期刊文献+

用于JPEG图像认证的特征水印算法

JPEG Image Authentication Based on Content Feature Watermarking
下载PDF
导出
摘要 为了更加快速有效地进行JPEG图像认证,提出了一种基于内容的JPEG特征编码算法。该算法的基本思想是首先采用DCT变换域中不同8×8块之间DCT能量关系来构造特征码;然后在此基础上给出了JPEG图像半脆弱水印方案,即将内容特征码生成方法和水印算法有机地结合在一起。由于特征码具有"半脆弱"特性,即它对于可接受的"内容保持"修改具有鲁棒性,因而对常见的"内容篡改"性修改具有敏感性。另外,由于DCT系数块能量的主要部分集中在低频部分,从而使得可以用低频部分来生成特征码,而且可用高频部分来嵌入水印。实验结果表明,该算法计算简单,不仅有很好的抗JPEG压缩性能,同时对篡改的定位也很精确。 A feature coding scheme based on the content of JPEG image was proposed. The basic logic of the scheme is to use partial energy relation between groups of 8 × 8 DCT block to produce related feature code. A semi-fragile watermarking scheme combines correctly the content based feature coding with the watermarking scheme. The feature code has the semi-fragile property, meaning that it is robust to the acceptable ' content preserving' modifications but sensitive to the ' content changing' tampering. The lower DCT region is used to form the feature codes while the higher one is used to embed watermarks. The experimental results demonstrate that the proposed algorithm has the advantages such as simple computation complexity, good robustness to JPEG, and precise location of tampered areas.
出处 《中国图象图形学报》 CSCD 北大核心 2008年第7期1265-1271,共7页 Journal of Image and Graphics
基金 国家自然科学基金项目(60374066)
关键词 JPEG图像 水印算法 图像认证 特征码 DCT变换域 半脆弱水印 能量关系 DCT系数 content authentication, feature coding, watermarking, semi-fragile
  • 相关文献

参考文献12

  • 1Lin C Y, Chang S F. Semi-Fragile Watermarking for Authenticating JPEG Visual Content [ A ]. In: Delp E J, Wong P W, eds: Proceedings Electronic Imaging 2000, Security and Watermarking of Multimedia Contents Ⅱ [C], San Jose, California, USA: SPIE Photonic West, 2000, 3971 : 140 - 151.
  • 2Fridrich J. Security of Fragile Authentication Watermarks with Localization [A]. In: Delp E J, Wong P W, eds: Proceedings Electronic Imaging 2002, Security and Watermarking of Multimedia Contents Ⅳ [ C ], San Jose, California, USA: SPIE Photonic West, 2002, 4675:691 -700.
  • 3Lin C Y, Chang S F. Issues and solutions for authenticating MPEG Video [ A ]. In : Delp E J, Wong P W, eds : Proceedings Electronic Imaging 1999, Security and Watermarking of Muhimedia Contents Ⅳ [C], San Jose, California, USA: SPIE Photonic West, 1999, 3657:54 - 65.
  • 4Dittmann J, Mukherjee A, Steinebach M. Media-independent Watermarking Classification and the need for combining digital video and audio watermarking for media authentication [ A ]. In: Proceedings of the IEEE Computer Society International Conference on Information Technology: Coding and Computing [ C ], Las Vegas, Nevada, USA, 2000:62-67.
  • 5Wong P W, Memon N. Secret and public key authentication watermarking schemes that resist vector quantization attack [ A ]. In: Delp E J, Wong P W, eds: Proceedings Electronic Imaging 2000, Security and Watermarking of Multimedia Contents Ⅳ [ C ] , San Jose, California, USA: SPIE Photonic West, 2000, 3971: 417 - 427.
  • 6Celik M U, Sharma G, Tekalp A M, et al. Video authentication with self-recovery [A]. In: Delp E J, Wong P W, eds: Proceedings Electronic Imaging 2002, Security and Watermarking of Multimedia Contents Ⅳ [ C ] , San Jose, California, USA: SPIE Photonie West, 2002, 4675:531 - 541.
  • 7Kuato Maeno, Sun Q B, Chang S F, et al. New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization [ A ]. In: Delp E J, Wong P W, eds: Proceedings Electronic Imaging 2002, Security and Watermarking of Multimedia Contents Ⅳ [C], San Jose, California, USA: SPIE Photonie West, 2002, 4675:659 - 670.
  • 8Mobasseri B G, Evans A T. Content-dependent video authentication by self-watermarking in color space [ A ]. In: Delp E J, Wong P W, eds: Proceedings Electronic Imaging 2001, Security and Watermarking of Multimedia Contents Ⅳ [ C ], San Jose, California, USA: SPIE Photonic West, 2001, 4314:35-44.
  • 9何泉,苏广川.基于双重小波系数集的音频水印算法研究[J].北京理工大学学报,2004,24(2):170-173. 被引量:19
  • 10李春,黄继武.一种抗JPEG压缩的半脆弱图像水印算法[J].软件学报,2006,17(2):315-324. 被引量:40

二级参考文献14

  • 1[1]Cox I, Kilian J, Leighton F, et al. Secure spread spectrum watermarking for multimedia[J]. IEEE Transaction on Image Proceeding, 1997, 6(12): 1673-1687.
  • 2[2]Chandramouli R, Memon N. How many pixels to watermark[Z]. International Conference on Information Technology: Coding and Computing (ITCC'00), Las Vegas, 2000.
  • 3[3]Boney L, Tewfik A H. Digital watermarks for audio signals[Z]. International Conference on Multimedia Computing and Systems, Hiroshima, 1996.
  • 4[4]Tilki J F, Beex A A. Encoding a hidden digital signature onto an audio signal using psychoacoustic masking[Z]. International Conference on Signal Processing Applications & Technology, Boston, 1996.
  • 5[5]Wang Y. A new watermarking method of digital audio content for copyright protection[Z]. International Conference on Signal Processing, Beijing, 1998.
  • 6[6]Davoine F, Comparison of two wavelet based image watermarking schemes[Z]. International Conference on Image Processing, Vancouver, 2000.
  • 7[7]Wu M, Liu B. Digital watermarking using shuffing[Z]. International Conference on Image Processing, Kobe, 1999.
  • 8[8]Kundur D, Hatzinakos D. Digital watermarking using multiresolution wavelet decomposition[Z]. International Conference on Acoustics, Speech and Signal Processing, Seattle, 1998.
  • 9Yeung M.M.,Mintzer EC.,Braudaway G.W.,Rao A.R.,Digital Watermarking for High-quality Imaging, Proceedings of 1997 IEEE First Workshop on Multimedia Signal Processing, Princeton, NJ, June 23- 25: 357-362.
  • 10Ching-Yung Lin, Shih-Fu Chang,A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation IEEE Transactions on Circuits and Systems of Video Technology, Vo1.11, No.2,Feb 2001:153-168.

共引文献52

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部