首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到17条相似文献,搜索用时 203 毫秒
1.
本文以二维离散小波变换为基础,提出了一种新的盲水印算法.该算法采用均值量化的方式,在低频子带中分段嵌入二值水印信息,并且将该方法延伸到处理彩色图像水印的嵌入.除水印载体图像以外,水印的提取不需要任何其他附加信息.实验结果证明,该算法具有透明性好、嵌入信息量大的特点,并且能够较好地抵抗常见的数字水印攻击,如:JPEG压缩、图像剪切、椒盐噪声、高斯噪声等.该算法已经应用于电子印章产品中.  相似文献   

2.
雷赟  齐影虹 《科技广场》2007,(9):138-141
数字水印是一种新的有效的数字产品版权保护和数据安全维护的技术,它是一种十分贴近实际应用的信息隐藏技术,近年来已成为国内外的研究热点并有着广泛的应用前景。首先介绍数字水印技术的特点、分类及应用领域,并阐述了其基本原理,同时对一些鲁棒彩色图像数字水印算法做了概要性的介绍。由于彩色是我们平时接触最多的,因此,彩色图像的水印算法比灰度图像水印算法更具实用性。最后,指出了彩色图像数字水印今后的研究方向和前景展望。  相似文献   

3.
一种有意义的彩色图像数字水印研究   总被引:1,自引:0,他引:1  
本文提出了一种有意义的彩色图像数字水印研究。利用彩色图像的YUV色彩空间的Y分量嵌入水印。结合人类视觉系统的特性,计算视觉掩蔽函数值,将经JPEG位流编码转换的水印图像加密后自适应地嵌入到小波的中频和低频系数中,保证水印有较好的不可见性和鲁棒性。仿真实验证明本算法较好的鲁棒性,能够抵抗各种常见的信号处理操作、图像压缩处理的攻击。  相似文献   

4.
数字音频水印是水印技术中重要的组成部分,提出了一种基于音频小波变换的水印算法,在音频小波变换域的近似分量中通过量化策略嵌入水印,并实现了水印的盲提取。水印采用二值图像,比使用伪随即水印序列更加直观。仿真实验表明本算法的水印具有很好的鲁棒性和不可感知性。  相似文献   

5.
利用双树复小波变换并结合人眼视网膜的颜色特性,提出一种基于融合的彩色图像水印方案。利用复小波变换的平移不变性和多方向性来增强水印受攻击时的鲁棒性。通过试验调整水印能量在蓝、绿、红3种颜色信道里的比例来提高水印的不可见性。结果表明该水印方案在压缩、增加噪声、中值和平均滤波攻击下具有较高的鲁棒性。  相似文献   

6.
利用二维混沌流加密技术加密有意义的二进制图像,获得水印数据,以提高视频水印的安全性。水印嵌入过程中,水印被嵌入到随机选择的视频帧的离散余弦变换系数里。在鲁棒性和帧平均攻击实验后,大部分水印可以通过水印检测提取算法进行提取和识别。实验结果表明,这种视频水印方法具有一定的安全性、隐蔽性和鲁棒性。  相似文献   

7.
通过对基于混沌的DCT域数字水印技术在图像生成、水印嵌入、水印提取以及对水印攻击实验的结果分析中可以看出,此技术满足信息时代信息化所要求的数字图像信息隐藏的需要。  相似文献   

8.
有效的图像水印应满足可认证性、隐蔽性、鲁棒性和安全性。水印是通过二维混沌加密算法加密有意义图像生成。水印嵌入过程中,结合峰值信噪声比和归一化互相关系数,精心设计适应度函数,运用遗传算法寻找最佳嵌入强度,将水印嵌入到原始图像的DCT系数,提高了水印的隐蔽性和鲁棒性。实验结果证明了所提优化图像水印的有效性。  相似文献   

9.
在分析二值图像文档水印技术研究动态的基础上,通过对汉字特点的分析,发现横、竖笔画频繁交汇出现-拐点。基于此,提出一种新的应用于汉字文本图像的简便水印方法:在汉字笔画横竖交叉的拐点处加入水印,并利用MatLab进行仿真实验,讨论和分析了这一算法较传统的完全基于格式的文本数字水印的优点。  相似文献   

10.
针对彩色数字图像的版权保护问题,提出了基于奇异值分解和离散的小波变换的彩色图像数字水印算法。算法将CIE-RGB色彩模式下的彩色图像转换到CIE-LAB色彩模式,然后将置乱后的水印嵌入到LAB色彩空间的L分量分块的小波分解低频系数的奇异值中。实验证明,该算法能够抵抗剪贴、拼贴、高斯噪声、JPEG压缩缩放、旋转等常用的图像处理的攻击,并且具有良好的不可见性和安全性。  相似文献   

11.
Aiming at the problem that watermark information is easy to be lost in two-dimensional text image watermarking, a three-dimensional text image watermarking model is proposed based on multilayer overlapping of extracted two-dimensional information, and a specific method is accordingly realized by means of embedding, extracting and overlapping of multiple watermarks in sequence. We discuss the influence of the sequence order, positional distancing and color difference of the extracted multiple two-dimensional information on displaying a three-dimensional text watermark image. In addition, considering the crucial evaluation indices of the invisibility and robustness for the watermarking algorithm, the selection method for superior embedding regions of multiple watermarks is also constructed to enhance the robust performance of watermarks under the premise of effective invisibility. Moreover, we embed the multiple two-dimensional information into the host image by using the undecimated dual-tree complex wavelet transforms - bidiagonal singular value decomposition algorithm. In this way, the extracted multiple two-dimensional information is automatically overlapped to generate the three-dimensional text watermarking according to the optimal matching parameters. We use standard image processing data set to carry out experiments, the results show that the peak signal to noise ratio before and after embedded watermarks is higher than 39 dB, and the peak signal to noise ratio between the original watermarks and the extracted watermarks is more than 37 dB, which is superior to the current reported watermark model. Therefore, it is suggested that the proposed model shows good invisibility and robustness and can reduce the loss of watermark during transmission and attack as much as possible.  相似文献   

12.
In this paper, a new homomorphic image watermarking method implementing the Singular Value Decomposition (SVD) algorithm is presented. The idea of the proposed method is based on embedding the watermark with the SVD algorithm in the reflectance component after applying the homomorphic transform. The reflectance component contains most of the image features but with low energy, and hence watermarks embedded in this component will be invisible. A block-by-block implementation of the proposed method is also introduced. The watermark embedding on a block-by-block basis makes the watermark more robust to attacks. A comparison study between the proposed method and the traditional SVD watermarking method is presented in the presence of attacks. The proposed method is more robust to various attacks. The embedding of chaotic encrypted watermarks is also investigated in this paper to increase the level of security.  相似文献   

13.
胡爱娜 《科技广场》2005,66(3):39-42
本文提出了一种基于复小波变换的新的具有鲁棒性的数字图像水印方法。为了改进算法的鲁棒性,本文采用了纠错码,该技术是在空域中进行的。为了了解本文所提出的在CWT域上所提出的算法,我们在DWT域上采用同样的嵌入算法来和它进行比较。最后,我们要通过试验来检测两种算法对于选择性攻击(比如JPEG,JPEG2000压缩)的鲁棒性,并利用水印检测软件基准来对他们进行比较。  相似文献   

14.
采用差分能量水印(DEW)算法,对视频数字作品进行了数字水印的嵌入、检测和提取研究。实验结果表明,该算法计算简单、速度快、易于实现,视频信号里可编码的数据量大,可以隐藏较多的信息,并且还可以满足水印的实时嵌入和提取。  相似文献   

15.
This paper presents a novel dynamic stochastic resonance (DSR)-based technique for robust extraction of a grayscale logo from a tampered watermarked image. The watermark embedding is done on the singular values (SV) of the discrete cosine transform (DCT) coefficients of the cover image. DSR is then strategically applied during the logo extraction process where the SV of DCT coefficients are tuned following a double-well potential model by utilizing the noise introduced during attacks. The resilience of this technique has been tested in the presence of various noises, geometrical distortions, enhancement, compression, filtering and watermarking attacks. The proposed DSR-based technique for logo extraction gives noteworthy robustness without any significant trade-off in perceptual transparency of the watermarked image. A maximization approach has been adopted for the selection of bistable double-well parameters to establish noise-enhanced resonance. When compared with existing watermark extraction techniques based in SVD, DCT, SVD-DCT domains, as well as with their combination with DSR, the results suggest that remarkable improvement of robustness is achieved by using DSR on singular values of DCT.  相似文献   

16.
This paper proposes a new watermarking approach using dynamic stochastic resonance (DSR) based tuning operation to extract the watermark logo from the watermarked image that has undergone different intentional and signal processing attacks. This method is intended to provide remedies from the shortcomings of the technique proposed by Lin et al. (2008), and invalidates the effect of intentional attacks recently designed by Meerwald et al. (2009). The algorithm incorporates three level image decomposition using lifting wavelet transform (LWT) and low-pass subband is utilized for data hiding purpose. Watermark bits are embedded into the blocks of non-overlapped wavelet coefficients of the cover image by quantizing the two maximum coefficients of the corresponding block. In watermark extraction process, the DSR is applied by performing the tuning operation on coefficient blocks of attacked watermarked image. It is a parameter dependent approach that enhances the performance of watermark extraction, where the parameters of DSR inherently depend on the image properties such as standard deviation or variance. As far as security is concerned, the randomization of wavelet coefficients, blocks, and watermark bits helps the framework to be more secure. The proposed technique is also examined against multiple watermarking attack and successfully proves its authenticity and ownership. Comparison of the proposed technique with recent techniques shows remarkable improvement in terms of robustness and security against various intentional, signal processing, and geometrical attacks.  相似文献   

17.
图像数字水印技术,作为潜在的可有效解决数字图书馆中图像资源版权保护问题的手段,受到了广大学者越来越多的关注.为有效地实现图像资源的版权保护,该文在讨论和分析了图像资源版权保护的现状和发展趋势后,提出了一种新的简单、方便、容易的SVD域图像数字水印方法.该文方法在对数字水印的提取时,无须原始图像的参与,实用性强.实验结果表明,该文方法对数字水印具有很好的透明性,并且方法对图像JPEG压缩、亮度调整、对比度调整、叠加噪声等常见图像处理攻击均具有很强的稳健性.因此,该文方法可有效地运用于图像资源的版权保护.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号