随着图像处理软件的普及,数字图像篡改变得越来越容易。
The image tampering is becoming more and more easily due to powerful image processing software.
提出了一种基于图像块关联机制,实现图像篡改检测和恢复的脆弱水印新算法。
We propose a fragile watermarking scheme capable of image tamper detection and recovery with a block-wise dependency mechanism.
摄影成就的图像,其实早就“寄居”在机械复制和图像篡改技术的外壳之中,构成种种视觉欺骗。
The image produced by the medium of photography has long been sheltered in the shell of mechanic duplication and image perfection technology which could easily perpetrate visual cheating.
为提高可恢复双水印算法抵抗伪造攻击的能力,提出一种用于图像篡改检测和恢复的安全双水印算法。
To improve the security against the counterfeiting attack, this paper proposes a secure dual watermark scheme for image tamper detection and recovery.
图像区域复制篡改就是将数字图像中一部分区域进行复制并粘贴到同一幅图像的另外一个区域,是一种简单而又常见的图像篡改技术。
Region duplication forgery, in which a part of a digital image is copied and then pasted to another portion of the same image, is one of the simple and common image forgery techniques.
实验结果表明该算法能够很好地实现数字图像版权保护、篡改检测和定位。
The experimental result shows this algorithm can realize copyright protection, tamper detection and localization well.
为了能够区分偶然攻击与恶意篡改,半脆弱水印需要对一般的内容保护图像操作有一定的鲁棒性。
In order to differentiate incidental attacks and malicious attacks, semi-fragile watermark must be robust against content-protection image processing.
本文在对数字图像的一些统计特性进行研究的基础上,提出了两个检测篡改图像的算法。
Two algorithms of detecting the digital forgeries are proposed in this paper. They are based on the study of some statistical properties of digital images.
验证图像时需同时通过与摘要的对比以及与水印特征的对比来确定内容是否被篡改。
Image authentication needs to contrast with the digest and watermark character to confirm whether the content is tampered.
在实验阶段,对嵌有水印的图像进行了剪切、缩放、噪声干扰、JPEG压缩和篡改等攻击实验。
In the experimental phase, image with watermark has been attacked in several ways, such as cropping, scaling, noise, JPEG compression and tampering.
实验证明该算法对固定系数的JPEG压缩有较好的鲁棒性,并对图像的恶意篡改有较好的脆弱性。
The experiments results show that this algorithm has a good robustness for the JPEG compression with the fixed coefficient, and a good fragileness for the illegal manipulation.
设计并实现了一种基于分层的半脆弱数字水印算法,用于图像内容完整性认证,篡改定位和恢复。
A hierarchical semi-fragile digital watermarking algorithm was designed for image content integrality authentication, tamper localization and recovery.
认证时通过水印差值定位图像被篡改的位置,通过奇异值差值反映被篡改区域的篡改强度。
The tampered area of the watermarked image could be reflected in the watermarking difference map and the tampered intensity could be reflected in singular values difference.
同时,脆弱性水印不仅能判断图像的真实性,还能准确、直观地定位篡改信息。
Meanwhile, besides telling you whether an image has been tampered, the fragile watermark can reflect the distortion status truly and intuitively.
提出一种基于图像特征和公钥密码系统的易损水印算法,在图像认证中能够定位图像被篡改的位置。
A new invisible watermarking technique which could localize tampered areas for image authentication was proposed, based on image feature and public key cryptography.
实验表明,该方案对灰度文本图像有50%的篡改检测概率、并具有较好不可见性和一定的鲁棒性。
Experiments show that the algorithm has a tampering detecting probability 50% to the gray text image, and the invisibility and robustness works well.
在图像脆弱水印技术中,算法安全性、定位精度和篡改恢复效果是主要的研究方向。
In image fragile watermarking technique, the algorithm's security, the accuracy of localization and the capability of recovering tampered region are the main areas of research.
然后将特征矢量进行字典排序,并结合图像块的位移矢量,检测且定位出篡改区域。
Secondly, we sorted the feature vector by dictionary, and located the tampered region by utilizing the displacement vectors of image blocks.
NWD-455是一款高性能1 / 3英寸的CCD网络摄像机,它优化了图像质量并具备强大篡改检测功能。
The NWD-455 is a high performance 1/3-inch CCD network camera optimized for image quality and featuring powerful tamper detection.
同时还采用了聚合篡改区域方法来完成失真检测,能够区分出恶意攻击和一般的图像处理。
This algorithm accomplishes the distortion detection by gathering the tamper areas to distinguish malicious attacks from incidental distortions.
要实现篡改图像的恢复,就要有足够多的图像信息。
To recover the distorted images, we must have enough image information.
针对一类单幅图像的复制遮盖篡改,提出一种基于快速傅立叶变换相位和幅度的自相关检测算法对篡改部位进行检测。
To detect the forged parts in a single image with copy-move attack, an autocorrelation detection method based on phase and amplitude spectrum of FFT is proposed.
新型恶搞作品在制作手段上多借助电脑先进技术,融导演、编剧、音响配置、图像处理于一身,在表达手法上采用夸张放大、戏仿、剪辑移植、篡改变形等方法。
By the aid of advanced computer techniques, the production of new juggled culture often combines the direction, the playwright, the acoustic equipment and the image manipulation into a unity.
实验表明,该方法能有效精确地识别出修复刷对非压缩图像和高品质压缩图像等一类图像的润饰篡改技术的使用。
Experiments show that this method can efficiently and accurately identify the use of a class of image manipulation techniques for uncompressed images and high quality compressed images.
图像是否受到篡改,并检测出图像受到篡改的部位。最后论文分析了当前在混沌加密与图像水印研究中存在的问题,并指出了进一步的研究方向。
Finally, the thesis is concluded by pointing out some open issues on the research of chaos based encryption and image watermarking as well as highlight some further research directions.
随着SVG的广泛应用,确保SVG图像的不被非法篡改、安全性、版权合法性也成为日益突出的问题。
With the widespread application of Scalable Vector Graphics (SVG), a pressing problem arises to ensure its safety and Copyrights, and not to be modified illegally.
仿真实验表明,该算法对任意大小的亮度图像、RGB图像具有高精度的篡改定位能力,并且具有很好的篡改恢复性能。
The simulation results show that the proposed algorithm has precise tamper localization to any size of brightness images and RGB images, and has good tamper recovery performance.
而脆弱水印则主要用来对图像进行防篡改验证,它能够检测到所添加水印的微小变化。
Fragile watermarks are used for authentication purposes and are capable of detecting minute changes of the watermark's content.
针对图像区域复制—粘贴篡改,提出了一种基于灰度共生矩阵的检测算法。
With regard to the copy-move forgery of image region, this paper proposes a detection algorithm based on gray level co-occurrence matrix.
同时它利用离散余弦变换,在图像的高频部分嵌入脆弱水印,使脆弱水印在遭受攻击或篡改时更易被损坏。
At the same time it embed Fragile Watermark in image's high frequency part with the use of DCT so that Fragile Watermark can...
应用推荐