首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 140 毫秒
1.
针对多重水印信息的有效嵌入和提取,提出了一种基于峰值信噪比-归一化相关系数函数(PSNR-NC)优化和非抽样双树复小波变换的自适应多重水印算法。该算法首先利用PSNR-NC函数来确定水印的最佳嵌入位置,其次通过非抽样双树复小波变换-奇异值分解(UDTCWT-SVD)算法将多个相互独立的水印信息嵌入到彩色宿主图像中,最后通过水印提取算法在含水印图像中提取多重水印,有效实现了多个版权信息的嵌入和提取。实验结果表明,嵌入水印图像具备良好的不可见性,所提算法对常见的图像处理攻击,特别是在抵抗JPEG压缩、噪声攻击和滤波攻击方面表现出较强的鲁棒性。  相似文献   

2.
基于SIFT图像特征区域的全息水印技术   总被引:1,自引:0,他引:1  
为了增强水印的不可见性和鲁棒性,提出了一种基于图像特征区域的水印算法。首先利用SIFT(Scale Invariant Feature Transform)算法从载体图像蓝色B通道中提取图像特征点来进行优化和筛选,根据优化后的稳定特征点及其特征尺度确定图像的特征区域,再结合全息技术,对原始水印图像进行双随机相位加密,生成加密全息水印;然后对特征区域进行离散余弦变换(DCT);最后在其中频区域嵌入加密全息水印。在提取水印时无须借助原始图像,是盲水印技术。实验结果表明:该算法重建的水印图像与原始水印图像的NC值高达0.95;水印的嵌入对图像质量影响很小,PSNR值高达55.97,能够抵抗常规信号攻击及缩放、剪切、平移等几何攻击。  相似文献   

3.
针对大多数盲水印算法不能抗旋转攻击及鲁棒性差的问题,提出一种将彩色QR码作为水印嵌入彩色宿主图像的强鲁棒性盲水印算法。算法基于Arnold变换对彩色QR码分通道置乱加密并归一化,将水印信息嵌入到彩色载体图像对应通道经小波变换和分块Schur分解后酉矩阵的系数差中。实验结果表明该算法具有较强的鲁棒性,能够抵抗任意角度的旋转攻击,且对裁切、JPEG压缩、高斯噪声、椒盐噪声、中值滤波、对比度增强等攻击具有较强的抵抗能力。算法在提取水印过程中不需要任何原载体图像相关信息,属于盲水印算法,在数字产品版权保护中具有较大的实际实用价值。  相似文献   

4.
《光学技术》2021,47(2):223-230
提出了一种基于深度学习的光学水印重建方法,通过双随机相位加密的方法实现水印的加密,并将加密图像嵌入到宿主图像中,然后利用原水印图像与含水印宿主图像之间的物理关系,训练改进的神经网络FC-DenseNets-BC,得到可以重建原水印图像的网络模型。在传统光学水印技术中,含水印宿主图像质量和解密水印图像质量依赖于嵌入强度的选取(当嵌入强度较大时,含水印宿主图像质量低,解密水印图像质量高;当嵌入强度较小时,含水印宿主图像质量高,解密水印图像质量低),然而使用深度学习重建水印图像可以摆脱该依赖关系。研究结果表明,在嵌入强度低至0.05的情况下,所提方法仍能够重建出峰值信噪比在35dB以上的高质量水印图像,且具有一定的泛化性、安全性和抵抗噪声、剪切的能力。并进一步通过光学系统实验验证了方法的可行性和高效性。  相似文献   

5.
姚军财 《光学技术》2017,43(5):439-444
利用小波变换频谱特性和图像奇异值分解特征,提出了一种结合人眼对比感知特性的图像水印算法。并通过结合人眼视觉特性,将置乱的水印以一定的强度嵌入到图像的奇异值矩阵中,采用其逆过程提取水印,通过仿真进行了验证。对其实施了压缩、剪切、高斯噪声和中值滤波攻击测试,与前人提出的8种水印算法的抗攻击性能进行对比分析。结果表明,在质量因子为20%的较强压缩攻击下,提取水印的NC值仍能达到0.8359,含水印图的PSNR和SSIM达到25.0908dB和0.8451,且比8种水印算法具有更好的鲁棒性。综合表明,提出的算法有效地解决了水印嵌入过程中鲁棒性、视觉透明性与水印嵌入量之间的平衡问题。  相似文献   

6.
《光学技术》2013,(4):354-358
提出了一种新的图像水印实现方法。采用差分法进行水印强度的嵌入和检测,利用一种自适应算法调节水印强度,能使水印在透明性得到保证的前提下尽量地提高水印强度。使用密钥计算水印的嵌入位置,增加水印的安全性。在水印检测过程中,利用一种带优先级的膨胀算法辅助水印的复原。以二值图像作为水印信息,灰度图像作为水印的载体,以另一幅灰度图片作为密钥,通过实验成功地实现了水印的嵌入和检测。实验证明,该方法可以很好地抵御几何裁剪攻击、量化攻击、JPEG压缩攻击和高斯噪声攻击,具有一定的实用价值。  相似文献   

7.
为了弥补空间域水印算法在提取水印时需要原宿主图像、鲁棒性较差等缺点,提出一种基于BP神经网络和人眼视觉特性(HVS)的空域数字水印算法。先选出原宿主图像对比度函数值最大的前块用于二值水印图像的嵌入,利用神经网络能够逼近任意非线性关系的特点和其自适应性,构建水印信号嵌入前后图像块像素值间的映射关系,实现了水印的盲提取,并将该算法与现有算法进行了对比。实验结果表明,对于JPEG压缩、加噪、剪切和旋转等常见的图像处理攻击,算法具有良好的鲁棒性和不可见性。  相似文献   

8.
王兴元  张继明 《物理学报》2014,63(21):210701-210701
本文提出了一种基于抖动和混沌技术的数字图像篡改检测及修复算法.该算法使用小波变换后的低频子图和抖动技术生成图像的认证及修复信息,在有效减少水印数据量的同时,将水印嵌入小波变换后的高频子图,从而达到水印的不可见性.运用混沌技术完成水印的嵌入和加密,并结合中国余数定理,进一步减少水印嵌入对图像质量的影响.实验证明,该算法兼顾了水印的不可见性和鲁棒性,并且能够一定程度修复篡改图像,在图像认证和修复方面具有较高的实用意义.  相似文献   

9.
结合人眼对比度敏感视觉特性和图像变换域特征,提出了一种新的人眼感知图像误差阈值的计算方法;结合计算的阈值,提出了一种新的彩色图像水印方案,并进行了仿真实验和攻击测试;实验结果表明,含水印图像经攻击后提取的水印信息仍清晰可见,其相似度值在压缩质量因子为50%的压缩攻击下仍能达到0.7371以上,表明提出的水印方案具有较好的透明性和较高的鲁棒性;并且在水印嵌入和提取过程中将原始彩色图像变换到与设备无关的CIELAB颜色空间,从而更好的提高了水印的鲁棒性。综合结果表明提出的水印方案是一种行之有效的水印嵌入和提取方案。  相似文献   

10.
提出了一种基于小波变换的三维模型加密全息盲水印算法。该算法选取三维模型球面坐标与重心的距离作为离散二维信号,首先进行小波变换得到水平分量,水平分量经过小波变换后得到低频部分,将水印图像经光全息加密嵌入到低频部分,再经过逆小波变换生成含水印的三维模型,水印的提取是水印嵌入的逆过程。实验结果表明,该方法对噪声攻击、旋转、平移、比例变换、重排序攻击等具有很好的鲁棒性,且加密全息水印图像具有很好的水印安全性。  相似文献   

11.
Quantum watermarking technology protects copyright by embedding invisible quantum signal in quantum multimedia data. In this paper, a watermarking scheme based on INEQR was presented. Firstly, the watermark image is extended to achieve the requirement of embedding carrier image. Secondly, the swap and XOR operation is used on the processed pixels. Since there is only one bit per pixel, XOR operation can achieve the effect of simple encryption. Thirdly, both the watermark image extraction and embedding operations are described, where the key image, swap operation and LSB algorithm are used. When the embedding is made, the binary image key is changed. It means that the watermark has been embedded. Of course, if the watermark image is extracted, the key’s state need detected. When key’s state is |1〉, this extraction operation is carried out. Finally, for validation of the proposed scheme, both the Signal-to-noise ratio (PSNR) and the security of the scheme are analyzed.  相似文献   

12.
In this paper we applied differential evolution (DE) algorithm to balance the tradeoff between robustness and imperceptibility by exploring multiple scaling factors in image watermarking. First of all, the original image is partitioned into blocks and the blocks are transformed into Discrete Cosine Transform (DCT) domain. The DC coefficients from each block are collected to construct a low-resolution approximation image and apply Singular Value Decomposition (SVD) on this approximation image. After that watermark is embedded by modifying singular values with the singular values of the watermark. The role of DE algorithm is to identify the best multiple scaling factors for embedding process in order to achieve the best performance in terms of robustness without compromising with the quality of the image. To enhance the security, watermark is scrambled by Arnold transform before embedding. Experimental results show that the proposed scheme maintains a satisfactory image quality and watermark can still be identified from a seriously distorted image.  相似文献   

13.
In this paper, a blind dual color image watermarking scheme based on Schur decomposition is introduced. This is the first time to use Schur decomposition to embed color image watermark in color host image, which is different from using the binary image as watermark. By analyzing the 4 × 4 unitary matrix U via Schur decomposition, we can find that there is a strong correlation between the second row first column element and the third row first column element. This property can be explored for embedding watermark and extracting watermark in the blind manner. Since Schur decomposition is an intermediate step in SVD decomposition, the proposed method requires less number of computations. Experimental results show that the proposed scheme is robust against most common attacks including JPEG lossy compression, JPEG 2000 compression, low-pass filtering, cropping, noise addition, blurring, rotation, scaling and sharpening et al. Moreover, the proposed algorithm outperforms the closely related SVD-based algorithm and the spatial-domain algorithm.  相似文献   

14.
分数傅里叶域数字水印算法   总被引:19,自引:2,他引:17  
基于离散分数傅里叶变换(DFRFT)快速算法发展了一种分数傅里叶谱域图像水印算法.该算法根据分数傅里叶变换谱具有空域和频域双域信息表达能力,分别对原始图像和所加水印信息进行不同级次的分数傅里叶变换,提取水印分数傅里叶谱的低频成分并直接将其叠加到原始图像的分数傅里叶谱中的对角像元上,然后再进行逆变换得到水印图像.在JPEG压缩、图像旋转及剪切等攻击方式下,对该水印算法进行了鲁棒性分析,数值实验表明该水印算法具有良好的抗攻击性和安全性.  相似文献   

15.
In the past decade, rapid development in digital communication has led to prevalent use of digital images. More importantly, confidentiality issues have also come up recently due to the increase in digital image transmission across the Internet. Therefore, it is necessary to provide high imperceptibility and security to digitally transmitted images. In this paper, a novel blind digital image watermarking scheme is introduced tackling secured transmission of digital images, which provides a higher quality regarding both imperceptibility and robustness parameters. A block based hybrid IWT- SVD transform is implemented for robust transmission of digital images. To ensure high watermark security, the watermark is encrypted using a Pseudo random key which is generated adaptively from cover and watermark images. An encrypted watermark is embedded in randomly selected low entropy blocks to increase the security as well as imperceptibility. Embedding positions within the block are identified adaptively using a Blum–Blum–Shub Pseudo random generator. To ensure higher visual quality, Initial Scaling Factor (ISF) is chosen adaptively from a cover image using image range characteristics. ISF can be optimized using Nature Inspired Optimization (NIO) techniques for higher imperceptibility and robustness. Specifically, the ISF parameter is optimized by using three well-known and novel NIO-based algorithms such as Genetic Algorithms (GA), Artificial Bee Colony (ABC), and Firefly Optimization algorithm. Experiments were conducted for the proposed scheme in terms of imperceptibility, robustness, security, embedding rate, and computational time. Experimental results support higher effectiveness of the proposed scheme. Furthermore, performance comparison has been done with some of the existing state-of-the-art schemes which substantiates the improved performance of the proposed scheme.  相似文献   

16.
In this paper, a dual watermarking scheme based on discrete wavelet transform (DWT), wavelet packet transform (WPT) with best tree, and singular value decomposition (SVD) is proposed. In our algorithm, the cover image is sub-sampled into four sub-images and then two sub-images, having the highest sum of singular values are selected. Two different gray scale images are embedded in the selected sub-images. For embedding first watermark, one of the selected sub-image is decomposed via WPT. The entropy based algorithm is adopted to find the best tree of WPT. Watermark is embedded in all frequency sub-bands of the best tree. For embedding second watermark, l-level discrete wavelet transform (DWT) is performed on the second selected sub-image. The watermark is embedded by modifying the singular values of the transformed image. To enhance the security of the scheme, Zig-Zag scan in applied on the second watermark before embedding. The robustness of the proposed scheme is demonstrated through a series of attack simulations. Experimental results demonstrate that the proposed scheme has good perceptual invisibility and is also robust against various image processing operations, geometric attacks and JPEG Compression.  相似文献   

17.
龚一珉  孙刘杰 《光学技术》2017,43(6):555-560
提出一种水印算法的新思路,可以自适应地确定水印嵌入的区域和强度。基于HVS的人眼掩蔽效应对图像亮度和纹理敏感度的量化指标进行计算,图像先后两次分块。依据评分选择最佳嵌入区域后对其进行单尺度Retinex分解,将其分解为用于评价亮度信息的照度分量和评价纹理信息的反射分量。根据评价结果,设置不同的水印嵌入强度分别嵌入图像小波域中频的各分块中。提取的水印通过数学形态学处理以提高其可辨识度。嵌入水印的不可见性得到最大化实现(PSNR=40.0),鲁棒性较佳,能抵御信号处理和几何攻击。能根据图像特征自适应分析水印的最佳嵌入位置,在保证隐蔽性的同时嵌入尽可能多的水印信息;水印的安全性也得以保障,是一种应用面广、适应性强的数字水印算法。  相似文献   

18.
In order to resist geometric attacks, a robust image watermarking algorithm is proposed using scaleinvariant feature transform (SIFT) and Zernike moments. As SIFT features are invariant to rotation and scaling, we employ SIFT to extract feature points. Then circular patches are generated using the most robust points. An invariant watermark is generated from each circular patch based on Zernike moments.The watermark is embedded into multiple patches for resisting locally cropping attacks. Experimental results show that the proposed scheme is robust to both geometric attacks and signal processing attacks.  相似文献   

19.

Quantum watermarking technology protects copyright by embedding an invisible quantum signal in quantum multimedia data. This paper proposes a two-bit superposition method which embeds a watermark image (or secret information) into a carrier image. Firstly, the bit-plane is used to encrypt the watermark image. At the same time, the quantum expansion method is used to extend the watermark image to the same size with the carrier image, and then the image is encrypted through the Fibonacci scramble method again. Secondly, the first proposed method is the two bits of the watermark image which is embedded into the carrier image in accordance with the order of the high and lowest qubit, and the second proposed method which is the high bit of the watermark image is embedded to the lowest bit. Then the lowest bit of the watermark image is embedded in carrier image. Third, the watermark image is extracted through 1-CNOT and swap gates, and the watermark image is restored by inverse Fibonacci scramble, inverse expansion method and inverse bit-plane scramble method. Finally, for the validation of the proposed scheme, the signal-to-noise ratio (PSNR), the image histogram and the robustness of the two watermarking methods are analyzed.

  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号