Welcome![Sign In][Sign Up]
Location:
Search - watermarking for content authentication

Search list

[Graph programD542F922

Description: 彩色图像的篡改检测及自恢复算法赵春晖,孙建军,朱海峰(哈尔滨工程大学信息与通信工程学院,黑龙江哈尔滨150001)摘要:数字水印是图像认证的有效手段之一.利用小波变换提出一种计算简单的彩色图像水印算法,将一个图像的主要内容嵌入该图像自身之中,用均值量化的方法在亮度信号中嵌入水印,实现篡改检测和定位篡改区域;用多余的色度空间嵌入亮度信号和色度信号,用于恢复被篡改的图像内容.该算法可以获取较高的峰值信噪比,具有很好的鲁棒性.实验结果表明,该算法对删除、替换等恶意图像篡改具有良好的检测、定位和自修复能力.-color image tamper detection and self-recovery algorithm Zhao Chunhui, Sun Jianjun, Zhu Haifeng (Harbin Engineering University, Information and Communication Engineering Institute, Harbin, Heilongjiang 150001) Abstract : digital watermark image authentication is one of the effective means. Using wavelet transform A simple calculation of the color image watermarking algorithm, an image of the main elements embedded in the image itself, and use of quantitative methods mean the luminance signal embedded watermark, achieve tamper detection and localization tampering with the region; use of surplus space embedded color luminance signals and chrominance signals, for the restoration of tampering with the image content. The algorithm can generate a higher signal-to-noise ratio of the peak value, h
Platform: | Size: 238214 | Author: ghostsx | Hits:

[Graph programD542F922

Description: 彩色图像的篡改检测及自恢复算法赵春晖,孙建军,朱海峰(哈尔滨工程大学信息与通信工程学院,黑龙江哈尔滨150001)摘要:数字水印是图像认证的有效手段之一.利用小波变换提出一种计算简单的彩色图像水印算法,将一个图像的主要内容嵌入该图像自身之中,用均值量化的方法在亮度信号中嵌入水印,实现篡改检测和定位篡改区域;用多余的色度空间嵌入亮度信号和色度信号,用于恢复被篡改的图像内容.该算法可以获取较高的峰值信噪比,具有很好的鲁棒性.实验结果表明,该算法对删除、替换等恶意图像篡改具有良好的检测、定位和自修复能力.-color image tamper detection and self-recovery algorithm Zhao Chunhui, Sun Jianjun, Zhu Haifeng (Harbin Engineering University, Information and Communication Engineering Institute, Harbin, Heilongjiang 150001) Abstract : digital watermark image authentication is one of the effective means. Using wavelet transform A simple calculation of the color image watermarking algorithm, an image of the main elements embedded in the image itself, and use of quantitative methods mean the luminance signal embedded watermark, achieve tamper detection and localization tampering with the region; use of surplus space embedded color luminance signals and chrominance signals, for the restoration of tampering with the image content. The algorithm can generate a higher signal-to-noise ratio of the peak value, h
Platform: | Size: 237568 | Author: ghostsx | Hits:

[Special EffectsComparativeEvaluationofDigitalFragileImage

Description: 脆弱性数字水印能为多媒体内容完整性认证和篡改检测提供有效的解决方案。该文对用于图像认证的脆弱性数字水印技术的研究 现状、一般原理、基本特征、典型算法进行了综述-The vulnerability of digital watermark for the integrity of multimedia content authentication and tamper detection to provide an effective solution. The image authentication for the vulnerability of digital watermarking technology, research, general principles, basic features, typical algorithms are reviewed
Platform: | Size: 1678336 | Author: 张旭 | Hits:

[Graph programSemi_fragilewatermarking

Description: 内容认证半脆弱水印算法的研究与实现,本程序实现图像的半脆弱水印,是基于DCT的算法,特别适合研究半脆弱水印的同志-Content authentication semi-fragile watermarking algorithm for Research and Implementation of, the procedures for the realization of the semi-fragile watermarking images is based on the DCT algorithm, especially appropriate to study the semi-fragile watermarking comrades
Platform: | Size: 303104 | Author: byleimin | Hits:

[Special EffectsAudioWatermarkingforContentAuthentication

Description: 该水印算法具有以下特点:1)结合音频自身的特性,不仅能够自适应划分音频数据段,而且能够智能调节水印嵌入强度,增强了数字音频水印的鲁棒性;2)能够同时进行数字音频的版权保护与内容认证,并可大致确定篡改发生区域,仿真实验表明,文中算法不仅具有较好的不可感知性,而且对常规处理具有较好的鲁棒性,同时能够对替换等而已篡改做出报警并确定被篡改位置。-The watermarking algorithm has the following characteristics: 1) combined with the audio of its own characteristics, not only adaptive division of the audio data segment, but also can adjust watermark embedding intelligent strength, enhanced digital audio watermark robustness 2) can at the same time digital audio copyright protection and content authentication, and can generally determine the tampering occurred in the region, simulation experiments show that the algorithm not only has better not be perceived, but also on conventional treatment has good robustness, at the same time be able to tamper with it to make replacement alarm and to determine the location has been tampered with.
Platform: | Size: 2048 | Author: byleimin | Hits:

[Streaming Mpeg41

Description: 本文提出一种基于H.264低比特率视频流的半脆弱盲水印方法,通过在H.264特有的的帧内预 测和运动向量预测中分别嵌入鲁棒水印和脆弱水印,达到版权保护和内容完整性认证的双重目的.通过在嵌入强 度和预测模式选择的拉格朗日乘子中引入H.264量化因子,增强了水印对重量化编码的抵抗力,取得更好的率 失真平衡,减小水印嵌入对视频流比特率的影响.该算法可以实现水印的快速嵌入提取,满足视频实时处理的要 求,实验结果证明了该算法的有效性.-A novel semi—fragile blind watermark algorithm based on H.264 low bit—rate video stream was pro— posed in this paper,copyright protection and content authentication Can be achieved jointly by embedding the robust waterraark an d fragile watermark spectively during the process of interior prediction an d motion vector prediction which are characteristic for H.264 standard.Through introducing the quan tization factor of H.264 in the embedding and prediction mod e choice,the proposed scheme Can strengthen the watermarking resistance to video recoding and strike a good rate— distortion balan ce for the waterm ark of lower bit—rate video st/ ea/n.which relieve bit—rates lossness from the waterm arking embedding.Experimental results also demonstrate that this scheme iS very computational efi cient during watermark— ing embedding an d extraction.
Platform: | Size: 384000 | Author: 阿国 | Hits:

[Program docv3n1_4

Description: Robust Watermarking Algorithms for Content Authentication and Secure Image Transmission through Single Carrier Frequency Division Multiple Acce-Robust Watermarking Algorithms for Content Authentication and Secure Image Transmission through Single Carrier Frequency Division Multiple Access
Platform: | Size: 831488 | Author: fatma | Hits:

CodeBus www.codebus.net