首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 35 毫秒
1.
A robust and blind watermarking technique for dual color images is proposed in this paper. According to the energy concentrating feature of DCT, the two-level DCT is introduced and used to embed color watermark image into color host image, which is completely different with the traditional DCT. For reducing the redundancy of watermark information, the original color watermark image is compressed by the proposed compression method. After two-level DCT, nine AC coefficients in different positions of each sub-block are selected and quantified to embed watermark information. Moreover, only the extraction rules are used to extract watermark from the watermarked image without resorting to the original host image or watermark image. Experimental results show that the proposed watermarking algorithm can effectively improve the quality of the watermarked image and the robustness of the embedded watermark against various attacks.  相似文献   

2.
In this paper, we have proposed a new multiple image encryption and watermarking technique. Several gray images can be watermarked in the three channels of an enlarged color image. The neighbor pixel value addition and subtraction algorithm is used to realize blind watermarking, therefore the original host color image does not need in extraction the watermark image. The gray images are encrypted with FRFT and Region Shift Encoding techniques before hiding to enhance the security. The robustness against occlusion attacks and noise attacks are also analyzed. And some computer simulations are presented to verify the possibility.  相似文献   

3.
Color image watermarking has become essential and important copyright protection or authentication scheme. It is noted that most of the existing color image watermarking algorithms are performed only in the single domain (spatial domain or frequency domain), and not to integrate these merits of the different domains. By utilizing the generating principle and distribution feature of the direct current (DC) coefficient, a novel blind watermarking algorithm is proposed for color host images in this paper. Firstly, the Y luminance of host image is divided into 8 × 8 sub-blocks and the DC coefficients of each block are directly calculated in the spatial domain without DCT transform. Secondly, according to the watermark information and the quantization step, the DC coefficients are calculated and their increments are further utilized to modify directly the values of all pixels in the spatial domain instead of the DCT domain to embed watermark. When watermark extraction, only the watermarked image and the quantization step are needed in the spatial domain. Experimental results show that the proposed method not only can resist both traditional signal processing attacks and geometric attacks, but also has more efficient in computational complexity. Comparisons also demonstrate the advantages of the method.  相似文献   

4.
黄清龙  刘建岚 《光子学报》2007,36(12):2261-2265
基于光学菲涅耳全息图和相位密码板,结合离散余弦变换,设计了一种新的正实值编码的“盲数字水印”计算方法.相位密码板是多个点光源的菲涅耳衍射光场的相角之和,原始水印图像在其菲涅耳衍射域中与通过相位密码板的参考光作相干叠加,形成菲涅耳全息图;之后将其嵌入到原始宿主图像的离散余弦变换中,同时将此叠加水印信息的原像素值用其邻近的原像素均值来替换;通过作逆离散余弦变换,获得了已嵌入水印信息的正实数值的目标图像;通过对载有水印信息的目标图像作逆运算,从中提取了原始水印图像.数值计算结果表明:该水印计算法对JPEG有损压缩、剪切、噪音污染和重采样等攻击,具有很强的鲁棒性.由于本算法属“盲数字水印”技术,以及水印信息的灵活嵌入和多重密钥(衍射距离、多个点光源位置等)的随意选择,从而使该算法具有很高的安全性和实用价值.  相似文献   

5.
基于SIFT图像特征区域的全息水印技术   总被引:1,自引:0,他引:1  
为了增强水印的不可见性和鲁棒性,提出了一种基于图像特征区域的水印算法。首先利用SIFT(Scale Invariant Feature Transform)算法从载体图像蓝色B通道中提取图像特征点来进行优化和筛选,根据优化后的稳定特征点及其特征尺度确定图像的特征区域,再结合全息技术,对原始水印图像进行双随机相位加密,生成加密全息水印;然后对特征区域进行离散余弦变换(DCT);最后在其中频区域嵌入加密全息水印。在提取水印时无须借助原始图像,是盲水印技术。实验结果表明:该算法重建的水印图像与原始水印图像的NC值高达0.95;水印的嵌入对图像质量影响很小,PSNR值高达55.97,能够抵抗常规信号攻击及缩放、剪切、平移等几何攻击。  相似文献   

6.
基于虚拟通道技术的数字图像灰度水印算法   总被引:2,自引:2,他引:0  
王朋飞  冯桂  秦峰  王小林 《光子学报》2006,35(11):1770-1773
根据提出的虚拟通道技术,提出一种在载体中嵌入灰度图像作为水印的数字水印算法.通过修改载体频率域系数,载体通道可被看成一个虚拟的水印通道,它由若干个缺损的水印子通道构成,水印的提取不需要原始载体或原始水印的参与.实验结果表明提出的算法很好地保证了水印的不可见性和稳健性.  相似文献   

7.
基于光学菲涅耳衍射的"盲数字水印"技术   总被引:3,自引:0,他引:3  
黄清龙  刘建岚 《光学学报》2006,26(8):145-1149
基于光学菲涅耳衍射,设计了一种新的“盲数字水印”计算方法。水印图像通过离散菲涅耳衍射变换成一复矩阵,将此复矩阵的实部和虚部分开,分别嵌入到宿主图像的不同位置中。通过将水印嵌入点的宿主图像的像素值更改为其近邻像素值的均值,而实现“盲水印”的提取。数值计算结果表明:该水印计算法对像素变换攻击具有很强的鲁棒性,如图像亮度、对比度和灰度曲线的调整;能抵抗JPEG有损压缩、剪切和噪声污染攻击;能抵抗对图像的重采样攻击,可从显示屏幕拷贝的图像中提取水印。由于该方法为使用者提供了灵活的水印嵌入方式和双重密钥的选取,以及提取水印不需要原始图像数据,因而使该方法具有很高的安全性和实用价值。  相似文献   

8.
基于图象特征的小波域水印算法   总被引:4,自引:0,他引:4  
王卫卫  杨波  宋国乡 《光子学报》2001,30(7):856-860
提出一种基于图象特征点的小波变换域第二代水印算法.首先对图象作小波变换,其中最低频成分是图象的粗尺度(低分辨率)逼近,从中提取出图象的特征点;然后在特征点对应的所有高频系数中嵌入水印.水印检验不需要原始图象,但需要原始图象的特征点位置信息,计算特征点对应的所有高频系数与嵌入水印的互相关,利用门限值检验水印是否存在. 实验证明该算法对通常的图象处理有很强的鲁棒性,对有损压缩的鲁棒性尤为突出,而且对几何变换也有一定鲁棒性.  相似文献   

9.
In this paper, a blind dual color image watermarking scheme based on Schur decomposition is introduced. This is the first time to use Schur decomposition to embed color image watermark in color host image, which is different from using the binary image as watermark. By analyzing the 4 × 4 unitary matrix U via Schur decomposition, we can find that there is a strong correlation between the second row first column element and the third row first column element. This property can be explored for embedding watermark and extracting watermark in the blind manner. Since Schur decomposition is an intermediate step in SVD decomposition, the proposed method requires less number of computations. Experimental results show that the proposed scheme is robust against most common attacks including JPEG lossy compression, JPEG 2000 compression, low-pass filtering, cropping, noise addition, blurring, rotation, scaling and sharpening et al. Moreover, the proposed algorithm outperforms the closely related SVD-based algorithm and the spatial-domain algorithm.  相似文献   

10.
A novel blind color images watermarking based on SVD   总被引:1,自引:0,他引:1  
Since the color image watermark has more bit information, it is a challenging problem to design a robust and blind color watermarking scheme for copyright protection. In this paper, a blind watermarking scheme based on singular value decomposition (SVD) is proposed. By analyzing the orthogonal matrix U via SVD, it is found that there exists a strong similarity correlation between the second row first column element and the third row first column element. Hence, this paper utilizes this property for image watermarking. Firstly, the 4 × 4 non-overlapping pixels block of each component in color host image is processed by SVD. And then, the color watermark is embedded by slightly modifying the value of the second row first column element and the third row first column one of U matrix, and the modified relation can be utilized to extract watermark. Experimental results, compared with the related existing methods, show that the proposed color image scheme has stronger robustness against most common attacks such as image compression, filtering, cropping, noise adding, blurring, scaling and sharpening et al.  相似文献   

11.
In this paper,a compressive sensing(CS) and chaotic map-based joint image encryption and watermarking algorithm is proposed.The transform domain coefficients of the original image are scrambled by Arnold map firstly.Then the watermark is adhered to the scrambled data.By compressive sensing,a set of watermarked measurements is obtained as the watermarked cipher image.In this algorithm,watermark embedding and data compression can be performed without knowing the original image;similarly,watermark extraction will not interfere with decryption.Due to the characteristics of CS,this algorithm features compressible cipher image size,flexible watermark capacity,and lossless watermark extraction from the compressed cipher image as well as robustness against packet loss.Simulation results and analyses show that the algorithm achieves good performance in the sense of security,watermark capacity,extraction accuracy,reconstruction,robustness,etc.  相似文献   

12.
分数傅里叶域数字水印算法   总被引:19,自引:2,他引:17  
基于离散分数傅里叶变换(DFRFT)快速算法发展了一种分数傅里叶谱域图像水印算法.该算法根据分数傅里叶变换谱具有空域和频域双域信息表达能力,分别对原始图像和所加水印信息进行不同级次的分数傅里叶变换,提取水印分数傅里叶谱的低频成分并直接将其叠加到原始图像的分数傅里叶谱中的对角像元上,然后再进行逆变换得到水印图像.在JPEG压缩、图像旋转及剪切等攻击方式下,对该水印算法进行了鲁棒性分析,数值实验表明该水印算法具有良好的抗攻击性和安全性.  相似文献   

13.
《Optik》2014,125(24):7231-7234
The copyright protection of the remote sensing images is becoming a hot research topic in recent years. By considering the characteristics of the binary image, Zhu et al. proposed a new digital watermarking algorithm to protect the copyright of remote sensing images effectively. However, Zhu et al.’s scheme is not secure under the novel attack method proposed in this paper. While keeping the visual quality of the protected original image unchanged, the embedded watermark can be replaced with another watermark if the attacker has the host image carrying the other watermark. Thus the copyright of the original image changes and the copyright protection fail. To overcome the insecurity, a chaos-based improvement measure is proposed, in which the performance is the same as before. Analysis, proof, and experiment show that our methods are feasible and effective.  相似文献   

14.
一种基于二元位相加密的大信息量数字全息水印   总被引:14,自引:10,他引:4  
陈林森  周小红  邵洁 《光子学报》2005,34(4):616-620
研究了一种基于二元位相加密的大信息量数字全息水印方法,对需隐藏的水印信息用二元位相编码,然后再用2台阶位相密钥进行加密,作为水印插入宿主图像中,解码后得到了高质量的水印结果.与平面波照明数字全息水印相比,采用位相密钥数字全息水印有效地提高了水印提取的安全性和相对光学效率,并保持了对大信息量水印的提取质量,解码过程不依赖于原图像. 计算和分析了二元位相密钥的空间分布对水印信息提取质量的影响,计算结果验证了理论的正确性.  相似文献   

15.
陈家祯  郑子华  叶锋  连桂仁  许力 《物理学报》2017,66(23):234202-234202
提出了一种基于三维物体的多重菲涅耳计算全息水印方法.将水印信号作为虚拟三维物体的层面,首先结合分区复用层析法和菲涅耳双随机相位编码方法产生复噪声形式的水印信号;然后对水印信号的频谱作共轭对称处理实现实值编码;为减小对宿主全息图数字重建的影响,将水印信号的频谱设置于对宿主数字重建影响小的频谱非感兴趣区域;编码后的信号以一定强度叠加于宿主全息图,水印信号恢复无需原始宿主全息图信息,可实现盲提取,对宿主全息图重建像面的二维码可扫描识别.仿真测试结果表明,所提出的方法具有较好的透明性和稳健性,在宿主全息图遭受滤波、JPEG(联合图像专家小组)压缩、高斯噪声、剪切、旋转等各种攻击的情况下,不论对宿主还是水印信号仍具有良好的数字重建质量,对重建像面的二维码仍可扫描识别;而重建像面水印信号的无干扰可控重建后处理操作解决了不同层面水印信号之间的衍射干扰问题,提高了水印信号的重建质量.虚拟光学手段的应用丰富了水印信号设计方法并提升了算法的安全性.  相似文献   

16.
The main objective in developing a robust image watermarking technique is to obtain the highest possible robustness without losing the transparency. To achieve this objective, this paper presents a new optimal robust image watermarking technique based on singular value decomposition (SVD) using differential evolution algorithm (DE). The singular values (SV) of the host image are modified by multiple scaling factors to embed a watermark image. The modifications are optimised using DE to achieve maximum robustness and transparency Experimental results show that the proposed approach can effectively improve the quality of the watermarked image and the robustness of the embedded watermark against various attacks.  相似文献   

17.
袁胜  王真  周昕  邴丕彬 《光子学报》2020,49(2):179-187
提出了一种基于二值化计算鬼成像的盲水印方法.首先将水印图像经计算关联成像加密系统加密,并将加密数据二值化,然后将其隐藏到宿主图像的离散余弦变换域,实现水印信息的嵌入.水印信息的提取和重建是隐藏和加密的逆过程,分别借助提取密钥和解密密钥获取水印信息.仿真实验证明,该方法具有很好的隐蔽性,在嵌入因子α=10时,嵌入水印仍具有较好的不可感知性,含水印图像的峰值信噪比在38 dB以上;另外,该方法也具有一定的容错能力,提取的加密数据错误率达20%时,重建的水印信息仍能分辨和识别;与传统的计算鬼成像相比,加密数据的二值化为水印嵌入提供了方便,但是并未对重建图像带来严重恶化,其相关系数相差不足0.1;水印信息的提取无需借助原始宿主图像,是一种盲提取方法.  相似文献   

18.
Desynchronization attacks are among the most difficult attacks to resist, for it can desynchronize the location of the watermark and hence cause incorrect watermark detection. The design of an image watermarking scheme that is robust against desynchronization attacks is challenging. Based on a multi-scale SIFT (scale invariant feature transform) detector and Bandelet transform theory, we propose a new content based image watermarking algorithm with good visual quality and reasonable resistance toward desynchronization attacks. Firstly, the stable image feature points are extracted from the original host by using the multi-scale SIFT detector, and the local feature regions (LFRs) are constructed adaptively according to the feature scale theory. The Bandelet transform is then performed on the LFRs. Finally, the digital watermark is embedded into the LFRs by modifying the significant Bandelet coefficients. By binding the watermark with the geometrically invariant image features, the watermark detection can be done without synchronization error. Experimental results show that the proposed image watermarking is not only invisible and robust against common signal processing such as sharpening, noise adding, JPEG compression, etc., but also robust against the desynchronization attacks such as rotation, translation, scaling, row or column removal, cropping, etc.  相似文献   

19.
In this paper, a novel robust watermarking technique using particle swarm optimization and k-nearest neighbor algorithm is introduced to protect the intellectual property rights of color images in the spatial domain. In the embedding process, the color image is separated into non-overlapping blocks and each bit of the binary watermark is embedded into the individual blocks. Then, in order to extract the embedded watermark, features are obtained from watermark embedded blocks using the symmetric cross-shape kernel. These features are used to generate two centroids belonging to each binary (1 and 0) value of the watermark implementing particle swarm optimization. Subsequently, the embedded watermark is extracted by evaluating these centroids utilizing k-nearest neighbor algorithm. According to the test results, embedded watermark is extracted successfully even if the watermarked image is exposed to various image processing attacks.  相似文献   

20.
祁永坤  彭翔  关颖健  高志  孟祥锋  秦琬 《光学学报》2008,28(s2):308-313
提出一种基于相息图和小波变换的数字水印方案。利用迭代相位恢复算法将水印图像编码为相息图, 然后将经权重因子调制后的相息图嵌入到宿主图像的三层小波低频系数中, 完成整个水印嵌入过程。在水印提取阶段, 对宿主图像和含水印图像进行三层小波分解, 将得到的低频系数对应相减提取出水印相息图, 然后对此相息图进行傅里叶变换操作, 取其振幅即可提取原始嵌入的水印图像。针对不同权重因子的水印系统, 详细分析和讨论了所提出水印方案的隐蔽性和稳健性。计算机仿真结果验证了该数字水印方案的可行性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号