首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
A new robust reference logo watermarking scheme   总被引:1,自引:1,他引:0  
In this paper, a new yet simple reference logo watermarking scheme based on fractional Fourier transform (FrFT) and singular value decomposition (SVD) is proposed. The core idea of the proposed scheme is to segment host image into non-overlapping blocks by the means of Hilbert space filling curve and a reference image is formed by considering Human visual system (HVS). First, reference image is transformed into FrFT domain and embedding is done by modifying singular values of the reference image using singular values of watermark. After embedding, modified reference image is segmented into blocks and these modified blocks are mapped into their original places for constructing watermarked image. For extraction, a reliable watermark extraction scheme is proposed. The experimental results demonstrate better visual imperceptibility and resiliency of the proposed scheme against intentional or un-intentional variety of attacks.  相似文献   

2.
Generally, in watermarking scheme the size of the watermark is very small when compare to host image. On the contrary, this is an attempt in which a new watermarking scheme is presented where the size of host image is very small when compare with watermark image. The core idea of the proposed scheme is to scale up the size of host image equal to the size of watermark via over-sampling and then decompose it using stationary wavelet transform. A gray scale watermark is embedded in the low frequency sub-band at the finest level using singular value decomposition. To prevent ambiguity and enhance the security, a binary watermark is also embedded in loss-less manner. Finally, a reliable watermark extraction scheme is developed for extracting both the watermarks. The experimental results demonstrate better visual imperceptibility and resiliency of the proposed scheme against intentional or un-intentional variety of attacks.  相似文献   

3.
This paper presents an optimized watermarking scheme based on the discrete wavelet transform (DWT) and singular value decomposition (SVD). The singular values of a binary watermark are embedded in singular values of the LL3 sub-band coefficients of the host image by making use of multiple scaling factors (MSFs). The MSFs are optimized using a newly proposed Firefly Algorithm having an objective function which is a linear combination of imperceptibility and robustness. The PSNR values indicate that the visual quality of the signed and attacked images is good. The embedding algorithm is robust against common image processing operations. It is concluded that the embedding and extraction of the proposed algorithm is well optimized, robust and show an improvement over other similar reported methods.  相似文献   

4.
In this paper, a robust semi-blind watermarking scheme for color images, based on multiple decompositions is proposed to preserve the copyrights of the owner. Using multiple decompositions, the gray watermark is embedded into a host color image. Prior to that, to enhance security the gray watermark is encrypted with Arnold transform and SVD by generating secret keys. The luminance component of the given host image is subjected to discrete wavelet transform(DWT), contourlet transform(CT), Schur decomposition and singular value decomposition(SVD) in sequence and finally the watermark is embedded. In the semi-blind extraction process, the watermark is extracted without the help of the original host image. Experimental results show that the proposed watermarking scheme has better visual imperceptibility and high robustness against image & signal processing attacks compared to other methods.  相似文献   

5.
提出了一种基于奇异值分解的量化水印盲检算法.利用图像矩阵的奇异值稳定性好且最大奇异值远远大于其他奇异值的特点,首先时分块图像最大奇异值进行量化,再结合其奇偶性将二值水印嵌入量化后的奇异值中.实验结果表明,水印算法在满足较好的不可见性和较强的鲁棒性的同时;还可实现水印的盲提取.  相似文献   

6.
方旺盛  张蓉 《计算机应用研究》2012,29(11):4323-4326
为了保护数字彩色图像版权,提出了一种结合离散小波变换(DWT)和矩阵奇异值分解(SVD)的彩色图像自适应水印算法。其主要设计思想是:先将原RGB彩色图像的各颜色分量进行小波分解;再将得到的中、低频带的小波系数与原水印图像分别进行奇异值分解,水印信息的奇异值重复嵌入到三通道中、低频带的小波系数奇异值中,且利用临界视觉阈值与奇异值之间的关系对水印嵌入强度作自适应调节,从而达到增强水印鲁棒性和确保水印透明性的目的。本算法适用于二值及灰度水印,在二值水印的提取过程中需设定一个提取阈值,以保证提取水印的完整性。仿真结果说明本算法对水印系统的透明性与鲁棒性作了较好的协调,是一种较稳健的算法。  相似文献   

7.
This paper proposes an adaptive watermarking scheme for e-government document images. The adaptive scheme combines the discrete cosine transform (DCT) and the singular value decomposition (SVD) using luminance masking. As a core of masking model in the human visual system (HVS), luminance masking is implemented to improve noise sensitivity. Genetic algorithm (GA), subsequently, is employed for the optimization of the scaling factor of the masking. Involving a number of steps, the scheme proposed through this study begins by calculating the mask of the host image using luminance masking. It is then continued by transforming the mask on each area into all frequencies domain. The watermark image, following this, is embedded by modifying the singular values of DCT-transformed host image with singular values of mask coefficient of host image and the control parameter of DCT-transformed watermark image using Genetic Algorithm (GA). The use of both the singular values and the control parameter respectively, in this case, is not only to improve the sensitivity of the watermark performance but also to avoid the false positive problem. The watermark image, afterwards, is extracted from the distorted images. The experiment results show the improved adaptive performance of the proposed scheme is in resistant to several types of attacks in comparison with the previous schemes; the adaptive performance refers to the adaptive parameter of the luminance masking functioned to improve the performance or robustness of an image from any attacks.  相似文献   

8.
提出了一种新的水印方法,这种方法向宿主图像嵌入的信息是一幅数字图像,先将这个水印图像分割为两部分,一部分水印图像被嵌入宿主图像的小波域上;另一部分水印图像直接嵌入宿主图像的空域中。在提取水印的过程中分两个步骤得到水印图像的两个部分,再将这两个部分合并在一起得到有意义的水印图像。对于大部分主要的攻击, 这种方法表现出了良好的性质。该水印方法具有小波域上嵌入水印的鲁棒性的同时增加了嵌入图像的信息容量,是一个很好的向宿主图像中嵌入大量水印的策略。  相似文献   

9.
In this paper, a tailored blended image adaptive watermarking scheme has been presented, which is based on DWT and SVD. Through this paper an attempt has been made to solve the problem of false positive while maintaining the robustness and imperceptibility with the help of principal component and perceptual tuning of the image. Perceptual tuning is a non-blind technique and based on the objective quality of image. The embedding strength is made dependent on watermark features as well as of host in wavelet domain by using tuning parameter which is user specific. The idea of embedding the principal component of intermediate frequency sub-bands of watermark image into singular values of perceptually tuned intermediate frequency sub-bands of host image have been exploited. The proposed algorithm is providing the adaptive behavior towards the image content for perceptual transparency and at the same time avoiding the possibility of false watermark extraction well supported by a private key, which is necessary at the time of extraction. Thus the proposed watermarking algorithm is a kind of non-blind, image adaptive and suitable for rightful ownership. Various comparative results make the algorithm superior in terms of intentional and non-intentional attacks. Also the algorithm is strong against the print and scan attack.  相似文献   

10.
In this paper, a robust watermark scheme for copyright protection is proposed. By modifying the original image in transform domain and embedding a watermark in the difference values between the original image and its reference image, the proposed scheme overcomes the weak robustness problem of embedding a watermark in the spatial domain. Besides, the watermark extraction does not require the original image so it is more practical in real application. The experimental results show that the proposed scheme provides not only good image quality, but is also robust against various attacks, such as JPEG lossy compression, filtering and noise addition.  相似文献   

11.
This paper presents a robust watermarking approach for hiding grayscale watermarks into digital images. Plugging the codebook concept into the singular value decomposition (SVD), the proposed method embeds the singular values (SVs) of the original image into the watermark one to attain the lossless objective. The experimental results show that the proposed scheme guarantees the extracted watermark on an average and the worst PSNR values of 24.91 and 19.96 dB, respectively. In addition to the guarantee of the quality of extracted watermark image, the security of the referenced watermark is further strengthened by applying chaos permutation on it in advance. The proposed scheme leads to satisfactory robustness to various attacks and is compared to other well-known grayscale watermarking methods to reveal its efficiency for practical applications.  相似文献   

12.
针对数字图像的版权保护问题,提出一种基于Fibonacci置乱的小波域数字图像盲水印方案。将原图像中的感兴趣区域(ROI)作为水印来源,以此提高水印的隐蔽性。在水印嵌入过程中,将原图像进行分块,对每个块进行Fibonacci置乱和离散小波变换(DWT),选择出低频子带,用于水印嵌入。同时,对水印也执行DWT,选择出低频子带,通过Fibonacci置乱得到置乱矩阵,将水印的置乱矩阵嵌入到主图像的块中。在水印提取过程中,根据嵌入过程中设定的秘钥,通过逆Fibonacci置乱和逆DWT过程提取水印。在多种图像攻击下的仿真结果表明,该水印方案具有较高的安全性、鲁棒性和隐蔽性。  相似文献   

13.
In this paper, a novel logo watermarking technique with key concept is proposed using fractional wavelet packet transform (FrWPT), non-linear chaotic map and singular value decomposition (SVD). The core idea is to use biometrically generated keys in the embedding process of gray-scale watermark. Therefore, this paper first proposes a method for generating keys from biometrics efficiently. Then the host image is first randomized with the help of non-linear chaotic map followed by the embedding in the FrWPT domain by modifying the singular values of the randomized image. Further, in order to enhance the security, an authentication key is formed to authenticate the watermarked image. Finally, a reliable extraction process is proposed to extracted watermark from the possibly attacked authenticate watermarked image. The security, attack and comparative analysis confirm high security, efficiency and robustness of the proposed watermarking technique. Further, an efficient solution is also proposed to deal with the ambiguous situations created by SVD in watermarking.  相似文献   

14.
为了提高数字图像嵌入水印时的不可感知性与鲁棒性,提出一种利用图像信息熵与边缘熵理论并结合果蝇优化算法的水印嵌入方案。首先对载体图像进行分块,并计算每个分块的信息熵与边缘熵,将每个分块的2个熵值相加并排序。然后根据嵌入水印的容量选择熵值较高的分块,并将每一位水印信息嵌入到经过小波变换与奇异值分解的分块中。最后为了进一步平衡嵌入水印不可感知性与鲁棒性之间的矛盾,利用果蝇算法对嵌入水印的强度进行自适应优化。实验结果表明该方法具有更好的不可感知性,在面对多种类型、多种强度的模拟攻击时比同类算法表现出更强的鲁棒性。  相似文献   

15.
文章针对目前现有的基于小波变换和奇异值分解相结合的数字水印算法存在的缺陷,提出了一种新的视频水印算法:以二值图像为水印的混合整数小波变换和奇异值分解的视频水印盲提取算法,重点论述了奇异值分解的视频水印嵌入与检测以及安全性的测试.实验表明,提出的新算法具有较好的高透明性和鲁棒性.  相似文献   

16.
离散小波变换(DWT)和奇异值分解都可以作为数字水印算法有效的工具.提出了一种基于离散小波变换和奇异值分解联合的数字水印算法,先将整个图像分成4个区域,然后再对每个区域运用奇异值分解方法,通过修改奇异值来嵌入水印信息.实验结果表明,该算法具有很好的稳健性,在经过了一般的信号处理操作和JPEG压缩后,嵌入的水印能被可靠的提取和检测.  相似文献   

17.
提出了一种基于奇异值分解的数字图像二值水印嵌入与盲提取算法.利用图像矩阵的奇异值稳定性好且最大奇异值远远大于其它奇异值的特点,首先对分块图像进行奇异值分解,再结合二值水印和一个事先设置好的量化参数对每个分块的最大奇异值进行微调,从而达到水印嵌入的目的.实验结果表明,新的水印方案具有较高的不可见性和较强的鲁棒性;可灵活控制水印容量的大小;水印提取不需要原始图像的参与,从而可成功实现水印图像的盲提取.  相似文献   

18.
基于DWT-SVD的奇异向量量化水印算法   总被引:1,自引:1,他引:0  
胡青  龙冬阳 《计算机科学》2011,38(11):30-33,53
提出了一种新颖的可用于版权保护的小波奇异值分解的量化水印算法。与传统的水印比特信息直接嵌入小波系数不同,水印信息被量化嵌入原始图像小波低频子带分块奇异值分解得到的奇异向量中。水印提取无需原始图像,可在密钥和量化阂值控制下实现盲提取。实验表明,含水印图像质量好且能较好地抵抗常规的图像处理,对JPEG压缩具有优异的鲁棒性。  相似文献   

19.
In this paper, a new robust and secure digital image watermarking scheme that can be used for copyright protection is proposed. The scheme uses the integer wavelet transform (IWT) and singular value decomposition (SVD). The grey image watermark pixels values are embedded directly into the singular values of the 1-level IWT decomposed sub-bands. Experimental results demonstrate the effectiveness of the proposed scheme in terms of robustness, imperceptibility and capacity due to the IWT and SVD properties. A challenge due to the false positive problem which may be faced by most of SVD-based watermarking schemes has been solved in this work by adopting a digital signature into the watermarked image. The proposed digital signature mechanism is applied to generate and embed a digital signature after embedding the watermarks; the ownership is then authenticated before extracting watermarks. Thus, the proposed scheme achieved the security issue where the false positive problem is solved, in addition to that, the scheme is considered as a blind scheme. A computer simulation is used to verify the feasibility of the proposed scheme and its robustness against various types of attacks and to compare it with some previous schemes. Furthermore, the statistical Wilcoxon signed rank test is employed to certify the effectiveness of the proposed scheme.  相似文献   

20.
基于混沌和SVD DWT的稳健数字图像水印算法*   总被引:6,自引:1,他引:5  
针对现有适用于图像的数字水印对信号处理和几何失真比较敏感的问题,提出一种稳健的数字图像水印算法。该算法先对整个图像应用三级离散小波变换,再对低频域运用奇异值分解,并通过修改奇异值,嵌入经过混沌置乱的水印图像的奇异值,在小波变换域的中频系数上嵌入水印信息。水印检测时,分别在中频区域和低频提取水印并进行比较,采用效果较好的水印作为检测水印。实验结果表明,该方法对一般的信号处理操作及几何攻击等均具有较好的鲁棒性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号