期刊文献+

混沌映射的半脆弱图像数字水印算法 被引量:3

Chaos Based Semi-Fragile Image Watermarking Algorithm
下载PDF
导出
摘要 提出了一种抗JPEG有损压缩的半脆弱图像数字水印算法.该算法充分利用混沌映射对初值的敏感性,并根据JPEG图像压缩过程中DCT系数的不变特性,将预先量化的DCT低频系数和水印密钥合成为混沌系统的初值,经过多次混沌迭代生成水印信号.根据水印信号调整块对间DCT系数的大小,完成水印的嵌入调制.实验结果表明,该算法对JPEG有损压缩具有良好的鲁棒性,同时可对图像内容的恶意篡改进行精确的检测与定位. A semi-fragile image watermarking technique that accepts JPEG lossy compression was developed. With the high sensitivity on initial value of chaotic mapping and the invariant properties of DCT coefficients before and after JPEG compression, the pre-quantized low DCW coefficients and a watermarking key are combined as the initial value of logistic map for generating the watermark. The watermarked image was obtained by modifying the DCT coefficients in block pairs according to the watermark. The experimental results showed the effectiveness of this system. The proposed technique was robust against JPEG lossy compression, but sensitive to the malicious attacks on the watermarked image. In the meantime, it can localize the tampers correctly and accurately.
出处 《北京交通大学学报》 EI CAS CSCD 北大核心 2007年第2期52-56,共5页 JOURNAL OF BEIJING JIAOTONG UNIVERSITY
关键词 图像认证 半脆弱数字水印 JPEG 混沌 image authentication semi-fragile watermarking JPEG chaos
  • 相关文献

参考文献8

二级参考文献29

  • 1[1]I J Cox,J Kilian,T Leighton,T Shamoon.Secure spread spectrum watermarking for multimedia[J].IEEE Trans,1997,IP-6(12):1673-1687.
  • 2[2]M Yeung,F Mintzer.An invisible watermarking technique for image verification[A].Proc.Int.Conf.Image Processing[C].Barbara California,1997.680-683.
  • 3[3]Wong P W.A public key watermark for image verification and authentication[A].Proc.IEEE ICIP[C].Chicago,USA,1998.425-429.
  • 4[4]J Zhao,E Koch.Embedding robust labels into images for copyright protection,Intellectual Property Rights New Technologies[A].Proc.KnowRight'95 Conf[C].California,1995.242-251.
  • 5[5]Matth Holliman,Nasir Memon,Counterfeiting attacks on oblivious block-wise independent invisible watermark schemes[J].IEEE Trans,2000,IP-19(3):432-441.
  • 6[6]Fridrich J,Goljan M,Memon N.Further attacks on Yeung-Mintzer watermarking scheme[A].Proc.SPIE Security and Watermarking of Multimedia Contents[C].San Jose,California,2000.428-437.
  • 7C S Lu, H Y Mark Liao. Multipurpose watermarking for image authentication and protection[J]. IEEE Trans on Image Processing,2001, 10(10):1579-1592.
  • 8M U Celik, G Sharma, E Saber, et al. Hierarchical watermarking for secure image authentication with localization[J]. IEEE Trans on Image Processing. 2002,11(6):585-595.
  • 9P W Wong. Public key watermark for image verification and authentication[A] .Proc of 1998 IEEE Int Con on Image Processing[C]. Chicago, IL, USA: IEEE, 1998,1:455-459.
  • 10D Kundur, D Hatzinakos. Digital watermarking for telltale tamper profing and authentication[J]. Proc of the IEEE, 1999, 87(7):1167-1180.

共引文献72

同被引文献21

  • 1陈帆,朱大勇,许毅.基于混沌和图像内容的脆弱水印方案[J].计算机应用,2005,25(9):2151-2154. 被引量:5
  • 2胡玉平,陈志刚.用于图像认证的小波域半易损水印算法[J].电子学报,2006,34(4):653-657. 被引量:12
  • 3甘艳芬,郑胜林,潘保昌,曾健,赵全友.基于超混沌加密的脆弱数字水印技术[J].计算机技术与发展,2006,16(10):145-148. 被引量:4
  • 4张宪海,杨永田.基于脆弱水印的图像认证算法研究[J].电子学报,2007,35(1):34-39. 被引量:35
  • 5王向阳,陈利科.一种新的自适应半脆弱水印算法[J].自动化学报,2007,33(4):361-366. 被引量:17
  • 6Chandra DV S. Digital Image Watermarking Using Singular Value Decomposition[C].Proceedings of 45th IEEE Mid- west Symposium on Circuits and Systems, Tulsa, OK, USA, 2002 : 264 - 267.
  • 7Fridrich J, Goljan M, Memon N. Further Attacks on Yeung-Mintzer Fragile Watermarking Scheme [ C ].Proc. SPIE vol. 3971 Security and Watermarking of Multimedia Contents II, California: SPIE,2000: 428-437.
  • 8Xie L, Arce G R, Graveman R F. Approximate Image Message Authentication Codes[J]. IEEE Transactions on Multimedia,2001, 3(2) : 242 - 252.
  • 9Lin Chingyung, Chang Shihfu. A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation [ J ]. IEEE Transactions on Circuits and Systems of Video Technology, 2001; 11 (2) : 153 - 168.
  • 10Celik M, Sharma G, Saber E, et al. A Hierarchical Image Authentication Watermark with Improved Localization and Security[C].Proceedings of the IEEE International Conference on Image Processing, Thessalonlki, Greece, 2001,2 : 502 - 505.

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部