期刊文献+

基于元胞自动机的自嵌入图像认证水印算法

Cellular automata-based self-embedding watermark scheme for image authentication
原文传递
导出
摘要 提出了一种用于图像认证的分块自嵌入水印算法,图像分块后,根据基密钥产生的基函数,对子块进行两层元胞自动机变换,由高层低频系数产生初始构型,再由整数混沌序列计算对应子块的局部规则,由该局部规则的元胞自动机从初始构型演化生成基于图像内容的水印,再用量化系数技术将水印嵌入低层低频系数,利用元胞自动机对初始构型和局部规则的多变性,能有效检测并定位对图像内容的恶意篡改,避免矢量量化等攻击,同时也增强了算法的安全性,实验结果表明算法对JPEG压缩有较好的鲁棒性,检测时不需要原始图像。 A self-embedding scheme for image authentication is presented. The scheme splits the original image into blocks and performs two layer cellular automata transform on blocks with a transform base function produced by a base-key. An initial configuration is produced using high-layer low frequency coefficients, and a local rule of a block is calculated from a chaotic sequence. The watermark is generated from the initial configuration through an elementary cellular automaton of the local rule and embedded into the low-layer low frequency coefficients with quantization technique. The proposed scheme is exploiting the flexibility on initial configuration and local rule can localize the tampers on the watermarked image, and resist the counterfeiting attacks on block-wise independent watermarking schemes, moreover increase the watermark security. Experiment results show the proposed scheme maintains certain robustness for JPEG compression and no host image is needed in watermark detection.
作者 金军
出处 《四川大学学报(自然科学版)》 CAS CSCD 北大核心 2009年第3期635-641,共7页 Journal of Sichuan University(Natural Science Edition)
关键词 元胞自动机 元胞自动机变换 图像认证 半脆弱水印 自嵌入水印 cellular automata, cellular automata transform, image verification, semi-fragile watermark,self-embedding watermark
  • 相关文献

参考文献21

二级参考文献71

  • 1练秋生,王成儒.混沌数字水印及其性能分析[J].仪器仪表学报,2002,23(z3):157-159. 被引量:3
  • 2任娟,王蕴红,谭铁牛.基于感兴趣区域的图像认证与自恢复算法[J].自动化学报,2004,30(6):833-843. 被引量:5
  • 3张鸿宾,杨成.基于公钥和脆弱水印的图像认证算法[J].计算机科学,2004,31(11):218-221. 被引量:8
  • 4胡和平,周春蕾.一种鉴定图像真伪的半脆弱数字水印算法[J].华中科技大学学报(自然科学版),2005,33(6):4-7. 被引量:3
  • 5祁明.电子商务安全与保密[M].北京:高等教育出版社,2001..
  • 6C S Lu, H Y Mark Liao. Multipurpose watermarking for image authentication and protection[J]. IEEE Trans on Image Processing,2001, 10(10):1579-1592.
  • 7M U Celik, G Sharma, E Saber, et al. Hierarchical watermarking for secure image authentication with localization[J]. IEEE Trans on Image Processing. 2002,11(6):585-595.
  • 8P W Wong. Public key watermark for image verification and authentication[A] .Proc of 1998 IEEE Int Con on Image Processing[C]. Chicago, IL, USA: IEEE, 1998,1:455-459.
  • 9D Kundur, D Hatzinakos. Digital watermarking for telltale tamper profing and authentication[J]. Proc of the IEEE, 1999, 87(7):1167-1180.
  • 10YWWang,JFDoherty,REVanDyck. Awavelet-basedwatermarking algorithm for ownership verification of digital images[J]. IEEE Trans on Image Processing.2002,1(2):77-88.

共引文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部