEG compression, color reduction, sharpening, Gaussian filtering, median filtering, row or column removal, shearing, rotation, local warping, cropping, and linear geometric transformations.  相似文献   

20.
王飞 《现代电子技术》2012,35(14):83-86,89
基于图像多尺度空间理论和扩频机制以及视觉感知模型的特性,给出一种基于特征的数字图像水印算法。算法采用尺度不变特征变换算子提取图像的局部不变特征区域,根据信噪比特点自适应选取水印嵌入强度因子,将一幅二值水印图像嵌入到原始图像中,实现了数字水印的不可感知性和鲁棒性。仿真结果表明,该算法对添加噪声、压缩、旋转等常见的图像处理攻击具有较强的鲁棒性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号