首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
2.
针对目前PDF文档频繁使用程度与其数字水印技术发展缓慢之间的鲜明反差,提出了一种基于PDF字符颜色的文本水印算法。该算法通过修改PDF文档中字符颜色操作符的操作数,将预处理后的水印信息嵌入至载体PDF文档。在水印嵌入的预处理过程中,采用的信道编码和循环加密算法以及水印提取后处理过程中,采用的多数投票算法,有效地提高了水印信息的安全性和鲁棒性。实验结果表明,该算法具备高隐蔽性、强鲁棒性、大容量的特点,且算法与PDF文档之间的兼容性较好。  相似文献   

3.
4.
基于可分逆模糊化的脆弱水印   总被引:1,自引:0,他引:1  
提出了一种时域上的水隐藏与检测算法--基于可分逆模糊化的脆弱水印算法。其原理是将水印隐藏到图像的一行/列中,再通过高斯模糊化将水印信息进一步隐藏到其相邻的行/列中。在水印检测过程中,通过可分逆模糊化算法检测并估计出嵌入水印。实验结果表明,这种算法隐藏水印具有隐蔽性和脆弱性,同时能够对攻击方位进行准确定位,是一种很有前途的脆弱水印算法。  相似文献   

5.
目前,采用数字水印技术进行数字图像的真实性、完整性认证已成为信息认证领域的研究热点。为使国内广大相关领域工作者能够较全面地了解数字水印认证技术的发展现状,本文概括了认证水印的特点和分类,重点地介绍了现有脆弱水印的实现方法。  相似文献   

6.
7.
中英混排文档图像粘连字符分割方法的研究   总被引:1,自引:0,他引:1  
常丹华  何耘娴  苗丹 《激光与红外》2010,40(12):1369-1368
针对中英混排文档图像中粘连字符分割准确率不高的问题,提出了一种改进的滴水分割算法。该方法以贝叶斯分类器区分字符类型并利用阈值判定粘连字符的存在,利用粘连字符上下轮廓的极值点确定候选粘连分割点,并利用距离变换提取粘连位置的中心线,最终将极值点与中心线共同确定的路径作为滴水算法的分割路径来完成对粘连字符的分割。实验结果表明,该方法解决了准确选择滴水算法的起始位置和字符笔划损伤的问题,有效地提高了分割准确率。  相似文献   

8.
胡云  赵辉 《电视技术》2003,(8):67-69
提出了一种基于LU分解的脆弱水印算法Ⅰ,该算法能检测到嵌入水印后图像的任何微小改动,且具有数据嵌入量小,嵌入后图像降质少和对多种攻击具有敏感性的优点。在此基础上,为增加对图像改变的定位性能,还提出了算法Ⅱ。算法Ⅱ能B有效地对图像的改动进行定位,同时可以抵抗特殊的“剪切-粘贴”攻击。实验结果很好地验证了以上结论。  相似文献   

9.
<正> 当我们在写文章、报告等文件时,经常遇到要在文章中加入各种插图的问题。对于简单的插图,可直接用Microsoft Word文件中的绘图工具来插入各种简单的图形、表格等。但对于稍微复杂的图形,Word的绘图工具就表现出它的缺点来了,即:无栅格,不能绘制复杂图形,处理图形不方便等缺点。笔者通过在实践中发现了一种在Word文档  相似文献   

10.
能区分图像或水印篡改的脆弱水印方案   总被引:15,自引:2,他引:15       下载免费PDF全文
和红杰  张家树  田蕾 《电子学报》2005,33(9):1557-1561
针对现有脆弱型水印方案不能区分是图像内容还是水印被篡改的问题,提出一种能区分图像或水印篡改的脆弱水印方案.该方案用原始图像高7位的小波低频系数非均匀量化后生成的低频压缩图像作为水印,并用混沌系统对水印进行置乱加密,将安全性得到增强的水印直接嵌入到图像的LSB位;认证时通过差值图像定位图像内容被篡改的位置并指出图像中的水印是否被篡改.理论分析和仿真实验表明:该算法不但能精确定位图像内容被篡改的位置,而且能区分是图像内容被篡改、水印被篡改还是两者同时被篡改.  相似文献   

11.
一种有效的文档水印技术   总被引:6,自引:1,他引:6  
针对二值纯文本图像,深入分析二值中文和英文文档图像本身结构特点,并在此基础之上结合人类视觉特性,提出了一种具有一定全局顽健性的局部易碎性数字水印方案。首先将文本图像依据内容进行分块,使每一图像子块只包含一个英文单词或一个字,然后提取该块的可嵌入水印的像素点,最后从中随机选一部分点,嵌入水印信息。实验结果表明该算法在不破坏图像质量基础上,能有效抵抗噪音等攻击,同时又能抵抗和定位对文本内容的局部篡改。  相似文献   

12.
提出一种基于非负矩阵分解NMF(Non-negative Matrix Factorization)的脆弱数字水印算法。算法利用用户密钥构造NMF基矩阵,并在图像NMF分解过程中保持不变,二值水印图像嵌入NMF分解系数矩阵。实验结果本算法具有较强的鲁棒性,同时用户密钥保证的算法的脆弱性。  相似文献   

13.
基于模糊聚类理论,建立了以文本文档中汉字特征为变量的聚类模型。根据人类视觉系统特性,将文本文档中汉字按照汉字笔画数、出现频率及分布均匀度作了分类,选择文本文档中汉字笔画数相对较少、使用频率较高、分布均匀度高的类别嵌入水印。实验结果表明,该算法对于内容的部分删除、添加、格式调整等攻击具有较好的鲁棒性,水印的不可见性好。  相似文献   

14.
Discrete cosine transform is exploited in this work to generate the authentication data that are treated as a fragile watermark. This watermark is embedded in the motion vectors. The advances in multimedia technologies and digital processing tools have brought with them new challenges for the source and content authentication. To ensure the integrity of the H.264/AVC video stream, we introduce an approach based on a content fragile video watermarking method using an independent authentication of each group of pictures (GOPs) within the video. This technique uses robust visual features extracted from the video pertaining to the set of selected macroblocs (MBs) which hold the best partition mode in a tree-structured motion compensation process. An additional security degree is offered by the proposed method through using a more secured keyed function HMAC-SHA-256 and randomly choosing candidates from already selected MBs. In here, the watermark detection and verification processes are blind, whereas the tampered frames detection is not since it needs the original frames within the tampered GOPs. The proposed scheme achieves an accurate authentication technique with a high fragility and fidelity whilst maintaining the original bitrate and the perceptual quality. Furthermore, its ability to detect the tampered frames in case of spatial, temporal and colour manipulations is confirmed.  相似文献   

15.
This paper presents a real-time image tamper detection and localization based on fragile watermarking and Faber-Schauder discrete wavelet transform (FSDWT). The maximum coefficients of FSDWT are used with a logo to generate the watermark which is embedded in the least significant bit (LSB) of specified pixels of the original image. Experimental results prove the effectiveness of the proposed method through a series of attacks and affirm that the requirements of imperceptibility, fidelity, effectiveness and real-time processing are satisfied. The proposed method contains simple operations and has low complexity, hence, it is suitable for applications working on real-time.  相似文献   

16.
针对H.264/AVC的编码特征,本文提出一种基于H.264/AVC低比特率视频流的脆弱水印算法,该算法在I帧的量化后的4 4DCT块中结合系数值的符号特性与奇偶性,首先用倒数第二位非零系数与水印值一起生成标志信息,然后根据标志信息的值,利用最后一位非零系数的符号特性,修改系数值的奇偶性,从而将水印嵌入到最后一位非零系数中。在解码端根据4 4DCT块中最后两位非零系数的奇偶性关系提取水印,检测时不需要原始视频的参与。该算法具有较小的码率变化,以及较强的脆弱性。  相似文献   

17.
In this paper, we propose a novel fragile watermarking scheme with content restoration capability. Authentication-bits are produced using the image hashing method with a folding operation. The low-frequency component of the nonsubsampled contourlet transform (NSCT) coefficients is used to encode the restoration-bits for each block by the adaptive bit allocation mechanism. During the bit allocation, all the blocks are categorized into different types according to their degree of smoothness, and, complex blocks, which are deemed to have higher priority than smooth blocks, are allocated more bits. Two algorithms are utilized to adjust the block classification and the binary representations in order to guarantee that the numbers of the self-embedding authentication-bits and restoration-bits are exactly suitable for 1-LSB embedding capacity. On the receiver side, the extracted authentication-bits and the decoded restoration-bits are used to localize and restore the tampered blocks, respectively. Due to the low embedding volume, the visual quality of the watermarked image is satisfactory. Experimental results also show that the proposed scheme provides high restoration quality.  相似文献   

18.
In this work, a semi-fragile watermarking scheme, for grayscale image authentication and tamper detection, is proposed. The proposed watermarking scheme is based on implementing a modified DWT quantization-based algorithm by embedding a random watermark bit sequence into the DWT domain using an expanded-bit multiscale quantization-based technique with adjusted watermarked location. Here, the watermark bit is expanded into three similar bits and embedded in a multiscale fashion into the DWT low-frequency subbands of the 2nd DWT levels (LL2, LLHL1 and LLLH1). An adjustment of the quantized coefficients is provided based on modifying their values to fall in more secure locations within the quantization interval. Several designed criteria were used to judge the received image by classifying it into: authenticated, incidentally or maliciously attacked with high accuracy in detecting and classifying attacks. Experimental results have shown the suitability of the proposed approach for tamper detection and accurate authentication.  相似文献   

19.
一种基于DCT变换的语音数字水印算法研究   总被引:31,自引:0,他引:31  
陈琦  王炳锡 《信号处理》2001,17(3):238-241
随着数字媒体的广泛应用,其版权保护也显得日益重要,数字水印(watermarking)近年来引起了人们的高度重视,并逐渐成为多媒体信号处理领域的一个研究热点.本文研究了一种基于DCT变换域的语音数字水印算法,并且为提高算法的安全性,采用线性移位寄存器进行了类似加密的处理.通过实验证明该算法具有较强的稳健性和安全性.  相似文献   

20.
李静梅  冉祥金  姚成浪 《信息技术》2005,29(12):112-114
提出了一种基于垂直投影特征的文档图像拼接算法,即利用两幅待拼接的文档图像中的两组投影值,确定两幅文档图像的位置关系。该算法可自动拼接两幅文档图像成一幅完整的文档图像。实验结果验证了算法的有效性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号