期刊文献+

一种新的自适应半脆弱水印算法 被引量:17

A Novel Adaptive Semi-fragile Watermarking Scheme Based on Image Content
下载PDF
导出
摘要 提出了一种基于图像内容的自适应半脆弱数字水印算法.该算法首先结合梯度分割阈值选取策略,自适应抽取图像内容特征并作为水印信息;然后利用载体图像邻域特性自适应确定量化步长,并通过量化调制小波系数嵌入数字水印;最后通过比对提取出的水印信息与重新抽取出的图像内容特征,实现对待检测图像的完整性检验和篡改定位.仿真实验证明,该自适应半脆弱图像水印算法不仅具有较好的篡改检测与定位能力,而且具有较强的抗攻击能力. This paper proposes a novel semi-fragile watermarking scheme, which is robust against regular manipulations, for image authentication. The semi-fragile watermarking scheme extracts the content feature (watermark) from the original image by adaptively gradient partitioning, and inserts this content feature back into the image by modulating the wavelet coefficients. To enhance the robustness and invisibility of this scheme, the adaptive quantization step is calculated according to the local image characteristics. The integrity authentication and tamper detection are implemented by comparing the extracted watermark and the extracted content feature. Experimental result shows that if there is no change in the obtained image, the watermark will be correctly extracted, and thus will pass through the authentication system. This scheme is tolerant of regular manipulations (such as JPEG2000 compression), but malicious changes of the image will result in breaches of the watermark detection. In addition, this scheme can detect the exact locations-the illegal modified blocks.
出处 《自动化学报》 EI CSCD 北大核心 2007年第4期361-366,共6页 Acta Automatica Sinica
基金 辽宁省自然科学基金(20032100) 视觉与听觉信息处理国家重点实验室开放基金(0503) 大连市科技基金(2006J23JH020) "图像处理与图像通信"江苏省重点实验室开放基金(ZK205014) 江苏省计算机信息处理技术重点实验室开放课题基金(KJS0602)资助~~
关键词 半脆弱水印 图像特征 梯度 图像局部特性 去噪 Semi-fragile watermark, image feature, gradient, local image characteristic, denoise
  • 相关文献

参考文献8

二级参考文献77

  • 1(美)P.布雷特利 杨惟高等(译).模拟导论[M].北京:机械工业出版社,1991..
  • 2Honsinger C.W., Jones P., Rabbani M., Stoffel J.C.. Lossless recovery of an original image containing embedded data. U.S. Patent No. 6,278,791, 2001
  • 3Fridrich J., Goljan M., Du R.. Lossless data embedding for all image formats. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 572~583
  • 4Tian J.. Wavelet-based reversible watermarking for authentication. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 679~690
  • 5Holliman M., Memon N.. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000, 9(3): 432~441
  • 6Fridrich J., Goljan M., Memon N.. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262~274
  • 7Wu J., Zhu B., Li S., Lin F.. Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes. In: Proceedings of the IEEE International Conference on Multimedia & Expo (ICME'04), Taiwan, 2004
  • 8Wu J., Zhu B., Li S., Lin F.. New attacks on SARI image authentication system. In:Proceedings of the SPIE,Vol.5306, Security and Watermarking of Multimedia Contents VI, San Jose, California, USA, 2004, 602~609
  • 9Yeung M., Mintzer F.. Invisible watermarking for image verification. Journal of Electronic Imaging, 1998, 7(3): 578~591
  • 10Wu M., Liu B.. Watermarking for image authentication. In: Proceedings of the IEEE International Conference on Image Processing, Chicago, USA, 1998, 2: 437~441

共引文献154

同被引文献145

引证文献17

二级引证文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部