首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
提出了一种针对彩色图像认证的半脆弱水印方案,彩色图像亮度信息通过线性变化处理后进行离散小波变换(DWT),对低频子图分块后进行奇异值分解(SVD),将置乱后的二值水印信息通过自适应量化嵌入到奇异值中实现内容认证。线性变化处理能改善由水印带来的对彩色图像明暗度的影响,同时利用一维Tent混沌的特性构成混沌二维置换网络,只需要一个初值,使算法更加简单。由实验结果表明该算法对JPEG压缩稳健,而对恶意操作敏感,同时水印提取是盲提取的。  相似文献   

2.
Based on the support vector regression (SVR) geometric distortions correction, we propose a robust image watermarking algorithm in nonsubsampled contourlet transform (NSCT) domain with good visual quality and reasonable resistance toward geometric attacks in this paper. Firstly, the NSCT is performed on original host image, and corresponding low-pass subband is selected for embedding watermark. Then, the selected low-pass subband is divided into small blocks. Finally, the digital watermark is embedded into host image by modulating the NSCT coefficients in small blocks. In digital watermark detecting procedure, the SVR geometrical distortions correction is utilized. Experimental results show that the proposed image watermarking is invisible, and robust against common image processing and some geometrical attacks.  相似文献   

3.
以回归型支持向量机(Support Vector Regression,SVR)理论为基础,提出了一种新的基于SVR的小波域盲水印算法。算法核心思想是先对图像进行小波分解,然后利用图像小波分解后的子图系数之间的关系和图像局部相关性获得SVR训练模型,并利用SVR训练模型在小波域嵌入和提取水印。该算法以保证鲁棒性和透明性的良好平衡为前提,实现了数字水印的盲检测。仿真实验表明,该文算法不仅具有较好的透明性,而且对JPEG压缩和一般的图像处理具有很强的鲁棒性,其整体性能明显优于现有基于SVM的空间域上的水印算法。  相似文献   

4.
Multimedia Tools and Applications - Singular Value Decomposition (SVD) comprises many important mathematical properties that are useful in numerous applications. Newly developed SVD-based...  相似文献   

5.
Multimedia Tools and Applications - Image watermarking in wavelet domain has been found useful for copyright protection and rightful ownership. Classical wavelet transforms, like discrete wavelet...  相似文献   

6.
Geometric distortion is known as one of the most difficult attacks to resist. Geometric distortion desynchronizes the location of the watermark and hence causes incorrect watermark detection. According to the Support Vector Regression (SVR), a new image watermarking detection algorithm against geometric attacks is proposed in this paper, in which the steady Pseudo-Zernike moments and Krawtchouk moments are utilized. The host image is firstly transformed from rectangular coordinates to polar coordinates, and the Pseudo-Zernike moments of the host image are computed. Then some low-order Pseudo-Zernike moments are selected, and the digital watermark is embedded into the cover image by quantizing the magnitudes of the selected Pseudo-Zernike moments. The main steps of watermark detecting procedure include: (i) some low-order Krawtchouk moments of the image are calculated, which are taken as the eigenvectors; (ii) the geometric transformation parameters are regarded as the training objective, the appropriate kernel function is selected for training, and a SVR training model can be obtained; (iii) the Krawtchouk moments of test image are selected as input vector, the actual output (geometric transformation parameters) is predicted by using the well trained SVR, and the geometric correction is performed on the test image by using the obtained geometric transformation parameters; (iv) the digital watermark is extracted from the corrected test image. Experimental results show that the proposed watermarking detection algorithm is not only robust against common signal processing such as filtering, sharpening, noise adding, and JPEG compression etc., but also robust against the geometric attacks such as rotation, translation, scaling, cropping and combination attacks, etc.  相似文献   

7.

This article introduces a robust image watermarking primarily founded on DWT (discrete wavelet transform), BEMD (bi-dimensional empirical mode decomposition), DCT (discrete cosine transform), PSO (particle swarm optimization), and SVD (singular value decomposition). During the process of embedding, 2nd level DWT is used to decompose the cover image into sub-bands. DWT is also used for the decomposition of images for watermarking. Further, BEMD decomposition runs to implement on the selected band of DWT. For optimization, PSO is used for complex and multidimensional searches. Further DCT as well as SVD applied to the selected band. The embedding and scaling factors are embedded with the help of a security key. Further, this method is followed by using the inverse of ISVD, IDCT, IDWT, and IBEMD. The Watermark image is extracted by the extraction process. Experimental results show that the suggested technique is robust compared to several geometrical and non-geometrical attacks. Therefore, this proposed technique provides better visible quality and robustness against numerous attacks like salt and pepper, Gaussian filter, rotation, median filter, speckle, gamma correction, scaling, and shearing for gray scale images and provides the watermarked image with good quality.

  相似文献   

8.
Multimedia Tools and Applications - This paper presents an audio watermarking technique based on singular value decomposition (SVD) and fractional Fourier transform (FRT). The basic idea of this...  相似文献   

9.
提出了一种鲁棒数字图像水印算法。水印生成过程对原始水印进行转换、置乱和扩展等处理;水印嵌入过程将水印嵌入在原始图像小波域的逼近子图,嵌入的强度由噪声可见性函数自适应决定。水印提取过程不需要任何原始图像和原始水印的信息,采用独立分量分析实现对水印信号的盲提取。实验结果证实对于水印基准测试软件Checkmark的各种攻击,该算法具有较强的鲁棒性。  相似文献   

10.
通过分析发现,一类基于奇异值分解的图像水印算法存在致命漏洞,即利用在水印嵌入过程中生成的密钥可以从其他图像(含未嵌入水印的图像)中提取出高相关的水印信息,称这一新发现的算法漏洞为水印算法的伪验证,并由此首次提出了水印算法伪验证的定义和判定条件。然后通过实例分析,指出基于奇异值分解的水印算法之所以存在伪验证,是由于奇异值分解使得水印信息主要包含于正交阵U、V中,因此水印的提取与正交阵U、V以及奇异值的分布类型有关,而与奇异值的具体取值无关。  相似文献   

11.
Nowadays, several information security issues can compromise the medical images administration. The source and origin of the medical image must be authenticated to verify that it corresponds to the right patient. A second issue is to avoid detachment between an electronic medical record and the corresponding images. One possible solution is the use of digital watermarking techniques applied to medical images, considering the imperceptibility and robustness requirements of the medical imaging watermarking. To increase the security of medical image sharing and transfer, we present in this work a watermarking approach to protect medical images. This innovative approach consists precisely of carefully inserting hospital signature information and patient data into the medical image. The ambitious goal of our work is to properly integrate the watermark with as little distortion as possible to typically retain the medical information in the image. In this flexible approach DWT decomposition is applied to the image which allows a remarkably satisfactory adjustment during the insertion. An SVD is then applied to the three subbands LL, LH and HL, which allows retaining the maximum energy of the image in a necessary minimum of singular values. A possible combination of the three resulting singular value matrices is then performed for watermark integration. A possible combination of the three resulting singular value matrices is then performed for watermark integration. The proposed approach ensures information integrity, patient confidentiality when sharing data, and robustness to several conventional attacks.  相似文献   

12.
Multimedia Tools and Applications - This paper reports the effect of hyperchaos permutation on the False-Positive-Free (FPF) Singular Value Decomposition (SVD)-based image watermarking scheme. To...  相似文献   

13.
Most existing digital watermarking algorithms, which are based on the Discrete Wavelet Transform, are not robust to geometric distortions, even if for some special distortions, such as multiples of 90° rotation of integers and image flipping, which change the location of pixels but have no effect on the value of the image. Therefore, to solve the problem, according to Haar wavelet transform theory, the redistributed invariant wavelet domain is constructed and proofed in this paper; a novel image watermarking algorithm, based on the invariant domain, is proposed to eliminate such distortions. The experimental results showed that the proposed algorithm not only can resist the common image processing operations, but also successfully resist the distortions that result from multiples of 90° rotations of integers and image flipping.  相似文献   

14.
Multimedia Tools and Applications - These days, researchers have used many techniques in e-multimedia data for intellectual property protection. One of these important techniques is watermarking...  相似文献   

15.
Digital watermarking is one of the most effective methods for protecting multimedia from different kind of threats. It has been used for many purposes, like copyright protection, ownership identification, tamper detection, etc. Many watermarking applications require embedding techniques that provide robustness against common watermarking attacks, like compression, noise, filtering, etc. In this paper, an optimized robust watermarking method is proposed using Fractional Fourier Transform and Singular Value Decomposition. The approach provides a secure way for watermarking through the embedding parameters that are required for the watermark extraction. It is a block-based method, where each watermark bit is embedded in its corresponding image block. First, the transform is applied to each block, and then the singular values are evaluated through which the embedding modification is performed. The optimum fractional powers, of the transform, and the embedding strength factor are evaluated through a Meta-heuristic optimization to optimize the watermark imperceptibility and robustness. The Artificial Bee Colony is used as the Meta-heuristic optimization method. A fitness function is employed, at the optimization process, through which the maximum achievable robustness can be provided without degrading the watermarking quality below a predetermined quality threshold Qth. The effectiveness of the proposed method is demonstrated through a comparison with recent watermarking techniques in terms of the watermarking performance. The watermarking quality and robustness are evaluated for different quality threshold values. Experimental results show that the proposed approach achieves a better quality compared to that of other existing watermarking methods. On the other hand, the robustness is examined against the most common applied attacks. It is noticed that the proposed method can achieve a higher robustness degree when decreasing the quality threshold value.  相似文献   

16.
Deng  Biao  Li  Sheng  Qian  Zhenxing 《Multimedia Tools and Applications》2022,81(23):32841-32855
Multimedia Tools and Applications - This paper proposes a new watermarking scheme that is screen-shooting resilient. We try to design a watermarking scheme that can resist the distortion generated...  相似文献   

17.
An image watermarking technique based on the concept of JPEG2000 algorithm is proposed. Biorthogonal wavelet 9/7 transform is used to provide a set of coefficients suitable for watermark embedding. The statistical properties of different subbands are analyzed in order to choose the number of decomposition levels and position of subbands, which will assure the best compromise between the watermark transparency and robustness. The JPEG2000 quantization is applied to avoid insignificant wavelet coefficients, while the remaining ones are used for watermarking. The optimal and blind watermark detection is based on the nonlinear score function and appropriate model of coefficients distribution. The performance of the proposed procedure is tested on examples with various images, showing robustness under different attacks, while maintaining high image quality.  相似文献   

18.
基于SIFT特征的小波域数字图像鲁棒水印方法*   总被引:2,自引:1,他引:1  
利用数字图像SIFT(scale invariant feature transform)特征的稳定性和小波变换的特性,提出了一种抗仿射变换和剪切的鲁棒水印算法。水印信息通过量化调制方法嵌在小波变换的低频域。水印检测时,利用匹配的SIFT关键点的位置信息计算仿射变换参数和边缘剪切参数,然后对被检测图像进行逆变换和重定位,恢复水印的同步信息。实验结果表明该算法可以抗击仿射变换和剪切攻击,对常见的图像处理也有很强的鲁棒性。  相似文献   

19.
基于混沌和HVS的小波域自适应图像水印算法   总被引:1,自引:1,他引:1  
针对常规的小波域水印算法自适应性差的缺陷,提出了一种新的基于混沌和人类视觉系统的小波域自适应图像水印算法。首先对载体图像进行二级DWT变换;然后对特定的中频子带进行分块,并对每块做SVD分解;最后将Logistic混沌置乱后的二值水印信息嵌入到每块的最大奇异值中,嵌入的强度根据HVS原理自适应地进行调整。仿真实验表明,该算法不仅具有很好的不可见性,且对JPEG压缩、加噪、滤波等常见的图像攻击具有很强的鲁棒性。  相似文献   

20.
提出了一种Shearlet变换域嵌入强度因子能随图像内容自适应的水印算法。算法首先利用Shearlet变换对图像内容稀疏表示选择性,找出符合人眼视觉特性要求的水印嵌入位置,然后依据图像内容自适应地计算出水印嵌入强度因子,较好地解决了鲁棒性与可见性之间的矛盾。实验结果表明,该算法能够抵抗各种攻击,具有强鲁棒性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号