期刊文献+

DCT域半易损水印技术 被引量:12

DCT Based Semi-Fragile Watermarking Technique
下载PDF
导出
摘要 该文提出了一种DCT域半易损水印技术用于图像内容认证.水印嵌入算法基于DCT域的JPEG压缩不变特性,对一定质量的JPEG压缩是稳健的.水印比特包括认证比特和恢复比特.认证比特是块自嵌入的,可以对不可接受的图像篡改进行准确的检测和定位,而恢复比特则可以对篡改的图像进行一定程度的恢复.该文还分析了DCT变换过程中取整误差的影响,从理论上证明了水印嵌入算法中迭代过程的收敛性.实验结果证明了该半易损水印可以容许一定程度的JPEG压缩和AWGN噪声,对局部发生的篡改可以有效地检测、精确定位并进行内容恢复. This paper introduces a DCT based semi-fragile watermarking for image content authentication. The embedding algorithm is based on some invariant properties in JPEG compression to get robustness against JPEG compression. The watermark includes authentication bits and recover bits. The authentication bits are block self-embedded and have the ability of detecting and localizing unacceptable tamper in image, while the recover bits are used to reconstruct the tampered area approximately. The impact of integer rounding error is analyzed,and the convergence of iteration process is demonstrated. The experimental results demonstrates that the proposed algorithm can tolerate the distortion under certain JPEG compression and AWGN, and can effectively detect, localize and restore the tampered area.
作者 钟桦 焦李成
出处 《计算机学报》 EI CSCD 北大核心 2005年第9期1549-1557,共9页 Chinese Journal of Computers
基金 国家自然科学基金(60133010)资助
关键词 半易损水印 图像内容认证 HASH函数 JPEG压缩 取整误差 semi-fragile watermarking image content authentication hash JPEG compression rounding error
  • 相关文献

参考文献13

  • 1Friedman G.L.. The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Transactions on Consumer Electronics, 1993, 39(4): 905~910.
  • 2Schyndel R.G.., Tirkel A.Z., Osborne C.F.. A digital watermark. In: Proceedings of the ICIP, Austin, Texas, 1994, 86~90.
  • 3Yeung M., Mintzer F.. An invisible watermarking technique for image verification. In: Proceedings of the ICIP, Santa Barbara, California, 1997, 680~683.
  • 4Fridrich J., Goljan M., Baldoza A.C.. New fragile authentication watermark for images. In: Proceedings of the ICIP, Vancouver, Canada, 2000, 446~449.
  • 5Wong P.W., Memon N.. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing, 2001, 10(10): 1593~1601.
  • 6Fridrich J.. Image watermarking for tamper detection. In: Proceedings of the ICIP, Chicago, 1998, 404~408.
  • 7Kundur D., Hatzinakos D.. Digital watermarking for telltale tamper proofing and authentication. Proceedings of the IEEE, 1999, 87(7): 1167~1180.
  • 8Lin Ching-Yung, Chang Shih-Fu. Semi-fragile watermarking for authenticating JPEG visual content. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents, EI'00, San Jose, CA, 2000, 140~151.
  • 9Bhattacha S., Kutter M.. Compression tolerant image authentication. In: Proceedings of the ICIP, Chicago, 1998, 435~439.
  • 10Xie L., Arce G.R., Graveman R.F.. Approximate image message authentication codes. IEEE Transactions on Multimedia, 2001, 3(2): 242~252.

同被引文献105

引证文献12

二级引证文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部