期刊文献+

一种基于小波的脆弱水印算法 被引量:3

A Fragile Watermarking Arithmetic Based on Wavelet
下载PDF
导出
摘要 针对数字产品的安全问题,根据离散小波变换(DWT)多分辨率性质,结合人类视觉系统(HVS)特征,提出了一种基于小波的脆弱水印算法.检测器从接收到的水印图像中提取出水印信号,并与原始水印进行比较,从而证明宿主图像是否有篡改发生.实验结果证明,该算法具有防篡改和准确识别篡改区域的能力. In the light of safety question of digital products and combining the multi - resolution advantages of discrete wavelet transform (DWT) and the features of Human Visual System ( HVS), we propose a fragile watermarking arithmetic based on wavelet. The tamper detector can pick up the watermarking signal from the received watermarked image, compared with the original watermark to prove whether the original image has been tampered or not. The experimental results demonstrate the arithmetic has the ability of defend -tamper and accurately locating where watermarked image has been tampered.
出处 《哈尔滨理工大学学报》 CAS 2006年第5期24-26,30,共4页 Journal of Harbin University of Science and Technology
基金 黑龙江省教育厅科技项目资助(10051054)
关键词 脆弱水印 DWT 嵌入水印 HVS 篡改检测 fragile watermark DWT embed the watermark HVS tamper detection
  • 相关文献

参考文献8

二级参考文献28

  • 1张静,张春田.用于图象认证的数字水印技术[J].中国图象图形学报(A辑),2003,8(4):367-378. 被引量:29
  • 2[1]Walton S. Information authentication for a slippery new age [J]. Dr Dobbs Journal,1995,20(4):18-26.
  • 3[2]Wong PW. A public key watermark for image verification and authentication[A]. Proceedings of the IEEE International Conference on Image Processing[C]. Chicago,Illinois,USA,1998,1.455-459.
  • 4[3]Holliman M, Memon N. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes[J]. IEEE Transactions on Image Processing, 2000,9(3):432-441.
  • 5[4]Fridrich J, Goljan M. Images with self-correcting capabilities[A]. Proceedings of the IEEE International Conference on Image Processing[C]. Kobe,Japan,1999,3.792-796.
  • 6[5]Celik M, Sharma G, Saber E, et al. Hierarchical watermarking for secure image authentication with localization[J]. IEEE Transactions on Image Processing, 2002,11(6):585-595.
  • 7[6]Li C-T, Yang FM, Lee CS. Oblivious Fragile Watermarking Scheme For Image Authentication[A]. Proc IEEE International Conference on Acoustics, Speech, and Signal Processing[C]. Orlando, FL, USA, 2002,VI.3445-3448.
  • 8[7]Fridrich J. Security of fragile authentication watermarks with localization[A]. Proc SPIE[C], 2002.
  • 9[8]Marvel LM, Hartwig G. Boncelet Jr CG. Compression compatible fragile and semi-fragile tamper detection[A]. Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents Ⅱ[C]. San Jose, CA,USA, 2000.140-151.
  • 10[9]Kundur D, Hatzinakos D. Digital Watermarking for Telltale Tamper-Proofing and Authentication[A]. Proceedings of the IEEE Special Issue on Identification and Protection of Multimedia Information[C], 1999.1167-1180.

共引文献26

同被引文献8

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部