期刊文献+

基于SVD和伪随机循环链的图像认证水印算法 被引量:4

SVD and Pseudorandom Circular Chain Based Watermarking for Image Authentication
下载PDF
导出
摘要 针对矩阵的行列互换使得奇异值分解(SVD)后的奇异值不变,从而由奇异值直接产生水印安全性不高,以及基于SVD的图像认证水印算法把块水印嵌入本图像块的最低有效位,从而很难抵抗矢量量化攻击,提出了基于SVD和由Logistic混沌系统构成伪随机循环链的图像认证水印算法.首先通过Logistic混沌系统调制图像,使得图像矩阵唯一,然后将调制后图像块奇异值生成的块水印嵌入伪随机循环链对应图像块最低有效位.实验结果显示,该算法提高了水印的安全性,不仅能够准确定位,而且可以有效抵抗矢量量化攻击. Elementary Transformation of Matrix doesn't change the singular value decomposition (SVD), so the security of watermarks generated by SVD was not high. And most algorithms of watermarking for image authentication put watermarks into the least significant bits (LSB) plane of the block. These algorithms could not resist the counterfeiting attack. So a new watermarking algorithm for image authentication based on SVD and Pseudorandom Circular Chain (PCC) was presented. Firstly, the image was modulated by logistic mapping in order to make the image matrix unique. Then a Pseudorandom Circular Chain (PCC) was constructed by the logistic mapping. The watermarks generated by SVD were embedded into LSB of the corresponding block due to the PCC. The simulation results show that the proposed algorithm not only can localize the tampers correctly and accurately, but also can resist the counterfeiting attack.
出处 《北京交通大学学报》 EI CAS CSCD 北大核心 2008年第2期71-75,共5页 JOURNAL OF BEIJING JIAOTONG UNIVERSITY
基金 北京交通大学科技基金资助项目(2006XM002)
关键词 数字水印 图像认证 奇异值分解(SVD) 伪随机循环链(PCC) LOGISTIC映射 digital watermarking image authentication singular value decomposition(SVD) pseudo-random circular chain(PCC) logistic mapping
  • 相关文献

参考文献10

  • 1刘瑞祯,谭铁牛.基于奇异值分解的数字图像水印方法[J].电子学报,2001,29(2):168-171. 被引量:217
  • 2Chandra DV S. Digital Image Watermarking Using Singular Value Decomposition[C].Proceedings of 45th IEEE Mid- west Symposium on Circuits and Systems, Tulsa, OK, USA, 2002 : 264 - 267.
  • 3陈帆,朱大勇,许毅.基于混沌和图像内容的脆弱水印方案[J].计算机应用,2005,25(9):2151-2154. 被引量:5
  • 4孙锐,孙洪,姚天任.基于奇异值分解的半易损水印算法[J].电路与系统学报,2002,7(3):62-65. 被引量:23
  • 5Fridrich J, Goljan M, Memon N. Further Attacks on Yeung-Mintzer Fragile Watermarking Scheme [ C ].Proc. SPIE vol. 3971 Security and Watermarking of Multimedia Contents II, California: SPIE,2000: 428-437.
  • 6Xie L, Arce G R, Graveman R F. Approximate Image Message Authentication Codes[J]. IEEE Transactions on Multimedia,2001, 3(2) : 242 - 252.
  • 7Lin Chingyung, Chang Shihfu. A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation [ J ]. IEEE Transactions on Circuits and Systems of Video Technology, 2001; 11 (2) : 153 - 168.
  • 8Celik M, Sharma G, Saber E, et al. A Hierarchical Image Authentication Watermark with Improved Localization and Security[C].Proceedings of the IEEE International Conference on Image Processing, Thessalonlki, Greece, 2001,2 : 502 - 505.
  • 9李赵红,侯建军,宋伟.混沌映射的半脆弱图像数字水印算法[J].北京交通大学学报,2007,31(2):52-56. 被引量:3
  • 10张宪海,杨永田.基于脆弱水印的图像认证算法研究[J].电子学报,2007,35(1):34-39. 被引量:35

二级参考文献31

  • 1吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70
  • 2张静,张春田.用于图象认证的数字水印技术[J].中国图象图形学报(A辑),2003,8(4):367-378. 被引量:29
  • 3Hsuand J C T,IEEE Trans Image Processing,1999年,8卷,1期,58页
  • 4Swanson M D,IEEE J Select Areas Commun,1998年,16卷,4期,540页
  • 5Hsu C T,IEEE Trans Circuit Syst II Analog Digital Signal Processing,1998年,45卷,8期,1097页
  • 6Swanson M D,Proc of ICIP'96,1996年,3卷,211页
  • 7Koch E,Proc Int Conference on Digital Media and Electronic Publishing,1994年,6页
  • 8LIU RZ, TAN TN. An SVD-Based Watermarking Scheme for Protecting Rightful Ownership[J]. IEEE Trans. Mutimedia, 2002,4(1):121 - 128.
  • 9ZHANG JS, et al. A new watermarking method based on chaotic map [A]. IEEE International Conference on Multimedian an Expo[C].Taiwan, 2004.
  • 10SCHYNDEL RGV, TIRKEL AZ, AMEE NR, et al. A Digital Watermark[A]. First IEEE Image Processing[C]. Conference, Houston TX, November 15 -17, 1994, Ⅱ. 86 - 90.

共引文献269

同被引文献66

  • 1钱振兴,程义民,王以孝,田源.一种图像自嵌入方法[J].电子学报,2006,34(7):1347-1350. 被引量:12
  • 2ZHAO Yao.Sequence Watermarking Robust to Random Geometrical Attacks[J].Chinese Journal of Electronics,2006,15(4):634-637. 被引量:2
  • 3姜明新,迟学芬.基于IWT和HVS的彩色图像数字水印算法[J].吉林大学学报(信息科学版),2007,25(1):98-102. 被引量:3
  • 4Ni Rongrong, Ruan Qiuqi, Zhao Yao. Pinpoint Authentication Watermarking Based on A Chaotic System [ J]. Forensic Science International, 2008,179(1) : 54 - 62.
  • 5Mukherjee D P, Maitra S, Acton S T. Spatial Domain Digital Watermarking of Multimedia Objects for Buyer Authentication [ J]. Multimedia, IEEE Transactions on, 2004, 6(1):1- 15.
  • 6邵利平,覃征,高洪江,衡星辰.二维非等长图像置乱变换[J].电子学报,2007,35(7):1290-1294. 被引量:26
  • 7Song W, Hou J J, Li Z H, et al. Chaotic system and QR factorization based robust digital image watermarking algo- rithm[J ]. Journal of Central South University of Technolo- gy,20l 1,18:116 - 124.
  • 8NI R R, Ruan Q Q, Zhao Y. Pinpoint authentication wa- termarking based on A chaotic system[J:]. Forensic Science International, 2008,179 ( 1 ) :] 54 - 62.
  • 9Zhang X, Qian Z, Ren Y, e:] al. Watemmrking with flexi- ble self-recovery quality based on compressive sensing and compcxsitive reconstruction[J ]. IEEE Trans on Information Forensics and Security, 2011,6(4) : 1223 - 1232.
  • 10Fridrich J, Goljan M. Images with self-correcting capabili- ties[C]//ICIP, 1999- 792 - 796.

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部