首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 250 毫秒
1.
基于奇异值分解的半易损水印算法   总被引:21,自引:0,他引:21  
随着数字图像在报刊杂志、医院、法庭中的广泛应用,越来越需要一种有效的图像认证方法,数字水印技术为上述问题提供了一个潜在的解决方案。本文提出了一种基于分组奇异值分解(SVD)的半易损水印技术,算法将经过伪随机排序的二值图像通过量化策略嵌入到分组SVD分解中最大的奇异值点,提取水印信号无需使用原始图像。仿真实验表明水印是不可察觉的,可将JPEG有损压缩同恶意攻击区分开来,能够准确地定位被篡改的图像内容。  相似文献   

2.
In this paper, we propose multimodal biometric image watermarking scheme through a two-stage integrity verification method using the hidden thumbnail feature vectors for safe authentication of multimodal biometrics data, face and fingerprint, respectively. It is basically blind and spread spectrum-based robust watermarking method. The proposed method enables us to detect a tampered region by controlling watermark embedding strength to meet the requirement of predefined watermark extraction threshold. The key idea is that the thumbnail feature vectors of a face image as a watermark pattern are utilized by embedding into a fingerprint image in order to verify the integrity of respective biometric data. The first stage of integrity verification for a fingerprint image is done by deciding the validity of extracted thumbnail patterns. The second stage of integrity verification for a face image is done by one-to-one matching between the thumbnail feature vectors extracted from a face image and the thumbnail one of the received face image. Experimental results showed that the proposed method has a high detection rate of the forged biometric data and guarantees the security assurance.  相似文献   

3.
4.
In the present work, a novel image watermarking algorithm using vector quantization (VQ) approach is presented for digital image authentication. Watermarks are embedded in two successive stages for image integrity verification and authentication. In the first stage, a key based approach is used to embed robust zero level watermark using properties of indices of vector quantized image. In the second stage, semifragile watermark is embedded by using modified index key based (MIKB) method. Random keys are used to improve the integrity and security of the designed system. Further, to classify an attack quantitatively as acceptable or as a malicious attack, pixel neighbourhood clustering approach is introduced. Proposed approach is evaluated on 250 standard test images using performance measures such as peak signal to noise ratio (PSNR) and normalized hamming similarity (NHS). The experimental results shows that propose approach achieve average false positive rate 0.00024 and the average false negative rate 0.0012. Further, the average PSNR and tamper detection/localization accuracy of watermarked image is 42 dB and 99.8% respectively; while tamper localization sensitivity is very high. The proposed model is found to be robust to common content preserving attacks while fragile to content altering attacks.  相似文献   

5.
块奇异值分解和量化实现的图像数字水印算法   总被引:3,自引:2,他引:1  
李旭东 《光电子.激光》2011,(12):1847-1851
讨论了当前将水印嵌入在块奇异值分解(SVD,singular value decomposition)后最大奇异值中的图像数字水印算法不足,进而提出了两种新的将水印嵌入在块SVD后最大奇异值除外的其余奇异值中的图像数字水印算法。两种新算法均采用了量化嵌入策略,从而使两种算法在提取水印时无需任何原始信息的帮助。实验结果表...  相似文献   

6.
一种新的图像水印方案   总被引:1,自引:0,他引:1  
郭磊  郭宝龙 《通信学报》2004,25(5):20-27
目标区域是图像中视觉上最重要的部分。针对现有的水印算法很少考虑图像中确定的目标区域这一问题,提出了一种基于目标区域的水印方案(WIOR)。方案首先利用小波变换分析图像的目标特征,并依据图像的小波高频系数特征对其进行聚类,获得水印的嵌入域,在此嵌入域中,选择小波系数并对其进行量化调制来嵌入二值扩谱水印;同时,通过只在图像的局部区域内嵌入较少的水印信息来改善水印的隐蔽性。实验结果表明,该方案对于一类具有突出目标特征的图像具有较好的效果。嵌入的水印主要优势在于真正把水印嵌入图像的视觉重要部分,从而能有效地抵御剪切攻击,而且可以实现盲检测。  相似文献   

7.
一种半脆弱性数字图像水印算法   总被引:10,自引:1,他引:9  
董刚  张良  张春田 《通信学报》2003,24(1):33-38
本文基于JPEG有损压缩提出了一种半脆弱性数字图像水印算法。实验测试表明,所提出的算法不会明显影响图像的主客观质量,对JPEG有损压缩具有一定的顽健性,可以有效地进行篡改检测,达到检测和标示图像内容真实性的目的。  相似文献   

8.
In this dissertation, sereral key problems in the field of steganographic image security are mainly studied and discussed: (1) A novel kind of image cryptosystem is studied. The encrypted information of secret image is embedded into an ordinary image, which can be transmitted publicly, and it will not cause attention of illegal eavesdropper. The following results are achieved: (a) The image hiding algorithm and its improved algorithm based on wavelet transform and vector quantization are propo…  相似文献   

9.
Watermarking on Colored Images   总被引:3,自引:2,他引:1  
1 IntroductionInthelastfew years,manyschemesofwater markinghavebeenintroduced ,andtheresearchersalwaystrytheirbesttofindanalgorithmwhichal lowsthemtoembedarobustwatermarkwithoutaf fectingthequalityoftheimage.Uptillnow ,therehasbeennoschemegoodenoughtobead…  相似文献   

10.
李文  李宏昌 《电子科技》2012,25(3):8-10
引入虚拟水印的概念,结合自恢复技术,小波变换等水印技术,提出了一种新的数字图像双水印嵌入算法。文中将原图像二次小波变换后的低频分量LL2作为第一重水印,将数字产品公司标识作为第二重水印,同时利用双水印技术所特有的属性,在两重水印之间构筑函数关系,将其结合在一起。实验结果表明,该算法简单高效,可同时具有水印恢复、版权认证和篡改区定位恢复等多方面的功能。  相似文献   

11.
基于纹理子块的小波变换数字水印算法   总被引:12,自引:3,他引:9  
提出了一种基于纹理子块的小波变换数字水印算法,该算法能够依据人眼视觉特性,通过水印图像降维、图像子块划分等措施.将随机置乱的数字水印信息嵌入到高频子带的纹理区内,从而高效率地实现局部水印和全局水印之双重目的。实验结果表明:本文提出的数字水印算法不仅具有较好的透明性,而且对诸如叠加噪声、JPEG压缩、平滑滤波、几何剪切、图像增强、马赛克等攻击均具有较好的鲁棒性。  相似文献   

12.
Digital image watermarking has justified its suitability for copyright protection and copy control of digital images. In the past years, various watermarking schemes were proposed to enhance the fidelity and the robustness of watermarked images against different types of attacks such as additive noise, filtering, and geometric attacks. It is highly important to guarantee a sufficient level of robustness of watermarked images against such type of attacks. Recently, Deep learning and neural networks achieved noticeable development and improvement, especially in image processing, segmentation, and classification. Therefore, in this paper, we studied the effect of a Fully Convolutional Neural Network (FCNN), as a denoising attack, on watermarked images. This deep architecture improves the training process and denoising performance, through which the encoder–decoder remove the noise while preserving the detailed structure of the image. FCNNDA outperforms the other types of attacks because it destroys the watermarks while preserving a good quality of the attacked images. Spread Transform Dither Modulation (STDM) and Spread Spectrum (SS) are used as watermarking schemes to embed the watermarks in the images using several scenarios. This evaluation shows that such type of denoising attack preserves the image quality while breaking the robustness of all evaluated watermarked schemes. It could also be considered a deleterious attack.  相似文献   

13.
汪太月  ;李宏伟 《通信技术》2014,(9):1084-1089
介绍了离散余弦变换的系数特征,提出了一种基于离散余弦变换的彩色图像置乱数字水印算法。算法是将数字水印置乱加密后微小的扰动原始彩色图像经离散余弦变换后的对应系数,从而达到数字水印嵌入的目的。仿真实验表明算法简单高效,原图像与嵌入水印后图像差异小,水印提取准确,能较好的保证数字水印不可感知性,在对嵌入水印图像进行各种加噪、裁剪、旋转、锐化等处理后,水印仍有较强的鲁棒性。  相似文献   

14.
Most proposed digital watermarking algorithms are sensitive to geometric attacks because the synchronization information of watermark embedding and detection is destroyed. In this letter a novel synchronization recovery scheme based on image normalization is proposed. The presented scheme does not require the original image and can be applied to various watermark systems. A wavelet-based watermarking scheme is proposed as an example and experimental results show that it is robust to geometric attacks.  相似文献   

15.
一种基于HVS的图像易碎水印   总被引:6,自引:0,他引:6  
胡军全  黄继武  黄达人 《电子学报》2003,31(7):1057-1061
作为多媒体认证和篡改检测的一种新技术,易碎水印正得到越来越多的关注.基于小波变换,结合量化调制过程,本文提出了一个易碎水印算法.该算法具有以下特点:(1)构造水印金字塔,便于实现水印的多分辨率检测;(2)结合视觉特性量化调制,尽可能减小视觉失真;(3)结合图像融合技术的多分辨率检测,使检测结果更准确;(4)抵抗一定程度的JPEG有损压缩.为了实现篡改的检测,本文给出了一个攻击判别方案,以区分恶意攻击和偶然攻击.实验表明,嵌入的水印在脆弱性和鲁棒性上达到了较好的统一,能够抵抗一定程度的压缩而不影响篡改检测的精确性.  相似文献   

16.
This paper proposes an approach for the combined image authentication and compression of color images by making use of a digital watermarking and data hiding framework. The digital watermark is comprised of two components: a soft-authenticator watermark for authentication and tamper assessment of the given image, and a chrominance watermark employed to improve the efficiency of compression. The multipurpose watermark is designed by exploiting the orthogonality of various domains used for authentication, color decomposition and watermark insertion. The approach is implemented as a DCT-DWT dual domain algorithm and is applied for the protection and compression of cultural heritage imagery. Analysis is provided to characterize the behavior of the scheme under ideal conditions. Simulations and comparisons of the proposed approach with state-of-the-art existing work demonstrate the potential of the overall scheme.  相似文献   

17.
In this work, a semi-fragile watermarking scheme, for grayscale image authentication and tamper detection, is proposed. The proposed watermarking scheme is based on implementing a modified DWT quantization-based algorithm by embedding a random watermark bit sequence into the DWT domain using an expanded-bit multiscale quantization-based technique with adjusted watermarked location. Here, the watermark bit is expanded into three similar bits and embedded in a multiscale fashion into the DWT low-frequency subbands of the 2nd DWT levels (LL2, LLHL1 and LLLH1). An adjustment of the quantized coefficients is provided based on modifying their values to fall in more secure locations within the quantization interval. Several designed criteria were used to judge the received image by classifying it into: authenticated, incidentally or maliciously attacked with high accuracy in detecting and classifying attacks. Experimental results have shown the suitability of the proposed approach for tamper detection and accurate authentication.  相似文献   

18.
Image watermarking using Hadamard transforms   总被引:1,自引:0,他引:1  
A novel method based on the multi-resolution transform and complex Hadamard transform to embed watermarks in grey scale digital images is proposed. The results show that the presented scheme is robust to JPEG compression, image resizing cropping, dithering distortion and successive watermarking effects  相似文献   

19.
Multipurpose watermarking for image authentication and protection   总被引:58,自引:0,他引:58  
We propose a novel multipurpose watermarking scheme, in which robust and fragile watermarks are simultaneously embedded, for copyright protection and content authentication. By quantizing a host image's wavelet coefficients as masking threshold units (MTUs), two complementary watermarks are embedded using cocktail watermarking and they can be blindly extracted without access to the host image. For the purpose of image protection, the new scheme guarantees that, no matter what kind of attack is encountered, at least one watermark can survive well. On the other hand, for the purpose of image authentication, our approach can locate the part of the image that has been tampered with and tolerate some incidental processes that have been executed. Experimental results show that the performance of our multipurpose watermarking scheme is indeed superb in terms of robustness and fragility.  相似文献   

20.
非对称数字水印系统研究   总被引:4,自引:0,他引:4  
石磊  洪帆  骆婷  付小青 《通信学报》2005,26(8):28-35
针对传统对称水印的不足,设计并实现了一种用于版权保护的非对称图像水印系统。该系统采用三级认证结构:用户和认证机构分别拥有由私钥变换而成的不同的公钥,他们可以利用各自的公钥对数字产品进行两层检测,并且无法去除和伪造水印,只有掌握私钥的版权所有者才能进行最终的认证。实验表明:该水印的检测性能良好,同时对常规的图像处理方法具有较强的顽健性。与其它非对称水印相比,该水印系统不但抵御公开攻击的能力较强,而且可防止认证机构的欺骗行为,因而具有更高的安全性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号