首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 968 毫秒
1.
Watermarking is the process of embedding the particular information into the audio signal for managing the ownership copyrights through wireless network. During the watermarking process, the audio signal consumes high energy, conflicting problem of robustness and imperceptibility, signal to noise ratio, bit error rate and normalized correlation. To overcome these issues present in the audio watermarking process, novel wavelet decomposition and evolutionary algorithm is utilized. Initially the input information or message has been split into two and the spillted message is watermarked using the audio and the image in wireless network. The first half of the message is watermarked with the help of the image and the next half of the image is watermarked by audio. Initially the watermarked image is transferred into YIQ image, from the transferred image the scrambled image is generated with the help of the Hidden Markov tree counter let wavelet transform method for generating the watermarking image. Then the next part of information is watermarked by audio signal which is decomposed into various sub bands using the Multi-resolution complex dual tree wavelet method. From the decomposed audio signal, the message authentication code based watermarks have been embedded in the lower frequency coefficients. Then the embedded process is performed by using the Dead zone quantization process which is optimized with the help of the Fireflies algorithm for enhancing the quality of the watermarking process. Finally both watermarking process is embedded for improving the security to the information with efficient manner through wireless network. In addition the efficient watermarking process through wireless network reduces the various attacks while extracting the water marker. Thus the optimized wavelet and quantization process improves the image and audio watermarking through wireless network and efficiency of the proposed system is evaluated using the experimental results in terms of the Signal to noise ratio, normalized correlation and bit error rate.  相似文献   

2.
An innovative watermarking scheme based on progressive transmission with genetic algorithms (GAs) is proposed. We implement the watermarking embedding and extraction systems in the transform domain, and apply the JPEG spectral selection mode for scalable transmission of the watermarked image. By employing a GA with a proper fitness function into the watermarking system, both the watermark imperceptibility and watermark robustness requirements are considered and optimized. The number of embedded bits, or the watermark capacity, is much larger than that in other existing algorithms in the literature. Also, the watermark capacity in the proposed algorithm lies within the theoretical limit. In addition, the embedded watermark can be partly extracted at the receiver side even when the watermarked image is being transmitted. Simulation results show both the robustness and the effectiveness of progressive transmission under different attacking schemes and different bandwidth variations. The proposed scheme is directly applicable to scalable coding of multimedia, such as MPEG-4 scalable video coding.  相似文献   

3.
针对现有视频水印算法稳健性不足的问题,结合人类视觉系统,提出一种基于小波变换域的运动目标检测视频水印算法。该算法首先将原始帧图像进行8×8分块,分别对每一子块进行Daubechies复杂小波分解,采用基于近似中值滤波的帧间差分法,有效地解决阴影、重影、噪声等问题,更加准确地检测运动目标并标记运动区域;然后对水印进行Arnold置乱和混沌加密预处理,来加强水印的安全性;最后将预处理后的水印自适应嵌入在运动区域和高纹理复杂区域中。实验结果表明,该算法具有较好的不可感知性,并对常见的视频攻击具有较好的稳健性。与现有三种算法的性能比较,说明了本算法的优越性。  相似文献   

4.
In this dissertation, sereral key problems in the field of steganographic image security are mainly studied and discussed: (1) A novel kind of image cryptosystem is studied. The encrypted information of secret image is embedded into an ordinary image, which can be transmitted publicly, and it will not cause attention of illegal eavesdropper. The following results are achieved: (a) The image hiding algorithm and its improved algorithm based on wavelet transform and vector quantization are propo…  相似文献   

5.
Robust reversible watermarking can provide robustness against various attacks besides the ability to recover the cover image. However, robustness and reversibility are somewhat separate in many schemes. The original cover image cannot be recovered even if the watermarked image suffers from a tiny distortion. This paper presents a new robust reversible watermarking scheme by exploring the reversibility of spread-spectrum codes. Watermark bits are embedded by a suggested adaptive spread-spectrum code. The embedding amplitude used in the algorithms is determined by quantizing the source interference of the cover. The proposed scheme is robust to various attacks. Furthermore, since the embedding amplitude is available at the receiver, the original image can be recovered losslessly when there is no attack. Even in the presence of attacks, the original cover images can still be partially recovered. Experimental results demonstrate that the proposed scheme performs well on robustness and watermarked image quality, and provide extra reversibility that resists image distortions.  相似文献   

6.
Digital image watermarking has justified its suitability for copyright protection and copy control of digital images. In the past years, various watermarking schemes were proposed to enhance the fidelity and the robustness of watermarked images against different types of attacks such as additive noise, filtering, and geometric attacks. It is highly important to guarantee a sufficient level of robustness of watermarked images against such type of attacks. Recently, Deep learning and neural networks achieved noticeable development and improvement, especially in image processing, segmentation, and classification. Therefore, in this paper, we studied the effect of a Fully Convolutional Neural Network (FCNN), as a denoising attack, on watermarked images. This deep architecture improves the training process and denoising performance, through which the encoder–decoder remove the noise while preserving the detailed structure of the image. FCNNDA outperforms the other types of attacks because it destroys the watermarks while preserving a good quality of the attacked images. Spread Transform Dither Modulation (STDM) and Spread Spectrum (SS) are used as watermarking schemes to embed the watermarks in the images using several scenarios. This evaluation shows that such type of denoising attack preserves the image quality while breaking the robustness of all evaluated watermarked schemes. It could also be considered a deleterious attack.  相似文献   

7.
基于小波变换的信息隐藏技术的改进   总被引:1,自引:0,他引:1  
数字水印的稳健性体现了水印在数字文件中的生存能力,当前大多数算法均具有一定的稳健性,但是如果同时运用各种图像攻击,那么大部分算法均会失效。如何寻找更加稳健的水印算法仍是一个急需解决的问题。文中首先介绍了小波分析原理和数字水印算法,并且进行了仿真。由于Arnold变换具有周期性,文中重点讨论了一种基于小波分析的数字水印改进算法,该算法利用Arnold变换和亚放射变换进行双重图像置乱,能防止多次Arnold变换还原水印图像的攻击,经过仿真验证,具有更好的抗JPEG压缩攻击。  相似文献   

8.
为了解决预测误差方法在预测精度和图像不可感 知性上的不足,提出一种基于改进PVO的自适应选块可逆图像水印算 法。首先对原始图像进行分块,并利用子块内相关像素不平均值之间的梯度计算子块 噪声级;然后结合像素值排序预测 算子得到预测误差直方图;最后根据子块噪声级自适应地选择水印的嵌入位置,并采用本 文算法进行水印嵌入。本 算法可以根据原始图像的特性自适应选择水印嵌入的子块,提高了像素预测精度,减少了水 印嵌入产生的失真;提取水印信息 后,可以无失真地恢复原始图像。实验结果表明,本文针对噪声级判断以及PVO算法的改进 策略可以有效提升可逆图像水印 算法的性能,在相同的嵌入容量下,本算法嵌入水印后的图像峰值信噪比较相关文献平均提 高了1.3%左右,具有更好的不可感知性。  相似文献   

9.
论述了DWT(离散小波变换)域中的一种音频水印的嵌入和提取算法,此算法能够实现盲检测,并在Matlab软件中进行了仿真实验。实验结果表明,此算法具有较好的不可感知性,并且对叠加噪声、重采样、重量化、回声、MP3压缩等攻击具有较好的鲁棒性。  相似文献   

10.
This study analyzes the recent image watermarking schemes based on redundant discrete wavelet transform (RDWT) and singular value decomposition (SVD), and shows that in fact they are insecure and cannot be used for protecting the rightful ownership. The RDWT-SVD watermarking directly embeds a grayscale watermark image of the same size with the host image into the singular value matrix of the RDWT-transformed host image, then produces the left and right orthogonal matrices as side information which is later used in the watermark extraction stage. The RDWT-SVD approach enjoys the advantage of the RDWT redundancy to achieve a high embedding capacity, and preserves the watermark imperceptibility by exploiting the SVD stability properties. It is claimed that RDWT-SVD watermarking is robust against several common image processing and geometrical attacks, yet a fundamental flaw in the RDWT-SVD scheme is found, which leads to severe the false positive issue. Three vulnerable attacks should be considered in the RDWT-SVD scheme: (1) An attacker can easily claim the owner watermarked image; (2) the owner has the ambiguity because of the wrong side information usage, and (3) the owner can extract the correct watermark from arbitrary image. Thus, it is important to highlight these attacks when implementing the RDWT-SVD watermarking scheme.  相似文献   

11.
提出一种基于QR分解的小波域图像水印算法,是将水印信息矩阵做QR分解并嵌入到做离散小波变换后的载体图像的两个特殊的区域.首先将原始图像进行归一化处理后做离散小波变换,并计算出嵌入区域的嵌入强度;再将水印按照密钥进行置乱;然后再对置乱后的信息做正交分解,得到两个正交矩阵;分别将这两个正交矩阵使用加性规则自适应地嵌入到小波变换域的低频和对角方向上;最后小波逆变换得到含水印的图像.实验结果证明,本算法具有较好的鲁棒性、安全性和不可见性,特别是抗几何攻击效果尤其明显.  相似文献   

12.
A watermarking scheme designed for remote sensing images needs to meet the same demand of both invisibility as for ordinary digital images.Due to specific perceptual characteristics of Synthetic Aperture Radar (SAR) images,the watermarking algorithms with consideration of Human Vision System (HVS) modeling from optical images give poor performance when applied on SAR images.This paper examines a variety of factors affecting the noise sensitivity,and further proposes a refined pixel-wise masking approach for watermarking on SAR images.The proposed approach is applied on logarithmic transformed SAR images,and has increased the acceptable watermark embedding strength by about 6 dB to 10 dB while achieving the same levels of watermarked image visual quality.Experimental results show that this approach enhanced the perceptual invisibility of watermarking based on wavelet decomposition.  相似文献   

13.
谢斌  彭林  刘珊 《电视技术》2015,39(21):10-14
针对传统离散小波变换(DWT)水印算法不能较好地抵抗几何攻击的缺点,提出了一种基于离散小波变换(DWT)和奇异值分解(SVD)相结合的彩色图像水印新算法。首先对原始彩色载体图像进行RGB三基色分解,然后进行离散小波变换,再选取四个子块的四分之一重构成新子块,并进行二次离散小波变换,最后对其低频部分进行奇异值分解嵌入水印信息,得到嵌入水印的彩色图像。实验结果表明,该算法能够较好地抵抗诸如高斯噪声、椒盐噪声、压缩等常规攻击,并对大角度旋转、任意角度旋转、剪切加旋转等几何攻击也表现出了较强的鲁棒性,其总体性能明显优于传统的DWT水印算法。  相似文献   

14.
In this paper, a wavelet-based watermarking scheme for color images is proposed. The watermarking scheme is based on the design of a color visual model that is the modification of a perceptual model used in the image coding of gray scale images. The model is to estimate the noise detection threshold of each wavelet coefficient in luminance and chrominance components of color images in order to satisfy transparency and robustness required by the color image watermarking technique. The noise detection thresholds of coefficients in each color component are derived in a locally adaptive fashion based on the wavelet decomposition, by which perceptually significant coefficients are selected and a perceptually lossless quantization matrix is constructed for embedding watermarks. Performance in terms of robustness and transparency is obtained by embedding the maximum strength watermark while maintaining the perceptually lossless quality of the watermarked color image. Simulation results show that the proposed scheme is more robust than the existing scheme while retaining the watermark transparency.  相似文献   

15.
Hong Peng  Jun Wang 《电信纪事》2011,66(5-6):307-318
Designing an optimal audio watermarking system is an open difficult issue since its two basic performance measures, i.e., imperceptibility and robustness, are conflicting with each other. So, an optimal audio watermarking scheme needs to optimally balance both imperceptibility and robustness. In order to realize such an optimal watermarking system, by considering the balance as an optimization problem, we propose an optimal audio watermarking scheme using genetic optimization with variable-length mechanism in this paper. The presented genetic optimization procedure can automatically determine optimal embedding parameters for each audio frame of an audio signal. Specially, employed variable-length mechanism can effectively search most suitable positions for watermark embedding, including suitable audio frames and their AC coefficients. By dint of the genetic optimization with variable-length mechanism, proposed audio watermarking scheme can not only guarantee good quality of watermarked audio signal but also effectively improve its robustness. Experimental results show that proposed watermarking scheme has good imperceptibility and high capability against common signal processing and some desynchronization attacks.  相似文献   

16.
This article proposes a blind discrete wavelet transform-discrete cosine transform (DWT-DCT) composite watermarking scheme that is robust against print and scan distortions. First, two-dimensional DWT is applied to the original image to obtain the mid-frequency subbands. Then, a one-dimensional DCT is applied to the selected mid-frequency subbands to extract the final coefficients for embedding the watermark. To specify watermarking parameters, we utilize a Genetic Algorithm to achieve a predefined image quality after watermark insertion. Suitable locations for watermarking are determined by analyzing the effect of a modeling algorithm. This model simulates noise and nonlinear attacks in printers and scanners through noise estimation and system identification methods. The experimental results demonstrate that the proposed algorithm has a high robustness against print and scan attack such that its robustness is higher than related watermarking algorithms.  相似文献   

17.
In 2007, Wang-Chen proposed a majority-voting based self-recovery watermarking scheme, in which the additional authentication watermark of each block was embedded in the less significant bits and used to examine the authenticity of the same block. In this paper we examine the security of the Wang-Chen self-recovery watermarking scheme and show that it is vulnerable to the proposed XOR-equivalent attack. Specifically, given a watermarked image, one can forge the authentication watermark it contains into another image by the proposed XOR-equivalent attack. Experimental results are given to support our conclusions and demonstrate that our attack is successful in forging watermarked image. This implies that it is insecure to detect the validity of image block only by the additive authentication watermark embedded in the same block in self-recovery watermarking techniques.  相似文献   

18.
Copyright protection and proof of ownership are two of the main important applications of the digital image watermarking. The challenges faced by researchers interested in digital image watermarking applications lie in the creation of new algorithms to serve those applications and to be resistant to most types of attacks, especially the geometrical attacks. Robustness, high imperceptibility, security, and large capacity are four essential requirements in any watermarking scheme. This paper presents a new image watermarking scheme based on the Redundant Discrete Wavelet Transform (RDWT) and the Singular Value Decomposition (SVD). The gray scale image watermark was embedded directly in the singular values of the RDWT sub-bands of the host image. The scheme achieved a large capacity due to the redundancy in the RDWT domain and at the same time preserved high imperceptibility due to SVD properties. Embedding the watermarking pixel's values without any modification inside the wavelet coefficient of the host image overcomes the security issue. Furthermore, the experimental results of the proposed scheme showed a high level of robustness not only against the image processing attacks but also against the geometrical attacks which are considered as difficult attacks to resist.  相似文献   

19.
图像高逼真度的自适应盲水印算法   总被引:3,自引:0,他引:3  
王沛  余松煜 《电子与信息学报》2003,25(10):1349-1354
随着计算机和网络技术的飞速发展,数字图像、音频和视频产品越来越需要一种有效的版权保护方法,所谓数字水印就是一种嵌入到图像、视频或音频数据中的不可见标志,可以用于多媒体数据的版权保护、认证和标注等。该文提出了一个有效的自适应育水印算法,在水印检测过程中不需要原始图像。原始图像经小波变换后,选择内嵌水印所需要的子带,水印根据邻居特征平均值法和奇偶判决法内嵌到频域中所选择的子带上。实验结论和攻击测试表明,该文所提议的算法能得到高逼真度的加水印图像,对如 JPEG有损压缩、中值滤波、附加噪声、伸缩、裁剪等各种图像处理的攻击有较强的稳健性。  相似文献   

20.
一种基于边信息的数字水印算法   总被引:7,自引:0,他引:7  
借鉴边信息通信模型的思路,本文提出了一种小波域的数字水印的嵌入和提取算法,且提取时无需原始图像。该方法对原始图像小波变换后的系数,根据其对人类视觉影响的特性,选择出可嵌入信息的系数位置,并以边信息的方式记录下来,然后采取类似扩频的思想进行水印信息的嵌入。算法中为增强安全性,还对系数进行了随机抽取。实验结果表明该算法具有强不可察觉性、高容量性和抗击常见方法干扰的顽健性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号