期刊文献+

一种基于离散小波变换的数字图像认证算法 被引量:2

A Digital Watermarking of Image Authentication Algorithm Base on DWT
下载PDF
导出
摘要 提出了一种基于离散小波变换的半脆弱水印认证算法。利用小波系数之间的相关性作为图像特征水印,利用小波系数块均值量化来嵌入,在鲁棒性和脆弱性方面达到很好的平衡。该算法能够识别图像的恶意篡改,并定位篡改发生区域,而对通常的图像处理具有一定的鲁棒性。 This paper presents a existing kind of semi-fragile watermarking authentication algorithm based on the DWT (Discrete Wavelet Transform). The algorithm considers relations among wavelet coefficients as image features and the watermark that can protect the image content,thus the watermark bits imbed in the average value of the four adjacent wavelet coefficients with quantization since the average value has better stability than single wavelet coefficient. The algorithm is able to identify malicious changes, and can locate the tampered region. And it is very insensitive to the common image processing. In addition, it can stand against the collage attack.
作者 陈明举 范鹏
出处 《四川理工学院学报(自然科学版)》 CAS 2008年第4期93-95,118,共4页 Journal of Sichuan University of Science & Engineering(Natural Science Edition)
关键词 数字水印 图像认证 半脆弱水印 篡改检测 digital watermarking image authentication semi-fragile watermarking tamper detection
  • 相关文献

参考文献3

二级参考文献39

  • 1Swanson M D,Proc IEEE Workshop Multimedia Signal Processing,1997年,369页
  • 2Lin Haobai,Staring with parabolas:anintroduction to chaotic dynamics,1993年
  • 3C S Lu, H Y Mark Liao. Multipurpose watermarking for image authentication and protection[J]. IEEE Trans on Image Processing,2001, 10(10):1579-1592.
  • 4M U Celik, G Sharma, E Saber, et al. Hierarchical watermarking for secure image authentication with localization[J]. IEEE Trans on Image Processing. 2002,11(6):585-595.
  • 5P W Wong. Public key watermark for image verification and authentication[A] .Proc of 1998 IEEE Int Con on Image Processing[C]. Chicago, IL, USA: IEEE, 1998,1:455-459.
  • 6D Kundur, D Hatzinakos. Digital watermarking for telltale tamper profing and authentication[J]. Proc of the IEEE, 1999, 87(7):1167-1180.
  • 7YWWang,JFDoherty,REVanDyck. Awavelet-basedwatermarking algorithm for ownership verification of digital images[J]. IEEE Trans on Image Processing.2002,1(2):77-88.
  • 8C Hang, S Sun. Chaotic frequency hopping sequence[J]. IEEE Trans on Communications, 1998,46(11):1433-1437.
  • 9Fridrich J.Methods for tamper detection in digital images. In: Multimedia and Security Workshop at ACM Multimedia 99[C] , Orlando, FL, USA . 1999
  • 10Yeung M,Mintzer F C.An invisible wtermarking technique for image verification. In: International Conference on Image Processing. ( ICIP’ 97 ) [ C ], Washington DC, USA . 1997

共引文献97

同被引文献8

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部