首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 155 毫秒
1.
一种自适应的盲水印方法   总被引:9,自引:6,他引:3  
潘蓉  高有行 《光子学报》2002,31(9):1146-1150
目前数字水印算法多局限于在图象中嵌入特定的标记,并通过改变空域值或频域系数值来达到目的.提出了一种新颖的自适应盲水印方法.首先基于小波变换的零树结构,找出重要系数,然后根据重要系数所在区域的特性构造出一个序列信息,再利用置乱变换最终得到水印信息,而不修改图象本身的任何特征.因此水印的不可见性从根本上得到了保证.其中,重要系数的选择是自适应于图象的,并且水印的检测是不需要原始图象的盲检测.实验证明该方法的鲁棒性较强,是一种行之有效的方法.  相似文献   

2.
武风波  汪峰 《应用光学》2014,35(2):254-259
 为实现图像水印在数据认证、访问控制和版权保护等领域发挥作用,提出一种人眼视觉感知特性的小波变换数字图像水印算法。首先对二值图像水印进行Arnold变换,并采用行堆叠的方法,转换成一维序列,然后根据密钥生成的高斯序列中值的正负来确定水印信息嵌入时是采用那种调制方式,最后对原始图像进行3级DWT分解,在小波图像的第二层中频子带中,结合人眼视觉特性将水印正向或负向调制叠加在宿主图像大于JND 值的小波系数上。实验结果表明:该算法能抵抗JPEG压缩、加噪、剪切等多种攻击,具有良好的透明性,鲁棒性和安全性。  相似文献   

3.
基于非抽样Contourlet变换的彩色图像数字水印算法   总被引:5,自引:1,他引:4  
梁栋  殷兵  于梅  李新华  王年 《光学学报》2008,28(8):1469-1474
研究了小波变换和Contourlet变换的不足,利用非抽样Contourlet变换的多尺度性、多方向性以及平移不变性特征进行彩色图像数字水印.先对图像进行非抽样Contourlet变换得到不同尺度不同方向上的系数.然后为了满足水印的不町见性和稳健性,在低频系数和高频系数中采用不同的嵌入强度.并依据人类视觉的彩色感知特性,在蓝色分量中嵌入较多水印,在其他颜色分量选取变换系数能量最大的区域嵌入水印.与同样嵌入规则的Contourlet变换算法和平稳小波变换算法相比.该算法具有更好的稳健性,利用该算法得到的水印相似度更高,最高町提高约0.5.  相似文献   

4.
基于平稳小波和相空间重构的激光混沌预测   总被引:2,自引:2,他引:0  
相征  张太镒  孙建成 《光子学报》2005,34(11):1756-1760
提出了一种激光混沌时间序列预测算法.该算法通过平稳小波分解,将原始数据序列分解为与原序列等长的尺度系数和小波系数,利用坐标延迟理论,重建各级尺度系数和各级小波系数的相空间,再根据混沌吸引子的稳定性和分形性,在相空间中对尺度系数和小波系数进行预测,进而通过平稳小波重构算法,实现了时间序列的非线性预测.该算法对数据可以进行更平滑的处理,比无小波算法预测的时间范围更长.通过仿真试验说明,原始时间数据序列被成功的重建,说明算法能够有效的对非线性动态系统的时间序列进行建模和预测.  相似文献   

5.
基于双混沌置乱和扩频调制的彩色图像盲水印算法   总被引:5,自引:0,他引:5  
胡裕峰  朱善安 《光学学报》2008,29(9):1691-1696
提出了一种新的适应彩色图像的盲水印算法,先对宿主图像的绿色分量以8×8像素分块进行离散余弦变换(DCT)变换,用logistic映射生成两个混沌序列,然后用混沌序列置乱加密二值水印图像,并用两个互不相关的伪随机序列扩频调制水印,最后将调制好的水印嵌入到DCT变换域的中频子带系数上,进行分块DCT反变换得到水印化图像.提取水印时,通过比较两个伪随机序列和水印化图像的相关性大小来提取水印,不需要原始图像的参与,为盲提取水印算法.实验结果证明本文算法能有效地抵抗JPEG压缩、加噪、剪切等常见攻击,绿色分量嵌入水印比红色和蓝色分量嵌入水印能更好地抵抗JPEG压缩的攻击.  相似文献   

6.
甘甜  冯少彤  聂守平  朱竹青 《物理学报》2012,61(8):84203-084203
提出了一种在小波域中图像信息隐藏与盲提取算法. 该算法首先对载体图像进行分块两层离散小波变换, 找到每块第二级分解子带中的最大值即最重要小波系数, 然后根据小波特征树的对应关系将其在第一级分解子带中的对应区域作为嵌入区域, 在该区域嵌入由秘密信息生成的伪随机序列. 提取过程中, 同样按照小波系数对应关系寻找到嵌入区域并判断其与伪随机序列的相关性即可解密, 不需要提供原始图像. 实验结果表明, 该算法能实现二值图像的嵌入与盲提取, 且提取出的图像质量较好并具备一定的抗攻击能力, 尤其对于剪切攻击的鲁棒性较好.  相似文献   

7.
小波域内的盲水印提取   总被引:1,自引:0,他引:1  
潘蓉 《光子学报》2006,35(10):1613-1616
在对水印嵌入位的假设检验基础上,提出了一种盲水印的逐位提取模型,并在小波域得到了实现.为平衡水印的不可见性和鲁棒性,根据图像小波域的特征,并利用上下文建模的方法为每个高频小波系数确定不同的水印幅度,从而使水印的嵌入强度依图像的特征而变化.由于水印提取的结果在很大程度上依赖于图像小波系数的统计分布模型,因此小波域中的系数建模采用了广义高斯分布,并使用极大似然法估计参量.实验表明,该方法具有良好的鲁棒性.  相似文献   

8.
基于图象特征的小波域水印算法   总被引:4,自引:0,他引:4  
王卫卫  杨波  宋国乡 《光子学报》2001,30(7):856-860
提出一种基于图象特征点的小波变换域第二代水印算法.首先对图象作小波变换,其中最低频成分是图象的粗尺度(低分辨率)逼近,从中提取出图象的特征点;然后在特征点对应的所有高频系数中嵌入水印.水印检验不需要原始图象,但需要原始图象的特征点位置信息,计算特征点对应的所有高频系数与嵌入水印的互相关,利用门限值检验水印是否存在. 实验证明该算法对通常的图象处理有很强的鲁棒性,对有损压缩的鲁棒性尤为突出,而且对几何变换也有一定鲁棒性.  相似文献   

9.
一种在数字音频信号中嵌入水印的新算法   总被引:47,自引:0,他引:47  
提出了一种在数字音频信号中嵌入水印新算法.该算法嵌入的水印不再是传统的伪随机序列形式,而是视觉可辨的二值图像.首先将二维的图像降维成一维的序列,然后对数字音频信号作分段离散余弦变换,最后在离散余弦变换域内通过修改数字音频信号的中频系数的方法嵌入水印.在水印嵌入过程中使用了伪随机排序技术.实验结果表明该算法对数字音频信号的滤波、压缩等操作具有很强的稳健性.  相似文献   

10.
王兴元  张继明 《物理学报》2014,63(21):210701-210701
本文提出了一种基于抖动和混沌技术的数字图像篡改检测及修复算法.该算法使用小波变换后的低频子图和抖动技术生成图像的认证及修复信息,在有效减少水印数据量的同时,将水印嵌入小波变换后的高频子图,从而达到水印的不可见性.运用混沌技术完成水印的嵌入和加密,并结合中国余数定理,进一步减少水印嵌入对图像质量的影响.实验证明,该算法兼顾了水印的不可见性和鲁棒性,并且能够一定程度修复篡改图像,在图像认证和修复方面具有较高的实用意义.  相似文献   

11.
When digital watermarking is used for piracy tracking, different watermarks are needed to be embedded into different distributions of a digital product. Based on double random phase encoding (DRPE) technique, cascaded-phases iterative algorithm and random-phase-shift algorithm, Chen et al. proposed a method to generate many different embedded watermarks from one reference watermark, while the embedded watermark can be recognized by testing the correlation between the recovered watermark and the original reference watermark. In this way, only the reference watermark instead of the embedded watermarks needs to be stored and managed. However, since the recovered watermark may be different from the embedded watermark, especially under any image processing, the correlation between the recovered watermark and the reference watermark may be different from the correlation between the embedded watermark and the reference watermark, which may result in wrong recognition. In this paper, the performance of Chen's method was analyzed with numerical simulations. The results indicated that, to correctly recognize the embedded watermark, the number of generated embedded watermarks with Chen's method is limited.  相似文献   

12.
In this paper, we present an effective block-based digital fragile watermarking scheme for image tamper detection and recovery. The proposed scheme embeds watermarks consisting of the authentication data and the recovery data into image blocks. It adopts parity check and the intensity-relation check to thwart various malicious attacks. In the tamper detection process, instead of independently testing the embedded authentication data of each block, we take the block-neighbourhood into account and utilize a hierarchical structure to determine the legitimacy of image blocks. Experimental results show that the proposed scheme can effectively resist collage attack, vector quantization (VQ) attack and constant-average attack, while sustaining superior accuracy of tamper localization. Furthermore, the results reveal that the tampered images can be successfully self-recovered with acceptable visual quality.  相似文献   

13.
Watermarking is a solution to the problem of copyright protection of multimedia documents over the Internet. This paper presents a block based watermarking scheme using the singular value decomposition (SVD) algorithm to embed encrypted watermarks into digital images. The paper compares between the traditional method of Liu and the proposed method for embedding encrypted watermarks. Also, a permutation based encryption algorithm and a diffusion based encryption algorithm are compared as the watermark encryption algorithms. Experimental results show that the proposed method is superior to the traditional method of Liu for embedding encrypted watermarks and extracting them efficiently under attacks. Results also show that it is preferred to use permutation based encryption algorithms than diffusion based encryption algorithms for watermark encryption due to their lower sensitivity to attacks.  相似文献   

14.
张震川  曹保锋  李鹏  殷昊  武慧春 《强激光与粒子束》2022,34(6):066002-1-066002-5
针对远区核爆电磁脉冲(NEMP)和闪电电磁脉冲(LEMP)的识别率不能满足实际需求的问题,提出了一种基于小波包分形技术的识别方法。首先,对实测的NEMP和LEMP做插值、归一化等预处理;然后,基于小波包理论对预处理后的信号进行2层小波包分解,并利用小波包系数重构信号的分形维数,组成信号的特征向量;最后,采用最小二乘支持向量机(LSSVM)作为分类器,利用五折交叉验证法选取最优的模型参数,将特征向量输入分类器中进行训练后获得测试结果。实验结果表明,小波包分形方法在NEMP和LEMP的识别上效果显著,平均识别率达到99%以上,具有较高的应用价值。  相似文献   

15.
A vector boundary-element method is developed for analyzing a conical horn in this paper. A moving boundary technique (MBT) is proposed for solving difficulties of the integration at high-order singularity points in a vector integral equation, and its validity is verified by calculating the reflection coefficients of an empty circular waveguide with a short-end. The circular symmetry of the conical horn is utilized to simplify the 3-D problem to 2-D one and the analyzing efficiency is significantly improved. A comparison of the reflection coefficients of the conical horn is given between the experimental data and the calculated results. Very good agreement has been seen, and the reliability and efficiency of the present method are thus verified.  相似文献   

16.
We construct vector rogue wave solutions of the two-dimensional two coupled nonlinear Schrödinger equations with distributed coefficients, namely diffraction, nonlinearity and gain parameters through similarity transformation technique. We transform the two-dimensional two coupled variable coefficients nonlinear Schrödinger equations into Manakov equation with a constraint that connects diffraction and gain parameters with nonlinearity parameter. We investigate the characteristics of the constructed vector rogue wave solutions with four different forms of diffraction parameters. We report some interesting patterns that occur in the rogue wave structures. Further, we construct vector dark rogue wave solutions of the two-dimensional two coupled nonlinear Schrödinger equations with distributed coefficients and report some novel characteristics that we observe in the vector dark rogue wave solutions.  相似文献   

17.
张春燕  于丽 《应用声学》2017,25(8):34-34
针对电子书应用存在的文件格式、性能效率低下和图像失真等问题,设计了一种应用于云电子书系统的多级优化框架,优化框架主要体现在如下三个方面。第一,对向量图形类库的性能进行描述,并提出了一种优化算法,减少了类库的时间复杂度。第二,在嵌入式GPU上并行进行坐标系统的计算。利用GPU在并行计算方面的优势,云电子书在向量图形类库方面获取了显著的性能提升。第三,云电子书将文件转化功能转嫁给Hadoop云平台,节省了移动设备的能量消耗和计算时间。同时为了对Hadoop调度过程中的数据位置问题进行优化,将位置感知调度器运用到提出的系统。实验结果表明:云电子书系统与最初的Open VG类库相比,性能提升了约70%,而且云电子书系统与连续服务器平台相比,计算时间减小了约60%。  相似文献   

18.
In this paper, a novel curvelet based digital image compression scheme is proposed. Aiming at achieving high compression ratio, the proposed scheme embeds a representative machine learning method, core vector machine (CVM), in the encoding process of the image compression technique. The core vector machine (CVM) has been introduced as an extremely fast classifier which is demonstrably superior to standard support vector machine (SVM) on very large datasets. In this scheme, we appropriately utilize the characteristic of CVM to reduce huge numbers of curvelet coefficients. Compared with image compression algorithms do not use CVM and methods based on wavelet transform, experimental results show that the compression performance of our method gains much improvement in peak-signal-to-noise-ratio (PSNR) and CPU time. Moreover, the algorithm works fairly well for declining block effect at higher compression ratios.  相似文献   

19.
We present a graphics hardware-based system for interactive denoising, vortex detection, and visualization of vector data. No intermediate results need to be read back by the application once the vector field has been loaded onto the graphics adapter. Due to modern GPUs’ parallel processing capabilities, our system significantly outperforms software implementations and thus provides a valuable tool for the interactive exploration of vector fields and the understanding of flow structures.  相似文献   

20.
The methods and the algorithms of the magnetic system design, producing the fields with a required distribution (the inverse problem of magnetostatics), are considered. The mathematical statement of the problem is reduced to the expansion of a given function into Fourier series on a non-orthonormal basis. The basis functions are the fields of the sections of a magnetic system, and the coefficients of the expansion are the components of the magnetization vector of the sections (the vector synthesis). The algorithms proposed to solve the problem take into account the physical constraints on the magnetization distribution of the assembly sections.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号