首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
基于图像归一化的抗几何攻击水印技术   总被引:1,自引:0,他引:1  
在数字图像水印中,确保水印和图像的同步问题是水印图像有效抵抗几何攻击的关键.本文利用几何不变矩,对水印抗几何攻击进行了探讨,提出了一种基于几何不变矩的抗几何攻击的水印算法.通过对原始图像和攻击后的图像的归一化处理,使水印和图像在嵌入与提取过程保证同步.实验证明该方法对常见的几何攻击有很好的鲁棒性,嵌入的水印容量较大且水印图像的质量也较高.  相似文献   

2.
针对目前的图像水印难以同时抵抗常规攻击和几 何攻击的不足,提出一种新的轮廓波 水印算法。水印嵌入阶段,该方法将宿主图像进行离散小波变换和非下采样轮廓波变换,并 将水印嵌入到熵值最大的高频子带,解决了将水印嵌入低频无法抵抗几何攻击及高频不能 很好抵抗滤波等常规攻击的问题。在水印嵌入前对嵌入区域进行加密处理,提高算法的安全 性。水印提取阶段,利用Zernike矩对含水印图像进行几何校正再进行提取,进一步提高了 算法的抗几何攻击能力。最后利用峰值信噪比和归一化系数对算法进行评价,验证算法的不 可感知性和鲁棒性。仿真实验结果表明,算法在不同的宿主图像和水印图像上均表现良好。 该算法在具有较好不可见性的基础上,除了对常规攻击具有很好的抵抗力,对几何攻击也具 有强鲁棒性,归一化系数(normalization coefficient,NC)均达到了0.99  相似文献   

3.
基于归一化图像的抗仿射变换攻击的水印算法   总被引:3,自引:0,他引:3  
对于鲁棒的数字图像水印技术来说,仿射变换是最难对付的一种攻击。将水印嵌入到基于几何矩的归一化图像中是一种抵抗仿射攻击的方法,但由于原始图像的归一化图像和遭受了仿射攻击后的归一化图像在尺寸上不相同,这就使得嵌入和提取水印很难实现同步。本文提出了一种基于归一化图像的数字水印算法,选择归一化图像中的某个参数作为水印,嵌入水印的过程就是在原始图像的基础上叠加一个原始图像的非线性变换,使得其归一化图像的该参数处于预定的变化范围之中。实验证明此算法对于大多数StirMark攻击来说都是鲁棒的。  相似文献   

4.
张力  钱恭斌  肖薇薇  纪震 《信号处理》2008,24(2):294-298
现有的大多数水印算法对旋转、平移和尺度变换等几何攻击的鲁棒性比较差,微小的几何攻击都有能导致水印检测器失效,因此水印算法对几何攻击具有鲁棒性非常重要。本文提出了一种基于Tchebichef不变矩实现的多比特几何攻击不变性图像盲水印算法。文中具体介绍了Tchebichef不变矩的构造方法,水印是事先产生的与原始图像无关的信号,嵌入过程中将水印嵌入到图像的Tchebichef不变矩中实现几何攻击不变性。水印检测过程中采用独立分量分析技术实现真正意义上的多比特水印盲检测。文中具体分析了所提出的水印算法的计算复杂度,实验过程中采用通用水印测试软件Stirmark对所提出的水印算法进行鲁棒性测试,实验数据说明这种水印算法对Stirmark具有很好的鲁棒性。  相似文献   

5.
为了更好对数字图像版权进行保护,提高数字水印的鲁棒性,以图像归一化技术为基础,提出一种可有效抵抗几何攻击的数字水印新算法。算法利用图像归一化和不变质心理论,通过对原始图像和攻击后的图像的归一化处理,使水印和图像在嵌入与提取过程保证同步,实验结果表明,该算法具有较强的抵抗几何攻击的能力,提高了数字水印抗几何攻击的鲁棒性。嵌入的水印容量较大且水印图像的质量也较高。  相似文献   

6.
基于局部Zernike矩的RST不变水印   总被引:1,自引:0,他引:1  
旋转、缩放和平移(RST)等几何攻击能够破坏水印检测的同步性,而使常规水印检测失败,提出了一种基于图像局部Zernike矩的RST不变水印算法.利用图像归一化后的Zernike矩幅度具有RST不变的性质,将由Zernike矩重构的水印图像在空域嵌入原始图像的局部中,并提取该区域的Zernike矩幅度矢量作为水印矢量.水印检测时,计算局部区域的Zernike矩,并与已知Zernike矩矢量计算均方误差根(RMSE)判断水印存在与否.与使用图像全局Zernike矩相比,使用局部矩使得水印具有更好的旋转不变性,同时水印对于缩放、JPEG压缩和噪声等攻击也具有较好的检测性能.  相似文献   

7.
抗几何攻击的最低有效位数字水印算法   总被引:1,自引:1,他引:0  
尽管最低有效位数字水印算法嵌入容量大,但抗几何攻击能力不足.通过分析几何攻击的原理,结合可视密码学和图像归一化技术,提出一种抗几何攻击的最低有效位数字水印算法.首先,利用可视密码学技术将水印隐藏到多幅图片中,同时仅选取一幅图片作为水印.然后对载体图像进行归一化,并以图像的几何中心作为中心提取重要区域.最后,依据重要区域的大小缩放水印,以增强水印与载体间的同步性,并从重要区域像素的低4位中随机选取嵌入位置通过异或运算嵌入水印.实验结果表明,算法具有良好的抗几何攻击能力.  相似文献   

8.
在水印技术的应用中,针对几何攻击的鲁棒性一直是一个难题。这主要是由于即使很小的尺度或旋转攻击,都会使接收图像失去与原水印图像的同步,从而无法检测出水印。提出一种利用几何矩对原始图像和接收图像进行归一化处理的方法,使水印的嵌入和检测都在同步的基础上进行。该方法具有鲁棒性好、校正精度高、运算简单的特点,同时检测端不需要原始图像。实验证明本算法对翻转、旋转和尺度变化等几何攻击具有很好的鲁棒性。  相似文献   

9.
基于伪Zernike矩的抗几何攻击图像水印   总被引:1,自引:5,他引:1  
针对几何攻击容易使常规水印算法检测失败的问题,利用图像伪Zernike矩的幅度具有旋转不变的性质,提出了一种抗几何攻击图像水印算法(GWPZM).首先计算图像的伪Zernike矩,选择适宜于嵌入水印的矩进行幅度改变量测试.筛选出最优矩集合,根据水印比特自适应地修改集合中的矩,并对差矢量进行伪Zernike矩重构,通过将重构图像在空域迭加到原始图像中嵌入水印.水印检测时,首先计算受攻击图像的伪Zernike矩,以最优矩集合作为密钥,通过与原始图像比较矩的幅度提取水印.实验结果表明,GWPZM算法能够抵抗旋转、缩放攻击、二者组合攻击以及JPEG压缩、噪声等常规攻击.  相似文献   

10.
针对目前通信技术中,鲁棒性水印技术面临的抗几何攻击这一难题,且现有鲁棒性水印算法不足,文中提出归一化鲁棒性的盲水印算法,以恢复水印同步性为目的,通过整合图像归一化技术、小波变换、加密置乱和盲水印等处理方法,并利用图像归一化所具有的几何不变性,研究能抵抗几何攻击的鲁棒性水印算法。实验结果表明:嵌入水印图像对常规的信号处理和几何攻击有很强的鲁棒性,尤其在同步攻击的放缩和拉伸攻击及旋转攻击方面效果更为显著。文中所提出的水印算法大大提高了现有水印算法对于旋转攻击的鲁棒性,有很重要的现实意义。  相似文献   

11.
Most proposed digital watermarking algorithms are sensitive to geometric attacks because the synchronization information of watermark embedding and detection is destroyed. In this letter a novel synchronization recovery scheme based on image normalization is proposed. The presented scheme does not require the original image and can be applied to various watermark systems. A wavelet-based watermarking scheme is proposed as an example and experimental results show that it is robust to geometric attacks.  相似文献   

12.
Digital watermarking robust to geometric distortions.   总被引:23,自引:0,他引:23  
In this paper, we present two watermarking approaches that are robust to geometric distortions. The first approach is based on image normalization, in which both watermark embedding and extraction are carried out with respect to an image normalized to meet a set of predefined moment criteria. We propose a new normalization procedure, which is invariant to affine transform attacks. The resulting watermarking scheme is suitable for public watermarking applications, where the original image is not available for watermark extraction. The second approach is based on a watermark resynchronization scheme aimed to alleviate the effects of random bending attacks. In this scheme, a deformable mesh is used to correct the distortion caused by the attack. The watermark is then extracted from the corrected image. In contrast to the first scheme, the latter is suitable for private watermarking applications, where the original image is necessary for watermark detection. In both schemes, we employ a direct-sequence code division multiple access approach to embed a multibit watermark in the discrete cosine transform domain of the image. Numerical experiments demonstrate that the proposed watermarking schemes are robust to a wide range of geometric attacks.  相似文献   

13.
Watermark robustness to geometric attacks is still a challenging research field. In this paper, a novel robust image watermarking scheme is proposed for resisting such attacks. Watermark synchronization is first achieved by local invariant regions which can be generated using scale normalization and image feature points. The watermark is embedded into all the local regions repeatedly in spatial domain. During embedding, each circular region is first divided into homocentric cirque regions. Then the watermark bits are embedded by quantizing each cirque region into an “odd” or “even” region using odd–even quantization. In the decoder, an odd–even detector (OED) is designed to extract the watermark from the distorted image directly. Localized embedding achieves good invisibility and repeated insertion enhances watermark robustness. Simulation results show that the proposed scheme is robust to both geometric attacks and traditional signal processing attacks.  相似文献   

14.
We present a technique for irreversible watermarking approach robust to affine transform attacks in camera, biomedical and satellite images stored in the form of monochrome bitmap images. The watermarking approach is based on image normalisation in which both watermark embedding and extraction are carried out with respect to an image normalised to meet a set of predefined moment criteria. The normalisation procedure is invariant to affine transform attacks. The result of watermarking scheme is suitable for public watermarking applications, where the original image is not available for watermark extraction. Here, direct-sequence code division multiple access approach is used to embed multibit text information in DCT and DWT transform domains. The proposed watermarking schemes are robust against various types of attacks such as Gaussian noise, shearing, scaling, rotation, flipping, affine transform, signal processing and JPEG compression. Performance analysis results are measured using image processing metrics.  相似文献   

15.
一种基于图像特征点的数字水印嵌入方法   总被引:1,自引:0,他引:1       下载免费PDF全文
王向阳  邬俊  侯丽敏 《电子学报》2007,35(7):1318-1322
如何有效抵抗去同步攻击是数字图像水印研究领域的热点问题之一.本文提出了一种可有效抵抗去同步攻击的图像水印新算法.该算法首先利用Harris-Laplace算子从载体图像中提取尺度空间特征点;再结合特征尺度自适应确定局部特征区域;最后,采纳DFT中频幅值量化策略将水印重复嵌入到多个不相交的局部特征区域中.检测时,利用特征点实现水印的重同步,无须求助于原始图像.仿真结果表明,本文算法不仅具有较好的透明性,而且对常规信号处理和去同步攻击均具有较好的鲁棒性.  相似文献   

16.
Geometric Invariance in image watermarking   总被引:19,自引:0,他引:19  
Surviving geometric attacks in image watermarking is considered to be of great importance. In this paper, the watermark is used in an authentication context. Two solutions are being proposed for such a problem. Both geometric and invariant moments are used in the proposed techniques. An invariant watermark is designed and tested against attacks performed by StirMark using the invariant moments. On the other hand, an image normalization technique is also proposed which creates a normalized environment for watermark embedding and detection. The proposed algorithms have the advantage of being robust, computationally efficient, and no overhead needs to be transmitted to the decoder side. The proposed techniques have proven to be highly robust to all geometric manipulations, filtering, compression and slight cropping which are performed as part of StirMark attacks as well as noise addition, both Gaussian and salt & pepper.  相似文献   

17.
基于奇偶量化的空域抗几何攻击图像水印算法   总被引:7,自引:0,他引:7  
数字水印对几何攻击的鲁棒性问题一直没有得到很好的解决,该文提出了一种能够抵抗RST(旋转、缩放、平移)攻击,局部剪切以及常规信号处理攻击的多比特图像水印算法。该文利用尺度不变特征变换(SIFT)进行水印信号的同步;设计了一种圆环形的水印模式,并在空域采用奇偶量化嵌入水印;并设计了一种奇偶检测器提取水印。实验结果表明该算法能获得很好的图像质量,且能十分有效地抵抗各种几何攻击以及常规的压缩,滤波等攻击。  相似文献   

18.
基于ICA的智能数字水印技术   总被引:3,自引:0,他引:3  
该文提出了一种基于智能信息分析方法--独立分量分析的智能数字水印新算法。水印嵌入之前先对其进行预处理,嵌入过程可以在图像任意作用域中实现,并给出了小波域中的一种闭环嵌入方法。水印嵌入的强度由小波域视觉模型决定。在不需要任何原始图像、水印和攻击类型等信息的情况下,该算法不仅可以检测到水印而且可以完全提取水印,实现了真正意义上的水印盲检测,并对多个水印嵌入的情况也可以进行水印提取。水印检测的精确程度取决于图像与水印之间的独立性以及所采用的密钥。实验过程中攻击由通用水印测试软件Stirmark产生,实验数据证明本文提出的水印算法对Stirmark提供的各种攻击剪切、滤波、图象压缩、删行、删列、几何攻击以及多种攻击同时存在时都具有很好的鲁棒性。  相似文献   

19.
In order to reduce the time complexity and improve the reconstruction performance of traditional method for Radial Harmonic Fourier Moments (RHFMs), we introduce a fast and precise method by using FFT and based on the which, this paper proposes a novel image watermarking algorithm which is robust to geometric attacks. We firstly compute the RHFMs of the original image by using the proposed method and select the robust RHFMs which are suitable for watermark embedding. Then the watermark is embedded by modifying the magnitudes of RHFMs based on quantization. In the decoder, the watermark can be extracted from the magnitudes of RHFMs directly without using the original image. Simulation results show the proposed algorithm provides an excellent watermark invisibility and can be resilient to geometric attacks and common image processing attacks effectively.  相似文献   

20.
半脆弱水印因为在多媒体内容认证方面的重要作用而受到人们密切的关注。为了能够区分偶然攻击与恶意篡改,半脆弱水印需要对一般的内容保护图像操作有一定的鲁棒性。基于此,提出了遗传算法的半脆弱数字图像水印方法。根据图像局部区域的类型自适应地确定图像局部区域的水印嵌入强度,GA用来优化水印的嵌入位置。实验结果证实了所提的算法的优点,表明该方法具有较好的不可见性和鲁棒性,并实现了印刷图像载体版权保护。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号