首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
Copyright protection and proof of ownership are two of the main important applications of the digital image watermarking. The challenges faced by researchers interested in digital image watermarking applications lie in the creation of new algorithms to serve those applications and to be resistant to most types of attacks, especially the geometrical attacks. Robustness, high imperceptibility, security, and large capacity are four essential requirements in any watermarking scheme. This paper presents a new image watermarking scheme based on the Redundant Discrete Wavelet Transform (RDWT) and the Singular Value Decomposition (SVD). The gray scale image watermark was embedded directly in the singular values of the RDWT sub-bands of the host image. The scheme achieved a large capacity due to the redundancy in the RDWT domain and at the same time preserved high imperceptibility due to SVD properties. Embedding the watermarking pixel's values without any modification inside the wavelet coefficient of the host image overcomes the security issue. Furthermore, the experimental results of the proposed scheme showed a high level of robustness not only against the image processing attacks but also against the geometrical attacks which are considered as difficult attacks to resist.  相似文献   

2.
基于奇异值分解的半易损水印算法   总被引:21,自引:0,他引:21  
随着数字图像在报刊杂志、医院、法庭中的广泛应用,越来越需要一种有效的图像认证方法,数字水印技术为上述问题提供了一个潜在的解决方案。本文提出了一种基于分组奇异值分解(SVD)的半易损水印技术,算法将经过伪随机排序的二值图像通过量化策略嵌入到分组SVD分解中最大的奇异值点,提取水印信号无需使用原始图像。仿真实验表明水印是不可察觉的,可将JPEG有损压缩同恶意攻击区分开来,能够准确地定位被篡改的图像内容。  相似文献   

3.
一种基于离散余弦变换与奇异值分解的数字图像水印算法   总被引:2,自引:1,他引:2  
刘俊景  蒋华 《微电子学与计算机》2007,24(10):111-114,117
结合奇异值分解(SVD)和离散余弦变换(OCT)的特点,提出了一种基于离散余弦交换与奇异值分解的数字图像水印算法.该算法能够很好地解决透明性和鲁棒性之间的矛盾.算法中采用经过置乱变换的灰度图作为水印,不仅增加了嵌入的信息量,而且提高了水印的安全性.实验结果表明,该算法不仅具有较好的透明性,而且对常见攻击如:叠加噪声、JPEG压缩、滤波以及几何攻击等具有较好的鲁棒性.  相似文献   

4.
基于奇异值分解的近无损可逆数字水印方案   总被引:1,自引:0,他引:1  
赵彦涛 《光电子.激光》2009,(11):1486-1492
提出一种基于奇异值分解(SVD)和可逆信息隐藏的近无损鲁棒水印方法。首先将图像分块,然后进行SVD分解,并将水印嵌入到其进去奇异值的U分量中,最后将可恢复载体图像的信息经可逆信息隐藏方法嵌入到水印图像中,在提取水印和恢复载体图像过程中都不需要原载体图像。实验证明,该算法不仅能使原载体图像近无损恢复,而且能有效地抵抗JPEG压缩、噪声干扰、低通滤波,剪切和旋转等典型的攻击,具有较强的鲁棒性。  相似文献   

5.
Digital watermarking, means of hiding/inserting a message, which can be an image, audio, video or text within the digital media. This hidden/inserting message can be later being extracted or detected for a variety of purposes. In this paper, a novel multi-resolution logo watermarking scheme using fractional M-band wavelet transform (Fr-M-band-WT) is proposed. The watermark is embedded in the multiresolution Fr-M-band-WT coefficients of low frequency bands of the host image using singular value decomposition (SVD). A multi-resolution nature of Fr-M-band-WT is exploited in the process of edge detection. Experimental results of the proposed logo watermarking scheme are compared with the previously available watermarking algorithms, fractional Fourier transform (FrFT), fractional wavelet transform (FrWT). Further, the proposed watermark extraction scheme is also tested on different attacks. The results after being investigated the proposed watermarking scheme shows a significant improvement as compared to other existing methods.  相似文献   

6.
针对图像水印算法在攻击强度较大时鲁棒性差的问题,提出了一种基于图变换(graph-based transform,GBT)、离散小波变换(discrete wavelet transform,DWT)和奇异值分解(singular value decomposition,SVD)的鲁棒图像水印算法。首先对载体图像进行不重叠分块处理,挑选出像素方差值较高的子块进行DWT得到其低频系数矩阵,然后对低频系数矩阵依次进行GBT和SVD得到奇异值矩阵,最后将水印信息嵌入到奇异值矩阵的最大奇异值中。实验结果表明,Pirate图像结构相似度(structural similarity,SSIM)达到0.97以上时,本文算法能有效抵抗噪声、滤波、JPEG压缩、剪切和交换行列等攻击,归一化互相关系数(normalization coefficient,NC)值均在0.9以上。  相似文献   

7.
基于奇异值分解的小波域水印算法   总被引:2,自引:0,他引:2  
结合奇异值分解(SVD)和离散小渡变换(DWT)的特点,提出一种基于SVD的小波域数字图像水印算法。该算法将二值水印图像经过取反置乱后嵌入到原始图像小波中频子带的奇异值中,具有较高的抗攻击能力。仿真实验证明,该算法不仅具有良好的透明性,而且对常见攻击,如:叠加噪声、JPEG压缩、滤波及几何攻击具有较好的鲁棒性。  相似文献   

8.
朱萌  陈青 《电子科技》2016,29(2):12
针对小波变换由于方向性缺乏而无法有效稀疏地表示图像本身几何结构的问题,结合Contourlet变换和奇异值分解的优点,提出了一种Contourlet变换域内基于奇异值分解的数字水印算法。宿主图像经过两层Contourlet分解后,生成一系列多尺度多方向的子带,选取第二层分解中能量最大的子带进行大小为4×4的互不重叠的分块,并进行奇异值分解,再将置乱后的原始二值水印信息嵌入到奇异值矩阵中。实验结果表明,该算法实现简单,透明性良好,对常规攻击和几何攻击具有较强的鲁棒性,且优于一般的小波域算法。  相似文献   

9.
基于奇异值分解的向量替换数字盲水印   总被引:1,自引:0,他引:1  
文章在分析图像的奇异值分解特性的基础上,提出了一种基于奇异值分解的载体奇异向量与水印奇异向量替换的盲水印算法。将载体图像分块进行奇异值分解,用水印分块奇异值分解的左右奇异向量和奇异值向量替换载体的对应向量。根据载体与水印的大小关系将水印循环嵌入,提取时进行平均判决。算法简单易于实现,提取的水印相似度高,可应用于高品质图像的版权保护与认证。  相似文献   

10.
In this paper, a novel optimal watermarking scheme based on singular-value decomposition (SVD) using genetic algorithm (GA) is presented. The singular values (SVs) of the host image are modified by multiple scaling factors to embed the watermark image. Modifications are optimised using GA to obtain the highest possible robustness without losing the transparency. Experimental results show both the significant improvement in transparency and the robustness under attacks.  相似文献   

11.
This paper presents an efficient, robust, and imperceptible video watermarking technique based on singular value decomposition (SVD) performed in the Discrete Wavelet Transform (DWT) domain. In the proposed DWT-based SVD video watermarking method, the video frames are transformed with the DWT using two resolution levels. The high frequency band HH and the middle frequency bands LH and HL are SVD transformed and the watermark is hidden in them. The proposed DWT-based SVD video watermarking method is characterized by two improvements: (1) a cascade of two powerful mathematical transforms; the Discrete Wavelet Transform (DWT)-based SVD using additive method, and (2) an error correction code is applied and embeds the watermark with spatial and temporal redundancy. The aim of these improvements is to increase robustness against attacks based on video characteristics and the robustness against image processing attacks, realize high security level, protect the watermark against bit errors and obtain good perceptual quality. The proposed DWT-based SVD video watermarking method has been tested in the presence of video and image processing attacks and experimental results proved that the proposed DWT-based SVD video watermarking method survives attacks based on video characteristics and image processing techniques.  相似文献   

12.
在音频水印领域,嵌入大量水印而不影响宿主音 频的听觉质量,同时具有良好的鲁棒 性,仍然是一项具有挑战的工作。针对这一问题,本文提出了一种大容量,透明,鲁棒的音 频水印算法。首先对音频应用2级离散小波变换(DWT),并选取低频分量作奇异值分解(SV D),然后将水印嵌入在奇异值矩阵的非对角线元素中,可同时提高算法的透明性和嵌入容 量。另外,利用汉明码编码提升水印的鲁棒性和安全性。仿真实验结果表明,所提算法在平 均信噪比37.75 dB的情况下,可以达到5512 bps 的嵌入容量,对噪声添加、滤波、剪切、压缩等各种信号处理攻击具有良好的鲁棒性。  相似文献   

13.
基于压缩感知的鲁棒可分离的密文域水印算法   总被引:2,自引:0,他引:2  
为了满足密文域水印嵌入的需要,该文基于压缩感知技术,提出一种鲁棒可分离的密文域水印算法。首先,内容拥有者将图像进行不重叠分块,利用边缘检测手段划分重要块和非重要块。重要块用传统加密方式进行加密,非重要块用压缩感知技术进行加密,同时为水印嵌入留出一定空间,然后根据嵌入密钥,实现二值水印的密文嵌入。在接收端获取图像内容和水印的方式是可分离的,同时根据含水印的密文图像块的像素分布特性可重新判断块的属性,避免了传输块属性信息。此外,水印信息重复4次嵌入在密文图像的不同区域,保证了水印的鲁棒性。实验结果显示所提方案在抵抗适度攻击时具有鲁棒性和安全性。  相似文献   

14.
针对数字产品的版权保护问题,提出了一种基于矩阵范数分析的自适应数字水印算法.算法将载体图像分为8×8不重复块并进行DCT变换,根据8×8模板对每个分块的低、高频数据分别组成新矩阵并进行SVD分解.结合人眼视觉特性和矩阵范数理论推导结果求解对应的块能量确定嵌入位置.水印信息选择在摸板的低频区矩阵的奇异值分解的首个值中,嵌入强度随块能量比自动调节.理论分析和实验结果表明,该算法不仅具有较好的透明性,而且对常见攻击如高斯噪声、JPEG压缩、滤波以及几何攻击等具有较好的稳健性.  相似文献   

15.
谢斌  彭林  刘珊 《电视技术》2015,39(21):10-14
针对传统离散小波变换(DWT)水印算法不能较好地抵抗几何攻击的缺点,提出了一种基于离散小波变换(DWT)和奇异值分解(SVD)相结合的彩色图像水印新算法。首先对原始彩色载体图像进行RGB三基色分解,然后进行离散小波变换,再选取四个子块的四分之一重构成新子块,并进行二次离散小波变换,最后对其低频部分进行奇异值分解嵌入水印信息,得到嵌入水印的彩色图像。实验结果表明,该算法能够较好地抵抗诸如高斯噪声、椒盐噪声、压缩等常规攻击,并对大角度旋转、任意角度旋转、剪切加旋转等几何攻击也表现出了较强的鲁棒性,其总体性能明显优于传统的DWT水印算法。  相似文献   

16.
Generally, in watermarking techniques the size of the watermark is very small when compared to the host image. On the contrary, this is an attempt in which a new facet in watermarking framework is presented where the size of host image is very small when compared to the watermark image. The core idea of the proposed technique is to first scale up the size of host image equal to the size of watermark using chaotic map and Hessenberg decomposition followed by the redundant wavelet transform. A meaningful gray scale watermark is embedded in the low frequency sub-band at the finest level using singular value decomposition. To prevent ambiguity and enhance the security, a binary watermark is also embedded in loss-less manner which ensures the authenticity of the watermarked image. Finally, a reliable watermark extraction scheme is developed for extracting both the watermarks. The experimental results demonstrate better visual imperceptibility and resiliency of the proposed scheme against intentional or un-intentional variety of attacks.  相似文献   

17.
The need of copyright protection and rightful ownership become very urgent in the fast growing Internet environment. The watermarking offers a convenient way to hide specific information via an imaging system for the consumer electronic devices such as digital camera, scanner, and printer. Numerous efforts have been devoted in the Singular Value Decomposition (SVD)-based image watermarking schemes which embed the visual watermark image into the host image before publishing for public usage. However, the main drawback of the SVD-based image watermarking is its false positive problem of which an attacker can easily claim and obtain the correct watermark from an unauthorized image. In this paper, we proposed a new SVD-based image watermarking by embedding the principal component of a watermark into the host image of block based manner using spread spectrum concept. The experimental results demonstrate that the proposed method overcomes the false positive problem, achieves a high payload, and outperforms the former reliable SVD-based watermarking.  相似文献   

18.
块奇异值分解和量化实现的图像数字水印算法   总被引:3,自引:2,他引:1  
李旭东 《光电子.激光》2011,(12):1847-1851
讨论了当前将水印嵌入在块奇异值分解(SVD,singular value decomposition)后最大奇异值中的图像数字水印算法不足,进而提出了两种新的将水印嵌入在块SVD后最大奇异值除外的其余奇异值中的图像数字水印算法。两种新算法均采用了量化嵌入策略,从而使两种算法在提取水印时无需任何原始信息的帮助。实验结果表...  相似文献   

19.
Watermark embedding: hiding a signal within a cover image   总被引:7,自引:0,他引:7  
When looked at as a communication task, the watermarking process can be split into three main steps: watermark generation and embedding (information transmission), possible attacks (transmission through the channel), and watermark retrieval (information decoding at the receiver side). We review the main issues in watermark generation and embedding. By focusing on the case of image watermarking, we first discuss the choice of the image features the watermark is superimposed to. Then we consider watermark generation and the rule used to insert the watermark within the host features. By adopting again a communication perspective, some useful hints are given on the way the watermark should be shaped and inserted within the host document for increased robustness against attacks. Given that invisibility is one of the main requirements a watermark must satisfy, the way psycho-visual notions can be used to effectively hide the watermark within an image is carefully reviewed. Rather than insisting on the mathematical aspects of each of the above issues, the main rationale behind the most commonly adopted approaches is given, as well as some illustrative examples  相似文献   

20.
为了提高数字水印抗击各种图像攻击的性能和保持图像的稳健性和不可见性,提出了一种基于离散小波变换(DWT),SVD(singular value decomposition)奇异值分解水印图像和原始载体图像的离散余弦变换(DCT)的自适应水印嵌入算法,主要是将水印图像的两次小波变换后的低频分量潜入到原始图像分块经过SVD分解的S分量矩阵中,同时根据图像的JPEG压缩比的不同计算各个图像块的水印调节因子。实验证明该算法在抗击JPEG压缩、中值滤波、加噪等均具有很好的鲁棒性,嵌入后的图像的PSNR达到38,具有良好的视觉掩蔽性  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号