期刊文献+

基于脆弱水印的可恢复图像认证方案 被引量:2

Restorable image authentication scheme based on fragile watermarking
下载PDF
导出
摘要 针对现有脆弱水印算法大多无法恢复被篡改区域的问题,提出了一种基于脆弱水印的可恢复图像认证方案:将分块的DCT系数量化、编码和加密后作为恢复水印,嵌入到偏移子块的次低位;待恢复水印嵌入后,由哈希算法产生分块的认证水印,并嵌入到自身的最低位.理论分析和实验结果表明:该方案在保证篡改定位精度和系统安全性的同时,可有效地恢复被篡改的区域. Since existing fragile watermarking schemes usually cannot recover the tampered position, a restorable image authentication scheme is proposed. The image is divided into small blocks and each block is DCT( discrete cosine transform) transformed. A specified number of the lower frequency DCT coefficients are encoded using a fixed number of bits. The resulting bit string as the recovery watermarks are embedded into the second LSB(least significiant bit) of the corresponding excursion block, then the authentication watermarks of each block are embedded into its LSB. Theoretical analysis and simulation 1 results show that the proposed algorithm can not only locate tampered blocks accurately, but also restore the tampered region effectively and ensure the system security.
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2007年第A01期211-214,共4页 Journal of Southeast University:Natural Science Edition
基金 国家高技术研究发展计划(863计划)资助项目(2006AA01Z409) 河南省科技攻关资助项目(0623021500)
关键词 脆弱水印 偏移子块 篡改定位 恢复 fragile watermarking excursion block temper location recovery
  • 相关文献

参考文献12

  • 1Zhu B B,Swanson M D,Tewfik A H.When seeing isnt believing[J].IEEE Signal Processing Magazine,2004,21(2):40-49.
  • 2Walton S.Image authentication for a slippery new age[J].Dr Dobbs Journal,1995,20(4):18-26.
  • 3Yeung M,Mintzer F.An invisible watermarking technique for image verification[C]//Proceedings of the IEEE International Conference on Image Processing.Santa Barbara,USA,1997,2:680-683.
  • 4Wong P W.A public key watermark for image verification and authentication[C]//Proceedings of the IEEE International Conference on Image Processing.Chicago,USA,1998,1:455-459.
  • 5Holliman M,Memon N.Counterfeiting attacks on oblivious blockwise independent invisible watermarking schemes[J].IEEE Transactions on Image Processing,2000,9(3):432-441.
  • 6Wong P W,Memon N.Secret and public key image watermarking schemes for image authentication and ownership verification[J].IEEE Transactions on Image Processing,2001,10(10):1593-1601.
  • 7Celik M U,Sharma G,Saber E.Hierarchical watermarking for secure image authentication with localization[J].IEEE Transactions on Image Processing,2002,11(6):585-595.
  • 8Ouda A H,El-Sakka M R.Localization and security enhancement of block-based image authentication[C]//Proceedings of IEEE International Conference on Image Processing (ICIP'2005).Genova,Italy,2005,1:673-676.
  • 9Fridrich J,Goljan M.Images with selfcorrecting capabilities[C]//Proceedings of International Conference on Image Processing.Koke,Japan,1999:25-28.
  • 10张鸿宾,杨成.图像的自嵌入及窜改的检测和恢复算法[J].电子学报,2004,32(2):196-199. 被引量:49

二级参考文献22

  • 1程义民,钱振兴,王以孝,田源.基于数位信息的信息隐藏方法[J].电子与信息学报,2005,27(8):1304-1309. 被引量:15
  • 2[1]Lin E T,Delp E J.A review of fragile image watermarks [A].Proc.of the Multimedia and Security Workshop (ACM Multimedia'99) [C].Orlando,1999.25-29.
  • 3[2]Walton S.Information authentication for a slippery new age [J].Dr.Dobbs Journal,1995,20(4):18-26.
  • 4[3]Yeung M,Mintzer F.Invisible watermarking for image verification [J].Journal of Electronic Imaging,1998,7(3):578-591.
  • 5[4]Wolfgang R B,Delp E J.A watermark for digital images [A].Proc.IEEE Int.Conf.on Image Processing [C].ACM Press,NY,1996.3.219-222.
  • 6[5]Schynael R van,Tirkel A,Osborce C.A digital watermark [A].Proc.of the IEEE ICIP [C].Austin,Texas,1994.2.86-90.
  • 7[6]Wolfgang R B,Delp E J.Fragile watermarking using the VW2D watermark [A].Proc.SPIE,Security and Watermarking of Multimedia Contents [C].San Jose,California,1999.204-213.
  • 8[7]Wong P W.A watermark for image integrity and ownership verification [A].Proc.IS&T PIC Conf.[C].Porland,OR,1998.
  • 9[8]Wong P W.A public key watermark for image verification and authentication [A].Proc.ICIP [C].Chicago,IL,Oct.1998.
  • 10[9]Wong P W,Memon N.Secret and public key image watermarking schemes for image authentication and ownership verification [J].IEEE Trans on Image Processing,2001,10(10):1593-1601.

共引文献51

同被引文献13

  • 1钱振兴,程义民,王以孝,田源.一种图像自嵌入方法[J].电子学报,2006,34(7):1347-1350. 被引量:12
  • 2王艳辉,王相海.用于图像认证的数字水印技术综述[J].计算机工程与应用,2007,43(2):33-37. 被引量:16
  • 3王新梅,肖国镇,纠错码--原理与方法[M].西安电子科技大学出版社.2006.
  • 4Janthawongwilai K, Amornraksa T. An improved retrieval method for amplitude modulation based digital watermarking [ C ].TENCON 2004. 2004 IEEE Region 10 Conference,2004,1:229-302.
  • 5C S Lu, H Y Mark Liao. Multipurpose Watermarking for Image Authentication and Protection [J].IEEE Trans on image Processing. (S1057-7149),2001,10(10):1579-1592.
  • 6J .Fridrich. Security of fragile authentication watermarks with local- ization[A].proc.SPIE[C], vol. 4675,no.75,Jan,2002.
  • 7T. Kohda, A. Tsuneda. "Statistics of chaotic binary sequences [J], IEEE Tran- sactions on Information Theory, 1997, 43(1): 104-112.
  • 8[日]江藤良纯,[日]金子敏信编著,张秀琴译.纠错编码及其应用[M].北京科学出版社,2004,1-21.
  • 9王国栋,刘粉林,汪萍,耿楠楠.一种篡改检测与篡改定位分离的图像认证方案[J].计算机学报,2007,30(10):1880-1888. 被引量:13
  • 10王蓓蓓,王希常,刘江.一种面向图像内容认证的半脆弱数字水印算法[J].计算机应用研究,2010,27(1):234-236. 被引量:5

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部