期刊文献+

一种用于JPEG图像认证的混沌自适应脆弱水印技术

An Adaptive Digital Fragile Watermarking Scheme for Authentication of JPEG Images Based on Chaos
下载PDF
导出
摘要 提出了一种用于JPEG图像认证的混沌自适应脆弱水印技术,实现了JPEG压缩和水印认证算法的有机结合.在水印的嵌入过程中,通过分析每个图像块在压缩域中非零系数的个数来确定水印的嵌入强度,解决了很多水印算法在大压缩比时无法完成水印嵌入的问题,提高了水印的不可见性.在水印的生成过程中使用了Tent映射,在水印的嵌入过程中使用了非确定性邻域相关的水印嵌入技术,并且没有使用Hash函数,使得算法不仅拥有很高的安全性,而且运算速度快. To integrate the JPEG compression and authentication watermarking algorithm together, an adaptive digital fragile watermarking scheme based on chaos for authentication of JPEG images is proposed. Through the analysis of the number of non-zero coefficients in the compressed domain of every image block, the watermark embedding factor is determined. By the using of this adaptive technique, not only the limitation that many algorithm can not accomplish the watermark embedding process in the scene of high compression ratio is solved, but also the perceptual quality of the watermarked images is improved. The chaotic Tent maps is used to participate the generation of watermark and the non deterministic neighborhood blockwise dependence in the embedding algorithm is utilized, these tactics ensure our algorithm resistance to cropping, cover-up, vector quantization and transplantation attacks and low complexity because of the absence of the hash function.
作者 余淼 任冰
出处 《中原工学院学报》 CAS 2009年第1期71-74,共4页 Journal of Zhongyuan University of Technology
关键词 数字水印 JPEG压缩 TENT映射 自适应 digital watermarking JPEG compression Tent maps adaptive
  • 相关文献

参考文献10

  • 1COX I J, MILLER M L N. A Review of Watermarking and the Importance of Perceptual Modeling. In Proc. SPIE Conf[J]. Human Vision and Electronic Imaging II, 1997, 3016, :92--99.
  • 2HO CK,LI C. --T. Semi--Fragile Watermarking Scheme for Authentication of JPEG Images[J]. Proceedings of the Interna tional Conference on Information Technology : Coding and Computing ( ITCC'04), 2004 ( 1 ), : 7 -- 11.
  • 3LIN C Y,CHANG S F. A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation[J]. IEEE Trans on Circuits and Systems of Video Technology,2001(11): 153-168.
  • 4FRIDRICH J, GOLJAN M DU R. Invertible Authentication Watermark for JPEG Images. Las Vegas, NV, USA, Proc[J]. IEEEInt. Conf. on Information Technology, 2001(10):223--227.
  • 5LI C T. Digital Fragile Watermarking Scheme for Authentication of JPEG images. Stevenage, SG1 2AY, United Kingdom[J].IEE Proceedings Vision, Image & Signal Processing, 2004, (151): 460--466.
  • 6GONZALEZ C, WINTZ P. Digital Image Processing[M]. 2nd Edition. Addison:Wesley Publishing Co/IEEE Press, 1987.
  • 7FRIDRICH J,GOLJAN M, MEMON N. Futher Attacks on Yeung--Mintzer Watermarking Scheme. [J]. Proc. SPIE--Int. Soc. opt. Eng,2000,3971:428--437.
  • 8BARRETO P S L M,KIM H Y. Toward Secure Public Key Blockwise Fragile Authentication Watermarking IEE Proc[J]. Vis. Image Signal Process, 2002,148 (2) : 57-- 62.
  • 9WINNE D A, KNOWLES H D, BULL D R, et. al. Digital Watermarking in Wavelet domain with Predistortion for Authenticaticity Verification and localization[J]Proc. SHE-Int. Soc. Opt. Eng, 2002,4675 : 349-- 356.
  • 10XIE L, ARCE G R.. A Class of Authentication Digital Watermarks for Secure Multimedia Communication[J]. IEEE Trans. Image Process, 2001,10 (11) :1754-- 1764.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部