Description: 一种基于感知模型的盲水印算法 :根据Watson模型,结合仿射变换置乱技术和DCT量化系数奇偶特性,本文提出了一种在分块DCT中频交流系数中嵌
入有含义二值水印图像,以实现盲检测的水印方案。实验结果表明,该算法对于JPEG有损压缩、图像剪切等处理有很强的
鲁棒性。-a model based on the perception of the blind watermarking algorithm : According to Watson model, with affine transformation Scrambling Technology and DCT coefficient quantization Parity characteristics, This paper presents a block in exchange DCT coefficient meaning embedded in a binary image watermarking, Blind to achieve the watermark detection program. Experimental results show that the algorithm for JPEG lossy compression, image processing shear is very robust. Platform: |
Size: 225358 |
Author:ghostsx |
Hits:
Description: 一种基于感知模型的盲水印算法 :根据Watson模型,结合仿射变换置乱技术和DCT量化系数奇偶特性,本文提出了一种在分块DCT中频交流系数中嵌
入有含义二值水印图像,以实现盲检测的水印方案。实验结果表明,该算法对于JPEG有损压缩、图像剪切等处理有很强的
鲁棒性。-a model based on the perception of the blind watermarking algorithm : According to Watson model, with affine transformation Scrambling Technology and DCT coefficient quantization Parity characteristics, This paper presents a block in exchange DCT coefficient meaning embedded in a binary image watermarking, Blind to achieve the watermark detection program. Experimental results show that the algorithm for JPEG lossy compression, image processing shear is very robust. Platform: |
Size: 225280 |
Author:ghostsx |
Hits:
Description: 二值图像数字水印算法的一般方法,然后在此基础上给出了一种基于分块DCT的自参照直流系数盲检测二值水印方法。-A blind binary image digital watermarking algorithm is proposed in the DCT domain. The algorithm uses the correlativity of the inter-blocks DC components based on blocked DCT with binary image. No original binary image is needed when detecting the watermark. The algorithm is realized with the efficient and practical programming tools MATLAB, The effect of the corresponding parameters is analyzed in detail. Platform: |
Size: 36864 |
Author:朱建伟 |
Hits:
Description: This is partial code for the paper "An Effective Blind Watermark Algorithm Based on DCT"-This is partial code for the paper "An Effective Blind Watermark Algorithm Based on DCT" Platform: |
Size: 1024 |
Author:Sathvika |
Hits:
Description: 提出一种基于支持向量机( SVM)和遗传算法(GA)的离散余弦变换(DCT)域盲数字图像水印方法. 该方法能自适应于图像的局部特征. 依据图像块的局部特性,利用SVM对图像块分类,自适应地确定水印嵌入强度, GA用来优化水印嵌入位置. 实验结果表明该方法有较好的不可见性和较强对抗攻击的鲁棒性.-Based on support vector machine (SVM) and genetic algorithm (GA), discrete cosine transform (DCT) domain blind digital image watermarking method. The method adaptive to local image features. Based on the local characteristics of image block using the SVM the image block classification, adaptive to determine the embedding strength, GA to optimize the watermark embedding location. The experimental results show that the method has good invisibility and robustness of the strong against the attacks. Platform: |
Size: 449536 |
Author:郭事业 |
Hits:
Description: Abstract—Based on the observation that low-frequency DCT
coefficients of an image are less affected by geometric processing,
we propose a new blind MPEG-2 video watermarking algorithm
robust to camcorder recording. Both the embedding and
extraction of the watermarks are done in the compressed domain.
The mean of the low-frequency DCT coefficients of the video is
temporally modulated according to the information bits. To
reduce complexity, we embed watermark in the prediction error
signals of the B-frames. Experimental results show that the
proposed scheme achieves high video quality and robustness to
camcorder recording, trans-coding, frame-rate conversion, and
geometric attacks on common test videos. Platform: |
Size: 136192 |
Author:lie |
Hits:
Description: 提出了一种可抗
几何攻击的二值文本图像水印算法. 该算法基于DCT,它将二值图像的DCT、图像的视觉特征向
量和加密技术有机结合起来,在提取水印时不需要原始图像,是一种实用的盲水印算法-We propose a geometric attacks against Binary Text Watermarking Algorithm. The algorithm is based on DCT, it binary image DCT, the image of the visual feature vector and encryption technology combine in the watermark without the original image is a practical blind watermarking algorithm Platform: |
Size: 1190912 |
Author:切尔西 |
Hits:
Description: 基于DCT和JPEG的脆弱性盲数字水印算法-Based on DCT and JPEG vulnerability of blind digital watermarking algorithm Platform: |
Size: 168960 |
Author:lk |
Hits:
Description: 基于关系的DCT域盲水印算法,盲水印要不可见的才可以。-Can only be based on the relationship between the DCT domain blind watermarking algorithm, blind watermark or else visible. Platform: |
Size: 414720 |
Author:liyong |
Hits:
Description: 提出了一种基于纠错编码的DCT域数字水印算法,该算法在检测时不需要原始图像,实现了盲检。并且对水印图像进行了利用超混沌置乱处理,提高了安全性能和抗攻击能力。纠错编码的引入使水印抗攻击能力明显增强。
-DCT digital watermarking algorithm based on error correction coding, the algorithm detected without the original image, blind. And watermark image of the the hyperchaotic scrambling process, improve the safety performance and anti-attack capability. The introduction of error correction coding watermark anti-attack capability significantly enhanced. Platform: |
Size: 102400 |
Author:顾丽萍 |
Hits:
Description: 盲水印提取时不需要参考原始载体图像,在信息隐藏、版权保护等方面具有更广泛的应用前景。提出的盲水印算法在分块离散余弦变换(DCT)和离散小波变换(DWT)的基础上,利用关系双方DCT系数和DWT系数在受到攻击时具有相同变化趋势的特点,采用关系嵌入和量化嵌入的自适应选择嵌入策略,较大幅度地提高了盲水印提取的鲁棒性。同时在量化嵌入中采用抖动调制,实现了水印透明性和鲁棒性调节的便捷性。大量仿真实验结果表明该算法对噪声干扰、低通滤波、JPEG压缩、对比度增强等攻击有很好的鲁棒性和透明性。关键词 数字水印盲水印关系嵌入量化嵌入离散余弦变换离散小波变换
按这篇文章的算法,自己编的matlab,没有攻击时水印提取率为1,加水印后图像PSNR有45+,。有攻击后提取率也有0.9+。-Blind watermark extraction can be fulfilled without referring to the original host image. Therefore it hasmuch
prospective applications in the fields of information hiding and copyright protection. Based on blocking Discrete Cosine
Transform (DCT) and blocking DiscreteWaveletTransform (DWT), the proposed blind watermarking algorithm uses an
embedding strategy of adaptively selecting either relationship embedding or quantization embedding. The relationship em-
bedding comes from the observation thatboth themagnitudes of coefficients concerned in the relationship usually have thesame change trend when the image is attacked. This strategy remarkably improves the robustness ofwatermark extraction.In addition, dithermodulation is used in quantization embedding, bywhich the tradeoff between transparency and robus-tness ofwatermarking can be easily adjusted. Simulation results show that the algorithm is fairly robust against the attacks such as noise, filtering, compression, and contrast Platform: |
Size: 758784 |
Author:CXF |
Hits: