期刊文献+

可恢复的脆弱图像水印技术的研究与实现 被引量:2

Research and Implementation of Restorative Fragile Digital Watermarking
下载PDF
导出
摘要 提出一种用于图像内容认证和保护的脆弱数字图像水印算法。该算法利用纠错码和置乱技术可以恢复较大面积的被篡改的图像数据。首先提取原始图像的最重要位MSB,将其分成4块并进行置乱处理,然后对置乱后的MSB信息进行(7,4)汉明纠错编码,最后将校验符号作为水印,并将其Arnold置乱后埋植于图像的最低有效位LSB。经实验验证,该算法对于图像的擦除攻击和剪切攻击有很强的恢复作用。 An auto-restorable fragile watermarking algorithm for image content authentication was proposed. The tampered image data can be largely restored by this algorithm, which uses the correct-encode and shuffling techniques. First, MSB of original image was picked up. Second, MSB was cut into four blocks, and then Arnold shuffling techniques were used in four blocks. Third (7,4) hamming correct-encode technology was used to encode the chaotic four blocks of MSB. Finally, the correct code was embedded into the lowest bits of the image data after being changed with Arnold shuffling techniques. Experimental results show that this algorithm has a strong restored ability for the erasure and cut tampering.
作者 彭波 王平
出处 《系统仿真学报》 CAS CSCD 北大核心 2006年第z1期366-368,共3页 Journal of System Simulation
关键词 MSB 汉明纠错编码 ARNOLD置乱 图像恢复 MSB hamming correct-encode Arnold shuffling techniques image restoration
  • 相关文献

参考文献2

二级参考文献36

  • 1LIN Ching-Yung, CHANG Shih-fu. Semi-fragile watermarking for authenticating JPEG visual content[Z]. Proc of SPIE,2000, 971:140- 151.
  • 2FRIDRICH J, GOLJAN M. Images with self-correcting capabilities[A]. Proceedings of the IEEE International Conference on Image Processing[C]. Kobe, 1999(3): 792 - 796.
  • 3IN Ching-yung, CHANG Shih-fu. A robust image authentication method surviving JPEG lossy compression [A]. SPIE Storage and Retrieval for Image and Video Databases, San Jose[C]. CA,1998: 296- 307.
  • 4LIN Ching-yung. Watermarking and digital signature techniques for multimedia authentication and copyright protection [D]. Columbia University: Graduate school of arts and sciences, 2000.
  • 5Fridrich J.Methods for tamper detection in digital images. In: Multimedia and Security Workshop at ACM Multimedia 99[C] , Orlando, FL, USA . 1999
  • 6Yeung M,Mintzer F C.An invisible wtermarking technique for image verification. In: International Conference on Image Processing. ( ICIP’ 97 ) [ C ], Washington DC, USA . 1997
  • 7Wong P W.A public key watermark for image verification and authentication. In: Proc.of the IEEE International Conference on Image Processing (ICIP’98) [C], Chicago, Illinois, USA . 1998
  • 8Lin C Y,Chang S F.Semi -Fragile watermarking for authenticating JPEG visual content. In: Proceedings of SPIE International Conference on Security and Watermarking of Multimedia Contents II , EI’ 00[C], San Jose, CA, USA . 2000
  • 9Lin C Y,Chang S F.A robust image authentication method surviving JPEG lossy compression. In:Proceedings of SPIE International Conference onStorage and Retrieval of Image/Video Database, EI’98[C], San Jose, CA , U SA . 1998
  • 10Lin C Y,Chang S F.A robust image authentication method distinguishing JPEGcompression from malicious manipulation. . 1997

共引文献45

同被引文献7

  • 1单承赣,王艳,潘理刚.可恢复的脆弱数字水印图像认证算法[J].合肥工业大学学报(自然科学版),2005,28(9):1117-1120. 被引量:4
  • 2Sutaharan S. Fragile Image Watermarking Using a Gradient Image for lmproved Localization and Security[J]. Pattern Recognition Letters, 2004, 25(16): 1893-1903.
  • 3Lin Phen-Lan, Huang Po-Whei, Peng An-Wei. A Fragile Water- marking Scheme for Image Authentication with Localization and Recovery[C]//Proc. of the 6th IEEE International Symposium on Multimedia Software Engineering. Miami, USA: IEEE Press, 2006 399-407.
  • 4Lin Phen-Lan, Hsieh C. A Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery[J]. Pattern Recognition, 2005, 38(2): 2519-2529.
  • 5Ouda A H, Elsakka M R. Localization and Security Enhancement of Block-based Image Authentication[C]//Proc. of IEEE Interna- tional Conference on Image Processing. Genoa, Italy: IEEE Press, 2005: 673-676.
  • 6McEliece RJ著.信息论与编码理论(第二版)[M].李斗,殷悦,罗燕等泽.北京:电子工业出版社,2004:110-114.
  • 7和红杰,张家树,陈帆.一种高定位精度的可恢复水印算法[J].中国科学(E辑),2008,38(4):533-552. 被引量:9

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部