期刊文献+

基于整数小波变换的半盲脆弱水印算法 被引量:1

A semi-blind fragile watermarking algorithm based on integer wavelet transform
下载PDF
导出
摘要 提出了一种用于图像认证的小波域半盲脆弱水印算法。水印由二值伪随机序列组成,嵌入在小波域细节分量的感知重要系数中。采用自适应量化中间值系数的方法嵌入水印。基于整数小波变换,并对量化算法进行改进以避免舍入误差。水印提取时不需要原始图像。实验结果表明,算法具有较好的不可见性,且对一定强度的图像压缩、增强等处理有鲁棒性;对于模糊、加噪等攻击表现出较强的脆弱性;对剪切等攻击有较好的篡改定位能力。 A semi-blind fragile watermarking algorithm for image authentication is introduced in this paper.The watermark is composed of binary sequence and is embedded into the perceptually important coefficients in the high frequency by adaptively quantizing the median value.Based on integer wavelet transform, the quantization algorithm is improved to avoid rounding errors.The watermark can be extracted without resorting to the original host image.Experimental results show that the proposed watermarking scheme is invisible and is robust against common image processing such as JPEG compression and image enhancement.The algorithm is fragile to content modification such as blurring and adding noise and can effectively detect the tampered regions for cropping.
出处 《测绘科学》 CSCD 北大核心 2008年第1期83-84,61,共3页 Science of Surveying and Mapping
关键词 整数小波变换 数字水印 图像认证 integer wavelet transform digital watermarking image authentication
  • 相关文献

参考文献6

二级参考文献24

  • 1[1]Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding a survey[J]. Proceedings of the IEEE, 1999,87(7):1062~1078.
  • 2[2]Peticolas F A P, Anderson R J, Kuhn M G. Attacks on copyright marking system [ A ]. In: Second International Workshop on Information Hiding[C], Portland, Oregon. U.S.A., April 14-17, 1998, Published in: Lecture Notes in Computer Science[J], 1998,1525: 218~238.
  • 3[3]Cox I J, Miller M L. A review of watermarking and the importance of perceptual modeling [J]. Proc. SPIE Conf. on Human Vision and Electronic Imaging, 1987,3016: 92 ~ 99.
  • 4[4]Friedman G L. The trustworthy digital camera: restoring credibility to the photographic image [J]. IEEE Trans. on Consumer Electronics, 1993.39(10) :905~ 910.
  • 5[5]Kutter M, Bhattacharjee S K, Ebrahimi T. Towards second generation watermarking schemes [A]. In: Proceedings 6th International Conference on Image Processing (ICIP'99)[C],Kobe. Japan. October 24-28, 1999:320~323.
  • 6[6]Kundur Deepa. Hatzinakos Dimitrios. Digital watermarking for telltale tamper-proofing and authentication [J]. Proceedings of the IEEE: Special Issue on Identification and Protection of Multimedia Information, 1999,87(7) :1167~1180.
  • 7[7]Calderbank A R. Daubeehies I, Sweldens W et al. Wavelet ransforms that map integers to integers [J]. Applied and Computational Harmonics Analysis, 1998, (5) :332~369.
  • 8WONG P W, MEMON N. Secret and public key image watermarking schemes for image authentication and ownership verification[J]. IEEE Trans on Image Processing, 2001(10): 1593-1601.
  • 9REY C, DUGELAY J L. Blind detection of malicious alterations on still image using robust watermarks[A]. 2000 the institution of electrical engineers, printed and published by the IEE[C]. Savoy Place,London WC2R 0BL,UK:7/1-7/6.
  • 10XIE L H, ARCE G R. A class of authentication digital watermarks for secure multimedia communication[J]. IEEE Trans on Image Processing,2001(11): 1754-1764.

共引文献27

同被引文献6

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部