期刊文献+

一种能区分水印或内容篡改的脆弱水印算法 被引量:24

An Image Authentication Scheme with Discrimination of Tampers on Watermark or Image
下载PDF
导出
摘要 针对目前脆弱水印算法大多无法区分水印被篡改还是内容被篡改的问题,本文基于多重水印技术提出了一种能区分水印或内容篡改的脆弱水印算法.该算法由子块的主要DCT系数生成恢复水印,将其嵌入到偏移子块的次低位;待恢复水印嵌入后,将恢复水印作为子块内容的一部分生成认证水印,将其嵌入到子块的最低位.理论分析和实验结果表明:本文算法在抵抗量化攻击的同时,不仅能准确定位图像内容被篡改的位置,而且能区分是水印被篡改还是图像内容被篡改,并且在一定条件下可以对内容被篡改的区域进行恢复. The existing fragile watermarking algorithms almost can't recognize the modification made to the watermarked image is on the image content or on the embedded watermark. In this paper, a novel fragile watermarking scheme is proposed. The recovery watermark of each block is embedded into the Hypo-LSB of the corresponding excursion block selected by a key,and the authentication watermark of each block is embedded into its LSB. Theoretical analysis and simulation results show that the proposed algorithm can not only thwart the VQ attack and locate tampered blocks accurately, but also discriminating tampering watermark from that of content. And in some case, it can restore the tampered region effectively.
出处 《电子学报》 EI CAS CSCD 北大核心 2008年第7期1349-1354,共6页 Acta Electronica Sinica
基金 国家863高技术研究发展计划(No.2006AA01Z409) 河南省科技攻关(No.0623021500) 河南省基础与前沿技术研究计划(No.082300410150)
关键词 脆弱水印 混沌 篡改定位 恢复 fragile watermarking chaos tamper location recovery
  • 相关文献

参考文献12

  • 1B B Zhu, M D Swanson, A H Tewfik. When seeing isn' t believing[ J ]. IEEE Signal Processing Magazine, 2004, 21 (2) : 40 - 49.
  • 2P W Wong. A public key watermark for image verification and authentication[ A]. Proceedings of the IEEE International Conference on Image Processing [ C ]. Chicago, USA, 1998,455 - 459.
  • 3M Holliman, N Memon. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes [J]. IEEE Transactions on Image Processing, 2000, 9 ( 3 ) : 432 - 441.
  • 4P W Wong, N Memon. Secret and public key image watermarking schemes for image authentication and ownership verification[ J ]. IEEE Transactions on Image Processing, 2001, 10 (10) : 1593 - 1601.
  • 5M U Celik, G Sharma, E Saber, et al. Hierarchical watermarking for secure image authentication with localization [ J]. IEEE Transactions on Image Processing,2002, 11(6) :585 - 595.
  • 6A H Ouda, M R El-sakka. Localization and security enhancement of block-based image authentication [ A ]. Proceedings of IEEE International Conference on Image Processing[ C ]. vol. 1, 2005,673 - 676.
  • 7张宪海,杨永田.基于脆弱水印的图像认证算法研究[J].电子学报,2007,35(1):34-39. 被引量:35
  • 8和红杰,张家树,田蕾.能区分图像或水印篡改的脆弱水印方案[J].电子学报,2005,33(9):1557-1561. 被引量:24
  • 9和红杰,张家树.基于混沌置乱的分块自嵌入水印算法[J].通信学报,2006,27(7):80-86. 被引量:33
  • 10J Fridrich, M Goljan. Images with self-correcting capa-bilities [A]. Proceedings of International Conference on Image Processing[ C]. IEEE Press, Kobe, Japan, 1999.25 - 28.

二级参考文献34

  • 1张家树,田蕾.一种新的基于密钥的混沌数字水印方法[J].通信学报,2004,25(8):96-101. 被引量:15
  • 2吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70
  • 3和红杰,张家树,田蕾.能区分图像或水印篡改的脆弱水印方案[J].电子学报,2005,33(9):1557-1561. 被引量:24
  • 4周红,凌燮亭.有限精度混沌系统的m序列扰动实现[J].电子学报,1997,25(7):95-97. 被引量:99
  • 5ZHU B B,SWANSON M D,TEWFIK A H.When seeing isn't believing[J].IEEE Signal Processing Magazine,2004,3:40-49.
  • 6CELIK M U,GAURAV S,et al.Hierarchical watermarking for secure image authentication with localization[J].IEEE Trans on Image Processing,2002,11(6):585-595.
  • 7WONG P W,MEMON N.Secret and public key image watermarking schemes for image authentication and ownership verification[J].IEEE Trans on Image Processing,2001,10(10):1593-1601.
  • 8FRIDRICH J.Security of fragile authentication watermarks with Localization[A].Security and watermarking of multimedia contents[C].San Jose,California,2002.691-700.
  • 9和红杰,张家树.区分不同篡改的脆弱水印算法[A].第十二届全国图象图形学学术会议(NCIG2005)[C].2005.140-144.
  • 10FRIDRICH J,GOLJAN M.Images with self-correcting capabilities[A].ICIP'99[C].Kobe,Japan,1999.25-28.

共引文献86

同被引文献176

引证文献24

二级引证文献130

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部