期刊文献+

基于感兴趣区域的图像认证与自恢复算法 被引量:5

A Self-recovery Algorithm Based on Region of Interest
下载PDF
导出
摘要 提出了一种基于感兴趣区域的图像认证与自恢复算法,该算法将图像分为两部分:感兴趣区域和背景区域.算法首先利用了基于4×4分块的编码算法对感兴趣区城进行编码,然后通过映射函数将此码流嵌入到背景图像的离散余弦变换系数中.实验表明该算法可以对整幅图像进行完整性认证,同时对被恶意篡改的感兴趣区域也能很好地恢复原来信息. A self-recovery algorithm based on region of interest is proposed in this pa-per.This algorithm divides a host image into two parts:region of interest and region ofbackground.The region of interest is coded based on 4×4 blocks,and the codes are thenembedded into the DCT coeffcients of the region of background by a novel mapping func-tion.Experimental results indicate that this scheme can authenticate the whole image,atthe same time,if the region of interest is tampered maliciously,the scheme can recover theoriginal content with good quality.
出处 《自动化学报》 EI CSCD 北大核心 2004年第6期833-843,共11页 Acta Automatica Sinica
基金 国家自然科学基金(60172054 69825105)国家"863"高技术研究发展计划基金(2003AA144080)资助
关键词 图像自恢复 感兴趣区域 半脆弱性水印 完全脆弱性水印 Self-recovery region of interest semi-fragile watermarking complete fragile watermarking
  • 相关文献

参考文献13

  • 1Utku Celik M, Sharma G, Saber E, Murat Tekalp. Hierarchical Watermarking for Secure Image Authentication With Localization. IEEE Transactions on Image Processing, 2002, 11(6): 585-595
  • 2Wong P. A Watermark for Image Integrity and Ownership Verification. In: Proceeding of Image Processing,Image Quality, Image Capture, Systems Conference. Portland, Oregon: May 1998. 374-379
  • 3Schneider M, Chang S. A robust content based digital signature for image authentication. In: proceeding of IEEE International Conference on Image Processing. Lausanne, Switzerland: Sep. 1996. 227-230
  • 4Xie L, Arce G. A Class of Authentication Digital Watermarks for Secure Multimedia Communication. IEEE Transactions on Image Processing, 2001, 10(11): 1754-1764
  • 5Bhattacharjee S, Kutter M. Compression tolerant image authentication. In: proceeding of IEEE International Conference on Image Processing, Chicago: Oct. 1998. 4-7
  • 6Marvel L, Hartwig G, Boncelet C. Compression-compatible fragile and semi-fragile tamper detection. In:Proceedings of SPIE-The International Society for Optical Engineering, Security and Watermarking of Multimedia Contents. San Jose, California: 2000. 140
  • 7Wu M, Liu B. Watermarking for image authentication IEEE Transactions on Image Processing, 1998, 2:437-441
  • 8Holliman M, Memon N. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000, 9(3): 432-441
  • 9Kundur D, Hatzinakos D. Towards a Telltale Watermarking Technique for Tamper-proofing IEEE Transactions on Image Processing, 1998, 2:409-413
  • 10Lin C Y, Chang S F. Semi-Fragile Watermarking for Authenticating JPEG Visual Content. In: proceeding of SPIE-The International Society for Optical Engineering, International Conf. on Security and Watermarking of Multimedia Contents Ⅱ. San Jose, USA: Jan

同被引文献38

引证文献5

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部