首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 89 毫秒
1.
吕建平  高新宇 《通信技术》2009,42(9):100-102
文中提出了一种新的基于系数奇偶量化的图像小波域数字水印算法,该算法首先对水印图像进行置乱处理,载体图像的小波变换系数经奇偶量化后,将置乱后的水印图像嵌入其中。算法对小波系数的奇偶量化性能在鲁棒性和水印的不可见性上进行了很好的折衷,实验表明该算法对载体图像的影响较小且具有很好的鲁棒性,可以有效地抵抗JPEG压缩、噪声干扰等常见的攻击。  相似文献   

2.
一种与JPEG图像压缩编码结合的细胞自动机域盲水印算法   总被引:2,自引:0,他引:2  
该文结合JPEG图像压缩编码和细胞自动机,提出一种用于JPEG压缩图像的数字盲水印算法。该算法先用Moore型细胞自动机对水印图像进行置乱;随后用2维正交细胞自动机变换将原始灰度图像进行分解,并在分解后得到的低频细胞自动机域系数中嵌入置乱后的水印信息。最后将嵌入了水印的图像按JPEG图像压缩标准进行编码。水印的提取是在解码过程中进行的。实验结果表明,该水印算法有较好的隐藏性;对常见的攻击如JPEG压缩、滤波、剪切、旋转以及加性噪声攻击等有较好的鲁棒性。  相似文献   

3.
文章提出了一种新的结合Arnold置乱变换的复合变换域灰度数字水印嵌入算法。该算法利用系数间的相关性对原始图像离散小波变换后的低频系数LL进行离散余弦变换,然后在其中嵌入水印,在嵌入水印之前对Arnold变换预处理的灰度水印图像作离散余弦变换,这样增强了水印的鲁棒性和不可见性。实验结果证明,该算法能有效抵抗JPEG图像压缩和常见的图像处理操作攻击。  相似文献   

4.
姜军  王朝霞  卓嘎  冯建尚  聂涛远 《电子科技》2013,26(3):143-146,150
提出了一种基于曲波变换的数字水印算法,该算法将水印信息嵌入到曲波变换的粗尺度系数矩阵中,考虑到水印鲁棒性和不可见性的要求,选择合理的嵌入强度,使得加水印图像的不可见性更好。由于选择了代表图像大多数能量的低频系数嵌入,在抵抗JPEG压缩、噪声攻击、中值滤波等攻击性能方面较理想,因此文中算法具有较强的鲁棒性,能满足水印系统不可见性和鲁棒性的要求。  相似文献   

5.
文章提出了一种基于分块思想的DWT-SVD盲数字水印算法,与传统的DWT-SVD算法,将水印信息直接嵌入到载体图像中不同,文章将水印图像进行量化嵌入到载体图像中,水印的提取不需要原始载体图像,可用密钥和量化因子实现盲提取。实验结果表明,该算法能够有效抵抗噪声、滤波等攻击。  相似文献   

6.
抗JPEG压缩攻击的DWT域图像量化水印算法   总被引:6,自引:4,他引:2  
分析了DWT域系数对JPEG压缩的稳定性,在此基础提出了一种新的抗JPEG压缩攻击的DWT域图像量化水印算法。此算法在提取水印时无需原始图像。实验结果表明,该算法对嵌入的水印具有很好的透明性,对JPEG压缩攻击具有很强的鲁棒性,对其他常见的图像处理攻击,如亮度调整、对比度调整、加噪声、重采样、颜色抖动和平滑等,均具有很强的鲁棒性。  相似文献   

7.
针对目前的图像水印难以同时抵抗常规攻击和几 何攻击的不足,提出一种新的轮廓波 水印算法。水印嵌入阶段,该方法将宿主图像进行离散小波变换和非下采样轮廓波变换,并 将水印嵌入到熵值最大的高频子带,解决了将水印嵌入低频无法抵抗几何攻击及高频不能 很好抵抗滤波等常规攻击的问题。在水印嵌入前对嵌入区域进行加密处理,提高算法的安全 性。水印提取阶段,利用Zernike矩对含水印图像进行几何校正再进行提取,进一步提高了 算法的抗几何攻击能力。最后利用峰值信噪比和归一化系数对算法进行评价,验证算法的不 可感知性和鲁棒性。仿真实验结果表明,算法在不同的宿主图像和水印图像上均表现良好。 该算法在具有较好不可见性的基础上,除了对常规攻击具有很好的抵抗力,对几何攻击也具 有强鲁棒性,归一化系数(normalization coefficient,NC)均达到了0.99  相似文献   

8.
针对现有的图像完整性验证水印技术,提出了一种小波域的图像完整性验证水印算法,该算法对小波系数块进行均值量化来实现二值水印信息的嵌入,在鲁棒性和脆弱性方面达到很好的平衡。仿真实验结果证明,该算法能抗常规的非恶意攻击,对于恶意攻击具有很强的识别和定位能力。  相似文献   

9.
提出一种基于小波域图像纹理特征的彩色图像盲水印算法。该算法根据。图像小波变换后小波系数的特点选择视觉重要系数,量化嵌入二值水印序列。利用人类视觉系统的纹理掩蔽特性和照度掩蔽特性自适应调整量化间距,以保证水印的透明性。算法实现了水印的盲检测。仿真实验的结果表明,算法对各种常用的水印攻击方法具有较好的鲁棒性。  相似文献   

10.
DWT域基于系数量化的盲水印算法   总被引:2,自引:0,他引:2  
贺冲  王慧琴 《通信技术》2010,43(3):159-161,164
提出了一种DWT域内基于系数量化的盲提取图像水印算法。通过分块量化DWT域的近似分量来嵌入二值水印信息。水印提取实现了盲提取,并结合Haar小波的特殊性质,增强水印的鲁棒性。仿真实验证明了该算法不仅具有较好的不可见性,而且对常用的普通攻击和诸如旋转、缩放、平移等几何攻击也具有较好的鲁棒性。  相似文献   

11.
彩色数字水印嵌入技术   总被引:30,自引:0,他引:30       下载免费PDF全文
本文提出一种将彩色数字水印嵌入到灰度级图像中的方法.利用静态图像的压缩编码技术,将彩色数字水印编码为一系列二值ID数字,以实现水印的嵌入.由于水印的嵌入过程是基于原始图像的离散余弦变换(DCT)系数之间的关系,所以水印的提取不需要原始图像.实验结果表明本文提出的数字水印技术,经某些图像处理操作和有损压缩后仍是鲁棒的.  相似文献   

12.
We consider optimal formulations of spread spectrum watermark embedding where the common requirements of watermarking, such as perceptual closeness of the watermarked image to the cover and detectability of the watermark in the presence of noise and compression, are posed as constraints while one metric pertaining to these requirements is optimized. We propose an algorithmic framework for solving these optimal embedding problems via a multistep feasibility approach that combines projections onto convex sets (POCS) based feasibility watermarking with a bisection parameter search for determining the optimum value of the objective function and the optimum watermarked image. The framework is general and can handle optimal watermark embedding problems with convex and quasi-convex formulations of watermark requirements with assured convergence to the global optimum. The proposed scheme is a natural extension of set-theoretic watermark design and provides a link between convex feasibility and optimization formulations for watermark embedding. We demonstrate a number of optimal watermark embeddings in the proposed framework corresponding to maximal robustness to additive noise, maximal robustness to compression, minimal frequency weighted perceptual distortion, and minimal watermark texture visibility. Experimental results demonstrate that the framework is effective in optimizing the desired characteristic while meeting the constraints. The results also highlight both anticipated and unanticipated competition between the common requirements for watermark embedding.  相似文献   

13.
文中提出了一种基于Turbo码的DCT变换域直流分量图像水印算法。首先对原始水印信息进行伪随机置乱,接着对置乱的水印进行Turbo编码并进行BPSK调制,生成待嵌入的水印信息。在充分考虑人眼视觉特性的基础上,分别采用两种方式将水印嵌入到DCT变换系数的De分量中,并进行性能比较。丈中对算法在多种常见的攻击如JPEG压缩、噪声、剪切、滤波下进行了仿真。实验结果表明,利用该算法实现的水印具有良好的不可见性和鲁棒性。特别是非自适应加性嵌入方式对JPEG压缩攻击具有很强的鲁棒性。  相似文献   

14.
基于奇异值分解的小波域水印算法   总被引:2,自引:0,他引:2  
文章提出了一种新的小波域奇异值分解的算法,通过对原图像小波分解后的系数进行奇异值分解来嵌入水印,具有很强的抗JPEG压缩能力,并在嵌入水印时采用了自适应嵌入的方法提高了不可见性,还采用了一种基于队列置换的图像置乱技术,提供密钥增加了系统的安全性。  相似文献   

15.
Watermarking 3D models using spectral mesh compression   总被引:1,自引:0,他引:1  
We propose a robust and imperceptible spectral watermarking method for high rate embedding of a watermark into 3D polygonal meshes. Our approach consists of four main steps: (1) the mesh is partitioned into smaller sub-meshes, and then the watermark embedding and extraction algorithms are applied to each sub-mesh, (2) the mesh Laplacian spectral compression is applied to the sub-meshes, (3) the watermark data is distributed over the spectral coefficients of the compressed sub-meshes, (4) the modified spectral coefficients with some other basis functions are used to obtain uncompressed watermarked 3D mesh. The main attractive features of this approach are simplicity, flexibility in data embedding capacity, and fast implementation. Extensive experimental results show the improved performance of the proposed method, and also its robustness against the most common attacks including the geometric transformations, adaptive random noise, mesh smoothing, mesh cropping, and combinations of these attacks.  相似文献   

16.
基于ICA的智能数字水印技术   总被引:3,自引:0,他引:3  
该文提出了一种基于智能信息分析方法--独立分量分析的智能数字水印新算法。水印嵌入之前先对其进行预处理,嵌入过程可以在图像任意作用域中实现,并给出了小波域中的一种闭环嵌入方法。水印嵌入的强度由小波域视觉模型决定。在不需要任何原始图像、水印和攻击类型等信息的情况下,该算法不仅可以检测到水印而且可以完全提取水印,实现了真正意义上的水印盲检测,并对多个水印嵌入的情况也可以进行水印提取。水印检测的精确程度取决于图像与水印之间的独立性以及所采用的密钥。实验过程中攻击由通用水印测试软件Stirmark产生,实验数据证明本文提出的水印算法对Stirmark提供的各种攻击剪切、滤波、图象压缩、删行、删列、几何攻击以及多种攻击同时存在时都具有很好的鲁棒性。  相似文献   

17.
It gets more and more important for video copyright protection, it is necessary to provide e?cient H.264 compression domain watermarking for video Digital rights management(DRM). A new watermarking method based on H.264 compressed domain is proposed for video DRM, in which the embedding and extracting procedure are performed using the syntactic elements of the com-pressed bit stream. In this way, complete decoding is un-necessary in both embedding and extracting processes. Based on the analysis of the time and space, some appro-priate sub-blocks are selected for embedding watermarks, increasing watermark robustness while reducing the dec-lination of the visual quality. In order to avoid bit-rate increasing and strengthen the security of the proposed video watermarking scheme, only a set of nonzero coe?-cients quantized in different parts of macroblocks is chosen for inserting watermark. The experiment results show the proposed scheme can achieve excellent robustness against some common attacks, the proposed scheme is secure and e?cient for video content DRM protection.  相似文献   

18.
Hidden digital watermarks in images   总被引:146,自引:0,他引:146  
An image authentication technique by embedding digital "watermarks" into images is proposed. Watermarking is a technique for labeling digital pictures by hiding secret information into the images. Sophisticated watermark embedding is a potential method to discourage unauthorized copying or attest the origin of the images. In our approach, we embed the watermarks with visually recognizable patterns into the images by selectively modifying the middle-frequency parts of the image. Several variations of the proposed method are addressed. The experimental results show that the proposed technique successfully survives image processing operations, image cropping, and the Joint Photographic Experts Group (JPEG) lossy compression.  相似文献   

19.
基于格的灰度级水印技术   总被引:1,自引:0,他引:1  
李晓强 《电子学报》2006,34(B12):2438-2442
提出一个新的灰度级水印算法.首先,使用量化技术对灰度级水印进行预处理,实现灰度级水印的数据压缩;然后,对原始图像进行小波分解,在小波域中使用格矢量量化技术构造水印的嵌人和提取算法.提取水印不需要原图像.为增强水印的安全性,使用混沌序列作为密钥对水印序列进行调制.实验结果表明,与同类算法相比该算法在获得较好感知质量含水印图像的同时提高了水印的鲁棒性.  相似文献   

20.
An Integrated Approach to Image Watermarking and JPEG-2000 Compression   总被引:4,自引:0,他引:4  
A scheme which integrates image compression and image watermarking in an effective way is proposed in this research. The image compression scheme under consideration is EBCOT (Embedded Block Coding with Optimized Truncation) which has been adopted in the verification model (VM) of the emerging JPEG-2000 image compression standard. The watermark is embedded during the process when the compressed bit-stream is formed, and can be detected on the fly in image decoding. Thus, watermark embedding and retrieval can be done very efficiently in comparison with other existing watermarking schemes. In addition to efficiency, the proposed scheme has many interesting features. The embedded watermark is robust against various signal processing attacks such as coding and filtering while the watermarked image maintains good perceptual quality. The watermark retrieval procedure does not require the knowledge of the original image. Furthermore, the watermark can be detected progressively and region of interest (ROI) watermarking can be accomplished easily.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号