期刊文献+

结合Zernike矩和水印的半脆弱图像认证 被引量:6

Semi-Fragile Image Authentication Based on Zernike Moments and Watermark
下载PDF
导出
摘要 水印安全性、抗JPEG的鲁棒性和篡改检测能力的矛盾、计算复杂度是现有基于数字水印的半脆弱图像认证算法需要克服的主要问题.本文提出一种结合Zernike矩和水印的图像认证算法.利用图像小波变换低频子带的Zernike矩幅值的半脆弱特性区分恶意攻击和偶然攻击.结合基于HVS(人类视觉系统)的水印后,可判断图像是否受到伪认证攻击,提高了水印安全性.通过采用基于提升格式的整数小波变换,有效降低了算法计算复杂性.实验结果表明,算法对较低质量因子的JPEG有损压缩鲁棒,对剪切、替换等恶意修改敏感且可准确定位篡改位置. How to ensure watermark security, how to overcome the contradiction between robustness and JPEG lossy compression, how to cancel out the contradiction between fragility and malicious tamper, and how to reduce the computational complexity are the main issues to be solved in the existing semi-fragile image authentication algorithms based on watermark technique. In this paper, a semi-fragile image authentication algorithm using Zernike moments and watermark is proposed. It can distinguish malicious modification from incidental modification according to semi-fragile characteristics of Zernike moments of the low frequency subband in the integer wavelet transform domain of an image. Combining the semi-fragile characteristics of Zernike moments and the watermark based on human visual system, it can discern counterfeit attack, thus, improving watermark security. Computational complexity is reduced by integer wavelet transform using lifting scheme. Experimental results show that the proposed algorithm tolerates JPEG lossy compression to a large extent, and meanwhile it is fragile to malicious tamper and capable of locating the tampered area accurately.
出处 《自动化学报》 EI CSCD 北大核心 2007年第2期145-150,共6页 Acta Automatica Sinica
基金 国家自然科学基金(90604008 60633030) 国家973计划(2006CB303104) 广东省自然科学基金团队项目(04205407) 广州市科技攻关项目(200523-D0391)资助~~
关键词 半脆弱图像认证 ZERNIKE矩 图像水印 人类视觉系统 整数小波变换 Semi-fragile image authentication, Zernike moments, image watermarking, human visual system, integer wavelet transform
  • 相关文献

参考文献10

  • 1Zhu B B, Swanson M D, Tewfik A H. When seeing isn't believing. IEEE Transaction on Signal Processing Magazine,2004, 21(2): 40-49
  • 2Lin E T, Delp E J. A review of fragile image watermarks.In: Proceedings of the Multimedia and Security Workshop (ACM Multimedia'99). Orlando: ACM Press, 1999. 25-29
  • 3Kundur D, Hatzinakos D. Towards a telltale watermark techniques for tamper-proofing. In: Proceedings of the IEEE Internation Conference on Image Processing. IEEE, 1998. 2:409-413
  • 4Lin C Y, Chang S F. Semi-fragile watermarking for authentication jpeg visual content. In: Proceedings of SPIE Security and Watermarking of Multimedia Content II. San Jose:SPIE Press, 2000. 140-151
  • 5Han S J, Chang I S, Park R H. Semi-fragile watermarking for tamper proofing and authentication of still images. Lecture Notes in Computer Science, Springer, 2004, 2939:328-339
  • 6Sweldens W. The lifting scheme: A custom-design construction of biorthogonal wavelets. Journal of Applied and Computational Harmonic Analysis, 1996, 3(2): 186-200
  • 7Daubechies I, Sweldens W. Factoring wavelet transforms into lifting steps. Journal of Fourier Analysis and Applications, 1998, 4(3): 247-269
  • 8Calderbank A R, Daubechies I, Sweldens W, Yeo B L.Wavelet transforms that map integers to integers. Journal of Applied and Computational Harmonic Analysis, 1998, 5(3):332-369
  • 9Khotanzad A, Hong Y H. Invariant image recognition by Zernike moments. IEEE Transaction on Pattern Analysisand Machine Intelligence, 1990, 12(5): 489-497
  • 10Watson A B, Yang G Y, Solomon J A, Villasenor J. Visibility of wavelet quantization noise. IEEE Transaction on Image Processing, 1997, 6(8): 1164-1175

同被引文献74

引证文献6

二级引证文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部