期刊文献+

基于特征的易碎图像水印框架(英文) 被引量:2

Feature Based Fragile Image Watermarking Framework
下载PDF
导出
摘要 提出了一种基于特征的易碎图像水印框架,来阻止VQ攻击.图像特征被提取出来,用来处理原始水印或生成水印,使得要嵌入的水印信息不仅不被攻击者知道,而且依赖于原始图像.因此,不同的原始图像嵌入了不同的水印信息,从而使得攻击者无法建立VQ码表,因而无法实现VQ攻击.同时,为了提高水印的安全性和篡改的局部检测性,本文给出了该框架下水印嵌入方法的基本要求.根据该易碎图像水印框架,本文设计了一种基于图像矩不变量的易碎水印算法.分析和实验结果表明,该算法不仅可以很好地、局部地检测图像中的篡改,即使图像中仅有一位被篡改时.同时,在不需任何额外的密码或图像索引号的情况下,成功地抵抗VQ攻击. A feature based fragile image watermarking framework is proposed to resist vector quantization (VQ) attack. Image features are extracted to process the original watermark or generate the watermark so that the embedded watermark is not only unknown to the attacker, but also dependent on the image. Therefore, different images have different embedded watermarks so that it is impossible for the attacker to build VQ codebook. At the same time, the watermark is embedded into the image under consideration of security and localization. The basic requirements for the embedding scheme are given for the trade-off between the security and localization. An actual moment invariants based fragile image watermarking scheme is presented to demonstrate our fragile watermarking framework. Analysis and experimental results demonstrate that our algorithm can simultaneously detect even one bit image alteration with graceful localization and resist vector quantization attack without the need of any unique keys or image indexes.
出处 《自动化学报》 EI CSCD 北大核心 2004年第5期641-651,共11页 Acta Automatica Sinica
基金 Supported by the National 863 Plan(2003AA114020)
关键词 易碎水印 VQ攻击 图像特征 矩不变量 随机块依赖 Algorithms Feature extraction Image processing Security of data Vector quantization
  • 相关文献

参考文献17

  • 1van Schyndel R G, Tirkel A Z, Osborne C F. A digital watermark. In: Proceedings of the IEEE International Conference on Image Processing, Austin, Texas: IEEE Computer Society Press, 1994, 2:86-90
  • 2Wolfgang R B, Delp E J. Fragile watermarking using the VW2D watermark. In: Proceedings of SPIE, Security and Watermarking of Multimedia Contents , San Jose, California: SPIE, Jan 25-27, 1999, 204-213
  • 3Walton S. Information authentication for a slippery new age. Dr. Dobbs Journal, 1995, 20(4): 18-26
  • 4Wong P. A watermark for image integrity and ownership verification. In: Proceedings of IS &- T PIC, Portland,Oregon, 1998,374-379
  • 5Yeung M, Mintzer F. An invisible watermarking technique for image verification. In: Proceedings of ICIP 97, Santa Barbara, California, 1997,680-683
  • 6Jiri Fridrich M Goljan, Memon N. Further attacks on Yeung-Mintzer fragile watermarking scheme. In: Proceedings of SPIE Photonic West, Electronic Imaging 2000, Security and Watermarking of Multimedia Contents, San Jose,California, 2000, 24~26
  • 7Holliman M, Memon N. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000,9(3): 432-441
  • 8Fridrich J, Goljan M, Baldoza A C. New Fragile Authentication Watermark for Images. ICIP 2000, Vancouver,Canada, 2000, 10-13
  • 9Byun S C, Lee L L. Shin T H, Ahn B H. A Public Key Based Watermarking for Color Image Authentication. In:Proceedings of ICASSP 2002
  • 10Wong P W, Memon N. Secret and public key authentication watermarking schemes that resist vector quantization attack. In: Proceedings of SPIE Security and watermarking of Multimedia, San Jose, USA: 2000,3971(40): 1593~1601

同被引文献15

  • 1高海英,钮心忻,杨义先.基于量化的小波域自同步数字音频水印算法[J].北京邮电大学学报,2005,28(6):102-105. 被引量:8
  • 2Wong P W. A public key watermark for image verification and authentication [ C] //Proceedings ICIP. Chicago [s.n,], 1998: 455-459.
  • 3Matth Holliman, Nasir Memon. Counterfeiting attacks oblivious block-wise independent invisible watermarking schemes[J]. IEEE Trans, 2000, 1P-19(3): 432-441.
  • 4Ping Wah Wong, Memon N. Secret and public keyimage watermarking schemes for image authentication and ownership verification [ J ]. Image Processing, IEEE Transactions on, 2001, 10(10) : 1593-1601.
  • 5Coppersmith D, Mintzer F, Tresser C. Fragile imperceptible digital watermark with privacy control[ C]//Proceedings of SPIE/IS&T Int Syrup Electronic Imaging: Science and Technology. San Jose: [s.n. ], 1999: 659-670.
  • 6Celik M, Sharma G, Saber E, et al. Hierarchical watermarking for secure image authentication with localization [J]. IEEE Transactions on Image Processing, 2002, 11 (6) : 585-595.
  • 7Hae Yong Kim. A new public-key authentication watermarking for binary document images resistant to parity attacks[J]. Image Processing, IEEE International Conference on, 2005(2): 1074-1077.
  • 8Li Zhaohong, Hou Jianjun. A chaos-based model for fragile watermarking: model development and simulation resuhs[J]. Signal Processing, ICSP 2006, IEEE International Conference on, 2006(9) : 2627-2631.
  • 9Wong P W. A Public Key Watermark for Image Verification and Authentication[C]// In Proc. ICIP, 1998;455- 459.
  • 10Matth Holliman, Nasir Memon. Counterfeiting Attacks Oblivious Block-Wise Independent Invisible Watermarking Schemes[J].IEEE Trans,2000, 19(3):432-441.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部