首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 11 毫秒
1.
3维网格数据是不规则采样的数据集,传统的图像变换域水印算法不能直接应用到网格上.提出了一种小波变换域的鲁棒网格水印算法.该算法对半规则的多分辨率网格进行小波变换,得到一个基网格和一系列小波系数.在对小波系数的统计特性进行实验分析的基础上,选择在低频子带的小波系数中嵌入水印,并对小波系数的切向和法向分量设计了不同的嵌入强度,以减小几何失真.实验结果表明,该水印算法满足不可见性,并具有较强的鲁棒性.  相似文献   

2.
祝莹  邵利平 《计算机应用》2015,35(9):2535-2541
传统水印通常对水印嵌入后掩体视觉质量较为关注,而对水印嵌入环节的安全性较为忽视,一些算法尽管提供了水印加密环节,但位置固定,导致嵌入水印易受攻击,而基于参数化小波的水印敏感性在实际中难以应用。针对以上问题,提出一种结合多级小波系数加权均值和量化的可公开敏感水印。在该算法中,首先将掩体图像的消息摘要算法5(MD5)值、用户密钥和初始参数与Logistic映射绑定,用于对水印加密和嵌入环节的多级小波系数进行随机选择;然后通过联合图像专家组(JPEG)压缩的各级小波系数绝对变化量的算术平均值来估算小波系数权重,调整小波系数加权均值以嵌入水印;最后通过孤立黑点滤除策略来提高水印提取质量。理论和实验表明,所提方法具有较好的明文敏感性和密钥敏感性,嵌入水印后图像峰值信噪比(PSNR)可达到45 dB,即使公开水印嵌入环节,嵌入的水印也难以篡改和提取,同时依然对图像剪裁、白噪声、JPEG压缩、覆盖和涂鸦等常规图像攻击具有鲁棒性。  相似文献   

3.
一种带纠错编码的小波域盲水印算法   总被引:5,自引:0,他引:5  
先前众多的DWT(discretewavelettransform)域水印算法几乎都是私有水印或易脆水印,而针对版权保护的鲁棒的、公开的小波域水印算法却极少。文章提出了一种小波域盲水印算法,水印嵌入到小波分解的高频子带,通过采用小波系数的数字化编码技术实现了盲水印的提取。水印在提取过程中不需要任何原始图像信息。为提高水印的鲁棒性,引入了简单的纠错编码机制。  相似文献   

4.
目前,大多数鲁棒图像水印所面临的最大问题就是几何攻击,而现有水印技术大都难以抵抗几何变换类攻击,如旋转、尺度变换等,由于几何攻击破坏了水印分量的同步,即使微小幅度的图像旋转或尺度变换都可能导致水印检测过程失败.提出了一种基于奇异值分解和小波变换的方法来盲提取受到几何攻击后的图像中的水印,即利用了奇异值对几何失真的稳健性,又利用了小波变换对一般攻击的稳健性.实验证明,提出的方法对几何攻击具有很好的鲁棒性.  相似文献   

5.
基于整数小波变换的医学图像易碎水印方法   总被引:2,自引:1,他引:2       下载免费PDF全文
为了对医学图像进行快速鲁棒的认证提出了一种基于整数小波变换的易碎水印算法.该算法首先利用小波分解后的四叉树结构结合树节点上的统计信息和密钥来选择嵌入水印的位置,然后对确定嵌入水印的位置只嵌入1bit的水印信息.该算法具有以下特点:(1)图像嵌入水印后具有较高的信噪比,适用于医学图像的认证;(2)结合小波系数的统计信息来选择嵌入水印的位置,可保证水印的易碎性;(3)小波分解在空频域的特性使得算法对篡改有很强的定位能力;(4)可利用密钥对本算法进行保护,即使算法公开,也能抵挡恶意攻击.实验结果表明,该算法适用于医学图像的认证,并且复杂度较低,实用性较强.  相似文献   

6.
提出了一种针对MPEG-4二维网格动画的强健数字水印系统的实现方法:首先利用多层解析分析将二维网格动画中的运动特征提取出来,再以扩频技术将水印信息分散到这些运动特征中,同时利用空间平面校正技术来解决几何转换所造成的网格位置偏移问题。使用了仿射变换攻击、平滑化攻击、强化及衰减攻击、随机噪声攻击以及混合性攻击来测试生成的水印系统。实验结果显示该水印系统实现方法能有效地抵抗上述攻击。  相似文献   

7.
基于混沌和SVD DWT的稳健数字图像水印算法*   总被引:6,自引:1,他引:5  
针对现有适用于图像的数字水印对信号处理和几何失真比较敏感的问题,提出一种稳健的数字图像水印算法。该算法先对整个图像应用三级离散小波变换,再对低频域运用奇异值分解,并通过修改奇异值,嵌入经过混沌置乱的水印图像的奇异值,在小波变换域的中频系数上嵌入水印信息。水印检测时,分别在中频区域和低频提取水印并进行比较,采用效果较好的水印作为检测水印。实验结果表明,该方法对一般的信号处理操作及几何攻击等均具有较好的鲁棒性。  相似文献   

8.
Distinct from image and video watermarking, a watermarking scheme for 3D animation content is required in the 3D industry market for various applications. This paper develops a watermarking scheme for copyright protection and authentication of 3D animation content. A 3D animated model generally has a hierarchical structure with a number of transform nodes of a geometry node and an interpolator node for the timeline in contrast to a 3D polygon mesh model. The proposed scheme embeds not only a robust watermark into the geometry node for copyright protection but also a fragile watermark into the position and orientation interpolators for content authentication. We named the former “robust geometry watermarking” and the latter “fragile interpolator watermarking”. The proposed scheme performs the two watermarking schemes independently to realize simultaneously robust and fragile watermarked 3D animated model. Experimental results confirm that a watermark embedded by geometry watermarking robust to many attacks from commercial 3D editing tools while a watermark embedded by interpolator watermarking fragile to the same attacks.  相似文献   

9.
自适应于局部几何特征的三维模型水印算法   总被引:7,自引:0,他引:7  
文章针对三维模型提出了一种稳健的三角网格数字水印算法,通过修改从模型中心到各顶点的向量长度来嵌入数字水印。该算法具有如下特点:以全局几何特征作为嵌入对象;将一比特的水印信息分布到整个模型之中;水印的嵌入强度自适应于模型的局部特征。实验结果表明该水印算法能抵抗网格简化攻击,噪声攻击,剪切攻击,以及它们的混合攻击,具有很高的稳健性。  相似文献   

10.
目的 基于数字水印技术的音乐作品版权保护是学术界的研究热点之一,多数数字音频水印方案仅仅能够对抗简单的常规信号处理,无法有效抵抗破坏性较强的一般性去同步攻击。为此,提出了一种基于稳健局部特征的非下采样小波域数字水印算法。方法 利用非下采样小波域平滑梯度检测算子从载体音频中提取稳定的音频特征点,结合数字音频样本响应确定局部特征音频段,采用量化调制策略将数字水印信号重复嵌入局部特征音频段中。结果 选取4段典型的采样频率为44.1 kHz、量化精度为16 bit、长度为15 s的单声道数字音频信号作为原始载体进行测试,并与经典算法在不可感知性和鲁棒性两方面进行对比。结果表明,本文算法在含水印音频与原始载体音频间的信噪比平均提升了5.7 dB,同时常规攻击和去同步攻击下的平均检测率分别保持在0.925和0.913,高于大多数传统算法,表明了本文算法具有较好的不可感知性。在常规信号处理(MP3压缩、重新量化、重新采样等)和去同步攻击(幅度缩放、随机剪切、音调伸缩、DA/AD转换、抖动等)方面均具有较好的鲁棒性。结论 本文利用描述能力强且性能稳定的平滑梯度刻画局部数字音频性质,提出一种基于平滑梯度的非下采样小波域音频特征点提取方法,有效解决了音频特征点稳定性差且分布极不均匀的缺点,提高了数字音频水印对音调伸缩、随机剪切、抖动等攻击的抵抗能力。  相似文献   

11.
We introduce a set theoretic framework for watermarking. Multiple requirements, such as watermark embedding strength, imperceptibility, robustness to benign signal processing, and fragility under malicious attacks are described as constraint sets and a watermarked image is determined as a feasible solution satisfying these constraints. We illustrate that several constraints can be formulated as convex sets and develop a watermarking algorithm based on the method of projections onto convex sets. The framework allows flexible incorporation of different constraints, including embedding strength requirements for multiple watermarks that share the same spatial context and different imperceptibility requirements based on frequency-weighted error and local texture perceptual models. We illustrate the effectiveness of the framework by designing a hierarchical semifragile watermark that is tolerant to mild compression, allows tamper localization, and is fragile under aggressive compression. Using a quad-tree representation, a spatial resolution hierarchy is established on the image and a watermark is embedded corresponding to each node of the hierarchy. The spatial hierarchy of watermarks provides a graceful tradeoff between robustness and localization under mild JPEG compression, where watermarks at coarser levels demonstrate progressively higher immunity to JPEG compression. Under aggressive compression, watermarks at all hierarchy levels vanish, indicating a lack of trust in the image data. The constraints implicitly partition watermark power in the resolution hierarchy as well as among image regions based on robustness and invisibility requirements. Experimental results illustrate the flexibility and effectiveness of the method  相似文献   

12.
This paper presents a new approach for speech signal watermarking using encrypted watermarks. The objective of this approach is to increase the degree of security of speech watermarking. In the proposed framework, watermark embedding is implemented with singular value decomposition due to its robustness to attacks. Moreover, two encryption schemes are tested for watermark image encryption; chaotic encryption due to its permutation nature and data encryption standard (DES) due to its diffusion nature. Overall and block-by-block watermarking scenarios are tested and compared for speech signal watermarking. Different modes of operation of the DES are investigated for watermark image encryption. These modes are the electronic code book, cipher block chaining, cipher feedback, and output feedback (OFB) modes. Simulation results reveal that the DES with OFB mode and the chaotic Baker map encryption make the system less sensitive to attacks with good quality of extracted watermarks.  相似文献   

13.
A blind watermarking method using maximum wavelet coefficient quantization   总被引:3,自引:0,他引:3  
This paper proposes a blind watermarking algorithm based on maximum wavelet coefficient quantization for copyright protection. The wavelet coefficients are grouped into different block size and blocks are randomly selected from different subbands. We add different energies to the maximum wavelet coefficient under the constraint that the maximum wavelet coefficient is always maximum in a block. The watermark is embedded the local maximum coefficient which can effectively resist attacks. Also, using the block-based watermarking, we can extract the watermark without using the original image or watermark. Experimental results show that the proposed method is quite robust under either non-geometry or geometry attacks.  相似文献   

14.
基于DFT的鲁棒三维网格模型数字水印算法   总被引:3,自引:0,他引:3  
刘旺  孙圣和 《计算机工程与应用》2006,42(14):192-196,207
论文提出了一种基于离散傅立叶变换(DFT)的鲁棒三维网格数字水印嵌入算法,该算法首先将模型中心到顶点的长度进行DFT变换,然后通过修改DFT系数的模来嵌入水印。算法以全局特征作为嵌入对象,并且将1位水印信息分布到整个模型之中。实验结果表明该算法能够抵抗网格简化、加噪声、剪切等类型攻击以及它们的混合攻击,具有很好的鲁棒性。  相似文献   

15.
A Frequency-Domain Approach to Watermarking 3D Shapes   总被引:11,自引:0,他引:11  
This paper presents a robust watermarking algorithm with informed detection for 3D polygonal meshes. The algorithm is based on our previous algorithm [ 22 ] that employs mesh‐spectral analysis to modify mesh shapes in their transformed domain. This paper presents extensions to our previous algorithm so that (1) much larger meshes can be watermarked within a reasonable time, and that (2) the watermark is robust against connectivity alteration (e.g., mesh simplification), and that (3) the watermark is robust against attacks that combine similarity transformation with such other attacks as cropping, mesh simplification, and smoothing. Experiment showed that our new watermarks are resistant against mesh simplification and remeshing combined with resection, similarity transformation, and other operations..  相似文献   

16.
提出了一种结合小波域和空域的图像数字水印新算法。依据重要性将原始水印分成两部分,分别嵌入载体图像小波域和空域。并利用混沌系统对水印序列的嵌入位置进行置乱。重要水印嵌入小波域多级分解的低频子图;采用二值量化算法。其余水印嵌入载体空域非LSB的中间比特位;并采用最小化像素改变策略。实验结果证明了该算法在提高水印容量的同时,嵌入水印也具有很好的安全性、隐蔽性和鲁棒性。  相似文献   

17.
提出了一种基于小波变换的强壮三维网格模型数字水印算法。首先采用一种平面参数化算法将三维网格模型映射为二维参数网格,三维网格模型表面的几何信号相应转换为二维信号,然后采用一种自适应小波水印算法加入水印。实验结果显示该水印算法能够抵抗各种几何信号处理攻击。  相似文献   

18.
This paper presents a new robust, blind and good imperceptibility 3D mesh double watermarks algorithm. Two different kinds of watermarks are embedded into one 3D mesh model. One watermarking algorithm based on mesh feature segmentation and the DCT transformation, the other based on redundancy information of 3D model. The two watermarks do not disturb each other during embedding and extracting. Several mesh models are applied to test the robustness, imperceptibility and efficiency of the proposed algorithm. The experimental results show that the proposed watermark scheme can not only keep good imperceptibility but also resist various attacks, such as similarity transformations (translation, rotation, scaling and combinations of the three operations), file attack, signal processing attacks (noising, smoothing and vertex coordinate quantization) and connectivity attacks (cropping).  相似文献   

19.
基于混沌序列的多重数字图像水印算法   总被引:18,自引:0,他引:18  
纪震  肖薇薇  王建华  张基宏 《计算机学报》2003,26(11):1555-1561
采用一维混沌映射,根据不同的混沌初始条件生成多个互不相关的混沌实值序列,进而得到性能良好的多重数字图像水印信号,有效地解决了多重数字图像水印信号的构造问题.同时采用二维混沌映射将各水印信号置乱,随机均匀地叠加在图像小波变换的中低频系数上,各水印信号的嵌入和提取可以互不干扰,解决了多重数字图像水印的嵌入问题.实验结果表明,该算法对各种常见的攻击均具备了一定的抵抗能力,可有效地解决数字图像产品的多著作权问题.  相似文献   

20.
基于整数小波变换和混沌映射的盲数字水印算法   总被引:1,自引:0,他引:1  
介绍一种基于整数小波变换和混沌映射的盲数字水印技术。利用广义Arnold混沌映射对水印图像进行置乱,利用整数小波变换对载体图像进行三级小波分解,然后用Logistic混沌映射随机产生各水印比特嵌入第二层高频部分HH2中整数小波系数的比特位置。水印的提取不需要原始图像。实验结果表明该算法嵌入的数字水印既有很好的隐蔽性,又能抵抗剪切和JPEG压缩的攻击.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号