首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
分析了现有算法的缺陷,提出了一种能有效区分图像内容或水印篡改的自恢复安全脆弱水印算法.该方案利用检测水印实现篡改定位和篡改区分的功能,采用恢复水印恢复被篡改的图像内容.理论分析和实验仿真均表明,所提出的算法具有很好的篡改区分、篡改定位和篡改恢复的能力,能够抵抗同步伪造攻击和密钥分析攻击.  相似文献   

2.
为了实现音频文件的完整性认证,提出了一种基于内容的脆弱水印算法.对于一维序列,改变其离散余弦变换(DCT)域交流系数不会改变该序列的幅值和.基于这一性质,在音频分帧后,再对每帧分组,计算每组采样点和的绝对值,相加后得到该帧的和,将其作为该帧音频的特征,量化后转换为二进制作为水印;然后,用量化索引调制方法,通过调整每组DCT域的低频系数嵌入水印.实验表明:该算法具有很好的不可感知性;得到的含水印音频的信噪比约为80 dB;算法对添加噪声、重量化、重采样、低通滤波、MP3压缩等操作具有很强的敏感性,并且能够确定替换等恶意篡改的位置.  相似文献   

3.
针对人脸识别系统中人脸图像数据可能受到攻击,导致人脸图像被恶意添加、替换、篡改等安全隐患,采用脆弱数字水印方法,解决上述人脸识别系统中人脸图像数据安全问题.用人脸原始图像的小波低频系数的高7位生成低频压缩图像,作为水印.通过混沌置乱加密,将水印直接嵌入到原始人脸图像的最低有效位平面,区分人脸图像篡改并定位检测.实验结果表明,采用脆弱数字水印的人脸图像对恶意添加、替换、篡改都有很高的敏感度.嵌入脆弱数字水印对人脸图形的特征提取的识别率以及识别速度的影响都很小.  相似文献   

4.
IntroductionTraditional solutions for the integrity protec-tion of web pages are based on the File Digest tech-niques, usually called Digital Signatures[1]. Suchmethods generate a signature through Hash func-tions with the to-be-protected information as theinput and then attach it to the end of the originalinformation to form the signed message. When thesigned message arrives at the receiver, the correctsignature can ensure its integrity; in other words,no signature or a false one means that…  相似文献   

5.
针对当前数字图像被购买者随意的散播、修改,而造成的版权问题,提出了一种空域水印认证算法,即使水印信息被篡改,也能够修复水印信息.该算法将购买者的信息以水印的形式嵌入到数字作品中,随着水印的恢复,可以找出参与了非法拷贝的买主的信息.  相似文献   

6.
提出一种基于水印序号的抗裁剪音频数字水印算法.该算法在音频信号中嵌入同步码、水印序号和二值水印图像,具有如下特点:利用同步技术,能有效对抗音频信号受到的随机裁剪攻击;水印序号的嵌入,能使检测到的水印信息自动定位在图像上.仿真实验表明,该算法在抵抗加性噪声和裁剪攻击等方面达到了较高的鲁棒性.  相似文献   

7.
Fragile watermarking is a method to verify the integrity and authenticity of multimedia data. A new fragile watermark for image was proposed, which can be used in image verification applications. The paper first described the above two techniques, some of which will be used in the method. Then it described the embedding and authentication process and also analyzed the method to show how it can survive some attacks. The experimental results show that the proposed method doesn‘t need the watermark or original image on authentication side. It provides more security against attack, and can localize where the temoerinlz has occurred.  相似文献   

8.
A novel semi-fragile watermarking scheme for the content authentication of images using wavelet transform (WT) is presented in this paper. It is tolerant to the embedded wavelet image compression methods based on WT such as embedded zerotree wavelet (EZW), set partitioning in hierarchical trees (SPIHT) and embedded block coding with optimized truncation (EBCOT) in JPEG2000 to a pre-determined bit-plane, but is sensitive to all other malicious attacks. The image features are generated from the lowest-frequency (LF) subband of the original image as the embedded watermark. The watermark is embedded into the pre-determined bit-plane by adjusting the corresponding values in the given subband. In the process of watermarking authentication, we compare the image features generated from the LF subband of the received image with the embedded watermarking information (the image features of the original image) extracted from the pre-determined bit-plane in the given subband of the received image to decide whether the image is attacked maliciously or processed acceptably (the embedded wavelet compression). The most important advantage of our watermarking scheme is that the watermark information can be extracted from the watermarked image when detecting watermark, so the received image authentication needs no information about the original image or watermark. Experimental results prove the effectiveness of our proposed watermarking scheme.  相似文献   

9.
We investigate the lightweight block cipher KATAN family which consists of three variants with 32, 48 and 64-bit block sizes, called KATAN32, KATAN48 and KATAN64 respectively. However, three variants all have the same key length of 80 bits. On the basis of the bit-oriented faulty model and the differential analysis principle, we describe the attack that combines differential fault attack with the meet-in-the-middle (MITM) attack on the KATAN32. More precisely, inducing a fault at a bit, we can recover some linear differential fault equations on the key bits. During solving equations, without the help of computer, we need only algebraic deduction to obtain relations of some key bits. The complexity in this process is neglectable. The secret key of the full cipher can be recovered faster than exhaustive search for all three block sizes in the KATAN family. Our result describes that KATAN32 is vulnerable.  相似文献   

10.
IntroductionBlock truncation coding( BTC) [1] is a simple andfast lossy image coding technique,which has theadvantage of being easy to implement comparedto transform coding and vector quantization[2 ] .Its simplicity,performance and channel error re-sisting capability make it attractive in the real-time image transmission.BTC is a one- bit adap-tive moment- preserving quantizer that preservescertain statistical moments of small blocks of theinput image in the quantized output.The origi-nal …  相似文献   

11.
Novel Blind Robust Watermarking Based on Chaotic Mixing   总被引:1,自引:0,他引:1  
This paper proposed a novel blind robust watermarking scheme. Multi-bits watermark is embedded in the chaotic mixed image blocks. Energy of the watermark is spread to all region of the blocks instead of some individual pixels, which entitles the watermark with imperceptibility and high robustness. A class of 1-D Markov chaotic maps is employed to perform image block mixing and watermark encryption ensures security of the system.To prove the validity of this proposed scheme, some objective comparisons with the popular spread spectrum scheme were also presented. The simulation results show that this scheme can survive processing such as high-ratio JPEG compression, Gaussian noise pollution and histogram equalization.  相似文献   

12.
A new robust watermarking approach was proposed in 2D continuous wavelet domain (CWT).The watermark is embedded into the large coefficients in the middle band of wavelet transform modulus maxima (WTMM) of the host image.After possible attacks,the watermark is then detected and extracted by correlation analysis.Compared with other wavelet domain watermarking approaches,the WTMM approach can endow the image with both rotation and shift invariant properties.On the other hand,scale invariance is achieved with the geometric normalization during watermark detection.Case studies involve various attacks such as shifting,lossy compression,scaling,rotation and median filtering on the watermarked image,and the result shows that the approach is robust to these attacks.  相似文献   

13.
Connectivity-Based Watermarking Robust to Geometrical Attacks   总被引:2,自引:0,他引:2  
Introduction Thegoalofdigitalwatermarkingtechniqueisto embedsomeunnoticeableinformation(calleda mark)inthecontentofmediainordertoprotect copyrightorauthenticateintegralityandverity.Many robustwatermarkingtechniqueshavesuccessfullyre sistednotonlycommonsig…  相似文献   

14.
提出了一种基于小波系数分段的数字水印算法,该算法对常见的图像处理具有一定强度的鲁棒性,并且该算法实现了完全盲检测,水印提取时不需要原始的载体图像,也不需要水印的任何信息,并且提取水印的正确性高.  相似文献   

15.
基于图像连通性的自适应水印同步方案   总被引:2,自引:2,他引:2  
为提高水印的鲁棒性和安全性,提出了基于图像连通性的自适应水印同步方案.该方案根据图像的连通性得到连通对象,选取较大的连通对象的重心作为水印嵌入的参考点.利用图像的连通性具有拓扑不变性以及图像的重心比较稳定的特性保证水印检测的自适应同步.用作水印嵌入的参考点的高度稳定性,使得该方案不仅对常见图像处理时,而且对全局和局部几何攻击均呈现了较强的鲁棒性.  相似文献   

16.
DWT-Based Robust Color Image Watermarking Scheme   总被引:1,自引:0,他引:1  
A scheme of embedding an encrypted watermark into the green component of a color image is proposed. The embedding process is implemented in the discrete wavelet transformation (DWT) domain, The original binary watermark image is firstly encrypted through scrambling technique, and then spread with two orthogonal pseudo-random sequences whose mean values are equal to zero, and finally embedded into the DWT low frequency sub-band of green components, The coefficients whose energies are larger than the others are selected to hide watermark, and the hidden watermark strength is determined by the energy ratio between the selected coefficients energies and the mean energy of the subband. The experiment results demonstrate that the proposed watermarking scheme is very robust against the attacks such as additive noise, low-pass filtering, scaling, cropping image, row (or column ) deleting, and }PEG compression.  相似文献   

17.
刊社利用现有微机、激光印字机等设备,再按图像扫描的要求配以适当的软硬件,可构成一套具有文稿扫描识别录入、插图数字化处理、复印、传真、网络通讯等功能的图文扫描系统。选型时要根据扫描仪的光学分辨率、色位数、品牌、价格等因素综合考虑。一般的刊社可根据自身工作量及图像质量要求,以几千元的投资,选配到一套由300或600dpi水平光学分辨率、24或30位色的中档平板扫描仪等构成的系统。为得到比较满意的使用效果,还需弄清分辨率等参数的概念,掌握其设定、控制的基本方法与技巧。  相似文献   

18.
Copy-paste forgery is a very common type of forgery in JPEG images.The tampered patch has always suffered from JPEG compression twice with inconsistent block segmentation.This phenomenon in JPEG image forgeries is called the shifted double JPEG(SDJPEG) compression.Detection of SDJPEG compressed image patches can make crucial contribution to detect and locate the tampered region.However,the existing SDJPEG compression tampering detection methods cannot achieve satisfactory results especially when the tampered region is small.In this paper,an effective SDJPEG compression tampering detection method utilizing both intra-block and inter-block correlations is proposed.Statistical artifacts are left by the SDJPEG compression among the magnitudes of JPEG quantized discrete cosine transform(DCT) coefficients.Firstly,difference 2D arrays,which describe the differences between the magnitudes of neighboring JPEG quantized DCT coefficients on the intrablock and inter-block,are used to enhance the SDJPEG compression artifacts.Then,the thresholding technique is used to deal with these difference 2D arrays for reducing computational cost.After that,co-occurrence matrix is used to model these difference 2D arrays so as to take advantage of second-order statistics.All elements of these co-occurrence matrices are served as features for SDJPEG compression tampering detection.Finally,support vector machine(SVM) classifier is employed to distinguish the SDJPEG compressed image patches from the single JPEG compressed image patches using the developed feature set.Experimental results demonstrate the efficiency of the proposed method.  相似文献   

19.
由于自然场景中目标物体表面的反射特性,以及图像采集过程中的CFA插值算法会使得图像三颜色分量之间具有相关性,特别是颜色分量的高频信息之间有近似相等的关系.拼接篡改操作会降低颜色高频分量的谱间相关性,同时也会给图像带来额外的高频信息.本文利用自然图像颜色通道高频分量之间的相关性,分析颜色差分图像中高频信息的分布情况来检测是否有拼接篡改操作.实验证明本文提取的高频特征分类效果较好,能够检测出图像的拼接篡改边缘.  相似文献   

20.
奇异值分解算法应用于数字水印技术中,把水印信息按位置换,对宿主图像分块并做奇异值分解,在奇异值域做数学变换以重复嵌入按位置换的二值水印信息.实验结果表明,该方法既提高了水印的信息量,同时又使得水印图像具有很强的稳健性,能抵抗旋转和裁剪等多种攻击,水印的保密性与鲁棒性均有显著的提高.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号