期刊文献+

基于分散式块相关水印的图像认证技术 被引量:1

Image Authentication Method Based on Divergent Block-Dependent Watermarking
下载PDF
导出
摘要 提出了一种新的分散式块相关水印技术并用于图像的完整性认证和篡改定位.分散式块相关水印技术兼具水印的高安全性和高定位精度,克服了传统块相关水印技术定位精度低等问题.将原始图像划分为互不重叠的图像块,对每个图像块进行独立地水印生成.将图像块特征值映射为混沌系统的初值.经过多次混沌迭代得到图像块水印.另外,利用混沌序列排序法构成了图像块之间的一对多关系。形成分散式块相关结构,再将该图像块的水印嵌入到对应图像块的最低有效位中,完成水印的嵌入.实验结果表明,分散式块相关水印技术能够有效地抵抗矢量量化攻击,并对图像的篡改进行精确的定位. A new divergent block-dependent watermarking method is proposed to authenticate the integrity of the image and localize the image tampers. The divergent block-dependent watermarking method is prior to conventional block-dependent watermarking method with improved security and localization accuracy. The original image is firstly divided into non-overlapping blocks, and then the block watermark is independently generated. The characteristics of the image block is mapped into the initial value of a chaotic map, and the block watermark is generated by iterating the chaotic map from the initial value. In the meantime, a block related to several blocks is made by sorting chaotic sequences to form the divergent block-dependent structure. Then the block watermark is inserted into the least significant bits of the related blocks to obtain the watermarked image. The experiments show that the proposed divergent block-dependent watermarking method can resist to the counterfeiting attack, and localize the tampers correctly and accurately.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2008年第5期107-111,共5页 Journal of Beijing University of Posts and Telecommunications
关键词 图像认证 脆弱水印 块相关 篡改定位 混沌系统 image authentication fragile watermarking block dependent tamper localization chaos system
  • 引文网络
  • 相关文献

参考文献10

  • 1高海英,钮心忻,杨义先.基于量化的小波域自同步数字音频水印算法[J].北京邮电大学学报,2005,28(6):102-105. 被引量:8
  • 2Wong P W. A public key watermark for image verification and authentication [ C] //Proceedings ICIP. Chicago [s.n,], 1998: 455-459.
  • 3Matth Holliman, Nasir Memon. Counterfeiting attacks oblivious block-wise independent invisible watermarking schemes[J]. IEEE Trans, 2000, 1P-19(3): 432-441.
  • 4Ping Wah Wong, Memon N. Secret and public keyimage watermarking schemes for image authentication and ownership verification [ J ]. Image Processing, IEEE Transactions on, 2001, 10(10) : 1593-1601.
  • 5Coppersmith D, Mintzer F, Tresser C. Fragile imperceptible digital watermark with privacy control[ C]//Proceedings of SPIE/IS&T Int Syrup Electronic Imaging: Science and Technology. San Jose: [s.n. ], 1999: 659-670.
  • 6刘飞龙,朱新山,王阳生.基于特征的易碎图像水印框架(英文)[J].自动化学报,2004,30(5):641-651. 被引量:2
  • 7Celik M, Sharma G, Saber E, et al. Hierarchical watermarking for secure image authentication with localization [J]. IEEE Transactions on Image Processing, 2002, 11 (6) : 585-595.
  • 8Hae Yong Kim. A new public-key authentication watermarking for binary document images resistant to parity attacks[J]. Image Processing, IEEE International Conference on, 2005(2): 1074-1077.
  • 9Li Zhaohong, Hou Jianjun. A chaos-based model for fragile watermarking: model development and simulation resuhs[J]. Signal Processing, ICSP 2006, IEEE International Conference on, 2006(9) : 2627-2631.
  • 10陈明奇,钮心忻,杨义先.数字水印的研究进展和应用[J].通信学报,2001,22(5):71-79. 被引量:107

二级参考文献28

  • 1Zhao J,Commun ACM,1998年,41卷,7期,67页
  • 2Podilchuk C I,IEEE J Select Areas Commun,1998年,16卷,4期,525页
  • 3KOC H E,Proc 1995 IEEE Workshopon Nonlinear Signal and Image Processing,1995年
  • 4Yeung M, Mintzer F. An invisible watermarking technique for image verification. In: Proceedings of ICIP 97, Santa Barbara, California, 1997,680-683
  • 5Jiri Fridrich M Goljan, Memon N. Further attacks on Yeung-Mintzer fragile watermarking scheme. In: Proceedings of SPIE Photonic West, Electronic Imaging 2000, Security and Watermarking of Multimedia Contents, San Jose,California, 2000, 24~26
  • 6Holliman M, Memon N. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000,9(3): 432-441
  • 7Fridrich J, Goljan M, Baldoza A C. New Fragile Authentication Watermark for Images. ICIP 2000, Vancouver,Canada, 2000, 10-13
  • 8Byun S C, Lee L L. Shin T H, Ahn B H. A Public Key Based Watermarking for Color Image Authentication. In:Proceedings of ICASSP 2002
  • 9Wong P W, Memon N. Secret and public key authentication watermarking schemes that resist vector quantization attack. In: Proceedings of SPIE Security and watermarking of Multimedia, San Jose, USA: 2000,3971(40): 1593~1601
  • 10Paulo S L M Barreto, Hae Yong Kim, Vincent Rijmen, Toward a secure public-key blockwise fragile authentication watermarking. In: Proceedings of ICIP 2001, Thessaloniki, Greece: 2001, 494-497

共引文献114

同被引文献2

引证文献1

二级引证文献1

;
使用帮助 返回顶部