共查询到20条相似文献,搜索用时 35 毫秒
1.
A robust and blind watermarking technique for dual color images is proposed in this paper. According to the energy concentrating feature of DCT, the two-level DCT is introduced and used to embed color watermark image into color host image, which is completely different with the traditional DCT. For reducing the redundancy of watermark information, the original color watermark image is compressed by the proposed compression method. After two-level DCT, nine AC coefficients in different positions of each sub-block are selected and quantified to embed watermark information. Moreover, only the extraction rules are used to extract watermark from the watermarked image without resorting to the original host image or watermark image. Experimental results show that the proposed watermarking algorithm can effectively improve the quality of the watermarked image and the robustness of the embedded watermark against various attacks. 相似文献
2.
Gray images embedded in a color image and encrypted with FRFT and Region Shift Encoding methods 总被引:1,自引:0,他引:1
In this paper, we have proposed a new multiple image encryption and watermarking technique. Several gray images can be watermarked in the three channels of an enlarged color image. The neighbor pixel value addition and subtraction algorithm is used to realize blind watermarking, therefore the original host color image does not need in extraction the watermark image. The gray images are encrypted with FRFT and Region Shift Encoding techniques before hiding to enhance the security. The robustness against occlusion attacks and noise attacks are also analyzed. And some computer simulations are presented to verify the possibility. 相似文献
3.
Color image watermarking has become essential and important copyright protection or authentication scheme. It is noted that most of the existing color image watermarking algorithms are performed only in the single domain (spatial domain or frequency domain), and not to integrate these merits of the different domains. By utilizing the generating principle and distribution feature of the direct current (DC) coefficient, a novel blind watermarking algorithm is proposed for color host images in this paper. Firstly, the Y luminance of host image is divided into 8 × 8 sub-blocks and the DC coefficients of each block are directly calculated in the spatial domain without DCT transform. Secondly, according to the watermark information and the quantization step, the DC coefficients are calculated and their increments are further utilized to modify directly the values of all pixels in the spatial domain instead of the DCT domain to embed watermark. When watermark extraction, only the watermarked image and the quantization step are needed in the spatial domain. Experimental results show that the proposed method not only can resist both traditional signal processing attacks and geometric attacks, but also has more efficient in computational complexity. Comparisons also demonstrate the advantages of the method. 相似文献
4.
基于光学菲涅耳全息图和相位密码板,结合离散余弦变换,设计了一种新的正实值编码的“盲数字水印”计算方法.相位密码板是多个点光源的菲涅耳衍射光场的相角之和,原始水印图像在其菲涅耳衍射域中与通过相位密码板的参考光作相干叠加,形成菲涅耳全息图;之后将其嵌入到原始宿主图像的离散余弦变换中,同时将此叠加水印信息的原像素值用其邻近的原像素均值来替换;通过作逆离散余弦变换,获得了已嵌入水印信息的正实数值的目标图像;通过对载有水印信息的目标图像作逆运算,从中提取了原始水印图像.数值计算结果表明:该水印计算法对JPEG有损压缩、剪切、噪音污染和重采样等攻击,具有很强的鲁棒性.由于本算法属“盲数字水印”技术,以及水印信息的灵活嵌入和多重密钥(衍射距离、多个点光源位置等)的随意选择,从而使该算法具有很高的安全性和实用价值. 相似文献
5.
基于SIFT图像特征区域的全息水印技术 总被引:1,自引:0,他引:1
为了增强水印的不可见性和鲁棒性,提出了一种基于图像特征区域的水印算法。首先利用SIFT(Scale Invariant Feature Transform)算法从载体图像蓝色B通道中提取图像特征点来进行优化和筛选,根据优化后的稳定特征点及其特征尺度确定图像的特征区域,再结合全息技术,对原始水印图像进行双随机相位加密,生成加密全息水印;然后对特征区域进行离散余弦变换(DCT);最后在其中频区域嵌入加密全息水印。在提取水印时无须借助原始图像,是盲水印技术。实验结果表明:该算法重建的水印图像与原始水印图像的NC值高达0.95;水印的嵌入对图像质量影响很小,PSNR值高达55.97,能够抵抗常规信号攻击及缩放、剪切、平移等几何攻击。 相似文献
6.
7.
基于光学菲涅耳衍射的"盲数字水印"技术 总被引:3,自引:0,他引:3
基于光学菲涅耳衍射,设计了一种新的“盲数字水印”计算方法。水印图像通过离散菲涅耳衍射变换成一复矩阵,将此复矩阵的实部和虚部分开,分别嵌入到宿主图像的不同位置中。通过将水印嵌入点的宿主图像的像素值更改为其近邻像素值的均值,而实现“盲水印”的提取。数值计算结果表明:该水印计算法对像素变换攻击具有很强的鲁棒性,如图像亮度、对比度和灰度曲线的调整;能抵抗JPEG有损压缩、剪切和噪声污染攻击;能抵抗对图像的重采样攻击,可从显示屏幕拷贝的图像中提取水印。由于该方法为使用者提供了灵活的水印嵌入方式和双重密钥的选取,以及提取水印不需要原始图像数据,因而使该方法具有很高的安全性和实用价值。 相似文献
8.
9.
In this paper, a blind dual color image watermarking scheme based on Schur decomposition is introduced. This is the first time to use Schur decomposition to embed color image watermark in color host image, which is different from using the binary image as watermark. By analyzing the 4 × 4 unitary matrix U via Schur decomposition, we can find that there is a strong correlation between the second row first column element and the third row first column element. This property can be explored for embedding watermark and extracting watermark in the blind manner. Since Schur decomposition is an intermediate step in SVD decomposition, the proposed method requires less number of computations. Experimental results show that the proposed scheme is robust against most common attacks including JPEG lossy compression, JPEG 2000 compression, low-pass filtering, cropping, noise addition, blurring, rotation, scaling and sharpening et al. Moreover, the proposed algorithm outperforms the closely related SVD-based algorithm and the spatial-domain algorithm. 相似文献
10.
A novel blind color images watermarking based on SVD 总被引:1,自引:0,他引:1
Shao-li Jia 《Optik》2014
Since the color image watermark has more bit information, it is a challenging problem to design a robust and blind color watermarking scheme for copyright protection. In this paper, a blind watermarking scheme based on singular value decomposition (SVD) is proposed. By analyzing the orthogonal matrix U via SVD, it is found that there exists a strong similarity correlation between the second row first column element and the third row first column element. Hence, this paper utilizes this property for image watermarking. Firstly, the 4 × 4 non-overlapping pixels block of each component in color host image is processed by SVD. And then, the color watermark is embedded by slightly modifying the value of the second row first column element and the third row first column one of U matrix, and the modified relation can be utilized to extract watermark. Experimental results, compared with the related existing methods, show that the proposed color image scheme has stronger robustness against most common attacks such as image compression, filtering, cropping, noise adding, blurring, scaling and sharpening et al. 相似文献
11.
A joint image encryption and watermarking algorithm based on compressive sensing and chaotic map
下载免费PDF全文
![点击此处可从《中国物理 B》网站下载免费的PDF全文](/ch/ext_images/free.gif)
《中国物理 B》2015,(6)
In this paper,a compressive sensing(CS) and chaotic map-based joint image encryption and watermarking algorithm is proposed.The transform domain coefficients of the original image are scrambled by Arnold map firstly.Then the watermark is adhered to the scrambled data.By compressive sensing,a set of watermarked measurements is obtained as the watermarked cipher image.In this algorithm,watermark embedding and data compression can be performed without knowing the original image;similarly,watermark extraction will not interfere with decryption.Due to the characteristics of CS,this algorithm features compressible cipher image size,flexible watermark capacity,and lossless watermark extraction from the compressed cipher image as well as robustness against packet loss.Simulation results and analyses show that the algorithm achieves good performance in the sense of security,watermark capacity,extraction accuracy,reconstruction,robustness,etc. 相似文献
12.
13.
《Optik》2014,125(24):7231-7234
The copyright protection of the remote sensing images is becoming a hot research topic in recent years. By considering the characteristics of the binary image, Zhu et al. proposed a new digital watermarking algorithm to protect the copyright of remote sensing images effectively. However, Zhu et al.’s scheme is not secure under the novel attack method proposed in this paper. While keeping the visual quality of the protected original image unchanged, the embedded watermark can be replaced with another watermark if the attacker has the host image carrying the other watermark. Thus the copyright of the original image changes and the copyright protection fail. To overcome the insecurity, a chaos-based improvement measure is proposed, in which the performance is the same as before. Analysis, proof, and experiment show that our methods are feasible and effective. 相似文献
14.
15.
提出了一种基于三维物体的多重菲涅耳计算全息水印方法.将水印信号作为虚拟三维物体的层面,首先结合分区复用层析法和菲涅耳双随机相位编码方法产生复噪声形式的水印信号;然后对水印信号的频谱作共轭对称处理实现实值编码;为减小对宿主全息图数字重建的影响,将水印信号的频谱设置于对宿主数字重建影响小的频谱非感兴趣区域;编码后的信号以一定强度叠加于宿主全息图,水印信号恢复无需原始宿主全息图信息,可实现盲提取,对宿主全息图重建像面的二维码可扫描识别.仿真测试结果表明,所提出的方法具有较好的透明性和稳健性,在宿主全息图遭受滤波、JPEG(联合图像专家小组)压缩、高斯噪声、剪切、旋转等各种攻击的情况下,不论对宿主还是水印信号仍具有良好的数字重建质量,对重建像面的二维码仍可扫描识别;而重建像面水印信号的无干扰可控重建后处理操作解决了不同层面水印信号之间的衍射干扰问题,提高了水印信号的重建质量.虚拟光学手段的应用丰富了水印信号设计方法并提升了算法的安全性. 相似文献
16.
An optimal robust digital image watermarking based on SVD using differential evolution algorithm 总被引:1,自引:0,他引:1
Veysel Aslantas 《Optics Communications》2009,282(5):769-7232
The main objective in developing a robust image watermarking technique is to obtain the highest possible robustness without losing the transparency. To achieve this objective, this paper presents a new optimal robust image watermarking technique based on singular value decomposition (SVD) using differential evolution algorithm (DE). The singular values (SV) of the host image are modified by multiple scaling factors to embed a watermark image. The modifications are optimised using DE to achieve maximum robustness and transparency Experimental results show that the proposed approach can effectively improve the quality of the watermarked image and the robustness of the embedded watermark against various attacks. 相似文献
17.
提出了一种基于二值化计算鬼成像的盲水印方法.首先将水印图像经计算关联成像加密系统加密,并将加密数据二值化,然后将其隐藏到宿主图像的离散余弦变换域,实现水印信息的嵌入.水印信息的提取和重建是隐藏和加密的逆过程,分别借助提取密钥和解密密钥获取水印信息.仿真实验证明,该方法具有很好的隐蔽性,在嵌入因子α=10时,嵌入水印仍具有较好的不可感知性,含水印图像的峰值信噪比在38 dB以上;另外,该方法也具有一定的容错能力,提取的加密数据错误率达20%时,重建的水印信息仍能分辨和识别;与传统的计算鬼成像相比,加密数据的二值化为水印嵌入提供了方便,但是并未对重建图像带来严重恶化,其相关系数相差不足0.1;水印信息的提取无需借助原始宿主图像,是一种盲提取方法. 相似文献
18.
Desynchronization attacks are among the most difficult attacks to resist, for it can desynchronize the location of the watermark and hence cause incorrect watermark detection. The design of an image watermarking scheme that is robust against desynchronization attacks is challenging. Based on a multi-scale SIFT (scale invariant feature transform) detector and Bandelet transform theory, we propose a new content based image watermarking algorithm with good visual quality and reasonable resistance toward desynchronization attacks. Firstly, the stable image feature points are extracted from the original host by using the multi-scale SIFT detector, and the local feature regions (LFRs) are constructed adaptively according to the feature scale theory. The Bandelet transform is then performed on the LFRs. Finally, the digital watermark is embedded into the LFRs by modifying the significant Bandelet coefficients. By binding the watermark with the geometrically invariant image features, the watermark detection can be done without synchronization error. Experimental results show that the proposed image watermarking is not only invisible and robust against common signal processing such as sharpening, noise adding, JPEG compression, etc., but also robust against the desynchronization attacks such as rotation, translation, scaling, row or column removal, cropping, etc. 相似文献
19.
In this paper, a novel robust watermarking technique using particle swarm optimization and k-nearest neighbor algorithm is introduced to protect the intellectual property rights of color images in the spatial domain. In the embedding process, the color image is separated into non-overlapping blocks and each bit of the binary watermark is embedded into the individual blocks. Then, in order to extract the embedded watermark, features are obtained from watermark embedded blocks using the symmetric cross-shape kernel. These features are used to generate two centroids belonging to each binary (1 and 0) value of the watermark implementing particle swarm optimization. Subsequently, the embedded watermark is extracted by evaluating these centroids utilizing k-nearest neighbor algorithm. According to the test results, embedded watermark is extracted successfully even if the watermarked image is exposed to various image processing attacks. 相似文献
20.
提出一种基于相息图和小波变换的数字水印方案。利用迭代相位恢复算法将水印图像编码为相息图, 然后将经权重因子调制后的相息图嵌入到宿主图像的三层小波低频系数中, 完成整个水印嵌入过程。在水印提取阶段, 对宿主图像和含水印图像进行三层小波分解, 将得到的低频系数对应相减提取出水印相息图, 然后对此相息图进行傅里叶变换操作, 取其振幅即可提取原始嵌入的水印图像。针对不同权重因子的水印系统, 详细分析和讨论了所提出水印方案的隐蔽性和稳健性。计算机仿真结果验证了该数字水印方案的可行性。 相似文献