Description: 提出了一种离散小波变换域实现图像水印的方法。这种算法充分利用小波变换的特点,把原始图像及水印图像塔式分解,在多分辨率分解后的相同的频段来嵌入水印信息。该方法也利用了人眼视觉特性,算法简单而有效。实验证明,该算法较好地解决了水印不可见性与鲁棒性之间的矛盾,对常见的水印攻击都有较强的鲁棒性。-presents a discrete wavelet transform domain image watermarking method. This algorithm using wavelet transform characteristics, the original image and the watermark image tower decomposition, Multiresolution decomposition in the same frequency band to the embedded watermark. The method has also been used HVS, the algorithm is simple and effective. Experiments show that the algorithm can solve the watermark is visible with the robust nature of, common to have more attacks watermark robustness. Platform: |
Size: 151372 |
Author:yy |
Hits:
Description: 提出了一种离散小波变换域实现图像水印的方法。这种算法充分利用小波变换的特点,把原始图像及水印图像塔式分解,在多分辨率分解后的相同的频段来嵌入水印信息。该方法也利用了人眼视觉特性,算法简单而有效。实验证明,该算法较好地解决了水印不可见性与鲁棒性之间的矛盾,对常见的水印攻击都有较强的鲁棒性。-presents a discrete wavelet transform domain image watermarking method. This algorithm using wavelet transform characteristics, the original image and the watermark image tower decomposition, Multiresolution decomposition in the same frequency band to the embedded watermark. The method has also been used HVS, the algorithm is simple and effective. Experiments show that the algorithm can solve the watermark is visible with the robust nature of, common to have more attacks watermark robustness. Platform: |
Size: 151552 |
Author:yy |
Hits:
Description: 提出了一种基于小波域的图像数字水印算法·该算法将相互正交的两种水印(鲁棒水印和参考
水印)同时添加到经过DWT后的载体图像小波系数中,然后用小波反变换得到添加了水印的图像·用提取出
的参考水印来估计图像所受到的攻击,由于提取出的鲁棒水印所受的攻击与参考水印受到的攻击一样,因此
可以估计出原始的鲁棒水印·通过对嵌入水印的图像进行加入噪声、滤波、压缩以及裁剪等大量图像处理等试
验,均能正确检测出水印,表明该算法具有很好的感知效果和鲁棒性
-A wavelet-based image digital watermarking algorithm that the algorithm will be mutually orthogonal two watermarks (watermark robust watermarking and reference) at the same time added to the carrier after image after DWT wavelet coefficients, and then using wavelet transform has been Add a watermark image to use to extract a reference to estimate the watermark image by the attacks, as a result of the robust watermark extracted suffered attacks and the reference watermark by the same attack, it can be estimated through the original Robust Watermarking of the embedded watermark image by adding noise, filtering, compression and cutting, such as a large number of image processing such as testing, can correctly detect the watermark, show that the algorithm has good performance and robustness of perception Platform: |
Size: 190464 |
Author:李倩 |
Hits:
Description: research on against geometry attacks watermarking technology. A digital Watermarking scheme, which is based on combination of simple and reliable harries detector and image normalization, is proposed. The feather points remain holding after geometry attack. Applying image normalization to these non-overlapped circles which centered at the feature points, after that, we can determine area for watermark embedding. -research on against geometry attacks watermarking technology. A digital Watermarking scheme, which is based on combination of simple and reliable harries detector and image normalization, is proposed. The feather points remain holding after geometry attack. Applying image normalization to these non-overlapped circles which centered at the feature points, after that, we can determine area for watermark embedding. Platform: |
Size: 1024 |
Author:xiaxianming |
Hits:
Description: 出了一种基于近邻插值取样法的自适应奇检测彩色图像水印算法.该算法利用近邻插值取样法,根据载体图像的
大小,自适应调节二值水印图像的尺寸,经ArnoM置乱预处理后,嵌入到彩色载体图像蓝色分量的Dcr高频系数中,检测时不需要
原载体图像.实验表明,该算法具有较强的鲁棒性和良好的不可感知性,可有效低抗剪切、加噪、锐化等常见的图像攻击.-Out of a neighbor-based interpolation of the adaptive sampling method detection singular color image watermarking algorithm. Neighbor interpolation algorithm uses the sampling method, in accordance with the size of vector images, adaptive binary watermark image of size, by scrambling ArnoM after pretreatment embedded into the color vector image of blue high-frequency component coefficient Dcr detected when do not need the original vector image. The experiments show that the algorithm has strong robustness and good can not be perceived, effectively low-shear, noise, sharpening and other common image attacks. Platform: |
Size: 265216 |
Author:manyhappy |
Hits:
Description: 本文提出了基于二维混沌映射的数字图像水印算法,混沌具有随机性、似噪声及对初始条件的极端敏感性等特点。将经过二维混沌映射置乱后的数字水印信号嵌入图像小波域的低频系数,实现了数字水印的隐蔽性、保密性和稳固性;利用二维混沌映射Arnold变换对水印信号进行置乱,不仅增强了水印信号保密性,同时有效提高了视觉上抵抗图像剪切攻击的能力。-In this paper, two-dimensional chaotic map based on digital image watermarking algorithm, Chaos with random noise and the likelihood of extreme sensitivity to initial conditions and so on. Two-dimensional chaotic map will be scrambling after the digital watermark embedded image signal of the low-frequency coefficients in wavelet domain, the realization of a digital watermark hidden, security and stability the use of two-dimensional chaotic map on Arnold transform scrambling watermark signal, not only enhances the confidentiality of the watermark signal at the same time improve the visual image shear resistance attacks. Platform: |
Size: 668672 |
Author:lafeng |
Hits:
Description: 这个水印一般般利用DWT变换和DCT变换嵌入水印,加上了Arnold变换使图片水印的抗MP3压缩攻击有所提高。-The watermark in general as the use of DWT transform and DCT transform embedded watermark, coupled with the Arnold transform to image watermarking against MP3 compression attacks increased. Platform: |
Size: 1024 |
Author:小王 |
Hits:
Description: 提出一种基于支持向量机( SVM)和遗传算法(GA)的离散余弦变换(DCT)域盲数字图像水印方法. 该方法能自适应于图像的局部特征. 依据图像块的局部特性,利用SVM对图像块分类,自适应地确定水印嵌入强度, GA用来优化水印嵌入位置. 实验结果表明该方法有较好的不可见性和较强对抗攻击的鲁棒性.-Based on support vector machine (SVM) and genetic algorithm (GA), discrete cosine transform (DCT) domain blind digital image watermarking method. The method adaptive to local image features. Based on the local characteristics of image block using the SVM the image block classification, adaptive to determine the embedding strength, GA to optimize the watermark embedding location. The experimental results show that the method has good invisibility and robustness of the strong against the attacks. Platform: |
Size: 449536 |
Author:郭事业 |
Hits:
Description: Abstract—Based on the observation that low-frequency DCT
coefficients of an image are less affected by geometric processing,
we propose a new blind MPEG-2 video watermarking algorithm
robust to camcorder recording. Both the embedding and
extraction of the watermarks are done in the compressed domain.
The mean of the low-frequency DCT coefficients of the video is
temporally modulated according to the information bits. To
reduce complexity, we embed watermark in the prediction error
signals of the B-frames. Experimental results show that the
proposed scheme achieves high video quality and robustness to
camcorder recording, trans-coding, frame-rate conversion, and
geometric attacks on common test videos. Platform: |
Size: 136192 |
Author:lie |
Hits:
Description: 提出了一种可抗
几何攻击的二值文本图像水印算法. 该算法基于DCT,它将二值图像的DCT、图像的视觉特征向
量和加密技术有机结合起来,在提取水印时不需要原始图像,是一种实用的盲水印算法-We propose a geometric attacks against Binary Text Watermarking Algorithm. The algorithm is based on DCT, it binary image DCT, the image of the visual feature vector and encryption technology combine in the watermark without the original image is a practical blind watermarking algorithm Platform: |
Size: 1190912 |
Author:切尔西 |
Hits:
Description: 盲水印提取时不需要参考原始载体图像,在信息隐藏、版权保护等方面具有更广泛的应用前景。提出的盲水印算法在分块离散余弦变换(DCT)和离散小波变换(DWT)的基础上,利用关系双方DCT系数和DWT系数在受到攻击时具有相同变化趋势的特点,采用关系嵌入和量化嵌入的自适应选择嵌入策略,较大幅度地提高了盲水印提取的鲁棒性。同时在量化嵌入中采用抖动调制,实现了水印透明性和鲁棒性调节的便捷性。大量仿真实验结果表明该算法对噪声干扰、低通滤波、JPEG压缩、对比度增强等攻击有很好的鲁棒性和透明性。关键词 数字水印盲水印关系嵌入量化嵌入离散余弦变换离散小波变换
按这篇文章的算法,自己编的matlab,没有攻击时水印提取率为1,加水印后图像PSNR有45+,。有攻击后提取率也有0.9+。-Blind watermark extraction can be fulfilled without referring to the original host image. Therefore it hasmuch
prospective applications in the fields of information hiding and copyright protection. Based on blocking Discrete Cosine
Transform (DCT) and blocking DiscreteWaveletTransform (DWT), the proposed blind watermarking algorithm uses an
embedding strategy of adaptively selecting either relationship embedding or quantization embedding. The relationship em-
bedding comes from the observation thatboth themagnitudes of coefficients concerned in the relationship usually have thesame change trend when the image is attacked. This strategy remarkably improves the robustness ofwatermark extraction.In addition, dithermodulation is used in quantization embedding, bywhich the tradeoff between transparency and robus-tness ofwatermarking can be easily adjusted. Simulation results show that the algorithm is fairly robust against the attacks such as noise, filtering, compression, and contrast Platform: |
Size: 758784 |
Author:CXF |
Hits:
Description: A digital image watermarking scheme must be robust against a
variety of possible attacks. In the proposed approach, a new
rotation and scaling invariant image watermarking scheme is
proposed based on rotation invariant feature and image
normalization. The rotation invariant features are extracted
from the segmented areas and are selected as reference points.
Sub-regions centered at the feature points are used for
watermark embedding and extraction. Image normalization is
applied to the sub-regions to achieve scaling invariance. In the
scheme, first, the image is segmented into a number of
homogeneous regions and the feature points are extracted. Then
the circular regions for watermark embedding or extraction are
defined. Based on the image normalization and orientation
assignment, the rotation, scaling, and translation invariant
regions can be used for watermark embedding and extraction. Platform: |
Size: 1475584 |
Author:prasannakumar |
Hits:
Description: 基于RS码的图像水印,通过对要嵌入图像的水印进行RS码加密,提高水印的抗攻击能力。程序包含对水印图像的RS码加密解密,水印的嵌入和提取和水印抗攻击鲁棒性的检测。-RS code based image watermarking, through the embedded image watermark to RS code encryption, watermarking improve anti-attack capability. Program contains the watermark image RS code encryption and decryption, watermark embedding and watermark extraction and detection robustness against attacks. Platform: |
Size: 365568 |
Author:王晗迤 |
Hits:
Description: A new method of video scene content characteristic detection is proposed. This method
can be applied in conjunction with digital watermarking schemes in order to improve the
transparency. In addition, new methods of video watermarking are also proposed. Three related
original aspects are reported. First, the authors’ previous robust image watermarking methods,
which consider the block texture are extended into video. In the detection process, watermark
extraction with or without the original frame is provided. Secondly, a method is proposed to
improve imperceptibility by reducing the flickering effect. Finally, a method is introduced to detect
video scene characteristics in order to suit the particular embedding scheme. By doing so, the
embedding method can be chosen adaptively in accordance with the video scene. The subjective
tests illustrate an imperceptibility improvement and experiments with various attacks show the
watermarking robustness.
Platform: |
Size: 505856 |
Author:atefe |
Hits:
Description: This paper proposes new watermarking technique
based on tetrolet domain. The tetrolet transform is a new
adaptive Haar-type wavelet transform based on tetrominoes. It
avoids Gibbs oscillation because it applies the Haar function at
the edge of the image. Our proposed watermarking algorithm
embeds the watermark into the tetrolet coefficients which are
selected by considering different of shapes tetrominoes. We
uated the effectiveness of the watermarking approach by
considering the quality metrics like RMSE, PSNR and
Robustness parameters. The experimental results reveal that the
proposed watermarking scheme is robust against common image
processing attacks. Platform: |
Size: 495616 |
Author:Naga Kishore |
Hits:
Description: This paper proposes new watermarking technique based on Tetrolet domain. The Tetrolet transform is a new adaptive Haar-type wavelet transform based on tetrominoes. It avoids Gibbs oscillation because it applies the Haar function at the edge of the image. Our proposed watermarking algorithm embeds the watermark into the Tetrolet coefficients which are selected by considering different shapes of tetrominoes and uated the effectiveness of the watermarking approach by considering the quality metrics like RMSE, PSNR and Robustness parameters. The experimental results reveal that the proposed watermarking scheme is robust against common image processing attacks.-This paper proposes new watermarking technique based on Tetrolet domain. The Tetrolet transform is a new adaptive Haar-type wavelet transform based on tetrominoes. It avoids Gibbs oscillation because it applies the Haar function at the edge of the image. Our proposed watermarking algorithm embeds the watermark into the Tetrolet coefficients which are selected by considering different shapes of tetrominoes and uated the effectiveness of the watermarking approach by considering the quality metrics like RMSE, PSNR and Robustness parameters. The experimental results reveal that the proposed watermarking scheme is robust against common image processing attacks. Platform: |
Size: 1816576 |
Author:shaik |
Hits:
Description: An additive image watermarking based on SPSO and fitness function, with filters and multiple attacks Platform: |
Size: 10070016 |
Author:DJCHDUILK |
Hits:
Description: 基于数字音频水印的dwt变换,程序代码。包含嵌入提取攻击等相关内容,程序稳定可靠便于使用。主要用于对于图像水印的安全保护。-Digital audio watermarking based on DWT transform, the program code. Contains embedded extraction attacks and other related content, the program is stable and reliable and easy to use. Mainly used for security protection of image watermark. Platform: |
Size: 318464 |
Author:海 |
Hits:
Description: Watermarking is an operation of embedding infor-
mation into an image in a way that allows to identify ownership
of the image despite applying some distortions on it. In this
paper, we present a novel end-to-end solution for embedding and
recovering the watermark in the digital image using convolutional
neural networks. We propose a spreading method of the message
over the spatial domain of the image, hence reducing the local
bits per pixel capacity and significantly increasing robustness. To
obtain the model we use adversarial training, apply noiser layers
between the encoder and the decoder, and implement a precise
JPEG approximation. Moreover, we broaden the spectrum of
typically considered attacks on the watermark and we achieve
high overall robustness, most notably against JPEG compression,
Gaussian blur, subsampling or resizing. We show that an appli-
cation of some attacks could increase robustness against other
non-seen during training distortions across one group of attacks
— a proper grouping of the attacks according to their scope
allows to achieve high general robustness Platform: |
Size: 774757 |
Author:bamzi334 |
Hits: