首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 767 毫秒
1.
AbstractA buyer-seller watermarking protocol is a combination of traditional watermarking and fingerprinting techniques. Recently, Frattolillo proposed such a watermarking protocol suitable for web context. Frattolillo’s scheme has two problems which would make it hard to implement practically. Several possible solutions to the two problems are presented in this paper.  相似文献   

2.
针对当前数字图像被购买者随意的散播、修改,而造成的版权问题,提出了一种空域水印认证算法,即使水印信息被篡改,也能够修复水印信息.该算法将购买者的信息以水印的形式嵌入到数字作品中,随着水印的恢复,可以找出参与了非法拷贝的买主的信息.  相似文献   

3.
针对人脸识别系统中人脸图像数据可能受到攻击,导致人脸图像被恶意添加、替换、篡改等安全隐患,采用脆弱数字水印方法,解决上述人脸识别系统中人脸图像数据安全问题.用人脸原始图像的小波低频系数的高7位生成低频压缩图像,作为水印.通过混沌置乱加密,将水印直接嵌入到原始人脸图像的最低有效位平面,区分人脸图像篡改并定位检测.实验结果表明,采用脆弱数字水印的人脸图像对恶意添加、替换、篡改都有很高的敏感度.嵌入脆弱数字水印对人脸图形的特征提取的识别率以及识别速度的影响都很小.  相似文献   

4.
基于图像连通性的自适应水印同步方案   总被引:2,自引:2,他引:2  
为提高水印的鲁棒性和安全性,提出了基于图像连通性的自适应水印同步方案.该方案根据图像的连通性得到连通对象,选取较大的连通对象的重心作为水印嵌入的参考点.利用图像的连通性具有拓扑不变性以及图像的重心比较稳定的特性保证水印检测的自适应同步.用作水印嵌入的参考点的高度稳定性,使得该方案不仅对常见图像处理时,而且对全局和局部几何攻击均呈现了较强的鲁棒性.  相似文献   

5.
奇异值分解算法应用于数字水印技术中,把水印信息按位置换,对宿主图像分块并做奇异值分解,在奇异值域做数学变换以重复嵌入按位置换的二值水印信息.实验结果表明,该方法既提高了水印的信息量,同时又使得水印图像具有很强的稳健性,能抵抗旋转和裁剪等多种攻击,水印的保密性与鲁棒性均有显著的提高.  相似文献   

6.
常规的数字水印算法对几何攻击无能为力,水印算法对几何攻击的鲁棒性被认为是数字水印技术走上实际应用的一个关键点.文中通过对普通的基于几何不变性数字水印算法的分析,提出了一种彩色图像中基于几何不变性的数字水印的嵌入及检测过程,并通过一系列实验证明了该数字水印算法具有很高的抗几何攻击(旋转、缩放等)特性,即提高了鲁棒性.  相似文献   

7.
提出了一种新的基于混沌理论的彩色图像水印方法.在空域中RGB色彩空间的蓝色信道里嵌入水印以提高水印隐性和鲁棒性.水印的检测同样只在蓝色信道里进行,通过相关性的比较来确定结果.实验结果表明,文中所提出的水印方法速度快、易于实现,具有较高的安全性,并对包括剪裁在内的几何攻击有很好的鲁棒性.  相似文献   

8.
提出了一种基于人眼视觉特性的小波变换数字水印算法,该算法能够依据人眼视觉特性,将水印信息嵌入到小波变换域的不同尺度、不同方向分量上,从而提供检测局部空域和频域变化的能力,实现局部水印和全局水印之双重目的.实验结果表明:所提出的数字水印不仅具有较好的透明性,而且对诸如剪切、低通滤波等攻击均具有较好的鲁棒性.  相似文献   

9.
The paper proposes a robust digital audio watermarking scheme using blind source separation(BSS) based on the global optimization of independency metric(IM),which is formulated as a generalized eigenvalue(GE) problem.Compared with traditional information-theoretical approaches used in digital audio watermarking,such as fast independent component analysis(FastICA),the proposed scheme has lower complexity without timeconsuming iteration steps used in FastICA.To make full use of the multiresolution characteris...  相似文献   

10.
In order to increase the watermarking capacity and improve the anti-counterfeiting performance of quick response (QR) two-dimensional (2D) barcode based on digital watermarking technique, this paper proposes a kind of graying algorithm for binary image to make transform domain watermarking methods possible. Based on the graying algorithm, the quantization-based watermarking scheme in discrete wavelet transform (DWT) domain is then designed. The experiments show that the proposed watermarking scheme for QR 2D barcode greatly improves anti-counterfeiting performance without loss of any barcode information.  相似文献   

11.
数字水印技术作为版权保护的重要手段,已得到广泛地研究和应用.提出了一种基于Arnold混沌映射的数字水印技术和水印信息置乱效果评价方法,用Arnold变换对原始水印信号进行置乱,再经过M序列扩频,将处理后水印信号嵌入宿主图片小波域的低频系数中,通过对四组不同条件和嵌入方法的比较,通过实验证明该算法具有良好的稳健性.  相似文献   

12.
Connectivity-Based Watermarking Robust to Geometrical Attacks   总被引:2,自引:0,他引:2  
Introduction Thegoalofdigitalwatermarkingtechniqueisto embedsomeunnoticeableinformation(calleda mark)inthecontentofmediainordertoprotect copyrightorauthenticateintegralityandverity.Many robustwatermarkingtechniqueshavesuccessfullyre sistednotonlycommonsig…  相似文献   

13.
IntroductionTraditional solutions for the integrity protec-tion of web pages are based on the File Digest tech-niques, usually called Digital Signatures[1]. Suchmethods generate a signature through Hash func-tions with the to-be-protected information as theinput and then attach it to the end of the originalinformation to form the signed message. When thesigned message arrives at the receiver, the correctsignature can ensure its integrity; in other words,no signature or a false one means that…  相似文献   

14.
一种多类多水印方案   总被引:2,自引:1,他引:2  
通过分析多类多水印的特点,讨论了多类多水印的技术难点,提出一种基于小波系数分块嵌入水印的解决方案,将各类型水印归一化处理,但对每种水印单独制定自适应嵌入技术,实现3种类型7个水印的同时隐藏.仿真实验证明了该方案的有效性.  相似文献   

15.
提出了一种基于小波系数分段的数字水印算法,该算法对常见的图像处理具有一定强度的鲁棒性,并且该算法实现了完全盲检测,水印提取时不需要原始的载体图像,也不需要水印的任何信息,并且提取水印的正确性高.  相似文献   

16.
基于DCT与DWT的水印算法的比较分析   总被引:1,自引:0,他引:1  
数字水印技术是保护数字媒体安全的一种有效手段,但当前对数字水印技术的研究还有待进一步加强。文章阐述了数字水印技术的基本原理,介绍了离散余弦变换(DCT)和离散小波变换(DWT)水印算法,并通过攻击实验,对DCT和DWT水印技术在不可见性、鲁棒性、水印容量等方面进行了比较分析,以期对推进数字水印技术的发展起到一定的积极作用。  相似文献   

17.
一种基于整数小波变换的彩色图像盲水印技术   总被引:1,自引:0,他引:1  
提出了一种在静止的彩色图像中嵌入盲水印的鲁棒算法,用彩色图像作为数字水印的载体,将有意义的二值图像作为水印图像,利用人类视觉系统(HVS)特性,综合考虑水印的鲁棒性和不可见性,将水印信息嵌入到小波分解的低频域(LLn),通过理论分析和实验结果证明:算法满足水印的抗JPEG压缩攻击、复杂度较低、实用性较强、对原图的影响较小,具有可行性和有效性等特点。  相似文献   

18.
提出了一种基于小波变换的数字水印的嵌入与检测方法。这种方法充分利用小波变换的特点,在原始图像的适当位置加入水印,采用盲水印算法检测图像中是否含有水印。  相似文献   

19.
Transmitter identification (TxID) technique is used to diagnose the operation status of radio trans-mitters in DTV distributed transmission network. A new TxID method for digital video broadcasting-handheld (DVB-H) system is proposed. Watermark is embedded in the DVB-H signal to form the composite signal. Ac-cording to watermarking theory we demonstrate the required signal level for watermarking signal to achieve given bit error Probability under different circumstance. By selecting the reference pattern to generate watermarking signal, peak-to-average power ratio (PAPR) of the transmitted signal can be improved. Simulation results show that even in wireless situation the receiver can distinguish the watermarking signal with low embedding strength, and distortion to the host signal can also be ignored.  相似文献   

20.
Taking full advantage of the randomicity of chaotic system and its extreme sensitivity to the initial value, a new chaotic fragile watermarking algorithm is proposed. In the algorithm, the location key is looked as a logistic chaotic initial value for iteration to create a location matrix. According to this location matrix, a mapping image is generated and the embedding location of watermarking in image blocks is identified. Then, the watermarking sequence, which is related with the mapping image blocks and generated by H6non chaotic map, is embedded into the least significant bit (LSB) of the corresponding location in each block. Since the image content and watermarking are staggered, the algorithm has a higher security. Simulation results showed that the algorithm can detect and locate the tamper in watermarked images with an accuracy of 2 x 2 block pixels. At the same time, the watermarking images has good invisibility, and the original image is not required when extracting watermarking.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号