期刊文献+

基于拉普拉斯金字塔的图像内容认证方法

Image Content Authentication Technique Based on Laplacian Pyramid
下载PDF
导出
摘要 为了验证图像内容的真实性,提出了一种基于拉普拉斯金字塔的图像内容认证方法.在发送端首先对图像进行拉普拉斯金字塔分解,然后根据拉普拉斯金字塔分析原图像的光滑特性和细节特性,并对其特性进行编码得到特征值,最后将特征值加密后生成签名以水印方式嵌入原图像.在接收端将待测图像的特征值与从中抽取出的水印进行比较,对二者的差异图像以形态滤波的方法自动判断是否有图像内容被篡改,同时给出篡改的位置信息.实验结果表明,文中提出的图像内容验证算法可有效地检测出恶意篡改及其发生的位置,并可容忍由压缩、滤波、噪声污染等造成的失真. This paper proposes a technique of image the authenticity of image content. First, the image is content authentication based on the Laplacian pyramid to verify decomposed into Laplacian pyramid before the transformation. Next, the smooth and detailed properties of the original image are analyzed according to the Laplacian pyramid, and the properties are classified and encoded to get the corresponding characteristic values. Then, the signature derived from the encrypted characteristic values is embedded in the original image as a watermark. After the reception, the characteristic values of the received image are compared with the watermark drawn out from the image, and the algorithm automatically identifies whether the content is tampered by means of morphologic filtration. The information of tampered location is presented at the same time. Experimental results show that the proposed authentication algorithm can effectively detect the event and location when the original image content is tampered, and can tolerate some distortions produced by compression, filtration and noise degradation .
作者 沃焱 韩国强
出处 《华南理工大学学报(自然科学版)》 EI CAS CSCD 北大核心 2007年第1期34-38,69,共6页 Journal of South China University of Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(60573019) 广东省自然科学基金资助项目(05103541) 广东省自然科学基金博士科研启动基金资助项目(05300198)
关键词 数字水印 图像认证 拉普拉斯金字塔 数字签名 形态学 digital watermark image authentication Laplacian pyramid digital signature morphology
  • 相关文献

参考文献10

  • 1Wong P W,Memon N.Secret and public key image watermarking schemes for image authentication and ownership verification[J].IEEE Transactions on Image Processing,2001,10(10):1 593-1 601.
  • 2Memon N,Vora P,Yeo B L,et al.Distortion bounded authentication techniques[C]∥Proceedings of the SPIE on Security and Watermarking of Multimedia Contents II.San Jose:SPIE,2000:164-174.
  • 3Quelue M P.Towards robust,content based techniques for image authentication[C]∥IEEE Second Workshop on Multimedia Signal Processing.Redondo Beach:IEEE Press,1998:297-302.
  • 4Rey C,Dugelay J L.Blind detection of malicious alterations on still image using robust watermarks[C]∥IEE Seminar on Secure Images and Image Authentication.London:IEE Press,2000:7/1-7/6.
  • 5Xie Lie-hua,Arce G R.A class of authentication digital watermarks for secure multimedia communication[J].IEEE Transactions on Image Processing,2001,10(11):1 754-1 764.
  • 6沃焱,韩国强,张波.一种新的基于特征的图像内容认证方法[J].计算机学报,2005,28(1):105-112. 被引量:32
  • 7沃焱,韩国强,张见威,张波.基于小波变换和形态学的图像内容认证方法[J].通信学报,2005,26(8):9-15. 被引量:3
  • 8沃焱,韩国强.基于小波变换和视觉感知特性的盲水印算法[J].华南理工大学学报(自然科学版),2005,33(4):29-33. 被引量:5
  • 9Burt P,Adelson E.The Laplacian pyramid as a compact image code[J].IEEE Transactions on Communications,1983,31(4):532-540.
  • 10Song J,Delp E J.A generalization of morphological filters using multiple structuring elements[J].IEEE International Symposium on Circuits and Systems,1989,2(3):991-994.

二级参考文献25

  • 1Wong P.W.,Memon N..A public key watermark for imag everification and authentication.In:Proceedings of the IEEE International Conference on Image Processing,Chicago,1998,1: 455-459.
  • 2Memon N.,Vora P.,Yeo B.L.,Yeung M..Distortion bounded authentication techniques.In:Proceedings of the SPIE,Security and Watermarking of Multimedia Contents II,San Jose,USA,2000,397l:164-174.
  • 3Quelue M.P..Towards robust,content based techniques forimage authentication. In: Proceedings of the IEEE 2nd Workshop on Multimedia Signal Processing,Redondo Beach,1998,297-302.
  • 4Rey C.'Dugelay J.L..Blind detection of malicious alterations on still image using robust watermarks.In:IEE Seminar on Secure Images and Image Authentication.London,2000,7/1-7/6.
  • 5Xie Lie-Hua, Arce G.R.. A class of authentication digital Watermarks for secure multimedia communication.IEEEtransactions on Image Processing,2001,10(11):1754-1764.
  • 6Mallat S..Zhong S.Charactedzation of signals from multiscale edges.IEEE Transactions on Pattern Analysis and Machine Intelligence,1992,14(7):710-732.
  • 7Mallat S..A Wavelet Tour of Signal Processing.Second Edition.Beijing;China Machine Press'2002.
  • 8Zhang Lei,Bao Paul.Edge detection by scale multiplication in wavelet domain.Pattern Recognition Letters,2002,23(12):1771-1784.
  • 9Rivest R.L..The MD5 message digest algorithm.MIT Laboratory for Computer Science and RSA Data Security,Internet Engineering Task Force(IETF),RFC 1321,1992,37.
  • 10Safranek R J, Johnston J D. A perceptually tuned sub band image coder with image dependent quantization and post-quantization data compression [ A ]. International Conference on Acoustics, Speech, and Signal Processing [C]. New York: IEEE, 1989.1945 - 1948.

共引文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部