期刊文献+

基于图像内容可恢复的脆弱水印技术 被引量:3

Image-Content-Based Fragile Watermarking with Restoration Capability
下载PDF
导出
摘要 提出了一种用于图像内容认证和保护的脆弱数字图像水印算法,该算法不仅可以检测定位出图像中内容的篡改,而且可以恢复被篡改的图像内容。算法用小波变换提取出图像的低频部分作为水印,然后再用RS纠错编码技术对水印进行编码,再利用置乱技术及加密技术将校验码处理后植入图像的最低有效位。实验结果证明该算法是比较有效的脆弱水印算法。 This paper gives an auto-restorable fragile watermarking algorithm for image content authentication, which can not only detect the location of any changes in images but also restore the altered image content. Firstly, the low frequents sector picked up by discrete wavelet transform(DWT) as watermarking. Then the RS correct-encode technology is used to encode the watermarking. Finally, tile watermarking data are embed into the lowest bits of the image data after being changed with arnold shuffling techniques and chaotic encrypt tentechniques. Experimental results demonstrate that the watermarking algorithm is a valid fragile digital image watermarking algorithm.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2006年第6期924-927,共4页 Journal of University of Electronic Science and Technology of China
关键词 小波变换 脆弱水印 RS纠错编码 置乱 wavelet transform fragile watermarking RS correct-encode shuffling
  • 相关文献

参考文献6

  • 1Lee J,Won C S.Authentication and correction of digital watermarking images[J].Electronic Letters,35(11):1999,886-887.
  • 2Lee J,Won C S.Image intergrity and correction using parities of error control coding[C]//IEEE International Conference on Multimedia and Expo.,2000.
  • 3Fridrich J,Goljan M.Images with self-correcting capabilities[C]//Proceedings of the IEEE International Conference on Image Processing,1999.
  • 4郑江滨,冯大淦,张艳宁,赵荣椿.可恢复的脆弱数字图像水印[J].计算机学报,2004,27(3):371-376. 被引量:10
  • 5MALLATS 杨力华 戴道清 黄文良译.信号处理的小波导引[M].北京:机械工业出版社,2002.124-132.
  • 6张华熊,仇佩亮.置乱技术在数字水印中的应用[J].电路与系统学报,2001,6(3):32-36. 被引量:107

二级参考文献12

  • 1[1]Cox I.J., Miller M.L., Bloom J.A.. Digital Watermarking.San Fransisco, USA: Morgan Kaufmann Publishers, 2002
  • 2[2]Hartung F., Kutter M.. Multimedia watermarking techniques. Proceedings of the IEEE, 1999, 87(7): 1079~1107
  • 3[3]Friedman G.L.. The trustworthy camera: Restoring credibility to photographic image. IEEE Transactions on Consumer Electronics, 1993, 39(4): 905~910
  • 4[4]Walton S.. Information authentication for a sippery new age. Dr. Bobbs Journal, 1995, 20(4): 18~26
  • 5[5]Barreto P.S.L.M., Kim H.Y., Rijmen V.. Toward secure public-key blockwise fragile authentication watermarking. IEE Proceedings of Vision, Image and Signal Processing, 2002, 149(2): 57~62
  • 6[6]Lee Sang-Kwang, Ho Yo-Sung. Fragile watermarking scheme using a simple genetic algorithm. In: Proceedings of International Conference on Consumer Electronics of ICCE, 2002 Digest of Technical Papers, Auckland, New Zealand, 2002, 190~191
  • 7[7]Lee Jaejin, Won Chee Sun. Authentication and correction of digital watermarking images. Electronics Letters of IEE, 1999, 35(11): 886~887
  • 8[8]Wu Chuan-fu, Hsieh Wen-shyong. Image refining technique using digital watermarking. IEEE Transactions on Consumer Electronics, 2000, 46(1): 1~5
  • 9[9]Jiri Fridrich. Image watermarking for tamper detection. In: Proceedings of IEEE International Conference on Image Processing, Chicago Illinois, USA, 1998, 2: 404~408
  • 10丁玮,闫伟齐,齐东旭.基于生命游戏的数字图像置乱与数字水印技术[J].北方工业大学学报,2000,12(1):1-5. 被引量:34

共引文献152

同被引文献33

引证文献3

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部