首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 218 毫秒
1.
This study analyzes the recent image watermarking schemes based on redundant discrete wavelet transform (RDWT) and singular value decomposition (SVD), and shows that in fact they are insecure and cannot be used for protecting the rightful ownership. The RDWT-SVD watermarking directly embeds a grayscale watermark image of the same size with the host image into the singular value matrix of the RDWT-transformed host image, then produces the left and right orthogonal matrices as side information which is later used in the watermark extraction stage. The RDWT-SVD approach enjoys the advantage of the RDWT redundancy to achieve a high embedding capacity, and preserves the watermark imperceptibility by exploiting the SVD stability properties. It is claimed that RDWT-SVD watermarking is robust against several common image processing and geometrical attacks, yet a fundamental flaw in the RDWT-SVD scheme is found, which leads to severe the false positive issue. Three vulnerable attacks should be considered in the RDWT-SVD scheme: (1) An attacker can easily claim the owner watermarked image; (2) the owner has the ambiguity because of the wrong side information usage, and (3) the owner can extract the correct watermark from arbitrary image. Thus, it is important to highlight these attacks when implementing the RDWT-SVD watermarking scheme.  相似文献   

2.
This work presents a secure and robust color image watermarking for copyright protection applications, that is based on exploiting the multi-spectral properties of the primary color components of the RGB image. The proposed scheme employs the interconnection between the subbands of the primary color components in the wavelet-packet domain. The scheme is constructed to be adaptive, in the sense that the watermark bits are embedded in safe locations, depending on the inter-layer energy of coefficients in the wavelet-packets. The scheme immunity to attacks is improved by applying a two-level security procedure. To validate the high performance of the proposed scheme, several experimental tests were conducted and a comparative analysis was provided. The obtained results have shown improved watermarking robustness against a wide range of attacks while preserving a high watermarking imperceptibility.  相似文献   

3.
一种基于离散余弦变换与奇异值分解的数字图像水印算法   总被引:2,自引:1,他引:2  
刘俊景  蒋华 《微电子学与计算机》2007,24(10):111-114,117
结合奇异值分解(SVD)和离散余弦变换(OCT)的特点,提出了一种基于离散余弦交换与奇异值分解的数字图像水印算法.该算法能够很好地解决透明性和鲁棒性之间的矛盾.算法中采用经过置乱变换的灰度图作为水印,不仅增加了嵌入的信息量,而且提高了水印的安全性.实验结果表明,该算法不仅具有较好的透明性,而且对常见攻击如:叠加噪声、JPEG压缩、滤波以及几何攻击等具有较好的鲁棒性.  相似文献   

4.
Many digital watermarking methods have been pro-posedin the last fewyears[1 ,3].It is a tradeoff problemsince whenthe robustness of a watermarkincreases ,theperceptual quality of the contents will be degraded.Hence,the main goal of i mproving a watermarki…  相似文献   

5.
李昌利 《无线电工程》2007,37(3):17-18,55
有望解决数字媒体版权纠纷的数字水印技术须满足3个相互冲突的基本要求:不可见性、健壮性和嵌入容量。应用信息论中多维无记忆加性高斯信道容量公式,提出一种基于图像内容的高容量算法。算法在保证水印不可见性的前提下,尽可能多地嵌入强度大的水印信息。水印的检测不需要原始图像,属于盲水印算法。仿真结果表明,运用该算法在图像中能嵌入较多的水印信息,同时具有很好的健壮性。  相似文献   

6.
抵抗仿射变换攻击的多比特图像水印   总被引:6,自引:0,他引:6  
杨文学  赵耀 《信号处理》2004,20(3):245-250
目前,大多数鲁棒图像水印所面临的最大问题就是几何攻击,而几何攻击又以仿射变换为主,攻击者只需对目标图像做轻微的几何形变就可以使嵌入其中的水印信息失效。本文在Ping Dong等人提出的基于图像归一化方法的抵抗任意仿射交换攻击的鲁棒数字水印的基础上,改进了原有的归一化方法,去掉了归一化过程中的约束条件,简化了归一化的过程。并且在此基础上提出一种新的水印嵌入方案,克服了文献[1]中水印方案水印不可见性较差的问题。实验证明,本文提出的方案对仿射变换攻击具有很好的鲁棒性,嵌入的水印容量较大且水印图像的质量较高。  相似文献   

7.
基于几何矩的抵抗RST攻击的数字图像水印   总被引:8,自引:0,他引:8  
目前大多数的数字图像水印方案不能有效抵抗几何形变的攻击,这一弱点已成为数字水印技术走上商用的瓶颈。在各种几何形变中,RST(旋转、缩放、平移)是最为常见的攻击方式。该文提出了一种具有普适性的能够抵抗RST攻击的多比特数字图像水印方案,采用的主要措施有:(1)提出一种基于几何矩的图像标准化方案以抵抗几何攻击;(2)采用扩谱方法构造二维CDMA水印信号,实现多比特水印嵌入;(3)根据HVS特性自适应调整水印的嵌入强度,在鲁棒性和不可见性之间达到平衡;(4)利用MAP和相关方法估计和检测水印信号。实验表明该方案对RST具有很高的鲁棒性,对压缩、滤波等常见的图像处理攻击同样具有良好的鲁棒性。  相似文献   

8.
This paper presents an efficient, robust, and imperceptible video watermarking technique based on singular value decomposition (SVD) performed in the Discrete Wavelet Transform (DWT) domain. In the proposed DWT-based SVD video watermarking method, the video frames are transformed with the DWT using two resolution levels. The high frequency band HH and the middle frequency bands LH and HL are SVD transformed and the watermark is hidden in them. The proposed DWT-based SVD video watermarking method is characterized by two improvements: (1) a cascade of two powerful mathematical transforms; the Discrete Wavelet Transform (DWT)-based SVD using additive method, and (2) an error correction code is applied and embeds the watermark with spatial and temporal redundancy. The aim of these improvements is to increase robustness against attacks based on video characteristics and the robustness against image processing attacks, realize high security level, protect the watermark against bit errors and obtain good perceptual quality. The proposed DWT-based SVD video watermarking method has been tested in the presence of video and image processing attacks and experimental results proved that the proposed DWT-based SVD video watermarking method survives attacks based on video characteristics and image processing techniques.  相似文献   

9.
在音频水印领域,嵌入大量水印而不影响宿主音 频的听觉质量,同时具有良好的鲁棒 性,仍然是一项具有挑战的工作。针对这一问题,本文提出了一种大容量,透明,鲁棒的音 频水印算法。首先对音频应用2级离散小波变换(DWT),并选取低频分量作奇异值分解(SV D),然后将水印嵌入在奇异值矩阵的非对角线元素中,可同时提高算法的透明性和嵌入容 量。另外,利用汉明码编码提升水印的鲁棒性和安全性。仿真实验结果表明,所提算法在平 均信噪比37.75 dB的情况下,可以达到5512 bps 的嵌入容量,对噪声添加、滤波、剪切、压缩等各种信号处理攻击具有良好的鲁棒性。  相似文献   

10.
Generally, in watermarking techniques the size of the watermark is very small when compared to the host image. On the contrary, this is an attempt in which a new facet in watermarking framework is presented where the size of host image is very small when compared to the watermark image. The core idea of the proposed technique is to first scale up the size of host image equal to the size of watermark using chaotic map and Hessenberg decomposition followed by the redundant wavelet transform. A meaningful gray scale watermark is embedded in the low frequency sub-band at the finest level using singular value decomposition. To prevent ambiguity and enhance the security, a binary watermark is also embedded in loss-less manner which ensures the authenticity of the watermarked image. Finally, a reliable watermark extraction scheme is developed for extracting both the watermarks. The experimental results demonstrate better visual imperceptibility and resiliency of the proposed scheme against intentional or un-intentional variety of attacks.  相似文献   

11.
基于奇异值分解的小波域水印算法   总被引:2,自引:0,他引:2  
结合奇异值分解(SVD)和离散小渡变换(DWT)的特点,提出一种基于SVD的小波域数字图像水印算法。该算法将二值水印图像经过取反置乱后嵌入到原始图像小波中频子带的奇异值中,具有较高的抗攻击能力。仿真实验证明,该算法不仅具有良好的透明性,而且对常见攻击,如:叠加噪声、JPEG压缩、滤波及几何攻击具有较好的鲁棒性。  相似文献   

12.
朱萌  陈青 《电子科技》2016,29(2):12
针对小波变换由于方向性缺乏而无法有效稀疏地表示图像本身几何结构的问题,结合Contourlet变换和奇异值分解的优点,提出了一种Contourlet变换域内基于奇异值分解的数字水印算法。宿主图像经过两层Contourlet分解后,生成一系列多尺度多方向的子带,选取第二层分解中能量最大的子带进行大小为4×4的互不重叠的分块,并进行奇异值分解,再将置乱后的原始二值水印信息嵌入到奇异值矩阵中。实验结果表明,该算法实现简单,透明性良好,对常规攻击和几何攻击具有较强的鲁棒性,且优于一般的小波域算法。  相似文献   

13.
Digital watermarking consists of hiding subliminal information into digital media content, also called host data. It can be the basis of many applications, including security and media asset management. In this paper we focus on the imperceptibility requirement for image watermarking. We first provide a functional inventory of image watermarking applications and emphasize the dependency between the application purpose and its need for invisibility. Then, we present a global framework common to most existing watermarking systems. It illustrates the methodology followed to translate human vision research into watermarking technology. It suggests future prospects and highlights the need for dedicated inputs from the human vision community  相似文献   

14.
蔡方凯  张松 《电讯技术》2007,47(5):149-152
数字水印(Digital Watermarking)是进行知识产权保护和认证的一种有效方法.在DCT域中基于SVD分解的数字图像水印嵌入-提取算法,通过在原始图像DCT变换的左上角系数嵌入水印信号的主分量信息,保留了原始图像的中低频信息,获得好的水印嵌入不可感知性;同时,该算法对于常见的图像攻击具有强的鲁棒性,很好地实现了数字信息的版权保护.计算机仿真结果表明所提出的算法是有效可行的.  相似文献   

15.
This paper presents a robust phase watermarking scheme for still digital images based on the sequency-ordered complex Hadamard transform (SCHT). The transform matrix of the SCHT exhibits sequency ordering which is analogous to frequency in the discrete Fourier transform (DFT). Hence, sequency-based image analysis can be performed for image watermarking while providing simple implementation and with less computational complexity for computation of the transform. As the SCHT coefficients are complex numbers which consist of both magnitudes and phases, they are suited to adopt phase modulation techniques to embed the watermark. In this proposed scheme, the phases of the SCHT coefficients in the sequency domain are altered to convey the watermark information using the phase shift keying (PSK) modulation. Low amplitude block selection (LABS) is used to enhance the imperceptibility of digital watermark, and amplitude boost (AB) method is employed to improve the robustness of the watermarking scheme. Spread spectrum (SS) technique is adopted to increase the security of watermark against various unintentional or intentional attacks. In order to demonstrate the effectiveness of the proposed watermarking scheme, simulations are conducted under various kinds of attacking operations. The results show that the proposed scheme is able to sustain a series of attacks including common geometric transformations such as scaling, rotating, cropping, painting, and common image-processing operations such as JPEG compression, low-pass filtering, sharpening, noising and phase perturbation, etc. Comparisons of the simulation results with the other schemes are also mentioned and the results reveal that the proposed scheme shows better robustness.  相似文献   

16.
It still remains a challenging problem to improve both of the imperceptibility and robustness for the digital image watermarking task. In this study, a color image watermarking scheme is proposed based on quaternion polar harmonic transform (QPHT) with maximum likelihood decoder, which better balances imperceptibility and robustness in a novel fashion. Thanks to the strong robustness of QPHT, the digital watermark is embedded into the QPHT magnitudes using a multiplicative approach. At the receiver, the watermark decoder can be formulated as a problem of weak signal detection, as the QPHT magnitudes are highly non-Gaussian. In view of this, selection of proper models is of great importance to construct a suitable watermark decoder. Further, we validate that the probability density function of Bessel K form suitably models the heavy tail behavior of QPHT magnitudes, and thus the maximum likelihood decoder is developed by modeling QPHT magnitudes with Bessel K form distribution. Experimental results on standard benchmarks demonstrate that the proposed approach provides better imperceptibility and robustness against various kinds of attacks compared to previous state-of-the-art methods.  相似文献   

17.
The problem to improve the performance of resisting geometric attacks in digital watermarking is addressed in this paper.Based on the optimized support vector regression(SVR),a zero-bit watermarking algorithm is presented.The proposed algorithm encrypts the watermarking image by using composite chaos with large key space and capacity against prediction,which can strengthen the safety of the proposed algorithm.By using the relationship between Tchebichef moment invariants of detected image and watermarking characteristics,the SVR training model optimized by composite chaos enhances the ability of resisting geometric attacks.Performance analysis and simulations demonstrate that the proposed algorithm herein possesses better security and stronger robustness than some similar methods.  相似文献   

18.
一种基于DCT的图像水印算法   总被引:1,自引:0,他引:1  
数字水印技术是一种在开放的网络环境中用以保护版权和认证来源及完整性的新技术.针对如何解决水印不可见性和鲁棒性矛盾这一问题提出了一种新的水印方案.实验结果表明,算法具有良好的不可见性,对常见的图像处理操作,如JPEG压缩、低通滤波、噪声攻击等具有较强的鲁棒性.  相似文献   

19.
In this paper, we propose a precise and robust watermarking scheme based on the technique called amplitude modulation. A watermark is embedded in a color image by modifying the pixel values in the blue channel. At the receiver, the watermark bits are retrieved using a prediction system, by a linear combination of nearby pixel values around the embedded pixels, and without having the original image. Because amplitude modulation is a spatial-domain watermarking method, it may not be robust enough, i.e., incapable of exact watermark retrieval. In order to enhance the bit retrieval, we apply a Gaussian mask to equalize the luminance intensity; we employ the pixel value replacing technique to enhance the prediction performance, and we use two additional bits as a geometrical reference. In addition, we demonstrate that choosing an improper location (like singularities) for watermarking will lead the prediction system to malfunction. In order to increase the robustness, we propose using the Curvelet transform to detect singularities such as lines and curves and to prevent the system from using these locations in an image for embedding the watermark bits. The experimental results indicate that our proposed method has a better performance in comparison with two other similar approaches, and in addition, it is robust against various geometrical and nongeometrical attacks as well as having a good imperceptibility.  相似文献   

20.
Digital watermarking, means of hiding/inserting a message, which can be an image, audio, video or text within the digital media. This hidden/inserting message can be later being extracted or detected for a variety of purposes. In this paper, a novel multi-resolution logo watermarking scheme using fractional M-band wavelet transform (Fr-M-band-WT) is proposed. The watermark is embedded in the multiresolution Fr-M-band-WT coefficients of low frequency bands of the host image using singular value decomposition (SVD). A multi-resolution nature of Fr-M-band-WT is exploited in the process of edge detection. Experimental results of the proposed logo watermarking scheme are compared with the previously available watermarking algorithms, fractional Fourier transform (FrFT), fractional wavelet transform (FrWT). Further, the proposed watermark extraction scheme is also tested on different attacks. The results after being investigated the proposed watermarking scheme shows a significant improvement as compared to other existing methods.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号