所有提交的电磁系统将被重定向到在线手稿提交系统。作者请直接提交文章在线手稿提交系统各自的杂志。

提高保护使用Self-Recognized图像

Sanchit Shrikant Mahajan1教授,Pratima Bhati2
  1. 研究学者、计算机工程系、D.P.C.O.E, Savitribai Phule浦那大学、印度
  2. 教授,计算机工程系,D.P.C.O.E, Savitribai Phule浦那大学、印度
相关文章Pubmed,谷歌学者

访问更多的相关文章国际期刊的创新在计算机和通信工程的研究

文摘

保护数据可以通过几种机制来保障和实现数据的真实性和完整性。数据隐藏技术的信息可以嵌入媒体数据安全原因。因此,数字水印可用于保护数字产品的版权。在这样的过程需要维持宿主图像的原始视图。评价水印方法性能必须专注于有水印的鲁棒性的图像质量和恢复图像质量。为此preinserted编码机制可用于离散余弦变换域。所以模拟器preinserted代码可以解决下一个级别的保护来执行各种程序的完整性和安全性。

关键字

数字水印,Pre-inserted代码、数据隐藏、盲水印。

介绍

用于嵌入信息的技术保护的合法版权今天需要各种形式的多媒体。数据隐藏技术关注如何有效地将信息嵌入到覆盖媒体数据进行安全。数字水印已获得保护数字产品的版权的重要性。高效的水印技术要求视觉无法感知和各种攻击的鲁棒性。为此小说自我认可和作物耐水印方法提供嵌入式图像的视觉质量。嵌入一个pre-inserted编码方法的原始水印的位置,该方法能够找到嵌入的水印和检索它甚至在发生同步裁剪攻击。这个盲水印提取使用投票机制获取准确的水印信息和恢复原来的无名宿主图像的图像没有知识。恢复原始图像,该方法可以获得宿主图像信息,恢复主机图像在抵制各种形式的攻击,从而保护数字产品的版权。基于pre-inserted编码系统,该方法可以正确地识别水印序列。嵌入水印涉及两个关键任务,首先验证版权保护和维护原始载体图像的视图。 To protect the copyright of an image, a watermarking mechanism must be robust enough to resist malicious attacks even if the watermarked image has been attacked. Also the watermarked images quality must be good so that it is difficult for an intruder to distinguish between the host image and the embedded one. In addition, the embedded information should not seriously distort the protected image, which may degrade the images quality. At the time of evaluating a watermarking mechanisms performance, we have to concentrate on issues like, robustness, the watermarked images quality, and the restored images quality.

二世。文献调查

保证嵌入图像的视觉质量,重要的是要确保宿主图像嵌入后仍然是视觉上类似于原始图像。之前的工作由贝Chang et al ., X。你为维护et al .,有水印的图像和恢复图像的质量。有两个方案用于恢复无名映像,可逆和可移动的方法,由这些科学家。但可逆的方法和可拆卸的方法仍无法实现鲁棒性和恢复图像的质量。所以有必要实现更好的方案来提高鲁棒性也保证至少对嵌入式图像的影响。
点Alattar[1]使用一个高容量算法基于任意大小的差异扩大向量为嵌入开发较低的可逆水印图像扭曲。可逆水印算法具有很高的彩色图像的数据隐藏能力了。该算法恢复原始图像的,隐藏了几位。可逆整数变换和避免其他条件下溢溢推导任意长度的向量。最大化的数据量可以隐藏到一个图像,嵌入算法应用在颜色组件。实验结果表明,空间,quadbased算法允许隐藏的最大有效载荷在最高的信噪比。也表明,一个可以嵌入到图像的数据量高度取决于图像的性质。测试结果还表明,空间的性能,quad-based算法优越的空间,三联体的基础算法更高的PSNR。这些结果还表明,应用该算法在应用算法空间颜色组件性能差;因此,层叠颜色失真与空间应用程序可能会有用只有当需要隐藏大量数据不考虑有水印的图像的质量。
在[2]林祖嘉Chang出版社。,presented a lossless and reversible steganography scheme for hiding secret data in each block of quantized discrete cosine transformation (DCT) coefficients in JPEG images. This shows that the two successive zero coefficients of the medium-frequency components in each block are used to hide the secret data. Also it modifies the quantization table to maintain the quality of the image. The results also confirm that the proposed scheme can provide expected acceptable image quality of images and successfully achieve reversibility. DCT is a widely used mechanism for frequency transformation. To extend the variety of cover images and for the sake of repeated usage, they over a lossless data hiding scheme for DCT-based compressed images. Using a modified quantization table and our proposed embedding strategy, the proposed scheme can maintain the image quality of images, with a PSNR value 2.2 times higher than that ordered by a standard quantization table without affecting hiding capacity. The experimental results further demonstrate that the proposed scheme provides images with acceptable image quality and hiding capacity.
林祖嘉Chang出版社。,in [3] presented a reversible data hiding scheme based on side match vector quantization (SMVQ) for digitally compressed images. With this method receiver performs two steps to achieve - extract the secret data and reconstruct the original SMVQ compression codes. The results show that the performance of this proposed scheme is better than those of other information hiding schemes for VQ-based and SMVQ-based compressed images. The experimental results also provides effectiveness and reversibility of the proposed scheme. Hiding data in SMVQcompressed codes originally caused a large distortion in stego-images because SMVQ is a low bit-rate compression scheme. To maintain the advantages of SMVQ and make sure the original compression indexes can be successfully reconstructed after secret data are extracted, they hide the secret data in compressed image and achieve reversibility. The original compressed image can be completely reconstructed after hidden secret data extraction, and the original compressed codes can be stored directly and used repeatedly. In addition, the proposed scheme can simply hide or extract the secret data and restore the SMVQ-compressed codes without complex computations. The hidden secret data can also be extracted from the stego-image without referencing the original compressed cover image. So proposed method is superior to that of other VQ or SMVQ-based reversible hiding schemes.
M.U.侯赛因出版社。,in [4] presented a novel framework for lossless authentication watermarking enables zero-distortion reconstruction of un-watermarked images upon verification. They presented a new lossless image authentication framework which offers computational efficiency, public/private key support and improved tamper-localization accuracy. The proposed method is flexible and compatible with the existing lossless data embedding and fragile image authentication algorithms. This new framework allows validation of the watermarked images before recovery of the original image. This decreases computational work when verification step fails or the zero-distortion reconstruction is not needed. For authenticated images the integrity of reconstructed image is ensured by uniqueness of the reconstruction procedure. The framework also enables public(-key) authentication without granting access to the perfect original and allows for efficient tamper localization. Also the effectiveness of this method is demonstrated by implementing the scheme using hierarchical image authentication along with lossless generalized-least significant bit data embedding.
在[5]林祖嘉Chang出版社。,proposed a novel watermarking mechanism by utilizing Pair difference correlations upon subsampling and the technique of JND. The simulation results revealed that the new scheme approximated a lossless watermarking scheme. Also the novel scheme resisted various signal processing attacks and geometric transformation attacks; therefore, it can be used to protect the ownership of important watermarked images. Furthermore, the novel method permitted authorized users to extract and restore the watermarked image without the host image. The new scheme confirms the essentials of robustness and restored image fidelity, which are practical for preserving valuable images.
C.Y.林出版社。,in [6] presented an effective technique for image authentication which can prevent malicious manipulations but allow JPEG lossy compression. The authentication is based on invariance of relationships between discrete cosine transform coefficients at the same position in separate blocks of an image. These relationships are preserved when discrete cosine transform coefficients are quantized in JPEG compression. This proposed method can distinguish malicious manipulations from JPEG lossy compression regardless of the compression ratio or the number of compression iterations. They described adaptive methods with probabilistic guarantee to handle distortions introduced by various acceptable manipulations. They also present theoretical and experimental results to demonstrate the activeness of the technique.
p . Bas出版社。,in [7] presented a new approach for watermarking of digital images providing robustness to geometrical distortions. A new class of watermarking schemes using the image content is presented. They propose an embedding and detection scheme where the mark is bound with a content descriptor defined by salient points. The embedding process of the signature is done by extracting feature points of the image and performing a Delaunay tessellation on the set of points. The mark is embedded using a classical additive scheme inside each triangle of the tessellation. The detection is performed using correlation properties on the different triangles. The performance of the presented scheme is evaluated after JPEG compression, geometrical attack and transformations. The final results show that the fact that the method is robust to different manipulations. The presented method is robust to the Stir Mark attack, shearing distortion, JPEG compression, and slight global transformations. But drawback of this technique is that the robustness depends on the capacity of feature point detector.
在[8]C.S.陆出版社。,proposed a scheme that can resist two famous water- mark estimation-based attacks, which have successfully cracked many existing watermarking schemes. The false negative and false positive analyses are conducted to verify the performance of scheme. A novel watermarking approach, called the non blind embedder, has applied by exploiting the available information of denoising-based watermark prediction. The information obtained using shrinkage-based denoising (soft-thresholding) techniques is easy to control, and, that denoising itself is, in fact, a solution for oblivious watermark detection. The knowledge at the detector side can then be utilized to design a nonblind embedder, which is extremely advantageous over the common blind embedders. The performance of scheme, composed of a non-blind embedder and a blind detector, has also been analyzed regarding false negative and false positive probabilities.
在[9]j·巴尔出版社。,developed a system which will mitigate the threat posed by the copy attack. They first developed an image signature algorithm which uses highly stable low frequency DCT coefficients to uniquely describe the image. This image signature was then combined with a standard image watermark, and embedded into the original image. If an attacker attempts to remove the watermark from this image and insert it into a new image, the image signature embedded in the watermark will not match the re-calculated image signature of the new image. The watermark also enables geometric synchronization, which allows us to automatically restore the image to its proper rotation, scale, and translation. This process, which in other systems must be performed by hand, is necessary to ensure the re-calculated image signature matches the image signature of the original digital image.
问:程出版社。,in [10] presented an investigation on robust optimum detection of multiplicative watermarks. In this the novel optimum detectors for multiplicative watermarks are derived using locally optimum detection for the generalized Gaussian distributions. For sub-band transformed domains such as the discrete cosine transform, discrete wavelet transform, and pyramid transform, a class of generalized correlators is constructed based on the generalized Gaussian distributions. For this, the square-root detector is designed and demonstrated to have near optimal performance for a large set of images and employed as a universally optimal detector or decoder for images and video. The locally most powerful detection method is then extended to DFT domain multiplicative watermarking with magnitudes of coefficients modeled by the Weibull distributions. The another class of detectors is built based on this statistical modeling. The robust optimum detection of multiplicative watermarks can be applied to copyright notification, enforcement, and broadcast monitoring. They applied the robust optimum watermarking detection to combined audio and video watermarking. It can tolerate commonly used audio and video compressions but is sensitive to content changes. It can be applied to audiovisual content authentication in commerce, law, defense, and journalism.
在[11]C.S.陆出版社。,proposed a new digital signature scheme which makes use of an images contents to construct a structural digital signature for image authentication. For image authentication, it is desired that the verification method be able to resist content-preserving modifications while being sensitive to content-changing modifications. The characteristic of the SDS is that it can tolerate content-preserving modifications while detecting content-changing modifications. There are many incidental manipulations that bypassed in the proposed scheme. Performance analysis is conducted and experimental results show that the new scheme is indeed superb for image authentication.
美国渴望et al .,在[12]地址不可见水印方案的能力来解决版权所有权。他们表明,在某些应用程序中,合法的所有权不能仅靠目前的水印方案解决。具体地说,它攻击现有技术通过提供伪造的水印方案可以有水印的图像上执行允许多个所有权的权利。为了防止假冒产品的技术开发,它检查所需的属性解决所有权通过无形的水印。还介绍和研究了可逆性和quasi-invertibility隐形水印技术。他们提出了不可逆转的水印方案,随后给技术的例子更复杂的攻击是刀枪不入的。
在x[13]等人提出了一种新的方法,构建nontensor产品小波滤波器设计和应用到数字水印方案。新的nontensor产品构造小波滤波器根据特殊的对称矩阵。他们克服缺点的张量小波银行只能显示三个方向的奇点。基于nontensor滤波器构造,实证研究已经显示nontensor产品的能力进行小波滤波器在不同方向的图像揭示了奇点。因此,他们开发了一种改性显著差异水印方案的性能显示的优越性nontensor产品小波水印的鲁棒性和m-perceptibility。提出了小波滤波器使水印方案更灵活,因为更多的分解和适合水印嵌入系数。实验结果表明,该算法对各种攻击具有很好的鲁棒性。

三世。结论

我们必须开发一个足够强大的系统将克服现有的水印方法的局限性和保持最高的嵌入式图像的视觉质量和强大的各种恶意攻击. .

四、确认

真诚的感谢审查员的审查这个手稿和提供输入的质量大大提高。

引用