期刊文献+

利用视觉掩蔽值的稳健水印认证算法 被引量:1

A robust watermarking authentication algorithm using the value of visual masking
下载PDF
导出
摘要 提出一种稳健水印认证算法,它以人类视觉掩蔽值为量化阶,同时满足了稳健和不可感知性的要求,其安全性取决于隐藏密钥而非量化阶,量化阶可以公开,从而避免了利用人类视觉特性时常见的安全性问题.实验结果表明,该算法能够区分一般的图像处理操作和恶意篡改,而且对于恶意篡改还能根据水印误差图样给出被篡改的区域. A robust watermarking authentication algorithm is proposed with the value of visual masking as the quantization size. The security depends on hiding keys rather than quantization sizes which now can be opened. Therefore, it avoids some security demerits when using human visual characteristics. Furthermore, our scheme is able to distinguish common image processing from malicious tampering, and even to indicate the area where the malicious tampering arises on the basis of the error image of watermarks.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2004年第6期929-933,共5页 Journal of Xidian University
基金 国家863计划项目(2002AA144060)
关键词 水印 视觉掩蔽 算法 人类视觉特性 隐藏 认证 不可感知性 量化 稳健 密钥 watermarking authentication robust watermarks the value of visual masking
  • 相关文献

参考文献8

  • 1Wong P W. A Public Key Watermark for Image Verification and Authentication[A]. ICIP'98: Vol 1[C]. Chicago: IEEE Computer Society Press, 1998. 425-429.
  • 2Li C T, Luo D C, Chen T H. Image Authentication and Integrity Verification Via Content-based Watermarks and a Public Key Cryptosystem[A]. ICIP: Vol 3[C]. Canada: IEEE Computer Society Press, 2000. 694-697.
  • 3Martinian E, Chen B, Wornell G. Information Theoretic Approach to the Authentication of Multimedia[A]. SPIE on Security and Watermarking of Multimedia Contents: Vol 4314[C]. San Jose: the International Society of Optical Engineering, 2001. 185-196.
  • 4Kundur D, Hatzinakos D. Towards a Telltale Watermarking Technique for Tamper Proofing[A]. ICIP'98: Vol 2[C]. Chicago: IEEE Computer Society Press, 1998.
  • 5Watson A B, Yang G Y, Solomon J A, et al. Visual Thresholds for Wavelet Quantization Error[A]. Proc SPIE Human Vision and Elecronic Imaging: Vol 2657[C]. Bellingham: the Society for Imaging Science and Technology, 1996. 382-392.
  • 6Podilchuk C I, Zeng W. Image-adaptive Watermarking Using Visual Models[J]. IEEE Trans on Selectred Areas of Communications, 1998, 16(4): 525-539.
  • 7Wolfgang R B, Podilchuk C I, Delp E J. Perceptual Watermarks for Digital Images and Video[J]. Proc of IEEE, 1999, 87(7): 1108- 1126.
  • 8王卫卫,杨波,宋国乡.图像可靠性鉴定的数字水印算法[J].西安电子科技大学学报,2001,28(4):507-511. 被引量:5

二级参考文献1

  • 1Schneider M,Proc IEEE Int Conf Image Processing:Vol 3,1996年,227-230页

共引文献4

同被引文献8

  • 1Zuoping Chen,Zhenglin Ye.Target recognition based on mathematical morphology[].Computer-Aided Design and Computer Graphics International Con- ference Proceedings.2007
  • 2Akihiro Okamoto,Akio Miyazaki.A digital wa- termark technique using morphological signal proc- essing[].Electronics and Communications in Japan (Part III: Fundamental Electronic Science).2003
  • 3K. Sepsirisuk,K. Atsuta,S. Kondo.An improved wavelet-based watermarking method using the mathematical morphology[].Eighth International Workshop on Image Analysis for Multimedia Inter- active Service (WIAMIS’).2007
  • 4Gui Xie,M. N. S Swamy,M. Omair Ahmad.Perceptual-shaping comparison of DWT-based pixel-wise masking model with DCT-based watson model[].Image Processing IEEE International Con- ference Proceedings.2006
  • 5Sedaaghi M H,Yousefi S.Morphological watermarking[].IEEE Electronics Letters.2005
  • 6Rizk MR M,Youssef A E,EI-Khamy S E.Adaptive watermarking techniques based on multi-scale morphological image seg-mentation[].Proceedings ofthe Mediterranean Electrotechnical Conference.2006
  • 7Khelifi F,Bouridane A,Kurugollu F.An improved wavelet-based image watermarking technique.In: Proceedings of IEEE Conference on Advanced Video and Signal Based Surveillance[].Italy.2005
  • 8Xie Gui,Shen Hong.Toward improved wavelet-based watermarking using the pixel-wise masking model[].IEEE International Conference on Image Processing ICIP.2005

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部