首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 4 毫秒
1.
In this paper, a robust and blind watermarking scheme for three dimensional (3-D) anaglyph images is proposed. Since the computational cost of Red–Green–Blue (RGB) processing is quite high, we have used 3-D Discrete Wavelet Transform (3-D DWT) to decompose the image and process it directly. The watermark to be embedded is computed from the image and also the process involves watermark strength factor which scales the quality of the watermark. Jacket matrix is used due to its simplicity in the watermark embedding and extraction processes. Experimental results show that the proposed scheme is highly imperceptible and robust against various image processing and signal processing attacks. Comparisons with the state-of-the-art demonstrate the effectiveness of our scheme.  相似文献   

2.
Bilge  Umut  A.   《Pattern recognition》2002,35(12):2739-2747
This paper introduces two spatial methods in order to embed watermark data into fingerprint images, without corrupting their features. The first method inserts watermark data after feature extraction, thus preventing watermarking of regions used for fingerprint classification. The method utilizes an image adaptive strength adjustment technique which results in watermarks with low visibility. The second method introduces a feature adaptive watermarking technique for fingerprints, thus applicable before feature extraction. For both of the methods, decoding does not require original fingerprint image. Unlike most of the published spatial watermarking methods, the proposed methods provide high decoding accuracy for fingerprint images. High data hiding and decoding performance for color images is also observed.  相似文献   

3.
目的 弥散加权成像(DWI)作为一种新型医学影像成像技术,已逐渐成为诊断心脏、大脑、肾脏、肝脏等器官中的神经、纤维组织病变的重要方法和手段。与传统的核磁共振(MRI)成像相比,通过使用不同的扩散方向矢量,在不同的扩散参数下,DWI图像呈现的灰度信息也有所不同。目前尚无相关文献提出针对DWI图像版权信息进行有效保护的相关研究。方法 为有效保护病人的DWI图像版权信息,提出一种基于DWI图像的整数小波变换域(IWT)统计直方图的鲁棒水印算法。该算法首先通过最大类间方差分割算法和面积控制阈值获取指定断层中带有弥散梯度方向图像的前景区域,作为待嵌入区域。对待嵌入区域使用整数小波变换获取低频子带系数,利用固定步长对低频子带系数进行统计,生成统计直方图,对统计直方图相邻簇的比值关系进行修改用于水印嵌入;最后提出DWI表观系数与弥散张量成像(DTI)中弥散张量值的可逆关系构建可逆密钥,利用该密钥将嵌入水印后的DWI图像再次加密,从而有效保护DWI图像的版权信息。结果 实验结果表明该算法引入的水印信息对DWI图像中的纤维参数改变量极小。在纤维方向和平均弥散程度改变个数上,本文算法与文献方法相比,分别降低了100多个和30多个;在可视质量上,本文算法提高约8 dB。在高斯噪声、小角度旋转等攻击中,本文算法能够提供较高的提取水印准确率。结论 本文算法对医生诊断的影响在可接受的范围内,且在感兴趣区域遭受各种常见攻击时,具有较高的安全性和鲁棒性。  相似文献   

4.
This paper proposes an adaptive watermarking scheme for e-government document images. The adaptive scheme combines the discrete cosine transform (DCT) and the singular value decomposition (SVD) using luminance masking. As a core of masking model in the human visual system (HVS), luminance masking is implemented to improve noise sensitivity. Genetic algorithm (GA), subsequently, is employed for the optimization of the scaling factor of the masking. Involving a number of steps, the scheme proposed through this study begins by calculating the mask of the host image using luminance masking. It is then continued by transforming the mask on each area into all frequencies domain. The watermark image, following this, is embedded by modifying the singular values of DCT-transformed host image with singular values of mask coefficient of host image and the control parameter of DCT-transformed watermark image using Genetic Algorithm (GA). The use of both the singular values and the control parameter respectively, in this case, is not only to improve the sensitivity of the watermark performance but also to avoid the false positive problem. The watermark image, afterwards, is extracted from the distorted images. The experiment results show the improved adaptive performance of the proposed scheme is in resistant to several types of attacks in comparison with the previous schemes; the adaptive performance refers to the adaptive parameter of the luminance masking functioned to improve the performance or robustness of an image from any attacks.  相似文献   

5.
对三维点云模型零水印技术开展研究,基于三维模型形状分析、结合数据分析理论,选择具有较高稳定性的三维模型全局几何特征作为水印构造的基础,通过计算三维模型顶点范数,以顶点范数为依据建立三维模型有序顶点集,分析顶点集中顶点数目的分布情况构造水印。实验结果表明,该方法执行速度较快,可以直接应用于三维点云数据,能够很好地抵抗平移、旋转、均匀缩放、顶点重排序、噪声、简化、量化、平滑和细分等常见攻击,对剪切攻击也有一定的鲁棒性,能够满足三维模型版权保护的要求。  相似文献   

6.
为进一步提高水印抵抗攻击的能力,提出一种基于量化的混合提升小波变换和奇异值分解的自适应数字图像水印算法。对二值水印信号进行异或加密与置乱处理,以增强水印信号的安全性和鲁棒性;对原始载体图像进行互不重叠的分块,对随机选取的分块进行一级提升小波变换,对生成的低频子带进行奇异值分解;根据水印信号的取值,对每一分块低频子带的最大奇异值采用自适应量化的方法嵌入水印信号。仿真结果表明,该算法具有较好的透明性和抵抗常规信号处理攻击的能力。  相似文献   

7.
A ROI (region of interest) of a medical image is an area including important information and must be stored without any distortion. In order to achieve optimal compression as well as satisfactory visualization of medical images, we compress the ROI by lossless compression, and the rest by lossy compression. Furthermore, security is an important issue in web-based medical information system. Watermarking skill is often used for protecting medical images. In this paper, we present a robust technique embedding the watermark of signature information or textual data around the ROI of a medical image based on genetic algorithms. A fragile watermark is adopted to detect any unauthorized modification. The embedding of watermark in the frequency domain is more difficult to be pirated than in spatial domain.  相似文献   

8.
以分形编码技术及伪Zernike矩相关知识为基础,提出一种可有效抵抗几何攻击的高鲁棒数字水印新算法。算法首先利用分形编码及设置的阈值将图像分成自相似性块和非自相似性块;然后计算自相似性块的伪Zernike矩,并从中选出最鲁棒的矩;最后通过量化调制伪Zernike矩幅值将水印嵌入其中。仿真实验表明,算法不仅具有较好的透明性,而且对常规信号处理(滤波、锐化、加噪和JPEG压缩等)和几何攻击(全局仿射变换、局部失真等)均具有较好的鲁棒性。  相似文献   

9.
The need for a robust reversible watermarking method has recently attracted more attention. This paper presents a novel robust reversible watermarking scheme based on using the Slantlet transform matrix to transform small blocks of the original image and hiding the watermark bits by modifying the mean values of the carrier subbands. The problem of overflow/underflow has been avoided by using histogram modification process. Extensive experimental tests based on 100 general images and 100 medical images demonstrate the efficiency of the proposed scheme. The proposed scheme has robustness against different kinds of attacks and the results prove that it is completely reversible with improved capacity, robustness, and invisibility in comparison with the previous methods.  相似文献   

10.
In this paper, a novel watermarking scheme for quantum images based on Hadamard transform is proposed. In the new scheme, a unitary transform controlled by a classical binary key is implemented on quantum image. Then, we utilize a dynamic vector, instead of a fixed parameter as in other previous schemes, to control the embedding process. The dynamic embedding vector is decided by both the carrier quantum image and the watermark image, which is only known by the authorized owner. The proposed scheme is analyzed from visual quality, computational complexity, and payload capacity. Analysis and results show that the proposed scheme has better visual quality under a higher embedding capacity and lower complexity compared with other schemes proposed recently.  相似文献   

11.
基于支持向量机的鲁棒盲水印算法   总被引:2,自引:0,他引:2  
提出了一种基于支持向量机的鲁棒盲水印算法.该算法首先用多尺度Harris-Laplace检测算子从载体图像中提取出稳定的特征点,然后根据特征自适应确定局部特征区域,在特征区域选择一些点作为嵌入水印的点,结合图像的邻域相关性,根据灰度图像特点,选取特征向量作为SVR训练模型,进而利用SVR进行预测,调节嵌入点的像素值进行水印的嵌入和提取.实验结果表明,用该技术嵌入水印后的图像具有很好的图像感知质量,时常规信号处理乖去同步攻击特别是JPEG压缩具有较强的鲁棒性.  相似文献   

12.
A semi-fragile watermarking scheme for multiple band images is presented. We propose to embed a mark into remote-sensing images applying a tree-structured vector quantization approach to the pixel signatures, instead of processing each band separately. The signature of the multi- or hyperspectral image is used to embed the mark into it in order to detect any significant modification of the original image. The image is segmented into three-dimensional blocks and a tree-structured vector quantizer (TSVQ) is built for each block. These trees are manipulated using an iterative algorithm until the resulting block satisfies a required criterion which establishes the embedded mark. The method is shown to be able to preserve the mark under lossy compression (above a given threshold) but, at the same time, it detects possibly forged blocks and their position in the whole image.  相似文献   

13.
For traditional fragile watermarking schemes, isolated-block tamper which will destroy the minutiae of the fingerprint image can hardly be efficiently detected. In this paper, we propose a multi-block dependency based fragile watermarking scheme to overcome this shortcoming. The images are split into image blocks with size of 8 × 8; a 64-bit watermark is generated for each image block, and then equally partitioned into eight parts. Each part of the watermark is embedded into another image block which is selected by the corresponding secret key. Theoretic analysis and experimental results demonstrate that the proposed method not only can detect and localize the isolated-block tamper on fingerprint images with high detection probability and low false detection probability, but also enhances the systematic security obviously.  相似文献   

14.
Su  Qingtang  Liu  Yonghui  Liu  Decheng  Yuan  Zihan  Ning  Hongye 《Multimedia Tools and Applications》2019,78(7):8113-8132

At present, the binary images are often used as the original watermark images of many watermarking methods, but partial methods cannot be easily extended to colour image watermarking methods. For resolving this problem, we propose a new watermarking method using ternary coding and QR decomposition for colour image. In the procedure of embedding watermark, the colour image watermark is coded to ternary information; the colour host image is also separated into image blocks of sized 3?×?3, and these image blocks are further decomposed via QR decomposition; then, one ternary watermark is embedded into one orthogonal matrix Q of QR decomposition by the proposed rules. In the procedure of extracting watermark, the proposed method uses the blind-manner to extract the embedded ternary information. The novelty of this scheme lies in the proposed ternary coding for watermark image, which can improve the imperceptibility, embedded watermark capacity and real-time feature of the watermarking scheme. The results of simulation show the presented technique is better than other compared schemes with respect to imperceptibility, embedded watermark capacity and real-time feature under the similar robustness.

  相似文献   

15.
图像归一化与伪Zernike矩的鲁棒水印算法研究*   总被引:1,自引:1,他引:1  
以基于矩的图像归一化技术及伪Zernike矩相关知识为基础,提出一种可有效抵抗几何攻击的数字水印新算法。算法首先利用归一化技术将原始图像映射到几何不变空间内;然后结合不变质心理论提取出归一化图像的重要区域;最后通过量化调制伪Zernike矩幅值将水印嵌入到重要区域中。仿真实验表明,该算法不仅具有较好的透明性,而且对常规信号处理(滤波、锐化、加噪和JPEG压缩等)和几何攻击(全局仿射变换、局部失真等)均具有较好的鲁棒性。  相似文献   

16.
In this paper, a novel watermarking scheme based on quantum wavelet transform (QWT) is proposed. Firstly, the wavelet coefficients are extracted by executing QWT on quantum image. Then, we utilize a dynamic vector for controlling embedding strength instead of a fixed parameter for embedding process in other schemes. Analysis and results show that the proposed dynamic watermarking scheme has better visual quality under a higher embedding capacity and outperforms the existing schemes in the literature.  相似文献   

17.
在传统分形图像编码的基础上,借用人类视觉系统(HVS)的掩蔽特性,对分形域上的水印方法进行了研究.在空间域上对原始图像进行预处理,使原始图像的纹理区得到了突出,对纹理区图像进行分形压缩编码的同时,实现了水印的嵌入和提取操作.水印提取时运用概率统计知识,提高了水印检测的准确度和水印抵抗攻击的鲁棒性.实验结果表明,该算法对剪切、噪声、滤波、JPEG等图像处理方法具有较好的鲁棒性.  相似文献   

18.
Multimedia Tools and Applications - Nowadays, due to widespread usage of the Internet, digital contents are distributed quickly and inexpensively throughout the world. Watermarking techniques can...  相似文献   

19.
The drawbacks of the current authentication watermarking schemes for JPEG images, which are inferior localization and the security flaws, are firstly analyzed in this paper. Then, two counterferiting attacks are conducted on them. To overcome these drawbacks, a new digital authentication watermarking scheme for JPEG images with superior localization and security is proposed. Moreover, the probabilities of tamper detection and false detection are deduced under region tampering and collage attack separately. For each image block, the proposed scheme keeps four middle frequency points fixed to embed the watermark, and utilizes the rest of the DCT coefficients to generate 4 bits of watermark information. During the embedding process, each watermark bit is embedded in another image block that is selected by its corresponding secret key. Since four blocks are randomly selected for the watermark embedding of each block, the non-deterministic dependence among the image blocks is established so as to resist collage attack completely. At the receiver, according to judging of the extracted 4 bits of watermark information and the corresponding 9-neighbourhood system, the proposed scheme could discriminate whether the image block is tampered or not. Owing to the diminishing of false detection and the holding of tamper detection, we improve the accuracy of localization in the authentication process. Theoretic analysis and simulation results have proved that the proposed algorithm not only has superior localization, but also enhances the systematic security obviously. Supported by the National Natural Science Foundation of China (Grant No. 60572027), the Program for New Century Excellent Talents in University of China (Grant No. NCET-05-0794), the Sichuan Youth Science & Technology Foundation (Grant No. 03ZQ026-033), the National Defense Pre-research Foundation of China (Grant No. 51430804QT2201) and the Application Basic Foundation of Sichuan Province, China (Grant No. 2006 J13-10)  相似文献   

20.
基于NMF和SVD相结合的Contourlet域鲁棒水印算法*   总被引:1,自引:2,他引:1  
为了提高变换域数字水印技术的鲁棒性,提出了一种在Contourlet域将非负矩阵变换(NMF)与奇异值变换(SVD)相结合的鲁棒水印算法。宿主图像经过Contourlet变换后,对低频子带进行非负矩阵变换,然后对非负基向量组W进行奇异值分解,最后将经过Arnold置乱的水印图像嵌入到奇异值中。实验结果表明,该图像水印算法在获得良好视觉效果的同时,对于加噪声、滤波、剪切等图像攻击有较好的鲁棒性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号