首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 26 毫秒
1.
基于图像连通性的自适应水印同步方案   总被引:2,自引:2,他引:2  
为提高水印的鲁棒性和安全性,提出了基于图像连通性的自适应水印同步方案.该方案根据图像的连通性得到连通对象,选取较大的连通对象的重心作为水印嵌入的参考点.利用图像的连通性具有拓扑不变性以及图像的重心比较稳定的特性保证水印检测的自适应同步.用作水印嵌入的参考点的高度稳定性,使得该方案不仅对常见图像处理时,而且对全局和局部几何攻击均呈现了较强的鲁棒性.  相似文献   

2.
A novel semi-fragile watermarking scheme for the content authentication of images using wavelet transform (WT) is presented in this paper. It is tolerant to the embedded wavelet image compression methods based on WT such as embedded zerotree wavelet (EZW), set partitioning in hierarchical trees (SPIHT) and embedded block coding with optimized truncation (EBCOT) in JPEG2000 to a pre-determined bit-plane, but is sensitive to all other malicious attacks. The image features are generated from the lowest-frequency (LF) subband of the original image as the embedded watermark. The watermark is embedded into the pre-determined bit-plane by adjusting the corresponding values in the given subband. In the process of watermarking authentication, we compare the image features generated from the LF subband of the received image with the embedded watermarking information (the image features of the original image) extracted from the pre-determined bit-plane in the given subband of the received image to decide whether the image is attacked maliciously or processed acceptably (the embedded wavelet compression). The most important advantage of our watermarking scheme is that the watermark information can be extracted from the watermarked image when detecting watermark, so the received image authentication needs no information about the original image or watermark. Experimental results prove the effectiveness of our proposed watermarking scheme.  相似文献   

3.
分析了现有算法的缺陷,提出了一种能有效区分图像内容或水印篡改的自恢复安全脆弱水印算法.该方案利用检测水印实现篡改定位和篡改区分的功能,采用恢复水印恢复被篡改的图像内容.理论分析和实验仿真均表明,所提出的算法具有很好的篡改区分、篡改定位和篡改恢复的能力,能够抵抗同步伪造攻击和密钥分析攻击.  相似文献   

4.
Novel Blind Robust Watermarking Based on Chaotic Mixing   总被引:1,自引:0,他引:1  
This paper proposed a novel blind robust watermarking scheme. Multi-bits watermark is embedded in the chaotic mixed image blocks. Energy of the watermark is spread to all region of the blocks instead of some individual pixels, which entitles the watermark with imperceptibility and high robustness. A class of 1-D Markov chaotic maps is employed to perform image block mixing and watermark encryption ensures security of the system.To prove the validity of this proposed scheme, some objective comparisons with the popular spread spectrum scheme were also presented. The simulation results show that this scheme can survive processing such as high-ratio JPEG compression, Gaussian noise pollution and histogram equalization.  相似文献   

5.
DWT-Based Robust Color Image Watermarking Scheme   总被引:1,自引:0,他引:1  
A scheme of embedding an encrypted watermark into the green component of a color image is proposed. The embedding process is implemented in the discrete wavelet transformation (DWT) domain, The original binary watermark image is firstly encrypted through scrambling technique, and then spread with two orthogonal pseudo-random sequences whose mean values are equal to zero, and finally embedded into the DWT low frequency sub-band of green components, The coefficients whose energies are larger than the others are selected to hide watermark, and the hidden watermark strength is determined by the energy ratio between the selected coefficients energies and the mean energy of the subband. The experiment results demonstrate that the proposed watermarking scheme is very robust against the attacks such as additive noise, low-pass filtering, scaling, cropping image, row (or column ) deleting, and }PEG compression.  相似文献   

6.
We propose a robust watermarking scheme and several extensions for digital right management of data cubes. The ownership information is hidden into a data cube by modifying a set of selected cell values. Its owner can use his private key to control all the watermarking parameters freely. Neither original data cube nor the watermark is required in watermark detection. Detailed analysis and extensive experiments are conducted for the proposed schemes in terms of watermark detectability, robustness and efficiency. Our results show that the scheme performs well in actual applications.  相似文献   

7.
物流配送中心选址问题是现代物流系统规划的一个重要环节,选址的方法有很多,其中,最普遍的就是我们通常所用的重心法,然而,重心法存在一些为人们所忽略问题,其一,重心法是如何引入的;其二,最后的迭代方案是否最好。本文对重心法的引入、公式的推导做了详尽的阐述,并且对以往的迭代方案做了相应的改进。  相似文献   

8.
Active tamper detection using watermarking technique can localize the tampered area and recover the lost information. In this paper, we propose an approach that the watermark is robust to legitimate lossy compression, fragile to malicious tampering and capable of recovery. We embed the watermark bits in the direct current value of energy concentration transform domain coefficients. Let the original watermark bits be content dependent and apply error correction coding to them before embedded to the image. While indicating the tampered area, the extracted bits from a suspicious image can be further decoded and then used to roughly recover the corresponding area. We also theoretically study the image quality and bit error rate. Experimental results demonstrate the effectiveness of the proposed scheme.  相似文献   

9.
A new robust watermarking approach was proposed in 2D continuous wavelet domain (CWT).The watermark is embedded into the large coefficients in the middle band of wavelet transform modulus maxima (WTMM) of the host image.After possible attacks,the watermark is then detected and extracted by correlation analysis.Compared with other wavelet domain watermarking approaches,the WTMM approach can endow the image with both rotation and shift invariant properties.On the other hand,scale invariance is achieved with the geometric normalization during watermark detection.Case studies involve various attacks such as shifting,lossy compression,scaling,rotation and median filtering on the watermarked image,and the result shows that the approach is robust to these attacks.  相似文献   

10.
提出了一种基于小波系数分段的数字水印算法,该算法对常见的图像处理具有一定强度的鲁棒性,并且该算法实现了完全盲检测,水印提取时不需要原始的载体图像,也不需要水印的任何信息,并且提取水印的正确性高.  相似文献   

11.
提出一种基于水印序号的抗裁剪音频数字水印算法.该算法在音频信号中嵌入同步码、水印序号和二值水印图像,具有如下特点:利用同步技术,能有效对抗音频信号受到的随机裁剪攻击;水印序号的嵌入,能使检测到的水印信息自动定位在图像上.仿真实验表明,该算法在抵抗加性噪声和裁剪攻击等方面达到了较高的鲁棒性.  相似文献   

12.
重车重心限制高度是我国铁路基本技术标准之一,起着指导现场装车、保障行车安全的重要作用.本文分析了影响货物列车安全运行的因素,给出衡量车辆倾覆稳定性的主要指标,并论述了双层集装箱重车重心高度运行试验,遂渝线提速综合试验及胶济线列车交会试验的试验方案和试验过程.在分析试验数据的基础上,得出了双层集装箱重车重心高度为2400mm时能够保证行车安全的结论.此外,根据敞车、平车和棚车等主要车型在环形试验线和运营线路上进行的重车重心高度试验,分析了敞车和平车重车重心高度设置为2400mm、棚车重车重心高度设置为2200mm时的运行稳定性和平稳性的要求.  相似文献   

13.
如何有效利用高速公路视频图像信息,实时全天候自动智能检测交通事件,提升交通管理部门应急处置能效,是当前公路视频监控亟需解决的问题.本文基于视频图像处理技术,开展交通事件自动识别算法和系统的研究:采用中值滤波、亮度缩放等图像预处理方法,提取交通视频图像的前景目标边界并抑制噪声;基于灰度阈值化方法,对车辆前景进行二值化分割处理;提出一种二值化场景图像连通区域标定算法,对交通事件前景目标进行特征提取与检测识别,并基于上述算法和识别流程开发了交通事件视频自动识别系统.试验表明,该系统对噪声干扰抑制能力较强,识别准确率较高.  相似文献   

14.
激光光斑中心精确定位是铁路路基表面沉降视觉测量系统的关键技术,关系沉降测量的精度.分析了铁路路基表面沉降视觉测量的基本原理,结合激光光斑图像的特点,在以光斑轮廓邻域的灰度分布进行曲面建模的基础上提出基于曲面拟合的光斑亚像素中心定位方法,并通过实验验证了该方法光斑中心定位精度优于常用的基于重心灰度分布曲线拟合法,定位精度高且鲁棒性好,达到了铁路路基沉降观测精度的要求.  相似文献   

15.
采取集中式处理技术对大规模公交信息进行处理时,传输与运算耗时长,不利于实现公交信息实时发布的需求。相比之下,公交车载智能终端可以针对单车信息进行独立感知与挖掘。由此构建基于分布式处理技术的公交信息感知与挖掘系统框架,包括公交车载智能终端、公交信息服务平台、公交调度中心三大模块。进而明确系统实施流程,并探讨公交信息挖掘软件的信息映射模型。由于分布式处理技术下的公交车载智能终端与调度中心可联网共享及交互信息,因此该系统除了实现公众信息实时发布之外,还能为交通部门的公交优先管制技术提供基础数据支撑。  相似文献   

16.
为解决单一形态学算子在LiDAR数据滤波中的准确性和自动识别问题,提出了一种融合序列形态学算子的城区LiDAR滤波方法.在顾及多种形态学算子优势互补特性和LiDAR不同地物数据特点的基础上,首先利用形态学开运算及白top-hat变换剔除低粗差噪声和树木、汽车、电力线等小型地物,然后利用形态学梯度查找大型建筑物边缘,最后利用连通性分析和二值形态学重建方法剔除大型建筑物,获得准确的地面与地物分类点.使用ISPRS提供的不同复杂度9组城区测试数据进行实验,结果表明,本文方法的Ⅰ类、Ⅱ类及总误差均值分别达到6.90%、3.33%和5.44%,整体分类与自动识别性能优于常规滤波算法.   相似文献   

17.
Fragile watermarking is a method to verify the integrity and authenticity of multimedia data. A new fragile watermark for image was proposed, which can be used in image verification applications. The paper first described the above two techniques, some of which will be used in the method. Then it described the embedding and authentication process and also analyzed the method to show how it can survive some attacks. The experimental results show that the proposed method doesn‘t need the watermark or original image on authentication side. It provides more security against attack, and can localize where the temoerinlz has occurred.  相似文献   

18.
19.
一种多类多水印方案   总被引:2,自引:1,他引:2  
通过分析多类多水印的特点,讨论了多类多水印的技术难点,提出一种基于小波系数分块嵌入水印的解决方案,将各类型水印归一化处理,但对每种水印单独制定自适应嵌入技术,实现3种类型7个水印的同时隐藏.仿真实验证明了该方案的有效性.  相似文献   

20.
IntroductionTraditional solutions for the integrity protec-tion of web pages are based on the File Digest tech-niques, usually called Digital Signatures[1]. Suchmethods generate a signature through Hash func-tions with the to-be-protected information as theinput and then attach it to the end of the originalinformation to form the signed message. When thesigned message arrives at the receiver, the correctsignature can ensure its integrity; in other words,no signature or a false one means that…  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号