首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 312 毫秒
1.

In this paper, we propose an efficient transform-based blind audio watermarking technique by introducing a parametric quantization index modulation (QIM). Theoretical expressions for the signal to watermark ratio and probability of error are derived and then used in an optimization technique based on the Lagrange multipliers method to find the optimal values for the parameters of the parametric QIM that ensure the imperceptibility while maximizing the robustness under an additive white Gaussian noise (AWGN) attack. Moreover, a fast scheme for the implementation of the proposed watermarking technique is developed and an efficient procedure is suggested to find the interval for the best selection of the watermark embedding positions that provide a good trade-off between the effects of high and low pass filtering attacks. The parameters of the resulting optimal parametric QIM coupled with the embedding positions constitute a highly robust secret key for the proposed watermarking technique. We also carry out several experiments to show the usefulness of the theoretical analysis presented in the paper and compare the proposed technique with other existing QIM-based watermarking techniques by considering known attacks such as AWGN, re-quantization, resampling, low/high pass filtering, amplitude scaling and common lossy compressions.

  相似文献   

2.
Su  Qingtang  Liu  Yonghui  Liu  Decheng  Yuan  Zihan  Ning  Hongye 《Multimedia Tools and Applications》2019,78(7):8113-8132

At present, the binary images are often used as the original watermark images of many watermarking methods, but partial methods cannot be easily extended to colour image watermarking methods. For resolving this problem, we propose a new watermarking method using ternary coding and QR decomposition for colour image. In the procedure of embedding watermark, the colour image watermark is coded to ternary information; the colour host image is also separated into image blocks of sized 3?×?3, and these image blocks are further decomposed via QR decomposition; then, one ternary watermark is embedded into one orthogonal matrix Q of QR decomposition by the proposed rules. In the procedure of extracting watermark, the proposed method uses the blind-manner to extract the embedded ternary information. The novelty of this scheme lies in the proposed ternary coding for watermark image, which can improve the imperceptibility, embedded watermark capacity and real-time feature of the watermarking scheme. The results of simulation show the presented technique is better than other compared schemes with respect to imperceptibility, embedded watermark capacity and real-time feature under the similar robustness.

  相似文献   

3.
为了提高数字水印的鲁棒性以及水印嵌入位置的保密性,提出了一种基于Logistic混沌映射和整数小流变换—奇异值分解(IWT-SVD)量化的盲鲁棒水印算法:对二值水印图像进行Arnold置乱,对原始载体图像进行8×8分块,利用生成的Logistic混沌序列选择嵌入水印的图像块,充分保证了水印嵌入位置的保密性;对选中的图像块进行二级IWT分解,对得到的二级低频子带系数进行SVD;将置乱后的水印信息嵌入.算法不需要原始载体图像,实现了水印的盲提取,更具实用性.仿真实验结果表明:算法对常规图像处理操作、压缩攻击和剪切攻击均具有较强的稳健性.  相似文献   

4.

Nowadays, with the development of public network usage, medical information is transmitted throughout the hospitals. A watermarking system can help for the confidentiality of medical information distributed over the internet. In medical images, regions-of-interest (ROI) contain diagnostic information. The watermark should be embedded only into non-regions-of-interest (NROI) regions to keep diagnostically important details without distortion. Recently, ROI based watermarking has attracted the attention of the medical research community. The ROI map can be used as an embedding key for improving confidentiality protection purposes. However, in most existing works, the ROI map that is used for the embedding process must be sent as side-information along with the watermarked image. This side information is a disadvantage and makes the extraction process non-blind. Also, most existing algorithms do not recover NROI of the original cover image after the extraction of the watermark. In this paper, we propose a framework for blind diagnostically-lossless watermarking, which iteratively embeds only into NROI. The significance of the proposed framework is in satisfying the confidentiality of the patient information through a blind watermarking system, while it preserves diagnostic/medical information of the image throughout the watermarking process. A deep neural network is used to recognize the ROI map in the embedding, extraction, and recovery processes. In the extraction process, the same ROI map of the embedding process is recognized without requiring any additional information. Hence, the watermark is blindly extracted from the NROI. Furthermore, a three-layer fully connected neural network is used for the detection of distorted NROI blocks in the recovery process to recover the distorted NROI blocks to their original form. The proposed framework is compared with one lossless watermarking algorithm. Experimental results demonstrate the superiority of the proposed framework in terms of side information.

  相似文献   

5.

This article presents a recent blind and robust fingerprint image watermarking scheme based on a two-dimensional discrete cosine transform (2D-DCT). The main focus is to compress the fingerprint image watermarked data for the purpose of reducing the volume of storage or sending over the network. The fingerprint features might be affected by the embedded watermark, compression of fingerprint images and the sending across network, thereby leading to various sets of features or watermark data. In order to address this goal in a differential way, the watermark sequence bit two sub-vectors were utilized. The two sub-vectors were achieved by the two-dimensional discrete cosine transform of the host image. Throughout the extraction stage, the essential distinction between the corresponding sub-vectors of the watermarked fingerprint image resulted explicitly in an embedded watermark sequence. The advantage of the proposed method is that it can develop a new simple blind and robust watermarking scheme by 2D-DCT frequency domain on the whole image. Accomplished results relative to other reliable compression schemes showed that the proposed scheme has greater or equivalent robustness to common image processing and geometric attacks, such as cropping, resizing, and rotation. To extract watermark data, the initial fingerprint image was not necessary. The proposed study was tested using 80 fingerprint images from 10 persons, for each from CASIA-FingerprintV5 and FVC2002 fingerprint databases. Eight fingerprint images for each individual were set as the format at which the watermark was embedded in each one.

  相似文献   

6.
Thakur  S.  Singh  A. K.  Ghrera  S. P.  Mohan  A. 《Multimedia Tools and Applications》2020,79(7-8):4263-4276

In this paper, a chaotic based secure medical image watermarking approach is proposed. The method is using non sub-sampled contourlet transform (NSCT), redundant discrete wavelet transform (RDWT) and singular value decomposition (SVD) to provide significant improvement in imperceptibility and robustness. Further, security of the approach is ensured by applying 2-D logistic map based chaotic encryption on watermarked medical image. In our approach, the cover image is initially divided into sub-images and NSCT is applied on the sub-image having maximum entropy. Subsequently, RDWT is applied to NSCT image and the singular vector of the RDWT coefficient is calculated. Similar procedure is followed for both watermark images. The singular value of both watermarks is embedded into the singular matrix of the cover. Experimental evaluation shows when the approach is subjected to attacks, using combination of NSCT, RDWT, SVD and chaotic encryption it makes the approach robust, imperceptible, secure and suitable for medical applications.

  相似文献   

7.

In the digital world, watermarking technology is a solution for data hiding and completely essential for management and secure communications of digital data propagated over the internet-based platforms. Reversible watermarking is a quality-aware type of watermarking which has been applied in managing digital contents such as digital images, texts, audios and videos. Reversible watermarking is also known as lossless watermarking due to its preservation of all details of host and hidden data. One of the important uses of this kind of watermarking is to manage medical data regarding DICOM images. In the recent years, a new type of reversible watermarking technology entitled interpolation-based reversible watermarking has been introduced, and we are going to enhance it for DICOM images by using a hybrid approach based on computing error histogram and by applying an image interpolation with greedy weights (adaptive weighting). In practice, simulation results clearly show better performance of the proposed scheme compared to the previous techniques using interpolation-based reversible watermarking on different DICOM images.

  相似文献   

8.

This paper offers a medical image watermarking approach based on Wavelet Fusion (WF), Singular Value Decomposition (SVD), and Multi-Level Discrete Wavelet Transform (M-DWT) with scrambling techniques for securing the watermarks images. The proposed approach can be used for providing multi-level security in various applications such as military, copyright protection, and telemedicine systems. The key idea of the projected approach is to first combine two digital watermark images into a single fused watermark to increase the embedded information payload. Then, the fused watermark is scrambled using Arnold and Chaotic algorithms. Finally, the scrambled fused watermark is embedded in the cover image using the SVD and three-level DWT algorithms. The selection of the Arnold and chaotic for watermark encryption is attributed to confirm robustness which resists several types of multimedia attacks and upturn the security level. This paper also presents a comparative study of the proposed approach for different digital images to determine its robustness and stability. Several simulation results reveal that the proposed system improves the capacity and security of embedded medical watermarks without affecting the cover image quality. In conclusion, the proposed approach achieved not only precise acceptable perceptual quality with admired Peak Signal-to-Noise Ratio (PSNR) values but similarly high Correlation Coefficient (Cr) and SSIM values in the existence of severe attacks.

  相似文献   

9.

The traditional watermarking algorithms prove the rightful ownership via embedding of independent watermarks like copyright logos, random noise sequences, text etc into the cover images. Coupling biometrics with watermarking evolved as new and secure approach as it embeds user specific biometric traits and thus, narrows down the vulnerability to impostor attacks. A multimodal biometric watermarking system has been proposed in this paper in the redundant discrete wavelet transform(RDWT). Two biometric traits of the user i.e. the iris and facial features are embedded independently into the sub-bands of the RDWT of cover image taking advantage of its translation invariant property and sufficient embedding capacity. The ownership verification accuracy of the proposed system is tested based on the individual biometric traits as well as the fused trait. The accuracy was enhanced while using the fused score for evaluation. The security of the scheme is strengthened with usage of non-linear chaotic maps, randomization via Hessenberg decomposition, Arnold scrambling and multiple secret keys. The robustness of the scheme has been tested against various attacks and the verification accuracy evaluated based on false acceptance rate, false rejection rate, area under curve and equal error rate to validate the efficacy of the proposed scheme.

  相似文献   

10.
Digital watermarking technology is concerned with solving the problem of copyright protection, data authentication, content identification, distribution, and duplication of the digital media due to the great developments in computers and Internet technology. Recently, protection of digital audio signals has attracted the attention of researchers. This paper proposes a new audio watermarking scheme based on discrete wavelet transform (DWT), singular value decomposition (SVD), and quantization index modulation (QIM) with a synchronization code embedded with two encrypted watermark images or logos inserted into a stereo audio signal. In this algorithm, the original audio signal is split into blocks, and each block is decomposed with a two-level DWT, and then the approximate low-frequency sub-band coefficients are decomposed by SVD transform to obtain a diagonal matrix. The prepared watermarking and synchronization code bit stream is embedded into the diagonal matrix using QIM. After that, we perform inverse singular value decomposition (ISVD) and inverse discrete wavelet transform (IDWT) to obtain the watermarked audio signal. The watermark can be blindly extracted without knowledge of the original audio signal. Experimental results show that the transparency and imperceptibility of the proposed algorithm is satisfied, and that robustness is strong against popular audio signal processing attacks. High watermarking payload is achieved through the proposed scheme.  相似文献   

11.
张连俊 《计算机工程与设计》2007,28(11):2603-2604,2622
在分析了自适应小波变换和扩频特性关系的基础上,研究了混沌序列扩频特性,并提出一种基于自适应小波变换的混沌扩频数字水印算法.利用该算法,可实现混沌扩频图像数字水印的嵌入和提取.计算机模拟实验表明该方法具有较好的不可视性、鲁棒性,并且可以实现扩频数字水印的盲检测性.  相似文献   

12.
Some watermarking authentication methods based on spectral domain using QR codes and Quantization Index Modulation (QIM) are proposed for ownership protection in color images. The QR code is created with the owners’ information and used as binary watermark sequence, which is permuted using Arnold Permutation to increase the security before embedding it. Once the watermark sequence is generated, the original color image is transformed from RGB to YCbCr color space where the Luminance Channel (Y) is processed by the Singular Value Decomposition (SVD), Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT) to embed the binary watermark sequence using Quantization Index Modulation (QIM). The experimental results show the effectiveness of the proposed method.  相似文献   

13.
This paper proposes a new reversible, imperceptible, semi fragile watermarking scheme for the authentication of digital fundus images that satisfies eight mandatory requirements. They are reversible, tamper detection, localization of modification, imperceptibility, capacity, complete blind detection, semi fragility and security. The proposed scheme generates the watermark dynamically using chaotic system and it is embedded using integer transform in reversible way. It precisely locates the tampering areas in the images and detects the watermark in complete blind approach without using the knowledge of both original image and watermark. It is found subjectively that 30,000 bits is the best size of the watermark for the proposed scheme to ensure the security and it is achieved for the PSNR value of around 60 dB at an average by retaining good level of imperceptibility. The proposed scheme is sensitive to the jittering, geometrical and filtering attacks and it modifies around 40 % of bits in the watermark for jittering and geometrical attacks, around 45 % of the bits in the watermark for filtering attacks to authenticate the images.  相似文献   

14.
针对现有基于混沌的医学图像加密算法未考虑图像纹理特征的不足,提出了一种自适应分块的医学图像混沌加解密算法。首先利用2D Sine Logistic混沌系统生成两个具有良好混沌特性的安全序列;然后将图像分成固定尺寸的图像块,并计算图像块的最大像素差和方差,根据设定的阈值将图像块划分成纹理平滑块和纹理复杂块;最后利用混沌序列1对平滑块进行密文反馈加密,利用混沌序列2对复杂块进行明文反馈加密,得到加密后的图像。算法有效地考虑了图像块的纹理特性,优化了混沌加密算法,提高了医学图像的加解密效率。实验仿真结果表明,提出的算法具有高的安全性和加解密效率,相比现有方法加解密速度提高1倍左右。算法适用于大数据量的医学图像实时加解密。  相似文献   

15.

This paper presents an encryption scheme based on genetic operations and a new hybrid pseudo random number generator (HPRNG). The new HPRNG is designed based on linear feedback shift register (LFSR), chaotic asymmetric tent map and chaotic logistic map. The scheme uses XOR and genetic operations (mutation, and multipoint crossover) to encrypt the image blocks. The first block of the plain image is encrypted with the help of a pseudo-random bit sequence generated by the HPRNG. The subsequent blocks are based on the previous cipher block and the XOR operator. The scheme can be extended to encrypt color images and text as well. The cipher images produced have very low correlation with their corresponding plain images and have high values of entropy, making it unpredictable and difficult to detect redundancies in the image pixel values. More over the scheme is compared with some existing schemes and found that the proposed scheme is comparatively secure and efficient.

  相似文献   

16.
一种用于图像认证的半脆弱数字水印算法   总被引:1,自引:0,他引:1  
数字水印作为数字媒体版权保护的有效办法之一,近年来越来越为人们所重视.新型的基于CDMA调制可以进行图像认证的半脆弱数字水印算法.首先利用混沌序列生成的规格化序列将二值水印数据进行加密并扩频调制后嵌入到图像的DWT低频域,检测时利用规格化序列的特性不仅有效实现了盲检测,又实现了图像内容认证和图像的篡改定位.实验结果表明,算法对JPEG有损压缩、滤波和噪声等水印攻击显示出较强的鲁棒性.  相似文献   

17.
为了解决水印盲检测中的水印定位问题,提出了一种在小波变换域中基于图像纹理特征和分形调制的盲水印算法.以熵值和方差等特征值作为划分图像块类型的依据,从中选择适当的区域嵌入水印.水印序列采用通过分形调制产生的分形序列.检测算法无需原始图像,只需要保留块嵌入位置作为密钥.实验结果证明,该算法具有很好的鲁棒性和不可见性.  相似文献   

18.

This paper presents a novel color image encryption approach. The proposed approach utilizes the basic concepts of DNA cryptography along with Lorenz and Rossler chaotic system and 2D logistic map. The proposed approach encrypts RGB images using DNA cryptography techniques. In diffusion phase, at pixel level Lorenz and Rossler chaotic system is used to encrypt the three channels of test images. Afterwards, at bit level 2D logistic map is used for performing bitwise chaotic ponytail process on these diffused Red, Green, and Blue channels in confusion phase. Simulation of the proposed approach on test images reveals that the color images have been encrypted very efficiently.

  相似文献   

19.
To optimize the tradeoff between imperceptibility and robustness properties, this paper proposes a robust and invisible blind image watermarking scheme based on a new combination of discrete cosine transform (DCT) and singular value decomposition (SVD) in discrete wavelet transform (DWT) domain using least-square curve fitting and logistic chaotic map. Firstly cover image is decomposed into four subbands using DWT and the low frequency subband LL is partitioned into non-overlapping blocks. Then DCT is applied to each block and several particular middle frequency DCT coefficients are extracted to form a modulation matrix, which is used to embed watermark signal by modifying its largest singular values in SVD domain. Optimal embedding strength for a specific cover image is obtained from an estimation based on least-square curve fitting and provides a good compromise between transparency and robustness of watermarking scheme. The security of the watermarking scheme is ensured by logistic chaotic map. Experimental results demonstrate the better effectiveness of the proposed watermarking scheme in the perceptual quality and the ability of resisting to conventional signal processing and geometric attacks, in comparison with the related existing methods.  相似文献   

20.
空域强鲁棒零水印方案   总被引:6,自引:1,他引:5  
熊祥光 《自动化学报》2018,44(1):160-175
为了解决传统鲁棒水印技术不可感知性和鲁棒性间的矛盾,对空域零水印技术进行研究,分析了常规图像处理攻击对载体图像所有选择分块整体均值与分块均值间大小关系的影响,结果表明此关系具有较强的稳健性.基于此,提出了一种新的空域强鲁棒零水印方案.1)利用混沌系统对初值敏感的特性映射图像分块的位置和采用混沌加密与Arnold空间置乱技术对原始水印信号进行预处理;2)采用载体图像所有选择分块整体均值与分块均值间大小关系的稳健性能来构造特征信息;3)采用混沌加密和Arnold空间置乱技术对生成的零水印信号进行后处理.仿真实验结果表明,本文算法对常规的图像处理、尺寸缩放、旋转和多种组合攻击等都表现出较强的抗攻击能力.与相似的鲁棒零水印方案相比,本文算法的平均运行时间不仅减少了约90%,而且抗攻击平均性能提高了约15%,表明它具有较低的计算复杂度和更优越的鲁棒性能,适用于对载体图像质量要求较高的作品版权保护应用场合.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号