Welcome![Sign In][Sign Up]
Location:
Search - attacks on image watermark

Search list

[Graph Recognizedct1_embed

Description: research on against geometry attacks watermarking technology. A digital Watermarking scheme, which is based on combination of simple and reliable harries detector and image normalization, is proposed. The feather points remain holding after geometry attack. Applying image normalization to these non-overlapped circles which centered at the feature points, after that, we can determine area for watermark embedding.
Platform: | Size: 1580 | Author: xiaxianming | Hits:

[Special Effectsattack

Description: 这写程序是对加水印之后图像的攻击,包括加噪声,各种滤波,剪切,压缩攻击和旋转等。-This writing process is a plus watermark image after the attacks, including the increase in noise, various filtering, shear, compression and rotation attacks.
Platform: | Size: 129024 | Author: 晁文婷 | Hits:

[Graph Recognizedct1_embed

Description: research on against geometry attacks watermarking technology. A digital Watermarking scheme, which is based on combination of simple and reliable harries detector and image normalization, is proposed. The feather points remain holding after geometry attack. Applying image normalization to these non-overlapped circles which centered at the feature points, after that, we can determine area for watermark embedding. -research on against geometry attacks watermarking technology. A digital Watermarking scheme, which is based on combination of simple and reliable harries detector and image normalization, is proposed. The feather points remain holding after geometry attack. Applying image normalization to these non-overlapped circles which centered at the feature points, after that, we can determine area for watermark embedding.
Platform: | Size: 1024 | Author: xiaxianming | Hits:

[Special Effectsmiyao

Description: 本文提出了基于二维混沌映射的数字图像水印算法,混沌具有随机性、似噪声及对初始条件的极端敏感性等特点。将经过二维混沌映射置乱后的数字水印信号嵌入图像小波域的低频系数,实现了数字水印的隐蔽性、保密性和稳固性;利用二维混沌映射Arnold变换对水印信号进行置乱,不仅增强了水印信号保密性,同时有效提高了视觉上抵抗图像剪切攻击的能力。-In this paper, two-dimensional chaotic map based on digital image watermarking algorithm, Chaos with random noise and the likelihood of extreme sensitivity to initial conditions and so on. Two-dimensional chaotic map will be scrambling after the digital watermark embedded image signal of the low-frequency coefficients in wavelet domain, the realization of a digital watermark hidden, security and stability the use of two-dimensional chaotic map on Arnold transform scrambling watermark signal, not only enhances the confidentiality of the watermark signal at the same time improve the visual image shear resistance attacks.
Platform: | Size: 668672 | Author: lafeng | Hits:

[Special EffectsSVM_GA

Description: 提出一种基于支持向量机( SVM)和遗传算法(GA)的离散余弦变换(DCT)域盲数字图像水印方法. 该方法能自适应于图像的局部特征. 依据图像块的局部特性,利用SVM对图像块分类,自适应地确定水印嵌入强度, GA用来优化水印嵌入位置. 实验结果表明该方法有较好的不可见性和较强对抗攻击的鲁棒性.-Based on support vector machine (SVM) and genetic algorithm (GA), discrete cosine transform (DCT) domain blind digital image watermarking method. The method adaptive to local image features. Based on the local characteristics of image block using the SVM the image block classification, adaptive to determine the embedding strength, GA to optimize the watermark embedding location. The experimental results show that the method has good invisibility and robustness of the strong against the attacks.
Platform: | Size: 449536 | Author: 郭事业 | Hits:

[Special EffectsA.Blind.MPEG-2.Video.Watermarking.Robust.to.Regula

Description: Abstract—Based on the observation that low-frequency DCT coefficients of an image are less affected by geometric processing, we propose a new blind MPEG-2 video watermarking algorithm robust to camcorder recording. Both the embedding and extraction of the watermarks are done in the compressed domain. The mean of the low-frequency DCT coefficients of the video is temporally modulated according to the information bits. To reduce complexity, we embed watermark in the prediction error signals of the B-frames. Experimental results show that the proposed scheme achieves high video quality and robustness to camcorder recording, trans-coding, frame-rate conversion, and geometric attacks on common test videos.
Platform: | Size: 136192 | Author: lie | Hits:

[matlabdwt-matLab-marking

Description: 提出了一种基于小波变换可抗击几何攻击算法。在水印嵌人 部分# 首先对宿主图像进行小波分解 、 嵌人水印, 再通过余弦变换求得该水印图像的一个特征向量, 利用该特征向量和水印 信息通过12 31 函数生成一个二值逻辑系列, 将该序列作为密钥/ 水印提取部分为# 对待测的图像进行小波变换, 再通过余 弦变换求得待测图像的一个特征向量, 利用该特征向量和密钥通过1 2 4 1 函数提取出水印。-Proposed based on wavelet transform algorithm can be against geometric attacks.# Watermark embedded in the first part of the host image wavelet decomposition, embedded watermark, and then through the cosine transform of the watermarked image obtained by a feature vector, using the feature vector and the watermark information through 1231 to generate a binary logic function series, the sequence as the key/watermark extraction part is# treated transform measured image, and then obtained through the cosine transform the image of a feature vector under test, using the feature vector and the key function by 1241 to extract the watermark .
Platform: | Size: 523264 | Author: 切尔西 | Hits:

[matlabBinary-text-digital-image

Description: 提出了一种可抗 几何攻击的二值文本图像水印算法. 该算法基于DCT,它将二值图像的DCT、图像的视觉特征向 量和加密技术有机结合起来,在提取水印时不需要原始图像,是一种实用的盲水印算法-We propose a geometric attacks against Binary Text Watermarking Algorithm. The algorithm is based on DCT, it binary image DCT, the image of the visual feature vector and encryption technology combine in the watermark without the original image is a practical blind watermarking algorithm
Platform: | Size: 1190912 | Author: 切尔西 | Hits:

[Special EffectsDCT

Description: 基于DCT的数字水印处理技术,本水印处理过程利用图像的缩放技术和调整原始图像的直方图,根据人眼视觉特性,在每个DCT变换块的DC分量上嵌入水印信息,并且在水印信息嵌入之前,对其进行置乱加密,提供双重安全保证,接着通过JPEG压缩攻击对DCT域的鲁棒性进行测试,证明了DCT的抗攻击能力。-DCT-based digital watermarking technique, the watermark processing technology and the use of image scaling to adjust the original image histogram, according to the human visual system, in each block of DCT-DC components on the embedded watermark information, and information in the watermark embedding prior to its scrambling encryption to provide double security guarantees, followed by JPEG compression attacks on the DCT domain robustness of tests to demonstrate the anti-attack capability of DCT.
Platform: | Size: 1024 | Author: zhangxibin | Hits:

[Special Effectsattacks

Description: 数字水印攻击代码,用于水印嵌入后对嵌入水印的图像进行攻击-Digital watermarking attack code the attack on the watermarked image for watermark embedding
Platform: | Size: 1024 | Author: tingting | Hits:

[Special EffectsA-Watermarking-Algorithm(MATLAB)--

Description: 盲水印提取时不需要参考原始载体图像,在信息隐藏、版权保护等方面具有更广泛的应用前景。提出的盲水印算法在分块离散余弦变换(DCT)和离散小波变换(DWT)的基础上,利用关系双方DCT系数和DWT系数在受到攻击时具有相同变化趋势的特点,采用关系嵌入和量化嵌入的自适应选择嵌入策略,较大幅度地提高了盲水印提取的鲁棒性。同时在量化嵌入中采用抖动调制,实现了水印透明性和鲁棒性调节的便捷性。大量仿真实验结果表明该算法对噪声干扰、低通滤波、JPEG压缩、对比度增强等攻击有很好的鲁棒性和透明性。关键词 数字水印盲水印关系嵌入量化嵌入离散余弦变换离散小波变换 按这篇文章的算法,自己编的matlab,没有攻击时水印提取率为1,加水印后图像PSNR有45+,。有攻击后提取率也有0.9+。-Blind watermark extraction can be fulfilled without referring to the original host image. Therefore it hasmuch prospective applications in the fields of information hiding and copyright protection. Based on blocking Discrete Cosine Transform (DCT) and blocking DiscreteWaveletTransform (DWT), the proposed blind watermarking algorithm uses an embedding strategy of adaptively selecting either relationship embedding or quantization embedding. The relationship em- bedding comes from the observation thatboth themagnitudes of coefficients concerned in the relationship usually have thesame change trend when the image is attacked. This strategy remarkably improves the robustness ofwatermark extraction.In addition, dithermodulation is used in quantization embedding, bywhich the tradeoff between transparency and robus-tness ofwatermarking can be easily adjusted. Simulation results show that the algorithm is fairly robust against the attacks such as noise, filtering, compression, and contrast
Platform: | Size: 758784 | Author: CXF | Hits:

[matlabcode-for-robust-feature-based-image-water-marking

Description: A digital image watermarking scheme must be robust against a variety of possible attacks. In the proposed approach, a new rotation and scaling invariant image watermarking scheme is proposed based on rotation invariant feature and image normalization. The rotation invariant features are extracted from the segmented areas and are selected as reference points. Sub-regions centered at the feature points are used for watermark embedding and extraction. Image normalization is applied to the sub-regions to achieve scaling invariance. In the scheme, first, the image is segmented into a number of homogeneous regions and the feature points are extracted. Then the circular regions for watermark embedding or extraction are defined. Based on the image normalization and orientation assignment, the rotation, scaling, and translation invariant regions can be used for watermark embedding and extraction.
Platform: | Size: 1475584 | Author: prasannakumar | Hits:

[Special EffectsDCTshuiyin

Description: 这是基于离散余弦DCT的数字水印算法的实现,图片自由选择,可以对嵌入水印的图像进行各种攻击后提取水印。鲁棒性较强。-This is the realization of digital watermarking algorithm based on discrete cosine of DCT, picture free choice, can of the embedded watermark image of various attacks watermark extraction. Strong robustness.
Platform: | Size: 174080 | Author: 赖沿州 | Hits:

[Special EffectsA-Image-watermark-based-on-RS-code

Description: 基于RS码的图像水印,通过对要嵌入图像的水印进行RS码加密,提高水印的抗攻击能力。程序包含对水印图像的RS码加密解密,水印的嵌入和提取和水印抗攻击鲁棒性的检测。-RS code based image watermarking, through the embedded image watermark to RS code encryption, watermarking improve anti-attack capability. Program contains the watermark image RS code encryption and decryption, watermark embedding and watermark extraction and detection robustness against attacks.
Platform: | Size: 365568 | Author: 王晗迤 | Hits:

[Software Engineeringfdkjfkdjfdkf

Description: 数字水印文件和数字水印命令是数字水印技术在军事应用的两个重要应用。本文以一种基于分数阶傅里叶变换 (FRFT)的数字水印算法,使用chirp信号作为水印信息,嵌入到图像的分数阶傅里叶的加密域中。该算法有效地利用水印的 嵌入位置和FRFT的阶次作为密钥的同时,还利用chirp信号在分数阶傅里叶域的特点,可以很方便的检测到水印,具有良好 的不可见性和安全性的同时,还能够抵抗很强的JPEG压缩和噪声的攻击,对剪切、滤波等操作也有一定的鲁棒性。-Watermarking files and digital watermarking command are two important applications of digital watermarking technology for military applications in. In this paper, based on fractional Fourier transform (FRFT) digital watermarking algorithm using chirp signal as the watermark information is embedded into the image encryption fractional Fourier domain. The effective use of watermarking algorithm FRFT embedding position and at the same time as the order of the keys, but also take advantage of the characteristics of chirp signals in fractional Fourier domain, and can easily detect the watermark, with good Invisibility and safety, it is also highly resistant to JPEG compression and noise attacks, shear, filtering and other operations also has certain robustness.
Platform: | Size: 1003520 | Author: baibai | Hits:

[File FormatRobust-Image-Watermarking-using-Tetrolet-Transfor

Description: This paper proposes new watermarking technique based on tetrolet domain. The tetrolet transform is a new adaptive Haar-type wavelet transform based on tetrominoes. It avoids Gibbs oscillation because it applies the Haar function at the edge of the image. Our proposed watermarking algorithm embeds the watermark into the tetrolet coefficients which are selected by considering different of shapes tetrominoes. We uated the effectiveness of the watermarking approach by considering the quality metrics like RMSE, PSNR and Robustness parameters. The experimental results reveal that the proposed watermarking scheme is robust against common image processing attacks.
Platform: | Size: 495616 | Author: Naga Kishore | Hits:

[matlabImage-Watermarking-using-Tetrolet-Transform

Description: This paper proposes new watermarking technique based on Tetrolet domain. The Tetrolet transform is a new adaptive Haar-type wavelet transform based on tetrominoes. It avoids Gibbs oscillation because it applies the Haar function at the edge of the image. Our proposed watermarking algorithm embeds the watermark into the Tetrolet coefficients which are selected by considering different shapes of tetrominoes and uated the effectiveness of the watermarking approach by considering the quality metrics like RMSE, PSNR and Robustness parameters. The experimental results reveal that the proposed watermarking scheme is robust against common image processing attacks.-This paper proposes new watermarking technique based on Tetrolet domain. The Tetrolet transform is a new adaptive Haar-type wavelet transform based on tetrominoes. It avoids Gibbs oscillation because it applies the Haar function at the edge of the image. Our proposed watermarking algorithm embeds the watermark into the Tetrolet coefficients which are selected by considering different shapes of tetrominoes and uated the effectiveness of the watermarking approach by considering the quality metrics like RMSE, PSNR and Robustness parameters. The experimental results reveal that the proposed watermarking scheme is robust against common image processing attacks.
Platform: | Size: 1816576 | Author: shaik | Hits:

[2D Graphicwatermark-additif

Description: An additive image watermarking based on SPSO and fitness function, with filters and multiple attacks
Platform: | Size: 10070016 | Author: DJCHDUILK | Hits:

[Special Effectswatermarking

Description: 基于数字音频水印的dwt变换,程序代码。包含嵌入提取攻击等相关内容,程序稳定可靠便于使用。主要用于对于图像水印的安全保护。-Digital audio watermarking based on DWT transform, the program code. Contains embedded extraction attacks and other related content, the program is stable and reliable and easy to use. Mainly used for security protection of image watermark.
Platform: | Size: 318464 | Author: | Hits:

[Report papersRobust Spatial-spread Deep Neural Image Watermarking

Description: Watermarking is an operation of embedding infor- mation into an image in a way that allows to identify ownership of the image despite applying some distortions on it. In this paper, we present a novel end-to-end solution for embedding and recovering the watermark in the digital image using convolutional neural networks. We propose a spreading method of the message over the spatial domain of the image, hence reducing the local bits per pixel capacity and significantly increasing robustness. To obtain the model we use adversarial training, apply noiser layers between the encoder and the decoder, and implement a precise JPEG approximation. Moreover, we broaden the spectrum of typically considered attacks on the watermark and we achieve high overall robustness, most notably against JPEG compression, Gaussian blur, subsampling or resizing. We show that an appli- cation of some attacks could increase robustness against other non-seen during training distortions across one group of attacks — a proper grouping of the attacks according to their scope allows to achieve high general robustness
Platform: | Size: 774757 | Author: bamzi334 | Hits:
« 12 »

CodeBus www.codebus.net