首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 109 毫秒
1.
提出了一种新的脆弱盲水印生成算法用于图像完整性证明和内容篡改证明。首先将原始图像分块,对各分块进行一次整数小波变换;计算4个子带(LL,HL,LH,HH)小波系数绝对值的均值,分别映射为混沌初值,经过迭代、量化生成二值水印信息;最后将水印信息随机嵌入到4个子带中。实验结果表明,所提出的算法提高了篡改检测率,对图像的篡改具有高度敏感性和准确的篡改定位能力。水印提取为盲提取,篡改检测只用到了篡改后的水印图像。  相似文献   

2.
基于Logistic混沌映射的DCT域脆弱数字水印算法   总被引:16,自引:0,他引:16  
李赵红  侯建军 《电子学报》2006,34(12):2134-2137
本文提出了一种新的混沌脆弱数字水印算法.利用混沌系统对初值的极端敏感性和块不相关水印技术,将图像DCT次高频系数和水印密钥合成为logistic混沌映射初值从而生成水印,再将水印嵌入到图像DCT的高频系数中得到水印图像.利用图像DCT系数之间的关系,实现了水印的盲检测.实验结果表明,该算法可以精确检测到对水印图像的一个像数点的改变,并具有良好的定位篡改能力.  相似文献   

3.
一种基于混沌映射和奇异值分解的数字图像水印算法   总被引:2,自引:0,他引:2  
焦问  丁文霞 《信号处理》2011,27(8):1219-1223
为了保证数字图像水印的安全性、透明性和鲁棒性,本文提出了一种基于混沌映射和奇异值分解的数字图像水印算法。混沌映射具有初值敏感性,以映射初值为私钥,利用混沌映射将二值水印图像进行双混沌置乱,这样可以提高水印嵌入的安全性。利用奇异值分解特性来嵌入水印,把U矩阵中第一列系数作为研究对象,采用保持相邻系数之间差值关系的方法来表示嵌入的水印比特,这种系数差值关系在经过信号处理后能够得到保持。通过仿真实验,表明嵌入水印后的图像具有良好的透明性,同时还具有抵抗图像信号处理的鲁棒性。此外,当含水印图像的内容遭到篡改时,提取出的水印仍易于辨认,并且能对篡改进行检测和定位。   相似文献   

4.
一种高检测率用于彩色图像完整性证明的脆弱盲水印   总被引:1,自引:0,他引:1  
提出了一种高检测率的用于彩色图像完整性证明的脆弱盲水印算法.将原始图像R、G、B色彩分量图像分块,对各分块进行一次整数小波变换;将小波系数经函数处理后映射为混沌初值,经过迭代、量化生成二值水印信息,然后随机嵌入到小波变换域.本算法利用混沌系统对初值极端敏性特点增强了水印信息的安全性,提高了脆弱水印的敏感性.  相似文献   

5.
混沌置乱在图像水印系统中的研究   总被引:3,自引:0,他引:3  
提出了一种新的置乱算法,利用混沌序列对初值的敏感性高、安全性强、密钥空间大且是非周期的特性,产生两个混沌序列分别置乱水印图像的行和列,加密水印图像.通过经典的图像水印系统对比实验证明了双混沌置乱能提高水印安全性和抗剪裁攻击攻击性能.  相似文献   

6.
提出了一种医学图像脆弱水印算法.该算法对原始医学图像感兴趣区域进行整数小波压缩,提取其低频子带LL,生成水印标志;对原始医学图像和水印图像分块处理,且对其做行列RH再进行量化处理变换,实现水印的嵌入.实验结果表明,该算法对于嵌入水印后的图像具有良好的透明性,可检测出1bit篡改,对图像篡改具有很高的敏感性和定位能力.  相似文献   

7.
能区分图像或水印篡改的脆弱水印方案   总被引:17,自引:2,他引:15       下载免费PDF全文
和红杰  张家树  田蕾 《电子学报》2005,33(9):1557-1561
针对现有脆弱型水印方案不能区分是图像内容还是水印被篡改的问题,提出一种能区分图像或水印篡改的脆弱水印方案.该方案用原始图像高7位的小波低频系数非均匀量化后生成的低频压缩图像作为水印,并用混沌系统对水印进行置乱加密,将安全性得到增强的水印直接嵌入到图像的LSB位;认证时通过差值图像定位图像内容被篡改的位置并指出图像中的水印是否被篡改.理论分析和仿真实验表明:该算法不但能精确定位图像内容被篡改的位置,而且能区分是图像内容被篡改、水印被篡改还是两者同时被篡改.  相似文献   

8.
基于混沌置乱的分块自嵌入水印算法   总被引:18,自引:0,他引:18  
针对分块自嵌入水印算法的安全性和不能有效判断图像篡改块的问题,提出一种基于混沌置乱的分块自嵌入算法.该算法将由图像块生成的水印按空间位置生成二值水印图像,利用混沌序列对其置乱加密后嵌入到图像的最低位,认证时根据设定的阈值能有效定位图像内容被篡改的图像块.实验仿真和理论分析表明,该算法在保持原算法篡改恢复效果的基础上,无论是否有水印被改变,均能有效判断图像内容被篡改的图像块,且具有更高的安全性.  相似文献   

9.
用于图像篡改定位和恢复的分层半脆弱数字水印算法   总被引:1,自引:0,他引:1  
刘泉  江雪梅 《通信学报》2007,28(7):104-110
设计并实现了一种基于分层的半脆弱数字水印算法,用于图像内容完整性认证,篡改定位和恢复。在嵌入方,将水印信息嵌入到原始图像所有像素的2bit最低有效比特,其中认证水印由奇偶校验码和块与子块之间灰度平均值的比较组成;恢复水印为环面自同构映射块的平均灰度值。在检测方,采用分层思想,分3层对水印进行篡改定位和恢复。实验结果表明,该算法对局部发生的篡改可以有效地检测,精确定位并进行内容恢复,同时能够有效的抵抗矢量量化攻击。  相似文献   

10.
基于双混沌系统的抗JPEG压缩的图像认证水印算法   总被引:1,自引:0,他引:1  
提出了一种新的兼具水印高安全性和高定位精度的抗JPEG压缩的图像认证水印算法.根据JPEG图像压缩过程中DCT系数的不变特性,将预先量化的DCT低频系数和水印密钥合成为混沌系统的初值.再将图像块的编号映射为混沌系统的迭代次数,经过logistic混沌迭代生成图像块水印.在水印嵌入过程中,利用另一混沌系统猫映射构造循环结构,建立图像块之间一一对应的循环关系,并将块水印嵌入到对应图像块的DCT中频系数中.实验结果表明,该算法对JPEG有损压缩具有良好的鲁棒性,同时可对图像内容的恶意篡改进行精确的检测与定位.  相似文献   

11.
A content authentication technique based on JPEG-to-JPEG watermarking is proposed in this paper. In this technique, each 8x8 block in a JPEG compressed image is first processed by entropy decoding, and then the quantized discrete cosine transform (DCT) is applied to generate DCT coefficients: one DC coefficient and 63 AC coefficients in frequency coefficients. The DCT AC coefficients are used to form zero planes in which the watermark is embedded by a chaotic map. In this way, the watermark information is embedded into JPEG compressed domain, and the output watermarked image is still a JPEG format. The proposed method is especially applicable to content authentication of JPEG image since the quantized coefficients are modified for embedding the watermark and the chaotic system possesses an important property with the high sensitivity on initial values. Experimental results show that the tamper regions are localized accurately when the watermarked JPEG image is maliciously tampered.  相似文献   

12.
A content authentication technique based on JPEG-to-JPEG watermarking is proposed in this paper. In this technique, each 88 block in a JPEG compressed image is first processed by entropy decoding, and then the quantized discrete cosine transform (DCT) is applied to generate DCT coefficients: one DC coefficient and 63 AC coefficients in frequency coefficients. The DCT AC coefficients are used to form zero planes in which the watermark is embedded by a chaotic map. In this way, the watermark information is embedded into JPEG compressed domain, and the output watermarked image is still a JPEG format. The proposed method is especially applicable to content authentication of JPEG image since the quantized coefficients are modified for embedding the watermark and the chaotic system possesses an important property with the high sensitivity on initial values. Experimental results show that the tamper regions are localized accurately when the watermarked JPEG image is maliciously tampered.  相似文献   

13.
Generally, in watermarking techniques the size of the watermark is very small when compared to the host image. On the contrary, this is an attempt in which a new facet in watermarking framework is presented where the size of host image is very small when compared to the watermark image. The core idea of the proposed technique is to first scale up the size of host image equal to the size of watermark using chaotic map and Hessenberg decomposition followed by the redundant wavelet transform. A meaningful gray scale watermark is embedded in the low frequency sub-band at the finest level using singular value decomposition. To prevent ambiguity and enhance the security, a binary watermark is also embedded in loss-less manner which ensures the authenticity of the watermarked image. Finally, a reliable watermark extraction scheme is developed for extracting both the watermarks. The experimental results demonstrate better visual imperceptibility and resiliency of the proposed scheme against intentional or un-intentional variety of attacks.  相似文献   

14.
基于混沌映射的鲁棒性图像水印算法   总被引:13,自引:0,他引:13       下载免费PDF全文
张春田  张静 《电子学报》2002,30(1):69-72
本文提出一种基于混沌映射的强鲁棒性数字图像水印算法,首先用一混沌动态系统对水印信息进行预处理,而后将其扩频调制在图像空间域,并且使水印嵌入强度自适应于图像;通过预置已知模板和嵌入多块水印可实现水印检测位置的几何校准.实验结果表明,采用该算法实现的水印对常见的图像处理和几何变换具有很好的鲁棒性.  相似文献   

15.
Many digital watermarking methods have been pro-posedin the last fewyears[1 ,3].It is a tradeoff problemsince whenthe robustness of a watermarkincreases ,theperceptual quality of the contents will be degraded.Hence,the main goal of i mproving a watermarki…  相似文献   

16.
张燕 《电子设计工程》2014,(14):128-131
针对视频水印的安全性,提出了一种基于双重水印加密和SVD的视频水印方案。该方法首先将水印图像经Arnold置乱,对置乱后的水印通过Chebyshev混沌映射进行加密,保障水印的安全性;然后,对视频关键帧进行三级小波分解,利用SVD对几何失真的不变性,将水印3次嵌入到LL3、HL3和LH3中。实验表明该方案对高斯噪声、MPEG压缩、剪切等具有较高的鲁棒性。  相似文献   

17.
This paper presents a novel technique for image watermarking based on chaos theory. Chaotic parameter modulation (CPM) is employed to modulate the copyright information into the bifurcating parameter of a chaotic system. The system output is a wideband signal and is used as a watermark to be inserted into the host image. In the detection, a novel method based on the ergodic property of chaotic signal is developed to demodulate the embedded copyright information. Compared to previous works on blind watermarking, the proposed technique can effectively remove the interference from the host image and, thus, improve the detection performance dramatically. Simulation results show that the ergodic CPM approach is effective for image watermarking in terms of noise performance, robustness against attacks, and payload. In addition, its implementation is very simple and the computation speed is fast. Compared to holographic transform domain method and the conventional spread spectrum watermarking scheme, the proposed technique is shown to be superior.  相似文献   

18.
董莉  王玲  邵鹏飞 《电讯技术》2008,48(1):56-59
结合Logistic映射及混合光学双稳模型,提出一种新的复合混沌加密算法用于医学图像水印加密,并将加密后的水印嵌入医学图像小波域的NROI中。实验证明,复合混沌映射极大地增强了系统的安全性,所提出的盲检测算法在保护ROI的同时提高了水印抗JPEG压缩的鲁棒性,并对篡改、剪切、滤波等均具有良好的鲁棒性和透明性。  相似文献   

19.
Watermarking scheme of colour image based on chaotic sequences   总被引:1,自引:0,他引:1  
The proposed perceptual mask is based on the singularity of cover image and matches very well with the properties of the human visual system. The cover colour image is decomposed into several subbands by the wavelet transform. The watermark composed of chaotic sequence and the covert image is embedded into the subband with the largest energy. The chaos system plays an important role in the security invisibility and robustness of the proposed scheme. The parameter and initial state of chaos system can directly influence the generation of watermark information as a key. Moreover, the watermark information has the property of spread spectrum signal by chaotic sequence to improve the invisibility and security of watermarked image. Experimental results and comparisons with other watermarking techniques prove that the proposed algorithm is effective and feasible, and improves the security, invisibility and robustness of watermarking information.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号