期刊文献+

一种用于图像内容认证的数字水印新方法 被引量:4

New watermarking algorithm for content authentication
下载PDF
导出
摘要 依据内容认证的特点和JPEG压缩原理提出一种半脆弱水印嵌入方法。该方法对原始图像进行分块DCT变换,每块取三个DCT低频系数,把这三个系数量化后取最低有效位,与水印的对应位进行异或运算得到密钥;再取三个高频系数进行异或等运算得到另一密钥。认证时使用这两个密钥来恢复水印信息。实验结果表明,该方法对JPEG压缩具有很好的鲁棒性,同时对滤波和加噪等处理具有很好的易碎性,适合于图像的内容认证。由于该水印方法不改变原图像,因而可应用于画面清晰度要求高的多媒体和认证系统中。 A digital image semi-fragile watermarking algorithm is presented based on the character of authentication and the elements of JPEG.The algorithm splits the original image to some blockes and do DCT transform,chooses three low-frequency coefficients in every block,quantizes them and chooses the least significance bits,then does the xor operations with the corresponding bits of water mark.,the result is the key.At the same time,we choose three high-frequency,and do the same operation and generate the other key.We use the two keys to extract the water mark to authenticate the image.The result of experiment show that this algorithm has good robust against JPEG,and frangibility against the familiar attacks,and beseem to selective authentication for image.Since the algorithm do not modify the original image,so it can be used in multimedia and authentication system that required high quality image.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第17期34-36,65,共4页 Computer Engineering and Applications
基金 国家自然科学基金(the National Natural Science Foundation of China under Grant No.60575023) 教育部博士点基金(No.20050359012)
关键词 半脆弱水印 图像认证 DCT变换 密钥 semi-fragile watermarking image authenticate DCT transform key
  • 相关文献

参考文献10

  • 1易开详.数字图像加密与数字水印技术研究[D].杭州:浙江大学,2001.
  • 2Wu M,Liu B.Watermarking for image authentication[J].IEEE Transaction on Image Processing,1998,2:437-441.
  • 3Noguchi Y.Kobayashi H,Kiya H.A method of extracting embedded binary data from JPEG bitstreams using standard JPEG decoder[J].IEICET Transaction Fundamentals of Electronics,Communications and ComputerScience,2000,E83-A(8):1582-1588.
  • 4Lin C-Y,Chang S-F.A robust image authenlieation method surviving JPEG lossy compression[J].Storage and Re trieval of Image/Video Database,1998,SPIE-3312:296-307.
  • 5Lin C-Y,Chang S-F,Semi-fragile watermarking for authenticating JPEG visual content[J].Security and Watermarking of Multimedia Content Ⅱ,2000,SPIE-3971:140-151.
  • 6Chang C C.Hwang K F,Hwang M S.Robust authentication scheme for protecting copyrights of images and graphics[J].IEEE Proceedings,2002,149(1):43-50.
  • 7郭宝龙,张永平,郭磊.基于DCT系数重构的分层认证水印算法[J].西安电子科技大学学报,2004,31(1):1-5. 被引量:6
  • 8任娟,王蕴红,谭铁牛.基于感兴趣区域的图像认证与自恢复算法[J].自动化学报,2004,30(6):833-843. 被引量:5
  • 9Macy W,Holliman M J.Quality evaluation of watermarked video[J].Proc SPIE Photonics West,2000,3971:486-501.
  • 10Gonalez R,Wintz P.Digital image processing[M].2nd ed.[S.l.]:Addison Wesley,1987.

二级参考文献20

  • 1Celik M U, Sharma G, Saber E, et al. Hierarchical Watermarking for Secure Image Authentication with Localization[J]. IEEE Tram on Image Processing, 2002, 11(6): 585-595.
  • 2Holliman M, Memon N. Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes[J]. IEEE Trans on image Processing, 2000, 9(3): 432-441.
  • 3Lin C Y, Chang S F. A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation[J]. IEEE Trans on Circuits and Systems of Video Technology, 2001, 11(2): 153-168.
  • 4Utku Celik M, Sharma G, Saber E, Murat Tekalp. Hierarchical Watermarking for Secure Image Authentication With Localization. IEEE Transactions on Image Processing, 2002, 11(6): 585-595
  • 5Wong P. A Watermark for Image Integrity and Ownership Verification. In: Proceeding of Image Processing,Image Quality, Image Capture, Systems Conference. Portland, Oregon: May 1998. 374-379
  • 6Schneider M, Chang S. A robust content based digital signature for image authentication. In: proceeding of IEEE International Conference on Image Processing. Lausanne, Switzerland: Sep. 1996. 227-230
  • 7Xie L, Arce G. A Class of Authentication Digital Watermarks for Secure Multimedia Communication. IEEE Transactions on Image Processing, 2001, 10(11): 1754-1764
  • 8Bhattacharjee S, Kutter M. Compression tolerant image authentication. In: proceeding of IEEE International Conference on Image Processing, Chicago: Oct. 1998. 4-7
  • 9Marvel L, Hartwig G, Boncelet C. Compression-compatible fragile and semi-fragile tamper detection. In:Proceedings of SPIE-The International Society for Optical Engineering, Security and Watermarking of Multimedia Contents. San Jose, California: 2000. 140
  • 10Wu M, Liu B. Watermarking for image authentication IEEE Transactions on Image Processing, 1998, 2:437-441

共引文献9

同被引文献43

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部