首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
图象的多尺度边缘相位水印算法   总被引:1,自引:1,他引:0  
王卫卫  刘波  徐国华 《光子学报》2001,30(11):1348-1352
提出一种基于图象多尺度边缘的新相位水印算法.利用常用于边缘检测的二进小波刻画图象的多尺度边缘,在多尺度边缘的相位成分中嵌入数字水印,利用相关检测器进行水印检测.实验证明算法具有不可见性,较好的安全性,对通常的图象处理有很强的鲁棒性.  相似文献   

2.
基于虚拟光学的三维空间数字水印系统   总被引:8,自引:3,他引:5  
彭翔  张鹏  牛憨笨 《光学学报》2004,24(11):1507-1510
数字水印已成为数字作品版权保护的一种手段。数字水印是一种嵌入到图像、视频或者音频数据中的不可见标志 ,通过对水印信息的检测可以达到保护多媒体数据版权的目的。先前众多的水印算法大部分是基于二维操作的 (如静止图像、视频 )。基于虚拟光学信息隐藏理论提出了一种三维空间的数字水印算法。该数字水印算法能成为一种多媒体数据产权保护的有效方案。对算法的测试结果表明 ,该算法对于噪声叠加、剪切、有损压缩等常见的信号处理操作具有较高的鲁棒性。同时 ,该算法由于引入了虚拟光学信息隐藏思想 ,将虚拟光路的几何结构参量作为密钥 ,设计出了多重“锁”和多重“密钥” ,大大提高了水印系统的密钥空间 ,仿真结果表明该算法具有良好的安全性。  相似文献   

3.
Watermarking is a solution to the problem of copyright protection of multimedia documents over the Internet. This paper presents a block based watermarking scheme using the singular value decomposition (SVD) algorithm to embed encrypted watermarks into digital images. The paper compares between the traditional method of Liu and the proposed method for embedding encrypted watermarks. Also, a permutation based encryption algorithm and a diffusion based encryption algorithm are compared as the watermark encryption algorithms. Experimental results show that the proposed method is superior to the traditional method of Liu for embedding encrypted watermarks and extracting them efficiently under attacks. Results also show that it is preferred to use permutation based encryption algorithms than diffusion based encryption algorithms for watermark encryption due to their lower sensitivity to attacks.  相似文献   

4.
The advances in recording, editing, and broadcasting multimedia contents in digital form motivate to protect these digital contents from illegal use, such as duplication, manipulation, and redistribution. However, watermarking algorithms are designed to satisfy requirements of applications, as different applications have different concerns. We intend to design a watermarking algorithm for applications which require high embedding capacity and imperceptibility, to maintain the integrity of the host signal as well as embedded information. Reversible watermarking is a promising technique which satisfies our requirements. In this paper, we concentrate on improving the watermark capacity and reducing the perceptual degradation of an image. We investigated the Luo's [1] additive interpolation-error expansion algorithm and enhanced it by incorporating with two intelligent techniques: genetic algorithm (GA), and particle swarm optimization (PSO). Genetic algorithm is applied to exploit the correlation of image pixel values to obtain better estimation of neighboring pixel values, which results in optimal balance between information storage capacity and imperceptibility. Particle swarm optimization (intelligent technique) is also applied for the same purpose. Experimental results show that PSO and GA nearly give the same results, but GA outperforms the PSO. Experimental results also reveal that the proposed strategy outperforms the state of art works in terms of perceptual quality and watermarking payload.  相似文献   

5.
陈家祯  郑子华  叶锋  连桂仁  许力 《物理学报》2017,66(23):234202-234202
提出了一种基于三维物体的多重菲涅耳计算全息水印方法.将水印信号作为虚拟三维物体的层面,首先结合分区复用层析法和菲涅耳双随机相位编码方法产生复噪声形式的水印信号;然后对水印信号的频谱作共轭对称处理实现实值编码;为减小对宿主全息图数字重建的影响,将水印信号的频谱设置于对宿主数字重建影响小的频谱非感兴趣区域;编码后的信号以一定强度叠加于宿主全息图,水印信号恢复无需原始宿主全息图信息,可实现盲提取,对宿主全息图重建像面的二维码可扫描识别.仿真测试结果表明,所提出的方法具有较好的透明性和稳健性,在宿主全息图遭受滤波、JPEG(联合图像专家小组)压缩、高斯噪声、剪切、旋转等各种攻击的情况下,不论对宿主还是水印信号仍具有良好的数字重建质量,对重建像面的二维码仍可扫描识别;而重建像面水印信号的无干扰可控重建后处理操作解决了不同层面水印信号之间的衍射干扰问题,提高了水印信号的重建质量.虚拟光学手段的应用丰富了水印信号设计方法并提升了算法的安全性.  相似文献   

6.
基于数字全息及离散余弦变换的图像数字水印技术   总被引:30,自引:9,他引:21  
尉迟亮  顾济华  刘薇  陶智 《光学学报》2006,26(3):55-361
提出了一种以数字全息和离散余弦变换为基础的数字水印技术,实现了在原始图像中嵌入数字全息水印。考虑到数字全息图的不可撕毁性,使得数字全息水印本身就具有良好的抗剪切能力,并且与传统的二维灰度水印相比嵌入的信息更多。数字全息图通过傅里叶变换全息的方法获得,为了提高抗有损压缩能力,在数字全息水印嵌入过程中采用了基于(JPEG模型和分解离散余弦变换(DCT)系数的方法。实验表明,通过该算法获得的数字全息水印对JPEG有损压缩和剪切等图像处理操作均有很好的稳健性,并且采用密钥加强了水印的安全性。因此该算法能成为数字多媒体产品版权保护的有效方案。  相似文献   

7.
黄清龙  刘建岚 《光子学报》2007,36(12):2261-2265
基于光学菲涅耳全息图和相位密码板,结合离散余弦变换,设计了一种新的正实值编码的“盲数字水印”计算方法.相位密码板是多个点光源的菲涅耳衍射光场的相角之和,原始水印图像在其菲涅耳衍射域中与通过相位密码板的参考光作相干叠加,形成菲涅耳全息图;之后将其嵌入到原始宿主图像的离散余弦变换中,同时将此叠加水印信息的原像素值用其邻近的原像素均值来替换;通过作逆离散余弦变换,获得了已嵌入水印信息的正实数值的目标图像;通过对载有水印信息的目标图像作逆运算,从中提取了原始水印图像.数值计算结果表明:该水印计算法对JPEG有损压缩、剪切、噪音污染和重采样等攻击,具有很强的鲁棒性.由于本算法属“盲数字水印”技术,以及水印信息的灵活嵌入和多重密钥(衍射距离、多个点光源位置等)的随意选择,从而使该算法具有很高的安全性和实用价值.  相似文献   

8.
基于图像部分加入的数字全息水印技术   总被引:3,自引:0,他引:3  
刘晓珂  苏显渝 《光子学报》2008,37(4):740-744
提出了一种以数字全息为基础的数字水印技术,实现了在原始图像中嵌入数字全息水印.考虑到传统的数字全息水印提取过程简单、易受攻击,为了提高水印信息的安全性,对传统的方法进行了改进.采用了图像部分加入的方法,将水印添加位置、水印图像大小和水印添加位置边缘像素作为水印提取密钥.实验证明,运用这种方法添加的水印具有较高的安全性.  相似文献   

9.
In this paper, a fuzzy self-adaptive digital audio watermarking method based on a time-spread echo hiding algorithm is proposed. Echo spreading is performed in the impulse response domain using PN sequences to achieve good robustness of echo hiding and high secrecy of spread spectrum. Fuzzy theory is employed in the embedding process to control the power of the watermark. Since fuzzy set theory is capable of performing complex nonlinear mappings between input and output spaces, it can effectively estimate the strength of a frame for each subband and ensure that the embedded watermark in the original audio is self-adaptive. A listening test and simulation results show that the algorithm is robust for common digital audio processing methods as attacks and that the quality of the audio is retained.  相似文献   

10.
基于光学菲涅耳衍射的"盲数字水印"技术   总被引:3,自引:0,他引:3  
黄清龙  刘建岚 《光学学报》2006,26(8):145-1149
基于光学菲涅耳衍射,设计了一种新的“盲数字水印”计算方法。水印图像通过离散菲涅耳衍射变换成一复矩阵,将此复矩阵的实部和虚部分开,分别嵌入到宿主图像的不同位置中。通过将水印嵌入点的宿主图像的像素值更改为其近邻像素值的均值,而实现“盲水印”的提取。数值计算结果表明:该水印计算法对像素变换攻击具有很强的鲁棒性,如图像亮度、对比度和灰度曲线的调整;能抵抗JPEG有损压缩、剪切和噪声污染攻击;能抵抗对图像的重采样攻击,可从显示屏幕拷贝的图像中提取水印。由于该方法为使用者提供了灵活的水印嵌入方式和双重密钥的选取,以及提取水印不需要原始图像数据,因而使该方法具有很高的安全性和实用价值。  相似文献   

11.
祁永坤  彭翔  关颖健  高志  孟祥锋  秦琬 《光学学报》2008,28(s2):308-313
提出一种基于相息图和小波变换的数字水印方案。利用迭代相位恢复算法将水印图像编码为相息图, 然后将经权重因子调制后的相息图嵌入到宿主图像的三层小波低频系数中, 完成整个水印嵌入过程。在水印提取阶段, 对宿主图像和含水印图像进行三层小波分解, 将得到的低频系数对应相减提取出水印相息图, 然后对此相息图进行傅里叶变换操作, 取其振幅即可提取原始嵌入的水印图像。针对不同权重因子的水印系统, 详细分析和讨论了所提出水印方案的隐蔽性和稳健性。计算机仿真结果验证了该数字水印方案的可行性。  相似文献   

12.
谢剑斌  刘通  陈章永  程永茂 《光子学报》2014,39(9):1706-1711
针对票据水印多目标检测过程中误检率和漏检率高的难题,提出了一种基于先验信息和多模板匹配的票据水印检测算法.该算法采用分级匹配的思想,首先选取初始水印模板进行单模板、粗匹配运算|然后利用票据水印的先验信息计算水印散布区间|接着在水印散布区间内进行多模板、细匹配运算|最后利用先验信息校验已检测到的水印位置,并估算未检测到的水印位置,降低水印检测的漏检率和误检率.仿真实验证明本算法误检率和漏检率低,可以有效地检测票据水印.  相似文献   

13.
陈大庆  顾济华  陶智 《光子学报》2009,38(12):3333-3337
提出了一种在数字全息技术中引入相位恢复算法的音频水印方法.用水印图像经相位恢复处理形成虚拟物光波与参考光波干涉,得到高对比度的傅里叶变换全息图.利用量化算法和离散余弦变换把数字全息图嵌入音频信号中,在水印提取过程中不需要原始音频信号的参与,并且采用密钥加强了水印的安全性.数值计算实验表明:该算法对有损压缩、重采样、低通滤波、噪音干扰等常用音频信号攻击均具有很好的稳健性.  相似文献   

14.
Watermark embedding algorithm based on critical band wavelet transform of digital audio signal is proposed in this paper. The masking threshold for each audio signal segment was calculated on the basic of psychoacoustic model. According to the similarity between critical band of human auditory system and critical band wavelet transform, a watermark was embedded into the low-band and mid-band coefficients of digital wavelet. The embedding strength was adaptively controlled by the masking threshold. The experiment results show that the embedded watermark signal is inaudible, and the watermarked audio signal has good robustness against many attacks such as compression, noise, re-sampling, low-pass filtering.  相似文献   

15.
宋伟  侯建军  李赵红  黄亮 《物理学报》2009,58(7):4449-4456
改变了传统通过修改图像内容进行版权保护的做法,描述了一种基于混沌理论和奇异值分解(singular value decomposing,SVD)的零水印方案;利用了Logistic混沌系统的初值敏感性映射信息隐藏的位置,增强了算法的安全性;采用了奇异值的不变特性构造注册中心的水印,保证了在不改变宿主图像任何信息的同时进行有效地版权保护;将有意义的二值图像作为水印图像,解决了零水印方案水印为无意义二值序列的问题;同时深入分析了水印容量和算法安全性之间的关系.通过对标准测试图像、卡通、医学、风景、遥感、诗画等 关键词: 零水印 混沌系统 Logistic系统 奇异值分解  相似文献   

16.
In this paper, a novel robust watermarking technique using particle swarm optimization and k-nearest neighbor algorithm is introduced to protect the intellectual property rights of color images in the spatial domain. In the embedding process, the color image is separated into non-overlapping blocks and each bit of the binary watermark is embedded into the individual blocks. Then, in order to extract the embedded watermark, features are obtained from watermark embedded blocks using the symmetric cross-shape kernel. These features are used to generate two centroids belonging to each binary (1 and 0) value of the watermark implementing particle swarm optimization. Subsequently, the embedded watermark is extracted by evaluating these centroids utilizing k-nearest neighbor algorithm. According to the test results, embedded watermark is extracted successfully even if the watermarked image is exposed to various image processing attacks.  相似文献   

17.
基于双混沌置乱和扩频调制的彩色图像盲水印算法   总被引:5,自引:0,他引:5  
胡裕峰  朱善安 《光学学报》2008,29(9):1691-1696
提出了一种新的适应彩色图像的盲水印算法,先对宿主图像的绿色分量以8×8像素分块进行离散余弦变换(DCT)变换,用logistic映射生成两个混沌序列,然后用混沌序列置乱加密二值水印图像,并用两个互不相关的伪随机序列扩频调制水印,最后将调制好的水印嵌入到DCT变换域的中频子带系数上,进行分块DCT反变换得到水印化图像.提取水印时,通过比较两个伪随机序列和水印化图像的相关性大小来提取水印,不需要原始图像的参与,为盲提取水印算法.实验结果证明本文算法能有效地抵抗JPEG压缩、加噪、剪切等常见攻击,绿色分量嵌入水印比红色和蓝色分量嵌入水印能更好地抵抗JPEG压缩的攻击.  相似文献   

18.
In most of the existing image encryption algorithms the generated keys are in the form of a noise like distribution with a uniform distributed histogram. However, the noise like distribution is an apparent sign indicating the presence of the keys. If the keys are to be transferred through some communication channels, then this may lead to a security problem. This is because; the noise like features may easily catch people׳s attention and bring more attacks. To address this problem it is required to transfer the keys to some other meaningful images to disguise the attackers. The watermarking schemes are complementary to image encryption schemes. In most of the iterative encryption schemes, support constraints play an important role of the keys in order to decrypt the meaningful data. In this article, we have transferred the support constraints which are generated by axial translation of CCD camera using amplitude-, and phase- truncation approach, into different meaningful images. This has been done by developing modified fusion technique in wavelet transform domain. The second issue is, in case, the meaningful images are caught by the attacker then how to solve the copyright protection. To resolve this issue, watermark detection plays a crucial role. For this purpose, it is necessary to recover the original image using the retrieved watermarks/support constraints. To address this issue, four asymmetric keys have been generated corresponding to each watermarked image to retrieve the watermarks. For decryption, an iterative phase retrieval algorithm is applied to extract the plain-texts from corresponding retrieved watermarks.  相似文献   

19.
基于级联分数傅里叶变换系统的数字水印技术   总被引:1,自引:0,他引:1  
提出一种基于分数傅里叶变换和随机相位编码的光学加密数字水印技术,可成为一种信息隐藏及保护的有效方案.该数字水印技术对于噪音叠加和常见的图像处理操作具有较强的稳健性.该技术根据光学级联分数傅里叶变换系统,利用两个随机相位分布函数对水印信息编码并经过迭代分数傅里叶变换嵌入到变换域的载体图像中.在水印检测和提取过程中,两个相位分布函数作为密钥.随机相位编码技术的引入,进一步提高了数字水印系统的密钥空间.增强了系统的安全性.该数字水印技术基于光学分数傅里叶变换原理,可以利用光学变换系统方便地实现.  相似文献   

20.
基于SIFT图像特征区域的全息水印技术   总被引:1,自引:0,他引:1  
为了增强水印的不可见性和鲁棒性,提出了一种基于图像特征区域的水印算法。首先利用SIFT(Scale Invariant Feature Transform)算法从载体图像蓝色B通道中提取图像特征点来进行优化和筛选,根据优化后的稳定特征点及其特征尺度确定图像的特征区域,再结合全息技术,对原始水印图像进行双随机相位加密,生成加密全息水印;然后对特征区域进行离散余弦变换(DCT);最后在其中频区域嵌入加密全息水印。在提取水印时无须借助原始图像,是盲水印技术。实验结果表明:该算法重建的水印图像与原始水印图像的NC值高达0.95;水印的嵌入对图像质量影响很小,PSNR值高达55.97,能够抵抗常规信号攻击及缩放、剪切、平移等几何攻击。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号