Welcome![Sign In][Sign Up]
Location:
Search - blind watermarking dwt

Search list

[DocumentsAdaptive_blind_watermark_algorithm

Description: 一种嵌入可读水印的自适应盲水印算法,  本文提出了一种基于DWT的嵌入可读水印的自适应盲水印算法,通过分析图像经离散小波变换后细 节子带系数的特性,把细节子带系数的均值和方差作为水印信息的一部分来自适应地修改图像小波分解后某些细节 子带的系数值,在满足水印不可感知性的条件下自适应地嵌入水印信息,实现了水印不可感知性和鲁棒性之间的折 衷. 同时,水印的提取无须求助于原图像,很好的实现了水印的盲检测. 这里的水印是一幅有实际意义的二值图像. 实 验结果和攻击测试表明,本文提出的算法对JPEG/ JPEG2000 压缩、添加噪声、剪切、像素移位等多种攻击有较强的鲁棒 性,同时对直方图均衡化、对比度调整和高斯滤波等图像处理操作也具有一定的抵抗能力.-A readable watermark embedding Adaptive Blind Watermarking Algorithm
Platform: | Size: 139264 | Author: wang | Hits:

[Graph programDWT_shuiyin

Description: 提出了一个新的基于量化抖动和模式分组编码的盲数字图像水印算法,该算法首先在DWT(离散小波变换)的第 二层中频子带中随机选取相应位置的绝对值最大的系数作为水印的嵌入区间,对小波系数进行量化并根据分组编码原 理生成预嵌入模式,然后将一个二值水印图像嵌入到模式当中。-Proposed a new model based on quantitative jitter and packet-coded blind digital image watermarking algorithm, the algorithm first DWT (Discrete Wavelet Transform) and second layer of randomly selected sub-band IF the corresponding absolute value of the location of the largest coefficient watermark embedded interval, the wavelet coefficients to quantify and in accordance with principles of generating the pre-embedded block coding mode, and then a binary watermark image embedded in them patterns.
Platform: | Size: 402432 | Author: 刘非 | Hits:

[Audio programaudio-watermark

Description: 音频数字水印的实现,包含源代码,基于量化dct和自适应dwt两种算法,可实现水印的盲取-Audio digital watermarking, and includes source code, based on quantified dct and adaptive dwt two algorithms can achieve the blind watermark to take
Platform: | Size: 1270784 | Author: 洪冰清 | Hits:

[Special EffectsA-Watermarking-Algorithm(MATLAB)--

Description: 盲水印提取时不需要参考原始载体图像,在信息隐藏、版权保护等方面具有更广泛的应用前景。提出的盲水印算法在分块离散余弦变换(DCT)和离散小波变换(DWT)的基础上,利用关系双方DCT系数和DWT系数在受到攻击时具有相同变化趋势的特点,采用关系嵌入和量化嵌入的自适应选择嵌入策略,较大幅度地提高了盲水印提取的鲁棒性。同时在量化嵌入中采用抖动调制,实现了水印透明性和鲁棒性调节的便捷性。大量仿真实验结果表明该算法对噪声干扰、低通滤波、JPEG压缩、对比度增强等攻击有很好的鲁棒性和透明性。关键词 数字水印盲水印关系嵌入量化嵌入离散余弦变换离散小波变换 按这篇文章的算法,自己编的matlab,没有攻击时水印提取率为1,加水印后图像PSNR有45+,。有攻击后提取率也有0.9+。-Blind watermark extraction can be fulfilled without referring to the original host image. Therefore it hasmuch prospective applications in the fields of information hiding and copyright protection. Based on blocking Discrete Cosine Transform (DCT) and blocking DiscreteWaveletTransform (DWT), the proposed blind watermarking algorithm uses an embedding strategy of adaptively selecting either relationship embedding or quantization embedding. The relationship em- bedding comes from the observation thatboth themagnitudes of coefficients concerned in the relationship usually have thesame change trend when the image is attacked. This strategy remarkably improves the robustness ofwatermark extraction.In addition, dithermodulation is used in quantization embedding, bywhich the tradeoff between transparency and robus-tness ofwatermarking can be easily adjusted. Simulation results show that the algorithm is fairly robust against the attacks such as noise, filtering, compression, and contrast
Platform: | Size: 758784 | Author: CXF | Hits:

[Graph program盲水印嵌入提取-已实现

Description: 使用盲数字水印实现DWT ,数字水印的嵌入和提取,小波变换(Using blind digital watermarking to implement DWT)
Platform: | Size: 160768 | Author: nep | Hits:

[Special Effects基于 QR 码的自适应抗打印扫描水印算法

Description: 提出一种基于 QR 码的自适应抗打印扫描盲水印算法。方法 首先对载体 QR 码进行三级小 波变换,并对低频部分进行 4×4 分块 Schur 分解,然后利用子块酉矩阵的系数差值的稳定性,将二值 水印信息自适应嵌入到载体 QR 码中,最后对含水印 QR 码打印扫描并提取出水印信息。同时,算法实 现了盲提取。结果 算法能较好抵抗打印扫描攻击,并对高斯噪声、椒盐噪声、斑纹噪声、泊松噪声、 JPEG 压缩等攻击具有较强的鲁棒性。结论 算法具有较强的抗打印扫描性能,可以广泛应用于数字产品 的版权保护。(An adaptive watermark blind watermarking algorithm based on QR codes is proposed. Methods first of all, the carrier QR code is three levels smaller. Wave transformation and 4 *4 block Schur decomposition of the low frequency part are carried out. Then the binary values are obtained by using the stability of the coefficient difference of the subblock unitary matrix. The watermark information is embedded into the carrier QR code adaptively. Finally, the watermark information is extracted by scanning the watermark QR code. At the same time, the algorithm achieves blind extraction. Results The algorithm can resist the attack of print and scan, and can resist Gaussian noise, salt and pepper noise, speckle noise, Poisson noise. JPEG attacks such as compression have strong robustness. Conclusion the algorithm has strong resistance to print scanning and can be widely used in digital products. Copyright protection.)
Platform: | Size: 4277248 | Author: macowin | Hits:

CodeBus www.codebus.net