首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
以回归型支持向量机(Support Vector Regression,SVR)理论为基础,提出了一种新的基于SVR的小波域盲水印算法。算法核心思想是先对图像进行小波分解,然后利用图像小波分解后的子图系数之间的关系和图像局部相关性获得SVR训练模型,并利用SVR训练模型在小波域嵌入和提取水印。该算法以保证鲁棒性和透明性的良好平衡为前提,实现了数字水印的盲检测。仿真实验表明,该文算法不仅具有较好的透明性,而且对JPEG压缩和一般的图像处理具有很强的鲁棒性,其整体性能明显优于现有基于SVM的空间域上的水印算法。  相似文献   

2.
In this article, a new DWT-SVD and DCT with Arnold Cat Map encryption based robust and blind watermarking scheme is proposed for copyright protection. The proposed scheme solves the most frequently occurring watermarking security problems in Singular Value Decomposition (SVD) based schemes which are unauthorized reading and false-positive detection. This scheme also optimizes fidelity and robustness characteristics. The grey image watermark splits into two parts using four bits MSBs and four bits LSBs of each pixel. Discrete Cosine Transform (DCT) coefficients of these MSBs and LSBs values are embedded into the middle singular value of each block having size 4 × 4 of the host image’s one level Discrete Wavelet Transform (DWT) sub-bands. The reason for incorporating Arnold Cat Map in the proposed scheme is to encode the watermark image before embedding it in the host image. The proposed scheme is a blind scheme and does not require the choice of scaling factor. Thus, the proposed scheme is secure as well as free from the false positive detection problem. The proposed watermarking scheme is tested for various malicious and non-malicious attacks. The experimental results demonstrate that the scheme is robust, imperceptible and secure to several attacks and common signal processing operations.  相似文献   

3.
针对扩频水印的盲提取问题,提出了一种在数字音频中扩频水印的盲提取算法。算法将扩频后的水印信息隐藏在音频文件小波分解的低频系数再做离散余弦变换(DCT)后的第5个系数中。提取时在扩频序列及其长度均未知的情况下,采用二次谱和奇异值分解(SVD)的方法对嵌入时使用的扩频参数进行估计,实现了数字音频中扩频水印的盲提取。仿真实验表明,所提算法在未知扩频参数的情况下能提取出归一化系数(NC)为1的水印图像并且水印的鲁棒性也很强,在加噪、低通滤波等攻击下估计出的扩频序列正确率能达到90%以上,恢复出的水印图像清晰可见,归一化系数都在0.98以上。  相似文献   

4.
This paper proposes a blind watermarking algorithm based on the significant difference of wavelet coefficient quantization for copyright protection. Every seven nonoverlap wavelet coefficients of the host image are grouped into a block. The largest two coefficients in a block are called significant coefficients in this paper and their difference is called significant difference. We quantized the local maximum wavelet coefficient in a block by comparing the significant difference value in a block with the average significant difference value in all blocks. The maximum wavelet coefficients are so quantized that their significant difference between watermark bit 0 and watermark bit 1 exhibits a large energy difference which can be used for watermark extraction. During the extraction, an adaptive threshold value is designed to extract the watermark from the watermarked image under different attacks. We compare the adaptive threshold value to the significant difference which was quantized in a block to determine the watermark bit. The experimental results show that the proposed method is quite effective against JPEG compression, low-pass filtering, and Gaussian noise; the PSNR value of a watermarked image is greater than 40 dB.   相似文献   

5.
To optimize the tradeoff between imperceptibility and robustness properties, this paper proposes a robust and invisible blind image watermarking scheme based on a new combination of discrete cosine transform (DCT) and singular value decomposition (SVD) in discrete wavelet transform (DWT) domain using least-square curve fitting and logistic chaotic map. Firstly cover image is decomposed into four subbands using DWT and the low frequency subband LL is partitioned into non-overlapping blocks. Then DCT is applied to each block and several particular middle frequency DCT coefficients are extracted to form a modulation matrix, which is used to embed watermark signal by modifying its largest singular values in SVD domain. Optimal embedding strength for a specific cover image is obtained from an estimation based on least-square curve fitting and provides a good compromise between transparency and robustness of watermarking scheme. The security of the watermarking scheme is ensured by logistic chaotic map. Experimental results demonstrate the better effectiveness of the proposed watermarking scheme in the perceptual quality and the ability of resisting to conventional signal processing and geometric attacks, in comparison with the related existing methods.  相似文献   

6.
基于Hilbert扫描和SVD的小波域图像水印算法   总被引:1,自引:0,他引:1       下载免费PDF全文
为了提高水印的安全性、鲁棒性和不可见性,提出了一种基于Hilbert扫描和SVD(Singular Value Decomposition,奇异值分解)的小波域图像水印技术。算法以一幅有意义的二值水印图像为水印信号。首先对原始图像进行一层小波变换,对低频分量进行图像分块,并对每一个图像块进行SVD。利用了SVD的单向非对称性和正交矩阵的性质,给出了一种自适应水印方案。同时,利用了Hilbert扫描能很好地保持图像空间局部连接性的特点。然后,利用图像的局部统计特征自适应地修改阈值,利用两个阈值严格控制系数的修改程度,使算法达到不可见性和鲁棒性之间的最优平衡。水印的提取无需原始图像的参与,达到了真正的盲水印。实验结果表明,该算法是有效的,对常见的图像处理操作具有较强的鲁棒性。  相似文献   

7.
基于Schur分解的Contourlet域水印方案   总被引:1,自引:0,他引:1       下载免费PDF全文
刘鹏  魏娟  杨峻 《计算机工程》2011,37(16):147-148
基于奇异值分解的数字水印方案计算量大、算法实现困难,为此,提出一种基于Schur分解的Contourlet域数字水印方案。将载体图像进行Contourlet变换,利用矩阵分裂理论得到分块对称矩阵,对每个对称矩阵进行Schur分解得到对角矩阵,通过量化对角元素的方法实现水印嵌入。水印提取是嵌入的逆过程。实验结果表明,该水印方案嵌入和提取的速度快,具有较好的不可见性和鲁棒性。  相似文献   

8.
In this paper, a novel blind image watermarking scheme based on QR decomposition is proposed to embed color watermark image into color host image, which is significantly different from using the binary or gray image as watermark. When embedding watermark, the 24-bits color host image with size of 512?×?512 is divided into non-overlapping 4?×?4 pixel blocks and each pixel block is decomposed by QR. Then, according to the watermark information and the relation between the second row first column coefficient and the third row first column coefficient in the unitary matrix Q, the 24-bits color watermark image with size of 32?×?32 is embedded into the color host image. In addition, the new element compensatory method is used in the upper-triangle matrix R for reducing the visible distortion. When extracting watermark, only the watermarked image is needed. Compared with other SVD-based methods, the proposed method does not have the false-positive detection problem and has lower computational complexity, that is, the average running time of the proposed method only needs 1.481403 s. The experimental results show that the proposed method is robust against most common attacks including JPEG compression, JPEG 2000 compression, low-pass filtering, cropping, adding noise, blurring, rotation, scaling and sharpening et al. Compared with some related existing methods, the proposed algorithm has stronger robustness and better invisibility.  相似文献   

9.
基于奇异值分解的Contourlet域稳健性数字水印算法*   总被引:2,自引:0,他引:2  
提出了一种基于奇异值分解的Contourlet域数字水印算法。对置乱后的水印图像进行奇异值分解,在Contourlet域中选取合适的方向子带,利用得到的奇异值来调制系数矩阵,然后通过逆变换获取嵌入水印后的图像。在水印提取中只需要保存原始图像的奇异值,实现了水印的近似盲提取。最后,进行了一系列的攻击实验,证明了与传统小波域水印算法相比,该算法的不可见性和鲁棒性都有了较大的提高。  相似文献   

10.
传统的可恢复水印算法往往是通过增加嵌入水印容量来提高篡改图像恢复质量,这将导致嵌入水印后图像质量的下降。针对这一问题,提出使用整数提升小波构建变容量恢复水印算法。该算法根据2×2图像块的纹理特征,使用小波系数生成长度可变的恢复水印,加密后嵌入其他映射图像块低位。使用恢复水印,结合相邻块特征进行篡改图像的检测与恢复。实验结果表明新算法能很好地满足水印不可见性要求,能有效抵抗剪切、拼贴及涂鸦等攻击,能更好地实现篡改图像的恢复。  相似文献   

11.
A reversible and visible image watermarking scheme extracts a visibly embedded binary watermark image and recovers the original cover image. This paper presents a reversible and visible image watermarking scheme that embeds visible watermarks into a part of the cover image, called the embedded region R, and embeds required binary strings into the whole image through the conventional difference-expansion method. The size of the embedded visible watermark is determined by the coefficient k; a large k value leads to a large embedded region for the visible watermark. The embedded region R is first segmented to non-overlapped k×k blocks, and each block is related to one bit of the watermark image. For those blocks that are related to the logo bits of the watermark image, these k×k blocks are adjusted by the proposed dynamic pixel value mapping method for highly visual detection. The binary bit string S, composed of the binary watermark image and LSB bits of the logo watermark bits’ corresponding k×k blocks, is embedded into the cover image using the conventional difference-expansion method. Experimental results show that the watermark is clearly embedded into the embedded region R and that the distortion of the reversible embedding is limited.  相似文献   

12.
为了提高数字水印的鲁棒性以及水印嵌入位置的保密性,提出了一种基于Logistic混沌映射和整数小流变换—奇异值分解(IWT-SVD)量化的盲鲁棒水印算法:对二值水印图像进行Arnold置乱,对原始载体图像进行8×8分块,利用生成的Logistic混沌序列选择嵌入水印的图像块,充分保证了水印嵌入位置的保密性;对选中的图像块进行二级IWT分解,对得到的二级低频子带系数进行SVD;将置乱后的水印信息嵌入.算法不需要原始载体图像,实现了水印的盲提取,更具实用性.仿真实验结果表明:算法对常规图像处理操作、压缩攻击和剪切攻击均具有较强的稳健性.  相似文献   

13.
In this paper, a robust blind watermarking technique, based on block-based DCT coefficient modification is proposed. The difference between two DCT coefficients of the adjacent blocks at the same position is calculated. Depending upon the watermark bit to be embedded; this difference is brought in a particular predefined range which is achieved by modifying one of the two DCT coefficients. The amount of modification to a DCT coefficient of a block depends upon the scaling variable, DC coefficient and median of certain zig-zag ordered AC coefficients of that block. The robustness of the proposed scheme has been examined for various singular and hybrid attacks. Comparison results reveal that the proposed technique has a higher degree of robustness against various singular and hybrid attacks. Further a watermark of good quality is extracted even after various simultaneous attacks on the system.  相似文献   

14.
用于图像认证的变容量恢复水印算法   总被引:3,自引:0,他引:3  
兼顾水印嵌入容量和安全性,提出一种水印容量可变的数字图像可恢复水印算法.该算法提取2×2图像块特征生成变容量恢复水印——平滑块6比特,纹理块12比特.图像块的恢复水印基于密钥随机嵌入在其它图像块的低有效位,通过比较图像块特征与相应恢复水印重构的块特征并结合邻域特征判定图像块的真实性,变容量恢复水印用尽可能少的比特数保存足够的图像块信息,仅被嵌入一次且同时用于篡改检测与恢复,不仅有效降低了水印嵌入容量,而且提高了算法抵抗恒均值攻击的能力.实验仿真结果表明,该算法得到的含水印图像和恢复图像的质量好,且能有效抵抗拼贴攻击、恒均值攻击等已知伪造攻击.  相似文献   

15.
针对数字图像的版权保护问题,提出一种基于Fibonacci置乱的小波域数字图像盲水印方案。将原图像中的感兴趣区域(ROI)作为水印来源,以此提高水印的隐蔽性。在水印嵌入过程中,将原图像进行分块,对每个块进行Fibonacci置乱和离散小波变换(DWT),选择出低频子带,用于水印嵌入。同时,对水印也执行DWT,选择出低频子带,通过Fibonacci置乱得到置乱矩阵,将水印的置乱矩阵嵌入到主图像的块中。在水印提取过程中,根据嵌入过程中设定的秘钥,通过逆Fibonacci置乱和逆DWT过程提取水印。在多种图像攻击下的仿真结果表明,该水印方案具有较高的安全性、鲁棒性和隐蔽性。  相似文献   

16.
This paper presents a new semi-blind reference watermarking scheme based on discrete wavelet transform(DWT) and singular value decomposition(SVD) for copyright protection and authenticity. We are using a gray scale logo image as watermark instead of randomly generated Gaussian noise type watermark. For watermark embedding, the original image is transformed into wavelet domain and a reference sub-image is formed using directive contrast and wavelet coefficients. We embed watermark into reference image by modifying the singular values of reference image using the singular values of the watermark. A reliable watermark extraction scheme is developed for the extraction of watermark from distorted image. Experimental evaluation demonstrates that the proposed scheme is able to withstand a variety of attacks. We show that the proposed scheme also stands with the ambiguity attack also.  相似文献   

17.

Most schemes exhibit low robustness due to LSB’s (Least Significant Bit) and MSB’s (Most Significant Bit) based information hiding in the cover image. However, most of these IW schemes have low imperceptibility as the cover image distortion reveals to the attacker due to information hiding in MSB’s. In this paper, a hybrid image watermarking scheme is proposed based on integrating Robust Principal Component Analysis (R-PCA), Discrete Tchebichef Transform (DTT), and Singular Value Decomposition (SVD). A grayscale watermark image is twisted/scrambled using a 2D Discrete Hyper-chaotic Encryption System (2D-DHCES) to boost up the robustness/heftiness and security. The original cover image is crumbled into sparse components using R-PCA and using DTT the substantial component is additionally decomposed and the watermark will be embedded in the cover image using SVD processing. In DTT, scarcer coefficients hold the utmost energy, also provide an optimum sparse depiction of the substantial image edges and features that supports proficient retrieval of the watermark image even after unadorned image distortion based channel attacks. The imperceptibility and robustness of the proposed method are corroborated against a variety of signal processing channel attacks (salt and pepper noise, multi-directional shearing, cropping, and frequency filtering, etc.). The visual and quantifiable outcomes reveal that the proposed image watermarking scheme is much effective and delivers high forbearance against several image processing and geometric attacks.

  相似文献   

18.
This paper proposes a blind watermarking scheme based on wavelet tree quantization for copyright protection. In such a quantization scheme, there exists a large significant difference while embedding a watermark bit 1 and a watermark bit 0; it then does not require any original image or watermark during watermark extraction process. As a result, the watermarked images look lossless in comparison with the original ones, and the proposed method can effectively resist common image processing attacks; especially for JPEG compression and low-pass filtering. Moreover, by designing an adaptive threshold value in the extraction process, our method is more robust for resisting common attacks such as median filtering, average filtering, and Gaussian noise. Experimental results show that the watermarked image looks visually identical to the original, and the watermark can be effectively extracted.  相似文献   

19.
提升方案小波和DCT下的图像盲水印算法   总被引:5,自引:0,他引:5  
在研究HVS对图像掩蔽特性的基础上,提出一种基于提升方案小波和DCT的彩色图像盲水印算法.首先将宿主图像亮度分量进行基于提升方案的小波分解,然后对其较低频子带进行基于分块的DCT分解,最后将二值图像的水印信息嵌人到各分块DCT域的中频系数中.文中算法结合HVS的掩蔽特性,使得水印信息的嵌人能量具有自适应的特性,从而保证了所嵌人的水印在不可见性的前提下,对常见的一些图像处理操作具有很强的鲁棒性.实验结果验证了文中算法的有效性.  相似文献   

20.
基于第二代Bandelet变换的抗几何攻击图像水印   总被引:2,自引:2,他引:0  
綦科  谢冬青 《自动化学报》2012,38(10):1646-1653
抗几何攻击的鲁棒图像水印设计是目前水印技术研究的难点和热点之一. 文中分析了图像的Bandelet变换特性, 提出了一种以图像特征点矢量集为特征向量的回归支持向量机(Support vector regression, SVR)和第二代 Bandelet变换的抗几何攻击图像水印算法,采取的主要方法包括: 1)在Bandelet变换提取的刻画图像局部特征的几何流系数上, 采用奇偶量化嵌入水印; 2)利用Harris-Laplace算子从归一化的含水印图像中提取具有几何形变鲁棒性的图像特征点,构造特征点矢量集 作为特征向量,应用回归支持向量机对几何变换参数进行训练学习; 3)水印检测时, 先利用SVR训练模型得到待检测图像所受几何攻击的参数并作几何校正,然后通过奇偶检测器盲提取水印.仿真实验表明,所提出的水印算 法不仅具有良好的透明性,而且对常规图像处理、一般性几何攻击和组合攻击均具有良好的鲁棒性.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号