首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到17条相似文献,搜索用时 171 毫秒
1.
黄清龙  刘建岚 《光子学报》2007,36(12):2261-2265
基于光学菲涅耳全息图和相位密码板,结合离散余弦变换,设计了一种新的正实值编码的“盲数字水印”计算方法.相位密码板是多个点光源的菲涅耳衍射光场的相角之和,原始水印图像在其菲涅耳衍射域中与通过相位密码板的参考光作相干叠加,形成菲涅耳全息图;之后将其嵌入到原始宿主图像的离散余弦变换中,同时将此叠加水印信息的原像素值用其邻近的原像素均值来替换;通过作逆离散余弦变换,获得了已嵌入水印信息的正实数值的目标图像;通过对载有水印信息的目标图像作逆运算,从中提取了原始水印图像.数值计算结果表明:该水印计算法对JPEG有损压缩、剪切、噪音污染和重采样等攻击,具有很强的鲁棒性.由于本算法属“盲数字水印”技术,以及水印信息的灵活嵌入和多重密钥(衍射距离、多个点光源位置等)的随意选择,从而使该算法具有很高的安全性和实用价值.  相似文献   

2.
基于双混沌置乱和扩频调制的彩色图像盲水印算法   总被引:5,自引:0,他引:5  
胡裕峰  朱善安 《光学学报》2008,29(9):1691-1696
提出了一种新的适应彩色图像的盲水印算法,先对宿主图像的绿色分量以8×8像素分块进行离散余弦变换(DCT)变换,用logistic映射生成两个混沌序列,然后用混沌序列置乱加密二值水印图像,并用两个互不相关的伪随机序列扩频调制水印,最后将调制好的水印嵌入到DCT变换域的中频子带系数上,进行分块DCT反变换得到水印化图像.提取水印时,通过比较两个伪随机序列和水印化图像的相关性大小来提取水印,不需要原始图像的参与,为盲提取水印算法.实验结果证明本文算法能有效地抵抗JPEG压缩、加噪、剪切等常见攻击,绿色分量嵌入水印比红色和蓝色分量嵌入水印能更好地抵抗JPEG压缩的攻击.  相似文献   

3.
黄清龙  刘建岚 《光子学报》2008,37(10):2118-2123
基于多重菲涅耳衍射变换和相位密码板,设计了一种新的图像加密计算方法.待加密的明文图像在多重离散菲涅耳衍射变换和相位密码板的共同作用下,变换为一个具有随机码特征的密文矩阵;衍射距离和相位密码板是主要的密钥.只有当所有密钥都正确时,才能成功地解密密文.结果表明,该加密算法能抵抗JPEG有损压缩、图像剪切、重度噪音污染和重采样等攻击,因此该法具有较强的鲁棒性;由于很难破解多重密钥,所以该算法具有极高的安全性.  相似文献   

4.
针对大多数盲水印算法不能抗旋转攻击及鲁棒性差的问题,提出一种将彩色QR码作为水印嵌入彩色宿主图像的强鲁棒性盲水印算法。算法基于Arnold变换对彩色QR码分通道置乱加密并归一化,将水印信息嵌入到彩色载体图像对应通道经小波变换和分块Schur分解后酉矩阵的系数差中。实验结果表明该算法具有较强的鲁棒性,能够抵抗任意角度的旋转攻击,且对裁切、JPEG压缩、高斯噪声、椒盐噪声、中值滤波、对比度增强等攻击具有较强的抵抗能力。算法在提取水印过程中不需要任何原载体图像相关信息,属于盲水印算法,在数字产品版权保护中具有较大的实际实用价值。  相似文献   

5.
袁胜  王真  周昕  邴丕彬 《光子学报》2020,49(2):179-187
提出了一种基于二值化计算鬼成像的盲水印方法.首先将水印图像经计算关联成像加密系统加密,并将加密数据二值化,然后将其隐藏到宿主图像的离散余弦变换域,实现水印信息的嵌入.水印信息的提取和重建是隐藏和加密的逆过程,分别借助提取密钥和解密密钥获取水印信息.仿真实验证明,该方法具有很好的隐蔽性,在嵌入因子α=10时,嵌入水印仍具有较好的不可感知性,含水印图像的峰值信噪比在38 dB以上;另外,该方法也具有一定的容错能力,提取的加密数据错误率达20%时,重建的水印信息仍能分辨和识别;与传统的计算鬼成像相比,加密数据的二值化为水印嵌入提供了方便,但是并未对重建图像带来严重恶化,其相关系数相差不足0.1;水印信息的提取无需借助原始宿主图像,是一种盲提取方法.  相似文献   

6.
针对多重水印信息的有效嵌入和提取,提出了一种基于峰值信噪比-归一化相关系数函数(PSNR-NC)优化和非抽样双树复小波变换的自适应多重水印算法。该算法首先利用PSNR-NC函数来确定水印的最佳嵌入位置,其次通过非抽样双树复小波变换-奇异值分解(UDTCWT-SVD)算法将多个相互独立的水印信息嵌入到彩色宿主图像中,最后通过水印提取算法在含水印图像中提取多重水印,有效实现了多个版权信息的嵌入和提取。实验结果表明,嵌入水印图像具备良好的不可见性,所提算法对常见的图像处理攻击,特别是在抵抗JPEG压缩、噪声攻击和滤波攻击方面表现出较强的鲁棒性。  相似文献   

7.
陈家祯  郑子华  叶锋  连桂仁  许力 《物理学报》2017,66(23):234202-234202
提出了一种基于三维物体的多重菲涅耳计算全息水印方法.将水印信号作为虚拟三维物体的层面,首先结合分区复用层析法和菲涅耳双随机相位编码方法产生复噪声形式的水印信号;然后对水印信号的频谱作共轭对称处理实现实值编码;为减小对宿主全息图数字重建的影响,将水印信号的频谱设置于对宿主数字重建影响小的频谱非感兴趣区域;编码后的信号以一定强度叠加于宿主全息图,水印信号恢复无需原始宿主全息图信息,可实现盲提取,对宿主全息图重建像面的二维码可扫描识别.仿真测试结果表明,所提出的方法具有较好的透明性和稳健性,在宿主全息图遭受滤波、JPEG(联合图像专家小组)压缩、高斯噪声、剪切、旋转等各种攻击的情况下,不论对宿主还是水印信号仍具有良好的数字重建质量,对重建像面的二维码仍可扫描识别;而重建像面水印信号的无干扰可控重建后处理操作解决了不同层面水印信号之间的衍射干扰问题,提高了水印信号的重建质量.虚拟光学手段的应用丰富了水印信号设计方法并提升了算法的安全性.  相似文献   

8.
为了弥补空间域水印算法在提取水印时需要原宿主图像、鲁棒性较差等缺点,提出一种基于BP神经网络和人眼视觉特性(HVS)的空域数字水印算法。先选出原宿主图像对比度函数值最大的前块用于二值水印图像的嵌入,利用神经网络能够逼近任意非线性关系的特点和其自适应性,构建水印信号嵌入前后图像块像素值间的映射关系,实现了水印的盲提取,并将该算法与现有算法进行了对比。实验结果表明,对于JPEG压缩、加噪、剪切和旋转等常见的图像处理攻击,算法具有良好的鲁棒性和不可见性。  相似文献   

9.
提出了一种新的基于Contourlet变换域的自适应量化索引调制数字图像水印算法.原始二值水印经过扩展置乱、降维和伪随机序列加密,嵌入到宿主图像经Contourlet变换后的低通子带系数中.根据低通子带能量分布特性,对分块低通子带的最大奇异值采用自适应量化索引调制,实现水印嵌入.实验结果表明,该水印算法不仅对嵌入的水印具有良好地视觉保真度,而且对JPEG压缩、低通滤波、加性噪声、重采样、剪切等多种攻击具有很强的稳健性.同时采用量化嵌入策略,水印提取时不需要宿主图像,即可实现水印网像盲提取.  相似文献   

10.
基于SIFT图像特征区域的全息水印技术   总被引:1,自引:0,他引:1  
为了增强水印的不可见性和鲁棒性,提出了一种基于图像特征区域的水印算法。首先利用SIFT(Scale Invariant Feature Transform)算法从载体图像蓝色B通道中提取图像特征点来进行优化和筛选,根据优化后的稳定特征点及其特征尺度确定图像的特征区域,再结合全息技术,对原始水印图像进行双随机相位加密,生成加密全息水印;然后对特征区域进行离散余弦变换(DCT);最后在其中频区域嵌入加密全息水印。在提取水印时无须借助原始图像,是盲水印技术。实验结果表明:该算法重建的水印图像与原始水印图像的NC值高达0.95;水印的嵌入对图像质量影响很小,PSNR值高达55.97,能够抵抗常规信号攻击及缩放、剪切、平移等几何攻击。  相似文献   

11.
A robust and blind watermarking technique for dual color images is proposed in this paper. According to the energy concentrating feature of DCT, the two-level DCT is introduced and used to embed color watermark image into color host image, which is completely different with the traditional DCT. For reducing the redundancy of watermark information, the original color watermark image is compressed by the proposed compression method. After two-level DCT, nine AC coefficients in different positions of each sub-block are selected and quantified to embed watermark information. Moreover, only the extraction rules are used to extract watermark from the watermarked image without resorting to the original host image or watermark image. Experimental results show that the proposed watermarking algorithm can effectively improve the quality of the watermarked image and the robustness of the embedded watermark against various attacks.  相似文献   

12.
基于虚拟通道技术的数字图像灰度水印算法   总被引:2,自引:2,他引:0  
王朋飞  冯桂  秦峰  王小林 《光子学报》2006,35(11):1770-1773
根据提出的虚拟通道技术,提出一种在载体中嵌入灰度图像作为水印的数字水印算法.通过修改载体频率域系数,载体通道可被看成一个虚拟的水印通道,它由若干个缺损的水印子通道构成,水印的提取不需要原始载体或原始水印的参与.实验结果表明提出的算法很好地保证了水印的不可见性和稳健性.  相似文献   

13.
In this paper, we have proposed a new multiple image encryption and watermarking technique. Several gray images can be watermarked in the three channels of an enlarged color image. The neighbor pixel value addition and subtraction algorithm is used to realize blind watermarking, therefore the original host color image does not need in extraction the watermark image. The gray images are encrypted with FRFT and Region Shift Encoding techniques before hiding to enhance the security. The robustness against occlusion attacks and noise attacks are also analyzed. And some computer simulations are presented to verify the possibility.  相似文献   

14.
In this paper, a state-coding based blind watermarking algorithm is proposed to embed color image watermark to color host image. The technique of state coding, which makes the state code of data set be equal to the hiding watermark information, is introduced in this paper. When embedding watermark, using Integer Wavelet Transform (IWT) and the rules of state coding, these components, R, G and B, of color image watermark are embedded to these components, Y, Cr and Cb, of color host image. Moreover, the rules of state coding are also used to extract watermark from the watermarked image without resorting to the original watermark or original host image. Experimental results show that the proposed watermarking algorithm cannot only meet the demand on invisibility and robustness of the watermark, but also have well performance compared with other proposed methods considered in this work.  相似文献   

15.
A novel blind color images watermarking based on SVD   总被引:1,自引:0,他引:1  
Since the color image watermark has more bit information, it is a challenging problem to design a robust and blind color watermarking scheme for copyright protection. In this paper, a blind watermarking scheme based on singular value decomposition (SVD) is proposed. By analyzing the orthogonal matrix U via SVD, it is found that there exists a strong similarity correlation between the second row first column element and the third row first column element. Hence, this paper utilizes this property for image watermarking. Firstly, the 4 × 4 non-overlapping pixels block of each component in color host image is processed by SVD. And then, the color watermark is embedded by slightly modifying the value of the second row first column element and the third row first column one of U matrix, and the modified relation can be utilized to extract watermark. Experimental results, compared with the related existing methods, show that the proposed color image scheme has stronger robustness against most common attacks such as image compression, filtering, cropping, noise adding, blurring, scaling and sharpening et al.  相似文献   

16.
甘甜  冯少彤  聂守平  朱竹青 《物理学报》2012,61(8):84203-084203
提出了一种在小波域中图像信息隐藏与盲提取算法. 该算法首先对载体图像进行分块两层离散小波变换, 找到每块第二级分解子带中的最大值即最重要小波系数, 然后根据小波特征树的对应关系将其在第一级分解子带中的对应区域作为嵌入区域, 在该区域嵌入由秘密信息生成的伪随机序列. 提取过程中, 同样按照小波系数对应关系寻找到嵌入区域并判断其与伪随机序列的相关性即可解密, 不需要提供原始图像. 实验结果表明, 该算法能实现二值图像的嵌入与盲提取, 且提取出的图像质量较好并具备一定的抗攻击能力, 尤其对于剪切攻击的鲁棒性较好.  相似文献   

17.
Desynchronization attacks are among the most difficult attacks to resist, for it can desynchronize the location of the watermark and hence cause incorrect watermark detection. The design of an image watermarking scheme that is robust against desynchronization attacks is challenging. Based on a multi-scale SIFT (scale invariant feature transform) detector and Bandelet transform theory, we propose a new content based image watermarking algorithm with good visual quality and reasonable resistance toward desynchronization attacks. Firstly, the stable image feature points are extracted from the original host by using the multi-scale SIFT detector, and the local feature regions (LFRs) are constructed adaptively according to the feature scale theory. The Bandelet transform is then performed on the LFRs. Finally, the digital watermark is embedded into the LFRs by modifying the significant Bandelet coefficients. By binding the watermark with the geometrically invariant image features, the watermark detection can be done without synchronization error. Experimental results show that the proposed image watermarking is not only invisible and robust against common signal processing such as sharpening, noise adding, JPEG compression, etc., but also robust against the desynchronization attacks such as rotation, translation, scaling, row or column removal, cropping, etc.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号