首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Active tamper detection using watermarking technique can localize the tampered area and recover the lost information. In this paper, we propose an approach that the watermark is robust to legitimate lossy compression, fragile to malicious tampering and capable of recovery. We embed the watermark bits in the direct current value of energy concentration transform domain coefficients. Let the original watermark bits be content dependent and apply error correction coding to them before embedded to the image. While indicating the tampered area, the extracted bits from a suspicious image can be further decoded and then used to roughly recover the corresponding area. We also theoretically study the image quality and bit error rate. Experimental results demonstrate the effectiveness of the proposed scheme.  相似文献   

2.
图像技术的发展,使其成为图像篡改的双刃剑.如何对已篡改的图像进行数字取证成为当前研究热点之一.本文对基于JPEG特性的图像被动取证技术进行分析,根据JPEG图像被动取证技术中不同算法所选用的特征量,将现有的技术方法分为两类:针对JPEG重压缩的被动取证和针对JPEG重采样的被动取证.详细分析了上述两类方法各自的特点及对应的优缺点,指出当前基于JPEG特性的图像被动取证的技术的不足之处,并对相关技术的未来发展方向进行了展望.  相似文献   

3.
为了实现音频文件的完整性认证,提出了一种基于内容的脆弱水印算法.对于一维序列,改变其离散余弦变换(DCT)域交流系数不会改变该序列的幅值和.基于这一性质,在音频分帧后,再对每帧分组,计算每组采样点和的绝对值,相加后得到该帧的和,将其作为该帧音频的特征,量化后转换为二进制作为水印;然后,用量化索引调制方法,通过调整每组DCT域的低频系数嵌入水印.实验表明:该算法具有很好的不可感知性;得到的含水印音频的信噪比约为80 dB;算法对添加噪声、重量化、重采样、低通滤波、MP3压缩等操作具有很强的敏感性,并且能够确定替换等恶意篡改的位置.  相似文献   

4.
Introduction Block-based discrete cosine transform(BDCT) is considered to be a basic tool in bothstill and moving image compression standards,such as JPEG, H.261/263, and MPEG, owing toits near-optimal energy compaction property andmoderate hardware complexity. However, sinceeach N×N block is coded independently, the re-constructed images would exhibit annoying discon-tinuities along block boundaries at low bit rate,which are often referred to as the“blocking arti-facts”in the transfo…  相似文献   

5.
为了实现对高精度图像进行高效压缩,同时确保重建图像的弱目标区域有较好的保真效果,提出了一种提升弱目标区域质量的基于误差优化编码的高精度图像压缩算法. 首先,使用JPEG-LS (joint photographic experts group lossless)压缩算法对图像数据进行压缩,在游程编码过程中自适应地选择需要二次编码的误差数据,并完成了基于视觉质量的非均匀量化;其次,对量化值进行数据分解,去除量化值之间的相关性,并对分解后的数据进行MQ算术编码的熵编码;图像重建时根据量化间隔重建反量化值,并设计了反量化优化和滤波优化过程;最后,将本文算法与JPEG-LS、JPEG2000 (joint photographic experts group 2000)算法进行了性能比较,结果表明:本算法能够实现高精度图像数据的高效压缩,且复杂度低,易于硬件实现,虽然引入了误差数据二次优化编码等过程,但增加编码的数据量较小,故与JPEG-LS算法的压缩速度相当,然而比JPEG2000算法的压缩速度提升4.47倍;同时有效减少了常规算法造成的信息损失,重建图像的峰值信噪比与JPEG-LS、JPEG2000相当或略低,但弱目标区域的视觉质量及保真效果更好.   相似文献   

6.
介绍了JPEG图像压缩算法,并对含有噪声的数字图像去除相关性差的问题,提出了先滤波再进行JPEG压缩的方法。在Matlab数学分析工具环境下仿真了该算法。实验结果表明,在图像客观保真度优于经典JPEG压缩方法的情况下,也能减小平均码长。同时也体现了Matlab用来实现JPEG的图像编解码过程,具有方法简单、速度快和误差小的优点。  相似文献   

7.
Introduction TheInternetandtheadvancementofdigital technologieshaveenablednumerousapplicationsin theareasofmultimediacommunicationsandmulti-medianetworking.Atypicalcharacteristicofdigi-talproductsisthattheyareeasytomanipulate,i.e.tostore,duplicate,transmitormodify.Thus,theauthenticationandthecopyrightprotec-tionfromunauthorizedmanipulationofdigitalau-dio,image,andvideodatabecomeanessential concerninthedigitalmultimediaera[1].Digitalwa-termarkinghasattractedconsiderableattentionand seennumerou…  相似文献   

8.
DWT-Based Robust Color Image Watermarking Scheme   总被引:1,自引:0,他引:1  
A scheme of embedding an encrypted watermark into the green component of a color image is proposed. The embedding process is implemented in the discrete wavelet transformation (DWT) domain, The original binary watermark image is firstly encrypted through scrambling technique, and then spread with two orthogonal pseudo-random sequences whose mean values are equal to zero, and finally embedded into the DWT low frequency sub-band of green components, The coefficients whose energies are larger than the others are selected to hide watermark, and the hidden watermark strength is determined by the energy ratio between the selected coefficients energies and the mean energy of the subband. The experiment results demonstrate that the proposed watermarking scheme is very robust against the attacks such as additive noise, low-pass filtering, scaling, cropping image, row (or column ) deleting, and }PEG compression.  相似文献   

9.
针对人脸识别系统中人脸图像数据可能受到攻击,导致人脸图像被恶意添加、替换、篡改等安全隐患,采用脆弱数字水印方法,解决上述人脸识别系统中人脸图像数据安全问题.用人脸原始图像的小波低频系数的高7位生成低频压缩图像,作为水印.通过混沌置乱加密,将水印直接嵌入到原始人脸图像的最低有效位平面,区分人脸图像篡改并定位检测.实验结果表明,采用脆弱数字水印的人脸图像对恶意添加、替换、篡改都有很高的敏感度.嵌入脆弱数字水印对人脸图形的特征提取的识别率以及识别速度的影响都很小.  相似文献   

10.
提出了一种利用离散余弦变换(Discrete Cosine Transform,DCT)系数和混沌系统的可用于检测图像篡改定位的脆弱性数字水印算法.首先将图像进行不重叠的分块,分块后的图像经过DCT变化后,利用中频系数产生水印.同时利用混沌系统构成图像块间信息嵌入和提取的对应关系,并将水印嵌入到相关块的最低有效位.图像篡改检测过程为:将提取的水印和生成的水印进行比较,通过差异的位置对其进行定位.实验结果显示,该算法具有良好的定位精度,混沌系统的采用,使算法具有较高的安全性.  相似文献   

11.
以JPEG2000静态数字图像压缩标准原理为基础,对影响JPEG2000压缩图像的参数如压缩率、tile大小、DWT以及JPEG2000压缩过程进行分析,然后通过对比已有的实验结果,分析了压缩参数对数字水印算法的影响.  相似文献   

12.
A new robust watermarking approach was proposed in 2D continuous wavelet domain (CWT).The watermark is embedded into the large coefficients in the middle band of wavelet transform modulus maxima (WTMM) of the host image.After possible attacks,the watermark is then detected and extracted by correlation analysis.Compared with other wavelet domain watermarking approaches,the WTMM approach can endow the image with both rotation and shift invariant properties.On the other hand,scale invariance is achieved with the geometric normalization during watermark detection.Case studies involve various attacks such as shifting,lossy compression,scaling,rotation and median filtering on the watermarked image,and the result shows that the approach is robust to these attacks.  相似文献   

13.
交通图像处理系统需要存储或上传非正常交通状况的图像,而图像数据量大难以存储或上传,对此本文设计了一种基于FPGA的交通图像压缩系统.针对交通图像压缩的特点,采用算法复杂度相对较低的JPEG算法,并对算法进行并行化处理,使系统内各个模块并行运行,增强了系统的实时性;采用两个基于Loeffler快速算法的一维DCT变换(1D DCT)模块实现二维DCT变换(2D DCT),并在对大量交通图像进行实验的基础上给出一套适合交通图像压缩同时适合FPGA处理的量化表,大大降低了系统对FPGA资源的占用.外场实验分析表明,系统工作稳定,压缩图像质量好,压缩比较高,实时性强,对分辨率为720×576的彩色图像具有30帧/s的处理能力,可以作为交通图像处理系统的重要组成模块.  相似文献   

14.
为了解决压缩图像质量与容积的矛盾,尤其当需要对图像采用大压缩比的情况下,使得压缩图像的视觉效果更好,提出了一种多级感兴趣区域编码方法.该方法首先对所要压缩的图像进行重要性划分,然后通过对划分的不同区域采用不同的压缩比,满足了人们对不同区域的不同压缩质量要求,得到了令人满意的图像压缩质量.  相似文献   

15.
基于DCT-SVD的抗几何攻击图像水印算法   总被引:1,自引:0,他引:1  
针对DCT域的最优均值量化盲水印算法抵抗剪切、旋转、缩放等几何攻击的能力不强,给出了一种DCT-SVD图像水印算法.该算法利用奇异值具有几何不变性,使算法具有较好抗几何攻击性能.实验结果表明,该算法对加噪、JPEG压缩、滤波、几何攻击等多种攻击都具有很强的鲁棒性.  相似文献   

16.
为降低H.264/AVC帧内预测计算复杂度,提出了基于频域特征的快速帧内编码模式预测算法.首先,对要编码的4×4块进行DCT变换,得到少数的几个DCT系数.然后,通过这几个系数计算块的特征方向和方差.最后,根据特征方向和方差计算最可能的几种预测模式.实验验证了该算法在不牺牲图像质量和压缩效率的基础上将帧内预测的计算复杂度平均降低了67.5%.  相似文献   

17.
Novel Blind Robust Watermarking Based on Chaotic Mixing   总被引:1,自引:0,他引:1  
This paper proposed a novel blind robust watermarking scheme. Multi-bits watermark is embedded in the chaotic mixed image blocks. Energy of the watermark is spread to all region of the blocks instead of some individual pixels, which entitles the watermark with imperceptibility and high robustness. A class of 1-D Markov chaotic maps is employed to perform image block mixing and watermark encryption ensures security of the system.To prove the validity of this proposed scheme, some objective comparisons with the popular spread spectrum scheme were also presented. The simulation results show that this scheme can survive processing such as high-ratio JPEG compression, Gaussian noise pollution and histogram equalization.  相似文献   

18.
THESIGNIFICANCEOFDERMATOMALSOMATOSENSORYEVOKEDPOTENTIALSINTHEDIAGNOSISOFLUMBOSACRALNERVEROOTCOMPRESSION(李辉)(陈君长)(王坤正)(贺西京)(鱼全...  相似文献   

19.
A novel semi-fragile watermarking scheme for the content authentication of images using wavelet transform (WT) is presented in this paper. It is tolerant to the embedded wavelet image compression methods based on WT such as embedded zerotree wavelet (EZW), set partitioning in hierarchical trees (SPIHT) and embedded block coding with optimized truncation (EBCOT) in JPEG2000 to a pre-determined bit-plane, but is sensitive to all other malicious attacks. The image features are generated from the lowest-frequency (LF) subband of the original image as the embedded watermark. The watermark is embedded into the pre-determined bit-plane by adjusting the corresponding values in the given subband. In the process of watermarking authentication, we compare the image features generated from the LF subband of the received image with the embedded watermarking information (the image features of the original image) extracted from the pre-determined bit-plane in the given subband of the received image to decide whether the image is attacked maliciously or processed acceptably (the embedded wavelet compression). The most important advantage of our watermarking scheme is that the watermark information can be extracted from the watermarked image when detecting watermark, so the received image authentication needs no information about the original image or watermark. Experimental results prove the effectiveness of our proposed watermarking scheme.  相似文献   

20.
A novel adaptive illumination normalization approach is proposed to eliminate the effects caused by illumination variations for face recognition. The proposed method divides an image into blocks and performs discrete cosine transform (DCT) in blocks independently in the logarithm domain. For each block-DCT coefficient except the direct current (DC) component, we take the illumination as main signal and take the reflectance as “noise”. A data-driven and adaptive soft-thresholding denoising technique is employed in each block-DCT coefficient except the DC component. Illumination is estimated by applying the inverse DCT in the block-DCT coefficients, and the indirectly obtained reflectance can be used in further recognition task. Experimental results show that the proposed approach outperforms other existing methods. Moreover, the proposed method does not need any prior information, and none of the parameters can be determined by experience.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号