期刊文献+

基于提升方案小波的半脆弱水印图像认证算法 被引量:1

Semi-fragile image watermarking authentication scheme based on lifting scheme wavelet
下载PDF
导出
摘要 在小波变换域内,将水印嵌入在特定的小波系数中,对图像带来的失真影响很小,同时可以准确地检测和篡改定位,因此目前实现认证的脆弱水印和半脆弱水印大多在小波域内。提出了一种使用提升小波变换的半脆弱水印方法。在原始宿主图像经过提升小波变换之后的低频子带,根据水印和小波系数的特征自适应地修改小波系数,嵌入过程实现了很好的不可见性和鲁棒性,实现了盲提取,并能准确地实现篡改的检测和定位。 Fragile watermarking and semi-fragile are the efficient way to solve the image authentication. Since in the wavelet transform embedding watermarking to the specify coefficients of the transformed wavelet will bring less distortions and can locate the tamper area accurately, there are many ways of fragile and semi-fragile watermarking wavelet transform. The proposed scheme is processed in liftwavelet transform. According to the watermarking and the features of the wavelet coefficients, watermark is adaptively embedded to the low frequency coefficients of the lift-wavelet transform to ensure the invisibility and the robustness of the watermarking. At the same time, in the extract process, original image is not needed, that is blind-extracting, and the tampered area is located accurately.
出处 《计算机工程与设计》 CSCD 北大核心 2007年第20期4955-4958,4961,共5页 Computer Engineering and Design
基金 辽宁省高等学校优秀人才支持计划(RC-04-11) 辽宁省自然科学基金项目(2003205) 辽宁省教育厅科学技术研究基金项目(20060486)
关键词 半脆弱水印 提升方案小波变换 自适应 安全性 篡改检测和定位 semi-fragile digital watermark transform based on lifting scheme self-adaptive security tamper detect and location
  • 相关文献

参考文献15

  • 1Cox I J,Miller,M.I.The first 50 years of electronic watermarking[J].Journal of Applied Signal Processing,2002(2):126-132.
  • 2Lu C S,Huang S K,Sze C J,et al.Cocktail watermarking for digital image protection[C].IEEE Trans Multimedia,2000.
  • 3Xie L,Arce G R.A class of authentication digital watermarks for secure multimedia communication[C].IEEE Trans Image Process,2001:1754-1764.
  • 4Lin C Y,Chang SEA robust image authentication method surviving JPEG lossy compression[C].Proc SPIE,1998:296-307.
  • 5Zhou Xiang,Duan Xiaohui,Wang Daoxian.A semi-fragile watemark scheme for image authentication[C].10th IEEE Int Multimedia Modeling Conf,004.
  • 6Li C T,Yang M,Lee C S.Oblivious fragile watermarking scheme for image authentication[C].Proc IEEE Int ConfAcoustics Speech and Signal Processing,2002:3445-3448.
  • 7Wu M,Liu B.Watermarking for image authentication[C].Proc IEEE Int Conf Image Processing,1998:437-441.
  • 8Winne D A,Knowles H D,Bull D R,et al.Digital watermarking in wavelet domain with predistortion for authenticity verification and localization[C].Proc SPIE,2002:349-356.
  • 9Kundur,D Hatzinakos.Towards a telltale watermark techniques for tamper-proofing[C].Proc of the IEEE Int Confon Image Processing (ICIP),1998:409-413.
  • 10Yu H J,Lu C S,Liao Y M,et al.Mean quantization blind watermarking for image authentication[C].Vancouver:Proc IEEE Int Conf on image Processing,2000:706-709.

同被引文献7

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部