首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
基于图像特征的鲁棒性数字水印算法   总被引:1,自引:0,他引:1  
陈海鹏  秦俊  申铉京  王友卫 《计算机科学》2011,38(5):258-260,264
为了同时实现图像版权保护和图像内容的真伪性鉴定,提出了一种基于数字图像特征的鲁棒性数字水印算法。先利用Hessian变换提取宿主图像的特征区域,并根据每个特征区域内各个像素点的局部方向,将用于版权保护的水印信息嵌入到这些特征区域中。同时,向图像中除特征区域之外的区域嵌入用于图像内容真伪鉴定的脆弱性水印。水印提取过程是水印嵌入的逆过程,在不需要原始图像的情况下实现了版权水印和内容鉴定水印的提取。实验表明,该算法能抵杭大多数的移除攻击等几何篡改,对篡改发生的位置定位效果良好。  相似文献   

2.
In this paper, a novel quantum representation and watermarking scheme based on the controlled rotation of qubits are proposed. Firstly, a flexible representation for quantum color image (FRQCI) is proposed to facilitate the image processing tasks. Some basic image processing operations based on FRQCI representation are introduced. Then, a novel watermarking scheme for quantum images is presented. In our scheme, the carrier image is stored in the phase \(\theta \) of a qubit; at the same time, the watermark image is embedded into the phase \(\phi \) of a qubit, which will not affect the carrier image’s visual effect. Before being embedded into the carrier image, the watermark image is scrambled to be seemingly meaningless using quantum circuits, which further ensures the security of the watermark image. All the operations mentioned above are implemented by the controlled rotation of qubits. The experimental results on the classical computer show that the proposed watermarking scheme has better visual quality under a higher embedding capacity and outperforms the existing schemes in the literature.  相似文献   

3.
4.
In this paper, a novel watermarking scheme for quantum images based on Hadamard transform is proposed. In the new scheme, a unitary transform controlled by a classical binary key is implemented on quantum image. Then, we utilize a dynamic vector, instead of a fixed parameter as in other previous schemes, to control the embedding process. The dynamic embedding vector is decided by both the carrier quantum image and the watermark image, which is only known by the authorized owner. The proposed scheme is analyzed from visual quality, computational complexity, and payload capacity. Analysis and results show that the proposed scheme has better visual quality under a higher embedding capacity and lower complexity compared with other schemes proposed recently.  相似文献   

5.
目的 随着互联网技术的飞速发展,彩色数字图像带来极大便利的同时,也产生了一些篡改、剽窃等侵权行为;同时,几何处理对含水印载体的破坏使水印盲检测的难度增加,因此,本文提出一种基于汉明码和图像矫正的彩色图像盲水印方法,旨在解决当前图像版权保护的难点问题。方法 嵌入水印时,使用仿射变换加密彩色水印,并将已加密的信息编为汉明码,然后利用特征值分解计算出像素块的全部特征值,并通过对特征值绝对值的和进行量化来完成水印的嵌入;提取水印时,利用图像的几何属性对多种几何攻击后的图像进行判断、矫正,并借助量化技术提取水印。结果 基于彩色图像标准数据库,将本文方法与7种相关方法进行了对比实验:在不可见性方面,与LU分解的水印方法相比,本文算法峰值信噪比(peak signal-to-noise ratio,PSNR)提高了4 dB;在常规攻击鲁棒性方面,与Schur分解的最新方法相比,本文算法平均归一化互相关(normalized cross-correlation,NC)的值稍有提高;在几何攻击鲁棒性方面,本文算法NC值具有一定的优势;同时,本文算法的水印容量达到了0.25 bit/像素,密钥空间达到了2432,运行时间仅需3 s左右。结论 所提方法不仅具有较好的水印不可见性和较强的鲁棒性,而且具有较大的水印容量、较高的安全性和实时性。  相似文献   

6.
针对医疗图像、遥感图像等敏感数字图像在认证水印的嵌入过程中不能引入失真的特点,提出一种基于可逆数字水印的图像完整性认证方案:首先提取图像特征,将其作为hash函数的输入;再用图像发送者的私钥对hash值进行数字签名;最后将数字签名作为水印数据,利用图像相邻像素点差值直方图的特征,轻微改变图像像素点的灰度值来可逆嵌入水印数据。方案实现简单,水印嵌入后图像失真小,认证通过后还可以完全恢复原始图像。理论和实验证明水印嵌入后,PSNR值能达到51.14dB以上。  相似文献   

7.
为实现多媒体图像的知识产权保护,进行有效的防篡改认证,设计了复合数字水印认证系统。利用该系统可以对单个或批量的多媒体图像嵌入鲁棒性水印及脆弱性水印。仿真实验证明,多媒体数字图像嵌入复合数字水印后和原始图像几呼一样,水印隐蔽效果好;当图像被篡改后,用该系统进行水印认证,可以清晰看到版权标志信息是否被篡改以及定位显示篡改的内容。  相似文献   

8.
High capacity, secure, reversible watermarking scheme using a color image for image authentication and tampered detection is still an important area of research. In this investigation, we have proposed a weighted matrix based reversible watermarking scheme using the color image which provides image authentication and tampered detection. Here, we decomposed the original image into R, G, B color components and partitioned into (3 × 3) pixel blocks then we performed the sum of entry-wise-multiplication operations using a modified weighted matrix to embed the watermark. The watermark embedding locations are stored within an index file to enhance security, increase data hiding capacity, gain good visual quality, achieve reversibility and confirm authenticity. The proposed watermarking scheme not only perform authentication and tampered detection but also improved both data embedding capacity up to 8.00 (bpp) as well as increase visual quality measured by PSNR, 50.03 (dB). Finally, the scheme is compared with other existing state-of-the-art methods and gives a reasonably better performance in terms of visual quality and hiding capacity. Our scheme has been evaluated through various steganographic analysis and observed that the scheme is secure and robust against various attacks.  相似文献   

9.
针对目前大多数彩色图像数字水印算法中嵌入的水印是二值灰度图像且为提取水印时需要原始宿主图像或原始水印的现状,本文提出了一种将彩色水印嵌入到彩色宿主图像中的盲水印算法。该算法分析了矩阵Schur分解的基本特征,通过修改其上三角矩阵对角线上的最大能量元素来嵌入水印,水印提取过程达到盲提取的目的。实验结果表明,该水印方案不但嵌入和提取的速度快,而且具有较好的水印不可见性(峰值信噪比达到40dB以上)和较强的鲁棒性。  相似文献   

10.
一种基于可逆脆弱水印的图像认证算法   总被引:1,自引:0,他引:1  
通过向图像嵌入水印,可实现图像的真伪鉴定。然而由于量化误差、信息嵌入及截断误差等原因,含水印图像在被确认为真实无误后,无法将原始图像恢复出来。采用可逆水印可以解决这一问题。该文提出了一种可逆脆弱水印算法,它可对图像进行真伪认证,并在图像通过认证后,恢复出原始图像。  相似文献   

11.
Supporting safe and resilient authentication and integrity of digital images is of critical importance in a time of enormous creation and sharing of these contents. This paper presents an improved digital image watermarking model based on a coefficient quantization technique that intelligently encodes the owner’s information for each color channel to improve imperceptibility and robustness of the hidden information. Concretely, a novel color channel selection mechanism automatically selects the optimal HL4 and LH4 wavelet coefficient blocks for embedding binary bits by adjusting block differences, calculated between LH and HL coefficients of the host image. The channel selection aims to minimize the visual difference between the original image and the embedded image. On the other hand, the strength of the watermark is controlled by a factor to achieve an acceptable tradeoff between robustness and imperceptibility. The arrangement of the watermark pixels before shuffling and the channel into which each pixel is embedded is ciphered in an associated key. This key is utterly required to recover the original watermark, which is extracted through an adaptive clustering thresholding mechanism based on the Otsu’s algorithm. Benchmark results prove the model to support imperceptible watermarking as well as high robustness against common attacks in image processing, including geometric, non-geometric transformations, and lossy JPEG compression. The proposed method enhances more than 4 dB in the watermarked image quality and significantly reduces Bit Error Rate in the comparison of state-of-the-art approaches.  相似文献   

12.
In recent years, end users can easily capture digital images using several devices, such as smartphones, mobile devices and digital imaging cameras, allowing such images to be easily copied, manipulated, transmitted or format converted without any restrictions. This fact suggests the necessity to develop digital tools, such as digital watermarking, to solve the issues associated with copyright protection and ownership authentication of digital images. To claim the ownership of a digital image, we propose a camouflaged, unseen-visible watermarking technique based on luminance and texture properties in conjunction with an image enhancement criterion. The proposed method has some advantages over invisible and visible watermarking methodologies in terms of readability and imperceptibility of the watermark, respectively. The experimental results demonstrate that the proposed scheme is effective and applicable for digital images on a variety of topics, including natural scenes and man-made objects, both indoors and outdoors. A comparison with previously reported methods based on unseen-visible watermarking techniques is also provided.  相似文献   

13.
The drawbacks of the current authentication watermarking schemes for JPEG images, which are inferior localization and the security flaws, are firstly analyzed in this paper. Then, two counterferiting attacks are conducted on them. To overcome these drawbacks, a new digital authentication watermarking scheme for JPEG images with superior localization and security is proposed. Moreover, the probabilities of tamper detection and false detection are deduced under region tampering and collage attack separately. For each image block, the proposed scheme keeps four middle frequency points fixed to embed the watermark, and utilizes the rest of the DCT coefficients to generate 4 bits of watermark information. During the embedding process, each watermark bit is embedded in another image block that is selected by its corresponding secret key. Since four blocks are randomly selected for the watermark embedding of each block, the non-deterministic dependence among the image blocks is established so as to resist collage attack completely. At the receiver, according to judging of the extracted 4 bits of watermark information and the corresponding 9-neighbourhood system, the proposed scheme could discriminate whether the image block is tampered or not. Owing to the diminishing of false detection and the holding of tamper detection, we improve the accuracy of localization in the authentication process. Theoretic analysis and simulation results have proved that the proposed algorithm not only has superior localization, but also enhances the systematic security obviously. Supported by the National Natural Science Foundation of China (Grant No. 60572027), the Program for New Century Excellent Talents in University of China (Grant No. NCET-05-0794), the Sichuan Youth Science & Technology Foundation (Grant No. 03ZQ026-033), the National Defense Pre-research Foundation of China (Grant No. 51430804QT2201) and the Application Basic Foundation of Sichuan Province, China (Grant No. 2006 J13-10)  相似文献   

14.
针对彩色数字图像局部区域内容保护和认证,研究了彩色数字图像的脆弱数字水印.为了保证水印的安全性,利用三维二值混沌序列对原始二值水印图像进行加密,对提取的加密二值水印图像进行解密.嵌入载体图像的水印和从嵌入水印的图像中提取的水印均是加密水印.将彩色数字图像中被保护区域的三个分量的小波变换域分别嵌入加密水印,以保护其内容的完整性和不可篡改性.采用模运算实现水印的嵌入和盲提取.理论分析和实验结果表明,该脆弱水印算法对彩色数字图像保护区域内的任何篡改,都能够正确地检测和定位.  相似文献   

15.
为增强水印图像的视觉隐秘性并抵御几何失真能力,设计NSST变换耦合粒子群优化的鲁棒水印算法。提取图像对应的Y(亮度)、U(色度)、V(浓度)成分;引入非下采样Shearlet变换(nonsubsampled Shearlet transform,NSST),对Y、U和V实施分解,形成对应的低频子带,将其分割为若干个子块;建立粒子群算法的适应度函数,优化子块的嵌入强度;构建水印嵌入方法,将水印信息隐藏到NSST系数中;构建训练图像集,计算这些样本的多元极谐变换(quaternion polar harmonic transorm,QPHT)矩,从中确定8个QPHT系数;训练支持向量机,预测攻击参数;构建水印检测方法,从校正图像中提取水印。测试数据表明,较已有的鲁棒水印技术而言,所提方案具有更高的不可感知性与抵御几何攻击的能力。  相似文献   

16.
桑军  王成良  李宗志  祝伟华 《计算机应用》2005,25(10):2348-2350
二元纯位相滤波器(BPOF)数字水印是一种用于图像真实性认证的半脆弱水印技术。它由图像离散Fourier变换(DFT)的幅值和相位分别得到幅值位平面和BPOF,并将BPOF作为水印嵌入到幅值位平面中。本文〖BP)〗在简要分析基于单一幅值位平面嵌入BPOF水印的基础上,讨论了使用多个幅值位平面嵌入水印并进行了性能分析。通过仿真实验得到了优化方案:以多个幅值位平面嵌入水印,而从其中的最高位平面中提取水印可以明显提高水印性能。  相似文献   

17.
基于RS码的二值图像认证及篡改定位算法   总被引:2,自引:1,他引:1  
用于二值图像内容认证和篡改定位的数字水印技术具有重要的实际价值,但却面临着二值图像像素单一、嵌入容量有限且分布不均匀等问题.根据纠错码--RS码的检错原理,提出一种用于二值图像内容认证和篡改定位的脆弱的数字水印算法.该算法利用二值图像的像素值来构造RS码,通过嵌入其校验码来实现对图像的内容认证和篡改定位,一方面保证了其优越的检错能力;另一方面,具有较低的嵌入负载.经实验证明,该算法能有效地检测出二值图像是否被篡改以及篡改发生的位置.此外,在水印信号的生成和提取过程中使用了密钥,确保了水印的安全.  相似文献   

18.
针对现有遥感影像数字水印算法多为全局水印算法,抵抗旋转、行列剪切、水平镜像以及联合几何攻击能力较差,提出一种基于Harris-Laplace特征区域的局部化遥感影像水印算法。算法依据密钥生成一个随机序列,对其实施二值化,并选取一段作为待嵌入的数字水印;在宿主遥感影像中提取Harris-Laplace特征点,并依据其确定水印嵌入特征区域;最后,根据待嵌入的水印信息,将所选特征区域进行圆环划分,利用奇偶量化方法将水印嵌入其中。实验证明该算法对JEPG压缩、噪声及滤波等常规信号处理具有较好鲁棒性的同时,能够更好地抵抗旋转、缩放、平移及其联合等几何攻击。  相似文献   

19.
结合人眼视觉系统的感知特性与图像的局部相关特性,提出了一种基于模糊聚类的小波域数字图像水印嵌入方案.该方案首先对原始载体图像实施小波变换;然后结合视觉感知特性,在小波域内进行模糊C-均值(FCM)聚类分析,自适应确定出数字水印的嵌入位置与嵌入强度;最后利用图像自身的局部相关性,通过修改小波系数值,将数字水印嵌入到宿主图像内.该方案在提取数字水印信息时,不需要原始载体图像.实验结果表明,该自适应小波域图像水印嵌入技术不仅具有较好的透明性,而且对诸如叠加噪声、JPEG压缩、平滑滤波、几何剪切、图像增强、马赛克效果等攻击均具有较好的鲁棒性.  相似文献   

20.
A novel fractal image watermarking   总被引:3,自引:0,他引:3  
A novel watermarking method is proposed to hide a binary watermark into image files compressed by fractal block coding. This watermarking method utilizes a special type of orthogonalization fractal coding method where the fractal affine transform is determined by the range block mean and contrast scaling. Such orthogonalization fractal decoding is a mean-invariant iteration. In contrast, the fractal parameters of classical fractal compression are very sensitive to any change of domain block pool and to common signal and geometric distortion. Hence, it is impossible to directly place a watermark in fractal parameters. The proposed watermark embedding procedure inserts a permutated pseudo-random binary sequence into the quantized range block means. The watermark is detected by computing the correlation coefficient between the original and the extracted watermark. Experimental results show that the proposed fractal watermarking scheme is robust against common signal and geometric distortion such as JPEG compression, low-pass filtering, rescaling, and clipping.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号