期刊文献+

基于小波变换的图象内容篡改识别与定位算法

Algorithm Used to Detect and Localize Tampers Based on DWT
下载PDF
导出
摘要 提出了一种对图象内容篡改的识别与定位算法,可用于图象内容的完整性验证。首先对原始图象进行2层小波变换,将变换后的小波近似系数以相邻的4个系数(2X2)为一组,计算每组的均值,利用原始图象的HVS特性,以均值为载体嵌入水印信号,对一般的图象处理操作(有损压缩、中值滤波等),系数的均值比单个系数有较强的稳定性。提取水印时不需要原始图象,实验结果表明,该算法对一般的图象处理操作具有好的鲁棒性而对篡改攻击能准确地识别和定位。 In this paper,we propse a algorithm used to detect and localize tampers based on DWT which can be used for image authentication.We transform the image into wavelet domain and group the four adjacent wavelet coefficients.Utilizing the characteristics of the human visual system,we embed a digital signal into the average value of the four adjacent wavelet coefficients since the average value has better stability than single wavelet coefficient.This method needn't original image when extracts the watermark.Experimental results show the effectiveness of this method which is robust to common image process and fragile to malicious attack.
出处 《计算机工程与应用》 CSCD 北大核心 2004年第17期95-97,共3页 Computer Engineering and Applications
关键词 小波变换 数字水印 篡改识别 wavelet transform,watermark,tamper Detection
  • 相关文献

参考文献7

  • 1S Bhattacharjee,M Kutter. Compression tolerant image authentication[C].In:IEEE Int Conf on Image Processing, 1998:1:4~7
  • 2C-Y Lin,S F Chang. A robust image authentication method surviving JPEG lossy compression[C].In:Int Conf on storage and Retrieval of Image/Video Database,Proc SPIE3312,1998
  • 3D Kundur,D Hatzinakos. Digital watermarking for telltale tamper proofing and authentication[C].In: Proc IEEE 87,1999:1167~1180
  • 4J Dittmann et al.Content-based digital signature for motion pictures authentication and content-fragile watermarking[C].In:IEEE Int Conf Multimedia Computing and Systems, 1999:Vol.Ⅱ
  • 5黄达人,刘九芬,黄继武.小波变换域图像水印嵌入对策和算法[J].软件学报,2002,13(7):1290-1297. 被引量:216
  • 6A B Warson,G Y Yang,J A Solomon et al.Visibility of wavelet quantization noise[J].IEEE Trans Image Process, 1997; 6 (8): 1164~1175
  • 7Marcia G Ramos,Sheila S Hemami.Perceptual quantization for waveletbased image coding[C].In:Proc IEEE Int Conf on Image Processing,Vancouver, BC, 2000-09

二级参考文献15

  • 1[1]Zhu, W.W., Xiong, Z.X., Zhang, Y.Q. Multiresolution watermarking for image and video. IEEE Transactions on Circuits and Systems for Technology, 1999,9(4):545~549.
  • 2[2]Wang, H-J.M, Su, P-C., Kuo, C-C.J. Wavelet-Based digital image watermarking. Optics Express, 1998,3(12):491~496.
  • 3[3]Swanson, M., Kobayashi, M., Tewfik, A. Multimedia data embedding and watermarking technologies. Proceedings of the IEEE, 1998,86(6):1064~1087.
  • 4[4]Wolfgang, R., Podilchuk, C., Delp, E. Perpetual watermarks for digital images and video. Proceedings of the IEEE, 1999,87(7): 1108~1126.
  • 5[5]Delaigle, J., Vleechouwer, C., Macq, B. Watermarking algorithm based on a human visual model. Signal Processing, 1998,66(3): 319~335.
  • 6[6]Podilchuk, C., Zeng, W. Image-Adaptive watermarking using visual models. IEEE Journal of Selected Areas on Communications, 1998,16(4):525~539.
  • 7[7]Shapiro, J. M. Embedded image coding using zerotrees of wavelet coefficients. IEEE Transactions on Signal Processing, 1993, 41(12):3445~3462.
  • 8[8]Zou, H., Tewfik, H. Discrete orthogonal M-Band wavelet decompositions. In: Proceedings of the IEEE 1992 International Conferences on Accoustics, Speech, and Signal Processing. San Francisco: IEEE Signal Processing Society, 1992. 605~ 608.
  • 9[9]Mallat, S., Zhong, S. Characterization of signals form multiscale edges. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1992, 14(7):710~732.
  • 10[10]Cox, J., Killian, J., Leighton, T., et al. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 1997,6(12):1673~1687.

共引文献215

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部