共查询到20条相似文献,搜索用时 0 毫秒
1.
In this paper, a robust and blind watermarking scheme for three dimensional (3-D) anaglyph images is proposed. Since the computational cost of Red–Green–Blue (RGB) processing is quite high, we have used 3-D Discrete Wavelet Transform (3-D DWT) to decompose the image and process it directly. The watermark to be embedded is computed from the image and also the process involves watermark strength factor which scales the quality of the watermark. Jacket matrix is used due to its simplicity in the watermark embedding and extraction processes. Experimental results show that the proposed scheme is highly imperceptible and robust against various image processing and signal processing attacks. Comparisons with the state-of-the-art demonstrate the effectiveness of our scheme. 相似文献
2.
This paper introduces two spatial methods in order to embed watermark data into fingerprint images, without corrupting their features. The first method inserts watermark data after feature extraction, thus preventing watermarking of regions used for fingerprint classification. The method utilizes an image adaptive strength adjustment technique which results in watermarks with low visibility. The second method introduces a feature adaptive watermarking technique for fingerprints, thus applicable before feature extraction. For both of the methods, decoding does not require original fingerprint image. Unlike most of the published spatial watermarking methods, the proposed methods provide high decoding accuracy for fingerprint images. High data hiding and decoding performance for color images is also observed. 相似文献
3.
This paper proposes an adaptive watermarking scheme for e-government document images. The adaptive scheme combines the discrete cosine transform (DCT) and the singular value decomposition (SVD) using luminance masking. As a core of masking model in the human visual system (HVS), luminance masking is implemented to improve noise sensitivity. Genetic algorithm (GA), subsequently, is employed for the optimization of the scaling factor of the masking. Involving a number of steps, the scheme proposed through this study begins by calculating the mask of the host image using luminance masking. It is then continued by transforming the mask on each area into all frequencies domain. The watermark image, following this, is embedded by modifying the singular values of DCT-transformed host image with singular values of mask coefficient of host image and the control parameter of DCT-transformed watermark image using Genetic Algorithm (GA). The use of both the singular values and the control parameter respectively, in this case, is not only to improve the sensitivity of the watermark performance but also to avoid the false positive problem. The watermark image, afterwards, is extracted from the distorted images. The experiment results show the improved adaptive performance of the proposed scheme is in resistant to several types of attacks in comparison with the previous schemes; the adaptive performance refers to the adaptive parameter of the luminance masking functioned to improve the performance or robustness of an image from any attacks. 相似文献
4.
为进一步提高水印抵抗攻击的能力,提出一种基于量化的混合提升小波变换和奇异值分解的自适应数字图像水印算法。对二值水印信号进行异或加密与置乱处理,以增强水印信号的安全性和鲁棒性;对原始载体图像进行互不重叠的分块,对随机选取的分块进行一级提升小波变换,对生成的低频子带进行奇异值分解;根据水印信号的取值,对每一分块低频子带的最大奇异值采用自适应量化的方法嵌入水印信号。仿真结果表明,该算法具有较好的透明性和抵抗常规信号处理攻击的能力。 相似文献
5.
A ROI (region of interest) of a medical image is an area including important information and must be stored without any distortion. In order to achieve optimal compression as well as satisfactory visualization of medical images, we compress the ROI by lossless compression, and the rest by lossy compression. Furthermore, security is an important issue in web-based medical information system. Watermarking skill is often used for protecting medical images. In this paper, we present a robust technique embedding the watermark of signature information or textual data around the ROI of a medical image based on genetic algorithms. A fragile watermark is adopted to detect any unauthorized modification. The embedding of watermark in the frequency domain is more difficult to be pirated than in spatial domain. 相似文献
6.
提出了一种基于支持向量机的鲁棒盲水印算法.该算法首先用多尺度Harris-Laplace检测算子从载体图像中提取出稳定的特征点,然后根据特征自适应确定局部特征区域,在特征区域选择一些点作为嵌入水印的点,结合图像的邻域相关性,根据灰度图像特点,选取特征向量作为SVR训练模型,进而利用SVR进行预测,调节嵌入点的像素值进行水印的嵌入和提取.实验结果表明,用该技术嵌入水印后的图像具有很好的图像感知质量,时常规信号处理乖去同步攻击特别是JPEG压缩具有较强的鲁棒性. 相似文献
7.
For traditional fragile watermarking schemes, isolated-block tamper which will destroy the minutiae of the fingerprint image can hardly be efficiently detected. In this paper, we propose a multi-block dependency based fragile watermarking scheme to overcome this shortcoming. The images are split into image blocks with size of 8 × 8; a 64-bit watermark is generated for each image block, and then equally partitioned into eight parts. Each part of the watermark is embedded into another image block which is selected by the corresponding secret key. Theoretic analysis and experimental results demonstrate that the proposed method not only can detect and localize the isolated-block tamper on fingerprint images with high detection probability and low false detection probability, but also enhances the systematic security obviously. 相似文献
8.
In this paper, a novel watermarking scheme for quantum images based on Hadamard transform is proposed. In the new scheme, a unitary transform controlled by a classical binary key is implemented on quantum image. Then, we utilize a dynamic vector, instead of a fixed parameter as in other previous schemes, to control the embedding process. The dynamic embedding vector is decided by both the carrier quantum image and the watermark image, which is only known by the authorized owner. The proposed scheme is analyzed from visual quality, computational complexity, and payload capacity. Analysis and results show that the proposed scheme has better visual quality under a higher embedding capacity and lower complexity compared with other schemes proposed recently. 相似文献
9.
At present, the binary images are often used as the original watermark images of many watermarking methods, but partial methods cannot be easily extended to colour image watermarking methods. For resolving this problem, we propose a new watermarking method using ternary coding and QR decomposition for colour image. In the procedure of embedding watermark, the colour image watermark is coded to ternary information; the colour host image is also separated into image blocks of sized 3?×?3, and these image blocks are further decomposed via QR decomposition; then, one ternary watermark is embedded into one orthogonal matrix Q of QR decomposition by the proposed rules. In the procedure of extracting watermark, the proposed method uses the blind-manner to extract the embedded ternary information. The novelty of this scheme lies in the proposed ternary coding for watermark image, which can improve the imperceptibility, embedded watermark capacity and real-time feature of the watermarking scheme. The results of simulation show the presented technique is better than other compared schemes with respect to imperceptibility, embedded watermark capacity and real-time feature under the similar robustness. 相似文献
10.
在传统分形图像编码的基础上,借用人类视觉系统(HVS)的掩蔽特性,对分形域上的水印方法进行了研究.在空间域上对原始图像进行预处理,使原始图像的纹理区得到了突出,对纹理区图像进行分形压缩编码的同时,实现了水印的嵌入和提取操作.水印提取时运用概率统计知识,提高了水印检测的准确度和水印抵抗攻击的鲁棒性.实验结果表明,该算法对剪切、噪声、滤波、JPEG等图像处理方法具有较好的鲁棒性. 相似文献
11.
In this paper, a novel watermarking scheme based on quantum wavelet transform (QWT) is proposed. Firstly, the wavelet coefficients are extracted by executing QWT on quantum image. Then, we utilize a dynamic vector for controlling embedding strength instead of a fixed parameter for embedding process in other schemes. Analysis and results show that the proposed dynamic watermarking scheme has better visual quality under a higher embedding capacity and outperforms the existing schemes in the literature. 相似文献
12.
The drawbacks of the current authentication watermarking schemes for JPEG images, which are inferior localization and the
security flaws, are firstly analyzed in this paper. Then, two counterferiting attacks are conducted on them. To overcome these
drawbacks, a new digital authentication watermarking scheme for JPEG images with superior localization and security is proposed.
Moreover, the probabilities of tamper detection and false detection are deduced under region tampering and collage attack
separately. For each image block, the proposed scheme keeps four middle frequency points fixed to embed the watermark, and
utilizes the rest of the DCT coefficients to generate 4 bits of watermark information. During the embedding process, each
watermark bit is embedded in another image block that is selected by its corresponding secret key. Since four blocks are randomly
selected for the watermark embedding of each block, the non-deterministic dependence among the image blocks is established
so as to resist collage attack completely. At the receiver, according to judging of the extracted 4 bits of watermark information
and the corresponding 9-neighbourhood system, the proposed scheme could discriminate whether the image block is tampered or
not. Owing to the diminishing of false detection and the holding of tamper detection, we improve the accuracy of localization
in the authentication process. Theoretic analysis and simulation results have proved that the proposed algorithm not only
has superior localization, but also enhances the systematic security obviously.
Supported by the National Natural Science Foundation of China (Grant No. 60572027), the Program for New Century Excellent
Talents in University of China (Grant No. NCET-05-0794), the Sichuan Youth Science & Technology Foundation (Grant No. 03ZQ026-033),
the National Defense Pre-research Foundation of China (Grant No. 51430804QT2201) and the Application Basic Foundation of Sichuan
Province, China (Grant No. 2006 J13-10) 相似文献
13.
We introduce a novel method for embedding and detecting a chaotic watermark in the digital spatial domain of color facial images, based on localizing salient facial features. These features define a certain area on which the watermark is embedded and detected. An assessment of the watermarking robustness is done experimentally, by testing resistance to several attacks, such as compression, filtering, noise addition, scaling, cropping and rotation 相似文献
14.
Multimedia Tools and Applications - Reversible and imperceptible watermarking is recognized as a robust approach to confirm the integrity and authenticity of medical images and to verify that... 相似文献
15.
In this paper, a robust lossless copyright protection scheme, based on overlapping discrete cosine transform (DCT) and singular value decomposition (SVD), is presented. The original host image is separated into overlapping blocks, to which the DCT is applied. Direct current (DC) coefficients are extracted from the transformed blocks to form a DC-map. A series of random positions are selected on the map and SVD is performed to construct an ownership share which is used for copyright verification. Simulation results are carried out, demonstrating the robustness of the proposed scheme against different image-manipulation attacks. 相似文献
17.
As one of the famous block-based image coding schemes,block truncation coding(BTC) has been also applied in digital watermarking.Previous BTC-based watermarking or hiding schemes usually embed secret data by modifying the BTC encoding stage or BTC-compressed data,obtaining the watermarked image with poorer quality than the BTC-compressed version.This paper presents a new oblivious image watermarking scheme by exploiting BTC bitmaps.Unlike the traditional schemes,our approach does not really perform the BTC compression on images during the embedding process but utilizes the parity of the number of horizontal edge transitions in each BTC bitmap to guide the watermark embedding and extraction processes.The embedding process starts by partitioning the original cover image into non-overlapping 4×4 blocks and performing BTC on each block to obtain its BTC bitmap.One watermark bit is embedded in each block by modifying at most three pixel values in the block to make sure that the parity of the number of horizontal edge transitions in the bitmap of the modified block is equal to the embedded watermark bit.In the extraction stage,the suspicious image is first partitioned into non-overlapping 4×4 blocks and BTC is performed on each block to obtain its bitmap.Then,by checking the parity of the number of horizontal edge transitions in the bitmap,we can extract one watermark bit in each block.Experimental results demonstrate that the proposed watermarking scheme is fragile to various image processing operations while keeping the transparency very well. 相似文献
18.
提出一种在小波域中新的基于支持向量机的鲁棒性水印嵌入和检测算法.通过对彩色图像中蓝色分量的小波变换,同时在小波域中计算低频子带的JND(just noticeable distortions)值,水印信号被自适应地嵌入到小波变换后的低频子带系数中.当图像经历各种攻击以后,通过支持向量机的训练,它仍然可以记住添加水印信号的位置同其周围像素之间的相对关系,利用支持向量机强的学习泛化能力,可以有效实现对水印信号的鲁棒性检测.实验结果表明,该方法对多种攻击具有较好的鲁棒性. 相似文献
20.
We investigate the dynamic watermarking scheme for quantum images using quantum wavelet transform (QWT) proposed by Song et al. (Quantum Inf Process 12(12):3689–3706, 2013). It is aimed to embed the watermark image into the wavelet coefficients of the quantum carrier image. However, in our opinion, the key procedures of the protocol are wrong. At last, a possible improvement strategy is presented. 相似文献
|