首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 156 毫秒
1.
为了提高水印技术的鲁棒性,提出了彩色图像离散小波变换(DWT)下的块奇异值分解(SVD)的零水印.首先对原始载体图像进行离散小波变换,然后选择低频子带进行分块,且对每一块进行奇异值分解,水印则由分解得到的最大前m个奇异值产生.实验结果表明,算法对各种攻击有较强的鲁棒性.  相似文献   

2.
提出一种基于离散小波变换(Discrete Wavelet Transform,DWT)与奇异值分解(Singular Value Decomposition,SVD)相结合的数字水印算法。该算法将原始图像的小波子图进行奇异值分解,将灰度水印图像进行Arnold变换以及扰乱加密,再进行分块离散余弦变换(Discrete Cosine Transform,DCT),将变换后的系数分类嵌入到相应的奇异值中。实验仿真表明,这种方法能抗大多数图像处理攻击,具有良好的鲁棒性。  相似文献   

3.
高勃  袁健 《信息技术》2014,(4):160-163,167
为增强嵌入水印方法的抵抗攻击能力,以及进一步提高数字图像水印的安全性,提出了一种基于DWT(离散小波变换)、DCT(离散余弦变换)和SVD(矩阵奇异值分解)的改进的水印算法。该算法首先对载体图像进行偏低频的3次DWT变换得到一个低频子图与三个高频子图,同时对加密置乱后的水印图像进行1次小波分解得到一个低频子图与高频子图;然后再对8个子图进行DCT变换,对DCT变换后的子图再进行互不重叠的大小为8×8的分块,分别对各个分块进行SVD(奇异值分解)变换,最后把水印的各个分块根据嵌入准则分别嵌入到相应子图的分块中。实验表明,该算法能够更好地抵抗JPEG压缩、高斯噪声、椒盐噪声、剪切等常见的攻击。  相似文献   

4.
DCT域可逆图像隐藏技术研究   总被引:1,自引:0,他引:1  
提出了一种基于DCT变换的数字图像隐藏算法.先对载体图像进行分块DCT变换,每个变换后的块矩阵中的细节元素位置用来存储被隐图像经加密后DCT变换的矩阵元素,然后分块反DCT变换后组合成加隐图像.加隐图像和原始的载体图像从肉眼上看几乎无异.用这样的方法来安全地隐藏一幅图像.从数值参数指标分析、秘钥空间大小、秘钥敏感性和抗破损攻击能力等角度对隐藏算法的有效性、隐藏性能、被隐藏图像提取时的恢复效果进行深入分析.  相似文献   

5.
贾茉 《电子技术》2008,45(3):86-88
文章以基于分块的离散余弦变换(BDCT)为基础,提出了一种改进的DCT图像压缩算法.首先,将源图像分解为32×32子图像并对每一图像块进行DCT运算,进而对量化后的DCT系数进行位平面编码以消除编码冗余,最后利用分块效应图像在小波域中的特性,进一步对分块效应进行消除.实验结果表明,本算法获得的解压图像在主观评价和客观评价上都拥有较之JPEG2000更好的压缩效果.  相似文献   

6.
基于梯度结构相似度的无参考模糊图像质量评价   总被引:8,自引:5,他引:3  
在对模糊图像边缘膨胀后进行边缘膨胀块提取的 基础上,提出一种基于梯 度结构相似度(GSIM)的无参考模糊图像质量评价方法(NRGSIM)。首先,将原始模糊图像经过低 通滤波生成再模糊图像;之后,将原始模糊图像生成的边缘膨胀图像进行8×8分块,并将子块 划分为边缘膨胀块和平滑块;然后,计算原始模糊图像和再模糊图像中所有对应到边缘膨胀 图 中边缘膨胀块的相应子块的GSIM;最后,平均得到整幅图像的模糊值。在4个数据 库上实验结果表明,本文方法评价结果合理、稳定,更加符合人类视觉特性,与主观评分有 较好的一致性,而且计算简单,取得了很好的评价效果,LIVE2数据库上的SROCC指标达到0.964。  相似文献   

7.
黄福莹  覃团发  陈华 《电视技术》2015,39(20):11-13
提出了一种基于离散小波变换、离散傅里叶变换和奇异值分解相结合的盲水印算法。该算法对原始图像进行一级离散小波变换后选择低频子带图像作分块离散傅里叶变换,然后对分块离散傅里叶变换的幅度谱进行奇异值分解,选择最大奇异值并采用量化嵌入方法实现水印的嵌入和盲提取。为了提高算法对旋转攻击的鲁棒性,采用基于Radon变换的检测算法对待检测图像进行旋转校正。实验结果表明,该算法对一些常规攻击和几何攻击都具有较强的鲁棒性。  相似文献   

8.
自适应阈值及加权局部二值模式的人脸识别   总被引:1,自引:0,他引:1  
针对局部二值模式(LBP)和中心对称局部二值模式(CS-LBP)方法描述图像纹理特征时,阈值不能自动选取并且图像中不同子块的贡献也没有进行区分的问题,该文提出一种自适应阈值及加权的局部二值模式方法。首先,将图像进行分块,采用设定的自适应阈值提取每个子块的LBP或CS-LBP纹理直方图;然后,将各子图像的信息熵作为直方图的加权依据,对每个子块对应的直方图进行自适应加权,并将所有子块的直方图连接成最终的纹理特征;最后,通过快速计算图像均值加快了算法的计算速度。在人脸数据库上进行的实验证明,利用该文提出的方法提取纹理特征,并结合最近邻分类法可以得到较高的正确识别率。  相似文献   

9.
传统的基于DCT变换的二值水印嵌入算法通常是在分块系数矩阵中选择一对中频系数实现1bit水印信息的嵌入,水印嵌入容量有限,为提高载体图像的安全性,提出了一种新的基于DCT的大容量二值水印嵌入算法.本算法首先对二值水印图像进行Arnold置乱加密处理,其次对所选取的载体图像进行分块DCT变换,然后选择4个中频系数进行排序,充分利用两两之间的3个差值关系实现水印的嵌入.若待嵌入水印位为0,通过改变系数值使得差值大于或等于阈值A,若待嵌入水印位为1,通过改变系数值使得差值等于阈值B,最终使得每块选择4个系数值实现了3bit二值水印信息的嵌入,水印嵌入容量大大优于传统方法.仿真实验表明,本算法实现了大容量水印的嵌入与提取且抵抗图像裁剪、图像加噪、JPEG压缩等攻击效果较好.  相似文献   

10.
块奇异值分解和量化实现的图像数字水印算法   总被引:3,自引:2,他引:1  
李旭东 《光电子.激光》2011,(12):1847-1851
讨论了当前将水印嵌入在块奇异值分解(SVD,singular value decomposition)后最大奇异值中的图像数字水印算法不足,进而提出了两种新的将水印嵌入在块SVD后最大奇异值除外的其余奇异值中的图像数字水印算法。两种新算法均采用了量化嵌入策略,从而使两种算法在提取水印时无需任何原始信息的帮助。实验结果表...  相似文献   

11.
叶天语 《通信学报》2013,34(3):148-156
利用子块区域分割思想和自嵌入技术提出了一种只利用攻击图像就能进行版权鉴别和内容认证的全盲多功能图像水印算法。将原始图像分割成不重叠的子块,对每个子块进行离散余弦变换,将每个子块离散余弦变换矩阵分成为区域1和区域2两部分,然后对区域1进行奇异值分解,通过判断奇异值均值的最高位数字奇偶性产生特征水印,然后通过调整区域2的2个离散余弦变换交流系数大小自嵌入特征水印,最后对每个子块进行逆离散余弦变换得到含水印图像。算法通过结合将区域1产生的特征水印自嵌入区域2和在区域2盲提取认证水印实现全盲检测和多功能。实验结果表明,算法既能实现版权保护又能实现内容认证,而且还具有区分恶意篡改和无意篡改的能力。  相似文献   

12.
针对现有大部分水印算法功能单一且无法实现完全盲检测的局限性,提出一种同时进行版权保护和内容认证的全盲双功能数字水印算法.算法采取子块区域分割的思想,水印产生和嵌入分别利用同一个子块的不同区域.通过判别两个最大奇异值均值的最高位奇偶性产生特征水印,然后自适应地调整相邻区域相同位置的两个离散余弦变换交流系数的大小,实现水印的嵌入.检测端通过产生的特征水印和盲提取的认证水印实现全盲的版权鉴别和内容认证.相比于已报道的一些水印方案,本文提出的水印算法对于常见的攻击具有更好的顽健性,可以实现版权保护功能,同时对于恶意的图像篡改又有较好的敏感性,可以准确定位篡改的区域.  相似文献   

13.
The motion compensated discrete cosine transform coding (MCDCT) is an efficient image sequence coding technique. In order to further reduce the bit-rate for the quantizied DCT coefficients and keep the visual quality, we propose an adaptive edge-based quadtree motion compensated discrete cosine transform coding (EQDCT). In our proposed algorithm, the overhead moving information is encoded by a quadtree structure and the nonedge blocks will be encoded at lower bit-rate but the edge blocks will be encoded at higher bit-rate. The edge blocks will be further classified into four different classes according to the orientations and locations of the edges. Each class of edge blocks selects the different set of the DCT coefficients to be encoded. By this method, we can just preserve and encode a few DCT coefficients, but still maintain the visual quality of the images. In the proposed EQDCT image sequence coding scheme, the average bit-rate of each frame is reduced to 0.072 bit/pixel and the average PSNR value is 32.11 dB.  相似文献   

14.
A content authentication technique based on JPEG-to-JPEG watermarking is proposed in this paper. In this technique, each 88 block in a JPEG compressed image is first processed by entropy decoding, and then the quantized discrete cosine transform (DCT) is applied to generate DCT coefficients: one DC coefficient and 63 AC coefficients in frequency coefficients. The DCT AC coefficients are used to form zero planes in which the watermark is embedded by a chaotic map. In this way, the watermark information is embedded into JPEG compressed domain, and the output watermarked image is still a JPEG format. The proposed method is especially applicable to content authentication of JPEG image since the quantized coefficients are modified for embedding the watermark and the chaotic system possesses an important property with the high sensitivity on initial values. Experimental results show that the tamper regions are localized accurately when the watermarked JPEG image is maliciously tampered.  相似文献   

15.
A content authentication technique based on JPEG-to-JPEG watermarking is proposed in this paper. In this technique, each 8x8 block in a JPEG compressed image is first processed by entropy decoding, and then the quantized discrete cosine transform (DCT) is applied to generate DCT coefficients: one DC coefficient and 63 AC coefficients in frequency coefficients. The DCT AC coefficients are used to form zero planes in which the watermark is embedded by a chaotic map. In this way, the watermark information is embedded into JPEG compressed domain, and the output watermarked image is still a JPEG format. The proposed method is especially applicable to content authentication of JPEG image since the quantized coefficients are modified for embedding the watermark and the chaotic system possesses an important property with the high sensitivity on initial values. Experimental results show that the tamper regions are localized accurately when the watermarked JPEG image is maliciously tampered.  相似文献   

16.
针对数字产品的版权保护问题,提出了一种基于矩阵范数分析的自适应数字水印算法.算法将载体图像分为8×8不重复块并进行DCT变换,根据8×8模板对每个分块的低、高频数据分别组成新矩阵并进行SVD分解.结合人眼视觉特性和矩阵范数理论推导结果求解对应的块能量确定嵌入位置.水印信息选择在摸板的低频区矩阵的奇异值分解的首个值中,嵌入强度随块能量比自动调节.理论分析和实验结果表明,该算法不仅具有较好的透明性,而且对常见攻击如高斯噪声、JPEG压缩、滤波以及几何攻击等具有较好的稳健性.  相似文献   

17.
Due to coarse quantization, block-based discrete cosine transform(BDCT) compression methods usually suffer from visible blocking artifacts at the block boundaries. A novel efficient deblocking method in DCT domain is proposed. A specific criterion for edge detection is given, one-dimensional DCT is applied on each row of the adjacent blocks and the shifted block in smooth region, and the transform coefficients of the shifted block are modified by weighting the average of three coefficients of the block. Mean square difference of slope criterion is used to judge the efficiency of the proposed algorithm. Simulation results show that the new method not only obtains satisfactory image quality, but also maintains high frequency information.  相似文献   

18.
In this paper, the backward-propagation neural network (BPNN) technique and just-noticeable difference (JND) model are incorporated into a block-wise discrete cosine transform (DCT)-based scheme to achieve effective blind image watermarking. To form a block structure in the DCT domain, we partition a host image into non-overlapped blocks of size 8 × 8 and then apply DCT to each block separately. By referring to certain DCT coefficients over a 3 × 3 grid of blocks, the BPNN can offer adequate predictions of designated coefficients inside the central block. The watermarking turns out to be a process of adjusting the relationship between the intended coefficients and their BPNN predictions subject to the JND. Experimental results show that the proposed scheme is able to withstand a variety of image processing attacks. Compared with two other schemes that also utilize inter-block correlations, the proposed one apparently exhibits superior robustness and imperceptibility under the same payload capacity.  相似文献   

19.
为了对数字视频进行版权保护,结合离散余弦变换和数字视频的相关理论,提出了一种基于帧DCT变换的鲁棒视频水印算法.先对水印进行预处理,然后选择嵌入强度,将水印信息多次重复嵌入到视频帧分块DCT变换的中频系数中.提取水印时无须原始视频的参与.实验结果表明,该算法具有较好的不可见性和较强的鲁棒性.  相似文献   

20.
Although zero-watermarking can provide an effective and distortion-free scheme for image copyright protection, its robustness and discriminability do not meet expectations in existing methods. Some cannot resist effectively geometric attacks, others do not consider the discriminability and equalization. For that reason, this paper proposes a robust and distinguishable color image zero-watermarking algorithm based on polar harmonic transforms (PHTs) and compound chaotic map. In the proposed algorithm, firstly three PHTs moments of an image are computed simultaneously and accurate moments are selected for the robustness. Then, content-based binary feature sequence is acquired by judging the relation between magnitudes of adjacent moments for the discriminability. Finally, compound chaotic map is employed to encrypt copyright logo for ensuring security and scramble binary feature sequence for improving the equalization. Experimental results show that the proposed zero-watermarking algorithm has good equalization and discriminability, and an advantage in robustness compared with other zero-watermarking and traditional watermarking.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号