期刊文献+

基于混沌与整数小波变换的脆弱盲水印 被引量:3

Fragile Blind Watermarking Based on Chaos and Integer Wavelet Transform
下载PDF
导出
摘要 提出了一种新的脆弱盲水印生成算法用于图像完整性证明和内容篡改证明。首先将原始图像分块,对各分块进行一次整数小波变换;计算4个子带(LL,HL,LH,HH)小波系数绝对值的均值,分别映射为混沌初值,经过迭代、量化生成二值水印信息;最后将水印信息随机嵌入到4个子带中。实验结果表明,所提出的算法提高了篡改检测率,对图像的篡改具有高度敏感性和准确的篡改定位能力。水印提取为盲提取,篡改检测只用到了篡改后的水印图像。 A new fragile blind watermarking algorithm for integrity verification and tampering proof of image is proposed. Firstly, we divided the original image into some blocks, operated integer wavelet transform for each block once, and worked out the average of absolute value of wavelet coefficients in four sub-bands(LL,HL, LH,HH)respectively. Then we changed each average into the initial value of chaos. The watermark information was obtained by iterating of chaos and quantifying the chaos sequence. At last, we embedded the watermark information into four sub-bands randomly. Ex- perimental results show that our algorithm improves the probability of tampering test further and has high sensitivity to image tampering. It can exactly locate the tampering part also. In addition, the watermark information can be extracted without original image, watermark image, and tampering test can be done only with the watermark image tampered.
作者 刘伟 王凤英
出处 《微电子学与计算机》 CSCD 北大核心 2007年第11期127-130,共4页 Microelectronics & Computer
关键词 混沌映射 整数小波变换 篡改证明 脆弱水印 chaotic map integer wavelet transform tampering proof fragile watermark
  • 相关文献

参考文献5

  • 1Holliman M,Memon N.Counterfeiting attacks on obliviousblock-wise independent invisible water marking schemes[J].IEEETrans.Image Processing,2000,9(3):432-441
  • 2Barreto PSL M,Kim H Y,Rijmen V.Toward a secure public-Key block-wise fragile authentication watermarking[J].IEEE Proc.Vision,Image and Signal Processing,2002,149(2):57-62
  • 3Sweldens W.The lifting scheme:A custom design construction of biorthogonal wavelets[J].Applied and Computational Harmonic Analysis,1996,3:186-200
  • 4丁科,何晨,王宏霞.一种定位精确的混沌脆弱数字水印技术[J].电子学报,2004,32(6):1009-1012. 被引量:25
  • 5华先胜,石青云.多类水印的同时嵌入[J].北京大学学报(自然科学版),2001,37(3):305-314. 被引量:24

二级参考文献7

  • 1Houng Jyh Mike Wang,Optics Express,1998年,3卷,12期
  • 2C S Lu, H Y Mark Liao. Multipurpose watermarking for image authentication and protection[J]. IEEE Trans on Image Processing,2001, 10(10):1579-1592.
  • 3M U Celik, G Sharma, E Saber, et al. Hierarchical watermarking for secure image authentication with localization[J]. IEEE Trans on Image Processing. 2002,11(6):585-595.
  • 4P W Wong. Public key watermark for image verification and authentication[A] .Proc of 1998 IEEE Int Con on Image Processing[C]. Chicago, IL, USA: IEEE, 1998,1:455-459.
  • 5D Kundur, D Hatzinakos. Digital watermarking for telltale tamper profing and authentication[J]. Proc of the IEEE, 1999, 87(7):1167-1180.
  • 6YWWang,JFDoherty,REVanDyck. Awavelet-basedwatermarking algorithm for ownership verification of digital images[J]. IEEE Trans on Image Processing.2002,1(2):77-88.
  • 7C Hang, S Sun. Chaotic frequency hopping sequence[J]. IEEE Trans on Communications, 1998,46(11):1433-1437.

共引文献46

同被引文献17

  • 1尚赵伟,张明新,沈钧毅.基于KL距离和双密度小波变换的纹理图像检索[J].微电子学与计算机,2006,23(2):13-15. 被引量:2
  • 2陈金儿,王让定,王晓丽.数字音频双重水印算法[J].宁波大学学报(理工版),2006,19(1):54-58. 被引量:4
  • 3李段,王成儒.一种小波域内的鲁棒脆弱图像水印技术[J].计算机仿真,2006,23(5):81-84. 被引量:4
  • 4王向阳,杨红颖,侯丽敏.一种新的半脆弱彩色图像数字水印算法[J].自动化学报,2007,33(6):561-566. 被引量:12
  • 5Liu J, Moulin P. Information- Theoretic analysis of inter-scale and intraseale dependeneies between image wavelet coefficients[J]. IEEE Trans. IP. , 2000, 9(12). 1647.- 1658.
  • 6Simoncelli E P. Modeling the joint statistics of image in the wavelet domain[J]. Proc. SHE, 1999, 313 (1) : 188 - 195.
  • 7Fan G, Xia X G. Improved hidden markov model in the wavelet domain[ J ]. IEEE Trans. SP. , 2001,49 ( 1 ) : 115 - 120.
  • 8Sendur L, Selesnick I W. Bivariate shrinkage functions for wavelet-based denoising exploiting interscale dependency [ J ]. IEEE Trans. SP., 2002,50( 11 ) : 2744 - 2756.
  • 9Nick Kinsbury. Image processing with complex wavelts E EB/OLJ. (2000 - 10 - 11) [2000 - 11 - 08]. www-sig proc. eng. cam. ac. uk/publications/ngk/ngk99a, ps. ga.
  • 10Holliman M, Memon N. Counterfeiting attacks on obliv- ious block-wise fragile authentication watermarking[J].IEEE Trans, Image and Signal Processing, 2009,9 (3) : 432-441.

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部