排序方式: 共有10条查询结果,搜索用时 15 毫秒
1
1.
一种基于时间戳认证的零水印方案设计 总被引:1,自引:0,他引:1
零水印方法是一种新的数字水印方法。本文介绍了零水印的概念及零水印技术的关键问题,提出了一种基于时间戳认证的零水印方案。该方案很好地解决了非零水印的不可见性与鲁棒性之间的矛盾,具有可行性和通用性。 相似文献
2.
对传统的数据库数字水印技术进行分析,结合关系数据库零水印一般模型,提出一种基于改进型C4.5算法的关系数据库零水印模型。重点研究该模型关系数据库零水印构建算法并进行定性分析,发现算法具有更广的适用性和更好的鲁棒性。 相似文献
3.
At present, it is difficult for the multiple images zero-watermark algorithm to protect all the images in the image set, and repeated operations will reduce the efficiency of the algorithm. To solve these issues, the proposed algorithm can design a reasonable copyright protection scheme according to the number of images in the image set to realize the protection of all images, and reduce the cost of time and storage. The gray-weighted average image fusion method is used to fuse multiple normalized standard images into one image. The LWT(Lifting the Wavelet Transform)-QR decomposition is applied to the effective area of the fusion image to obtain the robust feature image. Non-extended visual cryptography is used to enhance the security of the algorithm. A zero-watermark image is obtained by using the XOR manipulation for the feature image and the public shared image. Experimental results demonstrate that the proposed algorithm has good performance. 相似文献
4.
《Signal Processing: Image Communication》2014,29(1):167-176
As a practical and novel application of watermarking, this paper presents a zero-watermarking based objective reduced-reference stereoscopic image quality assessment (RR-SIQA) method. In the proposed method, two kinds of zero-watermarks are constructed according to the characteristics of image structure and stereoscopic perception. Concretely, two view zero-watermarks, which are constructed by judging the relation of the horizontal and vertical components of gradient vectors with respect to the two views, are used to reflect the image structure variation of the stereoscopic image. Meanwhile, a disparity zero-watermark, which is constructed with disparity map of the stereoscopic image, is used to reflect the stereoscopic perception quality variation. Then, the quality of stereoscopic image is objectively assessed by pooling the recovering rates of the detected zero-watermarks. The experimental results show that the stereoscopic image quality evaluation results assessed with the proposed RR-SIQA method are well consistent with subjective assessment, and the proposed method achieves better performance than the widely used full-reference stereoscopic image quality assessment method PSNR in assessing quality of stereoscopic images compressed with JPEG and JPEG2000. 相似文献
5.
通过分析人类视觉系统的纹理方向特性和立体感知特性,并结合数字水印的半脆弱性和支持向量回归(Support Vector Regression,SVR)的泛化学习能力,该文提出一种基于视觉感知和零水印的部分参考立体图像质量客观评价模型。该模型利用立体图像左右视点经小波分解后在同一空间频率的水平和垂直方向子带系数关系构造反映图像纹理方向特征的视点零水印,同时,利用左右视点视差值与自适应阈值的大小关系构造反映立体感质量的视差零水印,然后利用SVR来学习两类零水印恢复率(视觉加权视点零水印恢复率和视差零水印恢复率)与主观评价值的关系,最后用训练好的SVR完成立体图像质量预测。实验结果表明该模型符合人眼视觉特性,所得到的客观评价值与主观评价值具有较好的一致性。 相似文献
6.
7.
一种基于混沌阵列的鲁棒零水印算法 总被引:6,自引:0,他引:6
本文提出了一种基于混沌阵列的鲁棒零水印算法.它首先构造一个混沌阵列,然后利用该混沌阵列来在图像中寻找“嵌入1”位置,得到该位置的像素值的最高有效位,再通过和水印信息的比较结果来在混沌阵列中设置标志,构造出最终的水印阵列.实验表明,该水印方案具有良好的鲁棒性,能够抵抗剪切、加扰、旋转、滤波、缩放、JPEG压缩等常见的有意和无意攻击. 相似文献
8.
9.
10.
In this paper, three robust zero-watermark algorithms named Direct Current coefficient RElationship (DC-RE), CUmulant combined Singular Value Decomposition (CU-SVD), and CUmulant combined Singular Value Decomposition RElationship (CU-SVD-RE) are proposed. The algorithm DC-RE gets the feature vector from the relationship of DC coefficients between adjacent blocks, CU-SVD gets the feature vector from the singular value of third-order cumulants, while CU-SVD-RE combines the essence of the first two algorithms. Specially, CU-SVD-RE gets the feature vector from the relationship between singular values of third-order cumulants. Being a cross-over studying field of watermarking and cryptography, the zero-watermark algorithms are robust without modifying the carrier. Numerical simulation obviously shows that, under geometric attacks, the performance of CU-SVD-RE and DC-RE algorithm are better and all three proposed algorithms are robust to various attacks, such as median filter, salt and pepper noise, and Gaussian low-pass filter attacks. 相似文献
1