期刊文献+

一种基于图像内容的半脆弱数字水印算法 被引量:5

A New Semi-fragile Watermarking Algorithm Based on Image Content
下载PDF
导出
摘要 本文提出了一种新的基于混沌系统的半脆弱数字水印算法,该算法将图像分成两个大小相等的部分,其中一部分用来提取基于图像特征的水印,另外一部分则用来嵌入提取的特征水印,水印嵌入在小波变换的逼近子带中。水印提取算法不需要原始图像,而且通过比较原始水印和水印图像中的特征水印与提取的水印的两个相似度,能够区分图像受到攻击的种类,算法对恶意的篡改攻击能够较好地进行定位。实验结果表明,该算法在保持对常见的JPEG压缩稳健的同时,能有效地区分偶然失真与恶意篡改。 A new chaos-based semi-fragile watermarking algorithm is proposed in this paper, which first divided the total image into two parts of same size in pixel numbers, one part is used to extract image features which will be used watermarking, the other part is used to embed the watermarking extracted from the first part. The watermarking is embedded in the coefficients of low frequency of wavelet transform, and the watermarking can be extracted without resorting to the original host image. The correlation between the original watermarking and that of extracted and between the original waterrnarking and that of feature extracted from the watermarked image are used to distinguish the sort of distort imposedon image, and thetampered area of watermarked image can be reflected. Experimental results show that algorithm is robust to noise adding, compress and effective to differentiate occasional distortion from malicious tamper.
出处 《计算机科学》 CSCD 北大核心 2007年第12期252-256,共5页 Computer Science
基金 国家自然科学基金(60574036) 教育部博士点基金(20050055013)资助
关键词 混沌系统 图像认证 半脆弱数字水印 小波变换 Chaotic system, Image authentication, Semi-fragile watermarking, Wavelet transform
  • 相关文献

参考文献12

  • 1Chao H M, Hsu C M, Miaou S G. A Data Hiding Technique with Authentication, Integration and Confidentiality for Electronic Patient Records. IEEE Trans Inf Technol Biomed, 2003, 6 (1): 46-53
  • 2Kundur D, Hatzinakos D. Digital watermarking for telltale tamper-proofing and authentication. Proc. IEEE, 1999, 87(7) 1167-1180
  • 3Lin E T, Podilchuk C I,Delp E J, Detection of image alterations using semi-fragile watermarks. Proc. SPIE, 2000(3971): 152-163
  • 4何泉,苏广川.基于双重小波系数集的音频水印算法研究[J].北京理工大学学报,2004,24(2):170-173. 被引量:19
  • 5李春,黄继武.一种抗JPEG压缩的半脆弱图像水印算法[J].软件学报,2006,17(2):315-324. 被引量:40
  • 6陈生潭,侯振华,王虹现.双重认证的变换域图像半脆弱数字水印算法[J].计算机辅助设计与图形学学报,2005,17(5):1114-1119. 被引量:10
  • 7王兴元,石其江.基于图像特征和超混沌迭代的图像认证算法[J].计算机研究与发展,2005,42(11):1896-1902. 被引量:11
  • 8Zhao D W, Chen G R, Liu W B. A chaos-based robust waveletdomain watermarking algorithm. Chaos, Solitons and Fractals, 2004, 22:47-54
  • 9Hassan M H, Gilani S A M. A Semi-fragile signature based scheme for ownership identification and color image authentication. Transactions on Engineering. Computer and Technology, 2006, 13: 308-311
  • 10Celik M U, Sharrna G, Saber E, et al. Hierarchical Watermarking for Secure Image Authentication with Localization. IEEE Trans Image Process, 2002, 11 (6): 585-595

二级参考文献37

  • 1WANG XingyuanSchool of Electronic and Information Engineering, Dalian University of Technology, Dalian 116024, China.Relation of chaos activity characteristics of the cardiac system with the evolution of species[J].Chinese Science Bulletin,2002,47(24):2042-2048. 被引量:21
  • 2[1]Zhu, W.W., Xiong, Z.X., Zhang, Y.Q. Multiresolution watermarking for image and video. IEEE Transactions on Circuits and Systems for Technology, 1999,9(4):545~549.
  • 3[2]Wang, H-J.M, Su, P-C., Kuo, C-C.J. Wavelet-Based digital image watermarking. Optics Express, 1998,3(12):491~496.
  • 4[3]Swanson, M., Kobayashi, M., Tewfik, A. Multimedia data embedding and watermarking technologies. Proceedings of the IEEE, 1998,86(6):1064~1087.
  • 5[4]Wolfgang, R., Podilchuk, C., Delp, E. Perpetual watermarks for digital images and video. Proceedings of the IEEE, 1999,87(7): 1108~1126.
  • 6[5]Delaigle, J., Vleechouwer, C., Macq, B. Watermarking algorithm based on a human visual model. Signal Processing, 1998,66(3): 319~335.
  • 7[6]Podilchuk, C., Zeng, W. Image-Adaptive watermarking using visual models. IEEE Journal of Selected Areas on Communications, 1998,16(4):525~539.
  • 8[7]Shapiro, J. M. Embedded image coding using zerotrees of wavelet coefficients. IEEE Transactions on Signal Processing, 1993, 41(12):3445~3462.
  • 9[8]Zou, H., Tewfik, H. Discrete orthogonal M-Band wavelet decompositions. In: Proceedings of the IEEE 1992 International Conferences on Accoustics, Speech, and Signal Processing. San Francisco: IEEE Signal Processing Society, 1992. 605~ 608.
  • 10[9]Mallat, S., Zhong, S. Characterization of signals form multiscale edges. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1992, 14(7):710~732.

共引文献280

同被引文献31

  • 1李彩霞,李芬华,刘敏.基于分形和神经网络的B超图像识别[J].河北大学学报(自然科学版),2004,24(5):536-540. 被引量:4
  • 2陈生潭,侯振华,王虹现.双重认证的变换域图像半脆弱数字水印算法[J].计算机辅助设计与图形学学报,2005,17(5):1114-1119. 被引量:10
  • 3李春,黄继武.一种抗JPEG压缩的半脆弱图像水印算法[J].软件学报,2006,17(2):315-324. 被引量:40
  • 4ZHU Bin SWANSON M D,TEWFIK A H. Transparent robust authentication and distortion measurement technique for images [ C ]//Proc of the 7th IEEE Digital Signal Processing Workshop. 1996:45-48.
  • 5LIN C Y, CHANG S F. Semi-fragile watermarking for authenticating JPEG visual content [ C ]// Proe of SPIE International Conference on Security and Watermarking of Multimedia Contents II. San Jose : [ s. n. ] ,2000:140-t5|.
  • 6Brassil J, Low S, Maxemchuk N, et al. Hiding information in document images [ A ]. In : Proceedings ofthe 29th Annual Conicfence on Information Science and Systems [ C ]. John Hopkins University, 1995. 482 - 489.
  • 7Low S H, Maxemchuk N F, Lapone A M. Document identification for copyright protection using centroid detection [ J ]. IEEE Trans on Communications, 1998, 46 (3) :372 - 383.
  • 8Lin C Y, Chang S F. Semi -fragile watermarking for authenticating JPEG visual content [ C ]. Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents Ⅱ, San Jose, USA, 2000, 3971: 140 - 151.
  • 9Cox LJ, Miller M.I. The First 50 Years of Electronic Water-marking[J]. Journal of Applied Signal Processing, 2002:1.
  • 10孙圣和,陆哲明,牛夏牧.数字水印技术与应用[M].科学出版社,2004:58.

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部