首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.

Quantum watermarking technology protects copyright by embedding an invisible quantum signal in quantum multimedia data. This paper proposes a two-bit superposition method which embeds a watermark image (or secret information) into a carrier image. Firstly, the bit-plane is used to encrypt the watermark image. At the same time, the quantum expansion method is used to extend the watermark image to the same size with the carrier image, and then the image is encrypted through the Fibonacci scramble method again. Secondly, the first proposed method is the two bits of the watermark image which is embedded into the carrier image in accordance with the order of the high and lowest qubit, and the second proposed method which is the high bit of the watermark image is embedded to the lowest bit. Then the lowest bit of the watermark image is embedded in carrier image. Third, the watermark image is extracted through 1-CNOT and swap gates, and the watermark image is restored by inverse Fibonacci scramble, inverse expansion method and inverse bit-plane scramble method. Finally, for the validation of the proposed scheme, the signal-to-noise ratio (PSNR), the image histogram and the robustness of the two watermarking methods are analyzed.

  相似文献   

2.
黄清龙  刘建岚 《光子学报》2007,36(12):2261-2265
基于光学菲涅耳全息图和相位密码板,结合离散余弦变换,设计了一种新的正实值编码的“盲数字水印”计算方法.相位密码板是多个点光源的菲涅耳衍射光场的相角之和,原始水印图像在其菲涅耳衍射域中与通过相位密码板的参考光作相干叠加,形成菲涅耳全息图;之后将其嵌入到原始宿主图像的离散余弦变换中,同时将此叠加水印信息的原像素值用其邻近的原像素均值来替换;通过作逆离散余弦变换,获得了已嵌入水印信息的正实数值的目标图像;通过对载有水印信息的目标图像作逆运算,从中提取了原始水印图像.数值计算结果表明:该水印计算法对JPEG有损压缩、剪切、噪音污染和重采样等攻击,具有很强的鲁棒性.由于本算法属“盲数字水印”技术,以及水印信息的灵活嵌入和多重密钥(衍射距离、多个点光源位置等)的随意选择,从而使该算法具有很高的安全性和实用价值.  相似文献   

3.
In this paper, a state-coding based blind watermarking algorithm is proposed to embed color image watermark to color host image. The technique of state coding, which makes the state code of data set be equal to the hiding watermark information, is introduced in this paper. When embedding watermark, using Integer Wavelet Transform (IWT) and the rules of state coding, these components, R, G and B, of color image watermark are embedded to these components, Y, Cr and Cb, of color host image. Moreover, the rules of state coding are also used to extract watermark from the watermarked image without resorting to the original watermark or original host image. Experimental results show that the proposed watermarking algorithm cannot only meet the demand on invisibility and robustness of the watermark, but also have well performance compared with other proposed methods considered in this work.  相似文献   

4.
双随机相位加密同轴傅里叶全息水印防伪技术   总被引:32,自引:0,他引:32  
孙刘杰  庄松林 《光学学报》2007,27(4):21-624
提出了一种制作加密的傅里叶变换全息图像的方法,通过光学系统或计算机系统将原始数字图像经过双随机相位模板调制并与参考光干涉生成加密的傅里叶变换全息图像.将加密的傅里叶变换全息图像作为水印可以叠加隐藏在载体数字图像中,用于证明载体数字图像的版权.通过打印和扫描实验证明了含水印数字图像,可以通过普通的印刷技术印制在证件中;印刷品中的含水印载体数字图像,可以通过扫描输入计算机变换生成数字图像,通过盲检测技术可以从中提取所含数字水印,从而证明印刷品的真实性,提高了防伪能力.  相似文献   

5.
王兴元  张继明 《物理学报》2014,63(21):210701-210701
本文提出了一种基于抖动和混沌技术的数字图像篡改检测及修复算法.该算法使用小波变换后的低频子图和抖动技术生成图像的认证及修复信息,在有效减少水印数据量的同时,将水印嵌入小波变换后的高频子图,从而达到水印的不可见性.运用混沌技术完成水印的嵌入和加密,并结合中国余数定理,进一步减少水印嵌入对图像质量的影响.实验证明,该算法兼顾了水印的不可见性和鲁棒性,并且能够一定程度修复篡改图像,在图像认证和修复方面具有较高的实用意义.  相似文献   

6.
A robust and blind watermarking technique for dual color images is proposed in this paper. According to the energy concentrating feature of DCT, the two-level DCT is introduced and used to embed color watermark image into color host image, which is completely different with the traditional DCT. For reducing the redundancy of watermark information, the original color watermark image is compressed by the proposed compression method. After two-level DCT, nine AC coefficients in different positions of each sub-block are selected and quantified to embed watermark information. Moreover, only the extraction rules are used to extract watermark from the watermarked image without resorting to the original host image or watermark image. Experimental results show that the proposed watermarking algorithm can effectively improve the quality of the watermarked image and the robustness of the embedded watermark against various attacks.  相似文献   

7.
Region of interest (ROI) of a medical image is an area including important diagnostic information and must be stored without any distortion. This algorithm for application of watermarking technique for non-ROI of the medical image preserving ROI. The paper presents a 3D watermark based medical image watermarking scheme. In this paper, a 3D watermark object is first decomposed into 2D elemental image array (EIA) by a lenslet array, and then the 2D elemental image array data is embedded into the host image. The watermark extraction process is an inverse process of embedding. The extracted EIA through the computational integral imaging reconstruction (CIIR) technique, the 3D watermark can be reconstructed. Because the EIA is composed of a number of elemental images possesses their own perspectives of a 3D watermark object. Even though the embedded watermark data badly damaged, the 3D virtual watermark can be successfully reconstructed. Furthermore, using CAT with various rule number parameters, it is possible to get many channels for embedding. So our method can recover the weak point having only one transform plane in traditional watermarking methods. The effectiveness of the proposed watermarking scheme is demonstrated with the aid of experimental results.  相似文献   

8.
In this paper,a compressive sensing(CS) and chaotic map-based joint image encryption and watermarking algorithm is proposed.The transform domain coefficients of the original image are scrambled by Arnold map firstly.Then the watermark is adhered to the scrambled data.By compressive sensing,a set of watermarked measurements is obtained as the watermarked cipher image.In this algorithm,watermark embedding and data compression can be performed without knowing the original image;similarly,watermark extraction will not interfere with decryption.Due to the characteristics of CS,this algorithm features compressible cipher image size,flexible watermark capacity,and lossless watermark extraction from the compressed cipher image as well as robustness against packet loss.Simulation results and analyses show that the algorithm achieves good performance in the sense of security,watermark capacity,extraction accuracy,reconstruction,robustness,etc.  相似文献   

9.
袁胜  王真  周昕  邴丕彬 《光子学报》2020,49(2):179-187
提出了一种基于二值化计算鬼成像的盲水印方法.首先将水印图像经计算关联成像加密系统加密,并将加密数据二值化,然后将其隐藏到宿主图像的离散余弦变换域,实现水印信息的嵌入.水印信息的提取和重建是隐藏和加密的逆过程,分别借助提取密钥和解密密钥获取水印信息.仿真实验证明,该方法具有很好的隐蔽性,在嵌入因子α=10时,嵌入水印仍具有较好的不可感知性,含水印图像的峰值信噪比在38 dB以上;另外,该方法也具有一定的容错能力,提取的加密数据错误率达20%时,重建的水印信息仍能分辨和识别;与传统的计算鬼成像相比,加密数据的二值化为水印嵌入提供了方便,但是并未对重建图像带来严重恶化,其相关系数相差不足0.1;水印信息的提取无需借助原始宿主图像,是一种盲提取方法.  相似文献   

10.
When digital watermarking is used for piracy tracking, different watermarks are needed to be embedded into different distributions of a digital product. Based on double random phase encoding (DRPE) technique, cascaded-phases iterative algorithm and random-phase-shift algorithm, Chen et al. proposed a method to generate many different embedded watermarks from one reference watermark, while the embedded watermark can be recognized by testing the correlation between the recovered watermark and the original reference watermark. In this way, only the reference watermark instead of the embedded watermarks needs to be stored and managed. However, since the recovered watermark may be different from the embedded watermark, especially under any image processing, the correlation between the recovered watermark and the reference watermark may be different from the correlation between the embedded watermark and the reference watermark, which may result in wrong recognition. In this paper, the performance of Chen's method was analyzed with numerical simulations. The results indicated that, to correctly recognize the embedded watermark, the number of generated embedded watermarks with Chen's method is limited.  相似文献   

11.
基于光学菲涅耳衍射的"盲数字水印"技术   总被引:3,自引:0,他引:3  
黄清龙  刘建岚 《光学学报》2006,26(8):145-1149
基于光学菲涅耳衍射,设计了一种新的“盲数字水印”计算方法。水印图像通过离散菲涅耳衍射变换成一复矩阵,将此复矩阵的实部和虚部分开,分别嵌入到宿主图像的不同位置中。通过将水印嵌入点的宿主图像的像素值更改为其近邻像素值的均值,而实现“盲水印”的提取。数值计算结果表明:该水印计算法对像素变换攻击具有很强的鲁棒性,如图像亮度、对比度和灰度曲线的调整;能抵抗JPEG有损压缩、剪切和噪声污染攻击;能抵抗对图像的重采样攻击,可从显示屏幕拷贝的图像中提取水印。由于该方法为使用者提供了灵活的水印嵌入方式和双重密钥的选取,以及提取水印不需要原始图像数据,因而使该方法具有很高的安全性和实用价值。  相似文献   

12.
龚一珉  孙刘杰 《光学技术》2017,43(6):555-560
提出一种水印算法的新思路,可以自适应地确定水印嵌入的区域和强度。基于HVS的人眼掩蔽效应对图像亮度和纹理敏感度的量化指标进行计算,图像先后两次分块。依据评分选择最佳嵌入区域后对其进行单尺度Retinex分解,将其分解为用于评价亮度信息的照度分量和评价纹理信息的反射分量。根据评价结果,设置不同的水印嵌入强度分别嵌入图像小波域中频的各分块中。提取的水印通过数学形态学处理以提高其可辨识度。嵌入水印的不可见性得到最大化实现(PSNR=40.0),鲁棒性较佳,能抵御信号处理和几何攻击。能根据图像特征自适应分析水印的最佳嵌入位置,在保证隐蔽性的同时嵌入尽可能多的水印信息;水印的安全性也得以保障,是一种应用面广、适应性强的数字水印算法。  相似文献   

13.
彭翔  白伟东  田劲东 《光学学报》2007,27(6):011-1017
提出一种新的基于信息光学的数字水印方法。该方法将水印信息隐藏于半色调编码的计算全息图之中。通过相位复原技术将需隐藏的水印信息编码为相位函数嵌入在复波前中,其振幅定义为宿主图像,通过计算全息记录复波前并对全息图进行半色调编码完成水印信息的嵌入。水印的提取过程只需对含有水印信息的半色调图像进行光学或数字的傅里叶变换即可完成。并给出了算法有效性的理论分析和仿真实验结果。结果证明这种水印技术对于各种数字图像处理操作具有很高的稳健性,且半色调编码图的二值特性使嵌入水印具有很强的抗打印、抗复印、抗扫描的能力。  相似文献   

14.
祁永坤  彭翔  关颖健  高志  孟祥锋  秦琬 《光学学报》2008,28(s2):308-313
提出一种基于相息图和小波变换的数字水印方案。利用迭代相位恢复算法将水印图像编码为相息图, 然后将经权重因子调制后的相息图嵌入到宿主图像的三层小波低频系数中, 完成整个水印嵌入过程。在水印提取阶段, 对宿主图像和含水印图像进行三层小波分解, 将得到的低频系数对应相减提取出水印相息图, 然后对此相息图进行傅里叶变换操作, 取其振幅即可提取原始嵌入的水印图像。针对不同权重因子的水印系统, 详细分析和讨论了所提出水印方案的隐蔽性和稳健性。计算机仿真结果验证了该数字水印方案的可行性。  相似文献   

15.
基于双混沌置乱和扩频调制的彩色图像盲水印算法   总被引:5,自引:0,他引:5  
胡裕峰  朱善安 《光学学报》2008,29(9):1691-1696
提出了一种新的适应彩色图像的盲水印算法,先对宿主图像的绿色分量以8×8像素分块进行离散余弦变换(DCT)变换,用logistic映射生成两个混沌序列,然后用混沌序列置乱加密二值水印图像,并用两个互不相关的伪随机序列扩频调制水印,最后将调制好的水印嵌入到DCT变换域的中频子带系数上,进行分块DCT反变换得到水印化图像.提取水印时,通过比较两个伪随机序列和水印化图像的相关性大小来提取水印,不需要原始图像的参与,为盲提取水印算法.实验结果证明本文算法能有效地抵抗JPEG压缩、加噪、剪切等常见攻击,绿色分量嵌入水印比红色和蓝色分量嵌入水印能更好地抵抗JPEG压缩的攻击.  相似文献   

16.
基于虚拟通道技术的数字图像灰度水印算法   总被引:2,自引:2,他引:0  
王朋飞  冯桂  秦峰  王小林 《光子学报》2006,35(11):1770-1773
根据提出的虚拟通道技术,提出一种在载体中嵌入灰度图像作为水印的数字水印算法.通过修改载体频率域系数,载体通道可被看成一个虚拟的水印通道,它由若干个缺损的水印子通道构成,水印的提取不需要原始载体或原始水印的参与.实验结果表明提出的算法很好地保证了水印的不可见性和稳健性.  相似文献   

17.
自嵌入双功能图像水印算法   总被引:1,自引:0,他引:1  
叶天语 《光子学报》2012,41(7):859-867
利用自嵌入技术提出一种同时实现版权保护和内容认证的双功能图像水印算法.在嵌入端,首先将原始图像划分成互不重叠的子块,将各子块每个像素的最低m位置0,然后将最低m位置0后的子块进行奇异值分解,通过提取奇异值范数的最高位奇偶性产生原始鲁棒特征水印,然后再将原始鲁棒特征水印嵌入各子块每个像素的最低m位得到含水印图像.检测端从攻击的含水印图像提取鲁棒特征水印的过程与嵌入端产生原始鲁棒特征水印的过程类似,并且通过计算提取的鲁棒特征水印与原始鲁棒特征水印之间的归一化相关度进行版权鉴别,通过判断提取的鲁棒特征水印与攻击图像各子块每个像素的最低m位的一致性实现篡改检测进行内容认证.理论分析和实验结果都表明算法具有非常好的不可见性.实验结果还表明,算法不仅在抵抗添加噪音、剪切、JPEG压缩、平滑、重采样和几何攻击如随机删除行、向右偏移列、向下偏移行表现出很强的鲁棒性,而且能够精确定位出篡改位置和区分篡改类型.因此,算法具有版权保护和内容认证双重功能.  相似文献   

18.
A robust watermarking algorithm based on salient image features   总被引:3,自引:0,他引:3  
A feature-based robust watermarking algorithm against geometric attacks is proposed in this paper. It is well-known that geometric attacks such as rotation, scaling, and translation on a watermarked image will destroy the synchronization between the processes of watermark embedding and detection. In other words, the locations for embedding the watermark are lost due to geometric attacks, which results in the failure of watermark detection. Since salient features in an image are relatively stable under geometric attacks, they may serve as reference points to synchronize the embedding and detection processes and the detection rate of the watermark could be increased significantly. Another problem for feature-based watermarking is that the repeatability of feature detection tends to be low; that is, the features detected during the embedding process may not be detected again during the detection process. To overcome such a problem, a novel feature enhancement technique is developed to increase the repeatability rate of feature detection, in which image moments are used to achieve geometric invariance between the embedding and detection processes. Experimental results demonstrate that the proposed watermarking algorithm is able to survive various geometric attacks and common image processing operations. And the visual quality of the watermarked image is well preserved as well.  相似文献   

19.
改进的小波域混沌数字水印算法实现   总被引:13,自引:5,他引:8  
赵健  齐华  田泽  周明全 《光子学报》2004,33(10):1236-1238
在对小波域中数字水印的嵌入算法研究的基础上,利用混沌序列所特有的不可预测性,将混沌理论引入数字水印的创建中,提出了改进的小波域混沌数字水印算法,并通过仿真实现了利用Logistic映射产生的混沌序列有序的嵌入小波域数字水印的方法,该算法具有密钥唯一性、不可逆性、不可见性、鲁棒性等特点.实验证明该算法具有很好的视觉效果,是一种实际可行的数字水印算法.  相似文献   

20.
基于数字全息及离散余弦变换的图像数字水印技术   总被引:21,自引:9,他引:21  
尉迟亮  顾济华  刘薇  陶智 《光学学报》2006,26(3):55-361
提出了一种以数字全息和离散余弦变换为基础的数字水印技术,实现了在原始图像中嵌入数字全息水印。考虑到数字全息图的不可撕毁性,使得数字全息水印本身就具有良好的抗剪切能力,并且与传统的二维灰度水印相比嵌入的信息更多。数字全息图通过傅里叶变换全息的方法获得,为了提高抗有损压缩能力,在数字全息水印嵌入过程中采用了基于(JPEG模型和分解离散余弦变换(DCT)系数的方法。实验表明,通过该算法获得的数字全息水印对JPEG有损压缩和剪切等图像处理操作均有很好的稳健性,并且采用密钥加强了水印的安全性。因此该算法能成为数字多媒体产品版权保护的有效方案。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号