首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In this paper, a new digital watermarking technique is proposed for watermarking in a random sequence form. By the term associative watermarking we refer to this new technique that combines the traditional idea of digital watermarking with the concept of association rules widely applied in the field of data mining. As our experimental results, after the similarity diagram test, the new digital watermarking technique proves to be capable of guaranteeing the existence and uniqueness of the extracted watermark even when the embedded image has gone through various kinds of image processing procedures.  相似文献   

2.
We propose a robust digital watermarking algorithm for copyright protection.A stable feature is obtained by utilizing QR factorization and discrete cosine transform(DCT) techniques,and a meaningful watermark image is embedded into an image by modifying the stable feature with a quantization index modulation(QIM) method.The combination of QR factorization,DCT,and QIM techniques guarantees the robustness of the algorithm.Furthermore,an embedding location selection method is exploited to select blocks with small modifications as the embedding locations.This can minimize the embedding distortion and greatly improve the imperceptibility of our scheme.Several standard images were tested and the experimental results were compared with those of other published schemes.The results demonstrate that our proposed scheme can achieve not only better imperceptibility,but also stronger robustness against common signal processing operations and lossy compressions,such as filtering,noise addition,scaling,sharpening,rotation,cropping,and JPEG/JPEG2000 compression.  相似文献   

3.
Watermarking technology can achieve multipurpose such as copyright protection, copy protection, and integrity authentication. We propose a novel watermarking approach which involves robust watermark and fragile watermark in a two-stage quantization technique. Traditional watermarking algorithms mostly have poor performance in imperceptibility as the codeword selected from the modified codebook is not optimal. In our method, we select the codeword in the original codebook to ensure optimality. Furthermore, we use Huffman encoding to pick up property which is sensitive to many attacks in the entire aggregation. For copyright protection, the proposed scheme can resist attacks such as lossy compression, noise addition, and normalization. As for content authentication, the proposed scheme is sensitive to various attacks provided by Stirmark Benchmark for Audio. Experimental results show that the proposed method can be used respectively for protecting the copyright and authenticating the integrity of the audio aggregation.  相似文献   

4.
一种基于索引约束矢量量化的脆弱音频水印算法*   总被引:1,自引:1,他引:0  
与传统矢量量化不同,索引约束矢量量化在量化过程中通过约束码字索引二进制形式中某一位的值来限定码字的搜索范围。本文利用其特殊的码字搜索方法提出了一种在音频信号中嵌入水印的方法。将原始音频信号分段,每段进行DCT变换并提取若干中频系数构成矢量。水印嵌入时根据水印比特信息和预先设定的索引约束位的值找到匹配码字修改各段DCT中频系数。水印提取时利用传统矢量量化方法得到各量化索引值后,提取出各索引值中与嵌入端相同位的比特值即为水印信息。该方法在量化过程中嵌入水印信息,有很好的实时性。实验结果表明,利用该方法嵌入的水印为一种脆弱水印,可用于认证。  相似文献   

5.

In this paper, we propose an efficient transform-based blind audio watermarking technique by introducing a parametric quantization index modulation (QIM). Theoretical expressions for the signal to watermark ratio and probability of error are derived and then used in an optimization technique based on the Lagrange multipliers method to find the optimal values for the parameters of the parametric QIM that ensure the imperceptibility while maximizing the robustness under an additive white Gaussian noise (AWGN) attack. Moreover, a fast scheme for the implementation of the proposed watermarking technique is developed and an efficient procedure is suggested to find the interval for the best selection of the watermark embedding positions that provide a good trade-off between the effects of high and low pass filtering attacks. The parameters of the resulting optimal parametric QIM coupled with the embedding positions constitute a highly robust secret key for the proposed watermarking technique. We also carry out several experiments to show the usefulness of the theoretical analysis presented in the paper and compare the proposed technique with other existing QIM-based watermarking techniques by considering known attacks such as AWGN, re-quantization, resampling, low/high pass filtering, amplitude scaling and common lossy compressions.

  相似文献   

6.
Fang  Han  Zhou  Hang  Ma  Zehua  Zhang  Weiming  Yu  Nenghai 《Multimedia Tools and Applications》2019,78(7):8075-8089

This paper proposes a novel robust image watermarking scheme in Discrete Cosine Transform (DCT) domain for active forensics. We investigate the relation between the positions and the modification magnitudes of DCT coefficients and directions of texture blocks. By exploring such relation, a direction-coefficient mapping is designed. First, the texture direction of each image block is estimated by Gabor filter. And then, according to the direction-coefficient mapping, one watermark bit is embedded into each block along its texture direction. Compared with existing schemes, the proposed method utilizes the direction features of texture blocks better . Therefore, the improvements in watermarked image quality and the robustness of watermark signal against image processing attacks are both achieved.

  相似文献   

7.
为了提高数字水印的鲁棒性以及水印嵌入位置的保密性,提出了一种基于Logistic混沌映射和整数小流变换—奇异值分解(IWT-SVD)量化的盲鲁棒水印算法:对二值水印图像进行Arnold置乱,对原始载体图像进行8×8分块,利用生成的Logistic混沌序列选择嵌入水印的图像块,充分保证了水印嵌入位置的保密性;对选中的图像块进行二级IWT分解,对得到的二级低频子带系数进行SVD;将置乱后的水印信息嵌入.算法不需要原始载体图像,实现了水印的盲提取,更具实用性.仿真实验结果表明:算法对常规图像处理操作、压缩攻击和剪切攻击均具有较强的稳健性.  相似文献   

8.

In this paper, we propose a reversible data hiding scheme that exploits the centroid formula. Specifically, we use it to define a centroid boundary vector and a centroid state codebook CSCB. Initially, our centroid boundary vectors and CSCBs are the same as the side match vector quantization (SMVQ) algorithm’s boundary vectors and state codebooks SCBs. For each VQ index, the proposed scheme exploits the centroid formula to update its centroid boundary vector and the corresponding CSCB. The updating is coupled with a heuristic to select the best state codebook (i.e., either SCB or CSCB) for each VQ index, which generates a highly compressible distribution of index values. Our experimental results show that the proposed scheme can embed n = 1, 2, 3, and 4 bit per index (bpi) at bit rates of 0.332, 0.394, 0.457, and 0.519 bit per pixel (bpp), respectively, for the main codebook size N = 256. These results confirm that the proposed scheme improves recent VQ and SMVQ based reversible data hiding schemes.

  相似文献   

9.
运动矢量聚类的视频水印方法   总被引:2,自引:2,他引:0       下载免费PDF全文
基于运动矢量视频水印算法,结合人的视觉特性(HVS),根据运动矢量值及运动矢量块区域聚类的特征,利用FCM算法实现运动矢量的分类,以运动矢量块为单位,将水印信息嵌入到运动矢量上。运动矢量不需要完全解码和再编码过程,所提出的水印算法简单、有效,从而实现了水印盲检。与嵌入水印前的原视频图像相比,嵌入水印后的视频图像信噪比损失很小,对帧删除、帧插入和噪声等攻击方式具有极强的鲁棒性。  相似文献   

10.
In this paper, we present a simple and robust watermarking scheme for color images. The scheme is based on the square-root-modulus technique employed in the integer wavelet domain, which allows a large number of data bits to be embedded in a host image. Simulations confirmed that marked images generated by the proposed scheme are tolerant to various attacks such as blurring, brightness, contrast, cropping, edge sharpening, inversion, JPEG/JPEG2000 compressions, noise-additions, and truncation. Additionally, the payload of the proposed method is significantly larger than that of existing watermarking techniques and the resulting perceived quality is not bad. Because the code is quite simple, it is suitable for the proposed method implemented in the mobile equipments or smart devices.  相似文献   

11.
霍纬纲  屈峰  程震 《计算机应用》2017,37(11):3075-3079
为了提高动态数据集上模糊关联分类器(FAC)的建模效率,提出了一种基于演进向量量化(eVQ)聚类的增量模糊关联分类方法。首先,采用eVQ聚类算法增量更新数量属性上的高斯隶属度函数参数;然后,扩展早剪枝更新(UWEP)算法,使之适用于增量挖掘模糊频繁项;最后,以模糊相关度(FCORR)和分类规则前件长度为度量方式裁剪并更新模糊关联分类规则库。在4个UCI标准数据集上的实验结果表明,与批量模糊关联分类建模方法相比,所提方法能够在保证分类精度和解释性的前提下,减少模糊关联分类器的训练时间;基于eVQ的高斯隶属度函数的增量更新有助于提高动态数据集上模糊关联分类器的分类精度。  相似文献   

12.
Multimedia Tools and Applications - Two-dimensional vector maps are vulnerable to issues related to copyright owner’s protection, which have an impact on the vector-data usage in different...  相似文献   

13.
In this work, we propose a robust watermarking algorithm for video copyright protection. The proposed algorithm is characterized by four key features. First, a robust feature obtained by singular value decomposition is selected to embed the watermark. Second, a novel slope-based embedding technique is developed to embed a 1-bit watermark into several successive blocks in the temporal direction, thus enhancing the robustness against global attacks. Third, an embedding location selection method is used to give priority to blocks with small variations that can enhance the visual quality of the watermarked video. Fourth, a temporal synchronization method is introduced to effectively withstand temporal synchronization attacks. The experimental results demonstrate that our scheme has good imperceptibility and is robust against various attacks, such as noise addition, filtering, gamma correction, lossy compression, scaling, frame dropping, frame insertion, and frame averaging. Furthermore, the watermark can be extracted using only some side information rather than the original video, which makes the scheme more practical.  相似文献   

14.
Multimedia Tools and Applications - In this paper, a robust blind image watermarking method is proposed for copyright protection of digital images. This hybrid method relies on combining two...  相似文献   

15.
This paper presents a new semi-blind reference watermarking scheme based on discrete wavelet transform(DWT) and singular value decomposition(SVD) for copyright protection and authenticity. We are using a gray scale logo image as watermark instead of randomly generated Gaussian noise type watermark. For watermark embedding, the original image is transformed into wavelet domain and a reference sub-image is formed using directive contrast and wavelet coefficients. We embed watermark into reference image by modifying the singular values of reference image using the singular values of the watermark. A reliable watermark extraction scheme is developed for the extraction of watermark from distorted image. Experimental evaluation demonstrates that the proposed scheme is able to withstand a variety of attacks. We show that the proposed scheme also stands with the ambiguity attack also.  相似文献   

16.
In digital audio watermarking, the watermark's vulnerability to desynchronization attacks has long been a difficult problem. According to the audio statistics characteristics and synchronization code technique, a new robust audio watermarking scheme against desynchronization attacks is proposed in this paper. Firstly, the original digital audio is segmented and then each audio segment is cut into two parts. Secondly, with the spatial watermarking technique, the synchronization code is embedded into the statistics average value of audio samples in the first part. Finally, the second part of audio segment is cut into audio sections, the DWT is performed on the audio sections, and the watermark bit is embedded into the statistics average value of low frequency components. Experimental results show that the proposed scheme is inaudible and robust against common signals processing, including MP3 compression, low-pass filtering, noise addition, and equalization, etc. Moreover, it also survives several desynchronization attacks, such as random cropping, amplitude variation, pitch shifting, time-scale modification, and jittering, etc.  相似文献   

17.
提出一种自适应量化步长的盲水印算法,并给出其对称检测方法.该算法充分考虑人类视觉模型,根据图像块纹理复杂度的不同,嵌入不同强度的水印信息.实验结果表明,该算法对多种图像处理有很好的鲁棒性;在受到严重攻击时,通过对称检测能够检测出有效水印.  相似文献   

18.
International Journal of Speech Technology - In this work, we have proposed a robust audio watermarking technique in which a binary image is embedded into a host audio signal for copyright...  相似文献   

19.
为了提高数字水印算法的鲁棒性和不可见性,提出了一种基于Watson模型改进量化表的水印嵌入模型.通过对模型的实例化,得到具体的可行算法.对Watson模型和JPEG量化表自适应调节后的量化步长做“全偶数”处理,选取特定的低频位置作为水印嵌入位,采用奇偶量化达到水印嵌入的目的.通过实验仿真并对实验数据进行分析,表明了该算法的有效性.  相似文献   

20.
提出了一种基于HVS和量化的自适应盲水印算法,基于HVS的视觉模型使用亮度掩蔽系数,纹理掩蔽系数,频率掩蔽系数来自适应地调整水印的嵌入强度。算法选择在DCT域,通过用JPEG量化表量化DCT系数,比较量化后的DC系数|DC|与选定的量化后的AC系数|AC|之间的关系来嵌入和提取水印,并实现了水印的盲检测。由于DCT系数基于JPEG量化表来量化,对JPEG压缩具有很好的抵抗能力,对叠加噪声、模糊等常规的图像操作也具有很好的鲁棒性。实验结果证明,该算法是一种行之有效的方法。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号