期刊文献+

基于等级结构的多重图像认证水印算法 被引量:1

Image Multi-Authentication Watermarking Method Based on Hierarchical Structure
下载PDF
导出
摘要 提出了一种基于等级结构的用于多重图像认证的脆弱水印算法.根据等级结构,将原始图像划分为多等级子块,然后对各等级子块进行独立的水印生成和嵌入.将混沌调制后的像素值映射为混沌系统的初值,经过混沌迭代生成水印信号,然后将水印信号替代像素的最低有效位,完成水印的嵌入.文中提出了一种新的水印分配方法,通过引入一个可变参数来控制各等级图像块对应的认证水印长度,分析了在该分配方式下水印定位精度和安全性之间的矛盾.实验结果表明,提出的水印分配方法可以有效地提高等级水印算法的性能,选择合适的划分等级可以取得定位精度和安全性两方面的良好性能.提出的等级水印算法能对图像的篡改进行多重检测与定位,极大地提高了脆弱水印算法在实际应用中的灵活性. A fragile watermarking technique for image multi-authentication was proposed in this paper. According to the hierarchical structure, the image was divided into blocks in a multi-level hierarchy. Then we calculate and embed the block watermarks in each hierarchy, respectively. The chaotic inodulated pixel values were mapped into the initial value of the chaotic system, and then the watermark can be obtained by iterating the chaotic system. The least significant bits of pixels were substituted by the watermark to obtain the watermarked image. A novel assignment of watermark capacity was presented in this paper. A variable parameter was designed to control the length of signatures for each level block, and the conflict between the tamper localization accuracy and the security of the hierarchical watermarking method is analyzed. Simulation results show that the proposed assignment method can effectively improve the performance of hierarchical watermarking algorithm. The partitioning level can be chosen to make the hierarchical watermarking method obtain a good compromise between the tamper localization accuracy and security. The hierarchical watermarking method can detect and localize content modifications with multi-level authentication, which makes the watermarking method flexible in actual applications.
出处 《北京交通大学学报》 EI CAS CSCD 北大核心 2008年第5期111-115,共5页 JOURNAL OF BEIJING JIAOTONG UNIVERSITY
基金 北京交通大学科技基金资助项目(2006XM002)
关键词 图像处理 图像认证 等级水印 定位精度 image processing image authentication hierarchical watermarking localization accuracy
  • 相关文献

参考文献7

  • 1Wong P W. A Public Key Watermark for Image Verification and Authentication[C]// In Proc. ICIP, 1998;455- 459.
  • 2Matth Holliman, Nasir Memon. Counterfeiting Attacks Oblivious Block-Wise Independent Invisible Watermarking Schemes[J].IEEE Trans,2000, 19(3):432-441.
  • 3Ping Wah Wong, Memon N. Secret and Public Keyimage Watermarking Schemes for Image Authentication and Ownership Verification [J]. Image Processing, IEEE Transactions on,2001 , 10(10) : 1593 - 1601.
  • 4Coppersmith D, Mintzer F, Tresser C, et al. Fragile Imperceptible Digital Watermark with Privacy Control[ C]// Proc. SPIE/IS&T, Int. Symp. Electronic Imaging: Science and Technology, 1999 : 659 - 670.
  • 5刘飞龙,朱新山,王阳生.基于特征的易碎图像水印框架(英文)[J].自动化学报,2004,30(5):641-651. 被引量:2
  • 6Celik M, Sharma G, Saber E, et al. Hierarchical Watermarking for Secure Image Authentication with Localization [J]. IEEE Transactions on Image Processing, 2002, 11 (6) :585- 595.
  • 7Li Zhaohong, Hou Jianjun. A Chaos-Based Model for Fragile Watermarking: ModeX Development and Simulation Results[ C]//Signal Processing, 2006. ICSP 2006. IEEE International Conference on, 2006 : 2627 - 2631.

二级参考文献17

  • 1Yeung M, Mintzer F. An invisible watermarking technique for image verification. In: Proceedings of ICIP 97, Santa Barbara, California, 1997,680-683
  • 2Jiri Fridrich M Goljan, Memon N. Further attacks on Yeung-Mintzer fragile watermarking scheme. In: Proceedings of SPIE Photonic West, Electronic Imaging 2000, Security and Watermarking of Multimedia Contents, San Jose,California, 2000, 24~26
  • 3Holliman M, Memon N. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000,9(3): 432-441
  • 4Fridrich J, Goljan M, Baldoza A C. New Fragile Authentication Watermark for Images. ICIP 2000, Vancouver,Canada, 2000, 10-13
  • 5Byun S C, Lee L L. Shin T H, Ahn B H. A Public Key Based Watermarking for Color Image Authentication. In:Proceedings of ICASSP 2002
  • 6Wong P W, Memon N. Secret and public key authentication watermarking schemes that resist vector quantization attack. In: Proceedings of SPIE Security and watermarking of Multimedia, San Jose, USA: 2000,3971(40): 1593~1601
  • 7Paulo S L M Barreto, Hae Yong Kim, Vincent Rijmen, Toward a secure public-key blockwise fragile authentication watermarking. In: Proceedings of ICIP 2001, Thessaloniki, Greece: 2001, 494-497
  • 8Celik M U, Sharma G, Saber E, Tekalp A M. A hierarchical image authentication watermark with improved localization and security. In:Proceedings of ICIP 2001, Thessaloniki, Greece: 2001, 502-505
  • 9Liu Fei-Long, Wang Yang-Sheng. An improved block dependent fragile watermarking. In: Proceeding of ICME 2003, Baltimove, MD: 2003,501-504
  • 10Hu Ming-Kuei. Pattern recognition by moment invariants. In:Proceedings of IRE, 1961,49:1428

共引文献1

同被引文献48

  • 1钱振兴,程义民,王以孝,田源.一种图像自嵌入方法[J].电子学报,2006,34(7):1347-1350. 被引量:12
  • 2Song W, Hou J J, Li Z H, et al. Chaotic system and QR factorization based robust digital image watermarking algo- rithm[J ]. Journal of Central South University of Technolo- gy,20l 1,18:116 - 124.
  • 3NI R R, Ruan Q Q, Zhao Y. Pinpoint authentication wa- termarking based on A chaotic system[J:]. Forensic Science International, 2008,179 ( 1 ) :] 54 - 62.
  • 4Zhang X, Qian Z, Ren Y, e:] al. Watemmrking with flexi- ble self-recovery quality based on compressive sensing and compcxsitive reconstruction[J ]. IEEE Trans on Information Forensics and Security, 2011,6(4) : 1223 - 1232.
  • 5Fridrich J, Goljan M. Images with self-correcting capabili- ties[C]//ICIP, 1999- 792 - 796.
  • 6Lee J, Won C S. A Watermarking sequence using parities of error control coding for image authentication and correction [ J ]. IEEE Trans Consum Electr, 2000,46 (2) :] 313 317.
  • 7Bing C S, Che Z G, Xu S. Research on image self-recov- ery algorithm based on IX[J]. J Multimedia, 2010, 5 (10) :290 - 297.
  • 8T:]i M J, Chien C C. A wavelet-based semi-fragile wa- termarking with recovery mechanism [ C]//ISCAS2008, 2008,3033 - 3036.
  • 9Lin P L,Hsieh C K, Huang P W. A hierarchical digital watermarking method for image tamper detection and re- covery[ J ]. Pattern Recognition, 2005,38 ( 12 ) : 2519 - 2529.
  • 10Chang C C, Fan Y H, Tai W L. Four-scanning attack on hierarchical digital watermarking method for image tam- per detection and recovery [ J ]. Pattern Recognition, 2008,41:654 - 661.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部