首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
扩展频水印技术是一种鲁棒的水印算法 .如何提高扩频水印算法的鲁棒性是当前一大研究热点 .充分利用图象的像素与其周围像素之间的差值的统计特性 ,利用差调制的方法嵌入水印信息 ,从而降低了原始图象对该水印算法鲁棒性的影响 ,来提高水印算法的鲁棒性 .理论分析表明 ,该算法可以同时获得较小的误警和误拒概率 ,从而表明该算法有较好的性能 .实验结果表明 ,该算法可以鲁棒地抵抗常用的攻击 ,如JPEG压缩、中值滤波、加噪声和图象大小调整 .  相似文献   

2.
Neural decoders were introduced as a generalization of the classic Belief Propagation (BP) decoding algorithms. In this work, we propose several neural decoders with different permutation invariant structures for BCH codes and punctured RM codes. Firstly, we propose the cyclically equivariant neural decoder which makes use of the cyclically invariant structure of these two codes. Next, we propose an affine equivariant neural decoder utilizing the affine invariant structure of those two codes. Both these two decoders outperform previous neural decoders when decoding cyclic codes. The affine decoder achieves a smaller decoding error probability than the cyclic decoder, but it usually requires a longer running time. Similar to using the property of the affine invariant property of extended BCH codes and RM codes, we propose the list decoding version of the cyclic decoder that can significantly reduce the frame error rate(FER) for these two codes. For certain high-rate codes, the gap between the list decoder and the Maximum Likelihood decoder is less than 0.1 dB when measured by FER.  相似文献   

3.
本文提出了一种将彩色数字水印嵌入到彩色载体图像的新算法,利用改进的Patchwork方法将一级小波分解的水印图像的低频部分分别四次嵌入到经过离散余弦变换和离散小波变换后的载体图像的RGB分量中,提取的时候,将四次嵌入的低频分量取出并求平均值,用来作为水印的最终低频分量。经过实验验证,该算法对很多攻击具有很好的鲁棒性。  相似文献   

4.
This paper presents a novel dynamic stochastic resonance (DSR)-based technique for robust extraction of a grayscale logo from a tampered watermarked image. The watermark embedding is done on the singular values (SV) of the discrete cosine transform (DCT) coefficients of the cover image. DSR is then strategically applied during the logo extraction process where the SV of DCT coefficients are tuned following a double-well potential model by utilizing the noise introduced during attacks. The resilience of this technique has been tested in the presence of various noises, geometrical distortions, enhancement, compression, filtering and watermarking attacks. The proposed DSR-based technique for logo extraction gives noteworthy robustness without any significant trade-off in perceptual transparency of the watermarked image. A maximization approach has been adopted for the selection of bistable double-well parameters to establish noise-enhanced resonance. When compared with existing watermark extraction techniques based in SVD, DCT, SVD-DCT domains, as well as with their combination with DSR, the results suggest that remarkable improvement of robustness is achieved by using DSR on singular values of DCT.  相似文献   

5.
In this paper, a new homomorphic image watermarking method implementing the Singular Value Decomposition (SVD) algorithm is presented. The idea of the proposed method is based on embedding the watermark with the SVD algorithm in the reflectance component after applying the homomorphic transform. The reflectance component contains most of the image features but with low energy, and hence watermarks embedded in this component will be invisible. A block-by-block implementation of the proposed method is also introduced. The watermark embedding on a block-by-block basis makes the watermark more robust to attacks. A comparison study between the proposed method and the traditional SVD watermarking method is presented in the presence of attacks. The proposed method is more robust to various attacks. The embedding of chaotic encrypted watermarks is also investigated in this paper to increase the level of security.  相似文献   

6.
This paper proposes a new watermarking approach using dynamic stochastic resonance (DSR) based tuning operation to extract the watermark logo from the watermarked image that has undergone different intentional and signal processing attacks. This method is intended to provide remedies from the shortcomings of the technique proposed by Lin et al. (2008), and invalidates the effect of intentional attacks recently designed by Meerwald et al. (2009). The algorithm incorporates three level image decomposition using lifting wavelet transform (LWT) and low-pass subband is utilized for data hiding purpose. Watermark bits are embedded into the blocks of non-overlapped wavelet coefficients of the cover image by quantizing the two maximum coefficients of the corresponding block. In watermark extraction process, the DSR is applied by performing the tuning operation on coefficient blocks of attacked watermarked image. It is a parameter dependent approach that enhances the performance of watermark extraction, where the parameters of DSR inherently depend on the image properties such as standard deviation or variance. As far as security is concerned, the randomization of wavelet coefficients, blocks, and watermark bits helps the framework to be more secure. The proposed technique is also examined against multiple watermarking attack and successfully proves its authenticity and ownership. Comparison of the proposed technique with recent techniques shows remarkable improvement in terms of robustness and security against various intentional, signal processing, and geometrical attacks.  相似文献   

7.
利用二维混沌流加密技术加密有意义的二进制图像,获得水印数据,以提高视频水印的安全性。水印嵌入过程中,水印被嵌入到随机选择的视频帧的离散余弦变换系数里。在鲁棒性和帧平均攻击实验后,大部分水印可以通过水印检测提取算法进行提取和识别。实验结果表明,这种视频水印方法具有一定的安全性、隐蔽性和鲁棒性。  相似文献   

8.
Adversarial training is effective to train robust image classification models. To improve the robustness, existing approaches often use many propagations to generate adversarial examples, which have high time consumption. In this work, we propose an efficient adversarial training method with loss guided propagation (ATLGP) to accelerate the adversarial training process. ATLGP takes the loss value of generated adversarial examples as guidance to control the number of propagations for each training instance at different training stages, which decreases the computation while keeping the strength of generated adversarial examples. In this way, our method can achieve comparable robustness with less time than traditional training methods. It also has good generalization ability and can be easily combined with other efficient training methods. We conduct comprehensive experiments on CIFAR10 and MNIST, the standard datasets for several benchmarks. The experimental results show that ATLGP reduces 30% to 60% training time compared with other baseline methods while achieving similar robustness against various adversarial attacks. The combination of ATLGP and ATTA (an efficient adversarial training method) achieves superior acceleration potential when robustness meets high requirements. The statistical propagation in different training stages and ablation studies prove the effectiveness of applying loss guided propagation for each training instance. The acceleration technique can more easily extend adversarial training methods to large-scale datasets and more diverse model architectures such as vision transformers.  相似文献   

9.
图像数字水印技术,作为潜在的可有效解决数字图书馆中图像资源版权保护问题的手段,受到了广大学者越来越多的关注.为有效地实现图像资源的版权保护,该文在讨论和分析了图像资源版权保护的现状和发展趋势后,提出了一种新的简单、方便、容易的SVD域图像数字水印方法.该文方法在对数字水印的提取时,无须原始图像的参与,实用性强.实验结果表明,该文方法对数字水印具有很好的透明性,并且方法对图像JPEG压缩、亮度调整、对比度调整、叠加噪声等常见图像处理攻击均具有很强的稳健性.因此,该文方法可有效地运用于图像资源的版权保护.  相似文献   

10.
基于对称函数产生器的对称函数实现   总被引:2,自引:0,他引:2  
为直接利用现有逻辑器件实现多输出对称函数,通过对2线-4线译码器的逻辑功能和二变量基本对称函数的定义的比较,提出2线-4-线译码器可用作二变量基本对称函数产生器。由于任意n变量的基本对称函数均可通过二变量基本对称函数产生器的树型扩展得到实现,因此,任意n变量的对称函数可以用2线-4线译码器予以实现。文中分别就变量数为奇数和偶数的情况进行了讨论。本文提出的对称函数综合方法在实现多输出对称函数时可获得  相似文献   

11.
魏雯 《大众科技》2011,(11):45-47
以静止图像为研究对象,文章提出了一种离散分数傅立叶变换(DFRFT)域的图像数字水印算法,该算法通过对载体图像进行某个级次的分数傅立叶变换,将加密水印嵌入到载体图像的分数傅立叶谱中,从而得到含水印的图像。实验结果表明,该算法实现了水印图像的不可见性,同时对常见的图像攻击具有较好的鲁棒性。  相似文献   

12.
血滤器的中空纤维聚砜膜的形态学观察方法的探讨和评价   总被引:1,自引:0,他引:1  
提出了2种用于构建生物人工肾小管的中空纤维膜聚砜膜表面的观察的新方法.采用免疫荧光染色(immunofluorescence staining,IF)和原子力显微镜(atomic force microscopy,AFM)对中空纤维聚砜膜内和外壁进行观察研究.实验表明免疫荧光染色方法简便快捷,图象清晰,AFM的分辨率高,图象清晰,是除扫描电镜(scanning electronic micmscope,SEM)外的两种观察生物人工肾小管的简便可靠方法.普通显微镜观察不能观察到中空纤维聚砜膜形态,AFM简便,图象清晰,分辨率较高,并且可以观察立体三维形态,实验结果显示IF和AFM是观察生物人工肾小管的中空纤维膜聚砜膜表面的观察的新方法,并且简便使用,分辨率高,能观察三维结构.  相似文献   

13.
This paper proposes a novel Octonion Krawtchouk Moments (OKMs) transform to deal with a set of images in a compact manner, and based on this transform, a local zero-watermarking scheme is proposed to protect the copyright of CT medical images. The scheme first annotates regions of interest (ROIs) on seven medical images and then uses the OKMs of these ROIs to construct a single feature image called zero-watermark. This scheme adopts the gray Wolf Optimizer (GWO) algorithm to have a blind nature and to improve robustness against common image processing manipulations and attacks (zero-watermarking requirements). In addition, our scheme uses the trained U-net (R231) model to reduce the search space for the GWO algorithm and prevent this algorithm from getting stuck in a local optimal solution. The experimental results show that the proposed method is very robust against common image processing manupilations and attacks and has superiority compared with superb other zero-watermarking methods.  相似文献   

14.
基于块奇异值分解的水印算法研究   总被引:8,自引:0,他引:8  
奇异值分解是一种特殊的矩阵变换,并具有良好的性质。本文充分利用奇异值分解的特性,提出了一种新的基于块奇异值分解的量化水印算法和一种新的基于块奇异值分解的扩频水印算法。这两个算法都是通过对各个数据块的最大奇异值进行修改来嵌入水印,都可以根据待嵌入的水印信息量来调整分块的大小,算法的复杂度较低。其中的量化水印算法是含边信息的嵌入方法,可以实现盲检测。实验结果证明,基于块奇异值分解的水印算法对常规的图像处理攻击具有很好的鲁棒性,尤其是其中的量化水印算法。  相似文献   

15.
谢斌  张倍敏  涂荣强 《科技广场》2007,(11):102-104
提出了一种基于音频的倒谱域水印算法。实验结果表明,利用该方法嵌入的音频水印对大多数信号处理具有较好的鲁棒性和不可感知性。  相似文献   

16.
Aiming at the problem that watermark information is easy to be lost in two-dimensional text image watermarking, a three-dimensional text image watermarking model is proposed based on multilayer overlapping of extracted two-dimensional information, and a specific method is accordingly realized by means of embedding, extracting and overlapping of multiple watermarks in sequence. We discuss the influence of the sequence order, positional distancing and color difference of the extracted multiple two-dimensional information on displaying a three-dimensional text watermark image. In addition, considering the crucial evaluation indices of the invisibility and robustness for the watermarking algorithm, the selection method for superior embedding regions of multiple watermarks is also constructed to enhance the robust performance of watermarks under the premise of effective invisibility. Moreover, we embed the multiple two-dimensional information into the host image by using the undecimated dual-tree complex wavelet transforms - bidiagonal singular value decomposition algorithm. In this way, the extracted multiple two-dimensional information is automatically overlapped to generate the three-dimensional text watermarking according to the optimal matching parameters. We use standard image processing data set to carry out experiments, the results show that the peak signal to noise ratio before and after embedded watermarks is higher than 39 dB, and the peak signal to noise ratio between the original watermarks and the extracted watermarks is more than 37 dB, which is superior to the current reported watermark model. Therefore, it is suggested that the proposed model shows good invisibility and robustness and can reduce the loss of watermark during transmission and attack as much as possible.  相似文献   

17.
设计抗几何攻击的图像水印算法是数字水印技术研究中的难点。仿射变换是典型的几何攻击,能够使目前大多数数字水印算法失效。基于带边信息的水印模型,本文提出了一种利用Zernike矩的抗仿射变换多比特图像水印算法。该算法将归一化图像的Zernike矩作为边信息,利用量化技术对的水印信息进行编码和嵌入。实验证明,本文提出的算法不仅具有很好的抗仿射变换和抗JPEG压缩的鲁棒性,而且具有较小的嵌入失真和较大的水印容量。  相似文献   

18.
Contourlet变换是一种基于图像的几何性变换,通过各向异性实现了图像的多尺度多方向性分解,它能够有效地表示图像中的轮廓和纹理。利用这些特性,提出了基于Contourlet域的盲水印算法。实验证明,该算法很好地协调了透明性与鲁棒性;并且实现了盲检测。  相似文献   

19.
《Journal of The Franklin Institute》2023,360(13):10297-10336
Owing to the effect of measurement noise and sudden changes in the power system, the robustness of state estimation for power system becomes very important. The Unscented Kalman Filter (UKF) is widely used for state estimation. However, it does not consider the influence of different kinds of gross errors. To better deal with gross errors, a robust adaptive UKF with gross error detection and identification (RAUKF-GEDI) is proposed, which uses the robust generalized correntropy loss in the UKF framework. The RAUKF-GEDI detects gross errors by hypothesis testing, and then uses the moving window to identify and classify three kinds of gross errors. Subsequently, the RAUKF-GEDI estimates the magnitudes of the gross errors to further compensate the measurements, and finally uses the compensated measurements to re-estimate the state to obtain precise estimated states. In addition, RAUKF-GEDI also introduces adaptive covariance matching method for state estimation. The RAUKF-GEDI is applied to the state estimation for power systems where the measurements are contaminated by three kinds of gross errors. Finally, the RAUKF-GEDI is also applied to the practical power system of Zhejiang Juchuang Smart Technology Company Park. The results show that the RAUKF-GEDI can detect and identify gross errors and enhance the robustness of UKF.  相似文献   

20.
计云倩 《情报探索》2014,(5):112-115
介绍了数字图书馆和数字水印技术,就数字水印技术用于解决数字图书的图像版权保护问题进行了探讨,提出了一种用于图像认证的半易损数字水印算法。实验结果表明,该算法计算简单、有很好的抗JPEG压缩性能、对篡改的定位很精确。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号