期刊文献+

基于沃尔什-哈达玛变换和卷积编码的半脆弱水印算法 被引量:5

Semi-fragile watermark algorithm based on Walsh-Hadamard transformand and convolution coding
下载PDF
导出
摘要 提出了一种基于沃尔什-哈达玛变换和卷积编码的半脆弱水印算法。在该算法中,对嵌入水印之前的图像进行像素块差分编码和卷积纠错编码来得到水印,并将其嵌入在沃尔什-哈达玛变换的图像能量值上;水印检测端通过检测卷积译码中产生的误码实现水印篡改定位,利用卷积译码的结果实现篡改图像的恢复。通过理论和实验分析了该算法的有效性和由此产生的误差。实验结果表明,本算法对于有损压缩具有良好的顽健性,可以精确地检测与定位篡改的图像区域,并且可以大致恢复原始图像内容。 A semi-fragile watermark algorithm based on the Walsh-Hadamard transform and convolution coding was proposed. In this algorithm, the watermark content of the host image was extracted by differential coding and convolution coding respectively based on the image block before embedding watermark, and was embedded on the energy value of the host image after Walsh-Hadamard transforming. In the case of watermark detection, the tampered place of the image was located by detecting the error bits generated by convolution decoding, and its result was used to recover the tampered image. The efficiency and the influence on the host image quality of the proposed algorithm were discussed theoretically and experimentally. The experimental results show that the proposed algorithm has high robustness against lossy com- pression, can detect and locate the place being maliciously tampered accurately and recover the lost image content roughly.
出处 《通信学报》 EI CSCD 北大核心 2009年第10期89-95,共7页 Journal on Communications
基金 国家自然科学基金资助项目(60772098 60772042) 国家高技术研究发展计划("863"计划)资助项目(2007AA01Z455) 教育部新世纪优秀人才支持计划(NCET-06-0393) 上海市曙光学者基金资助项目~~
关键词 沃尔什-哈达玛变换 卷积编码 半脆弱水印 Walsh-Hadamard transform convolution coding semi-fragile watermark
  • 相关文献

参考文献7

  • 1丁科,何晨,王宏霞.一种定位精确的混沌脆弱数字水印技术[J].电子学报,2004,32(6):1009-1012. 被引量:25
  • 2李赵红,侯建军.基于Logistic混沌映射的DCT域脆弱数字水印算法[J].电子学报,2006,34(12):2134-2137. 被引量:38
  • 3ZHANG X P, WANG S Z. Statistical fragile watermarking capable of locating individual tampered pixels[J]. IEEE Signal Processing Letters, 2007,14(10): 727-730.
  • 4ZOU D, SHI Y Q, NI Z, SU W. A semi-fragile lossless digital watermarking scheme based on integer wavelet transform[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006, 16(10): 1294-1300.
  • 5TSAI J S, HUANG W B, CHEN C L, et al. A feature-based digital image watermarking for copyright protection and content authentication[A]. 2007 IEEE International Conference on Image Processing[C]. San Antonio TX, 2007.469-472.
  • 6HOANTHONY T S. Semi-fragile watermarking and authentication for law enforcement applications[A]. 2007 Second International Conference on Innovative Computing, Information and Control[C]. Kumamoto, 2007. 286-286.
  • 7HE H J, ZHANG J S, CHEN F. A chaos-based fragile watermarking scheme with recovery[A]. 2007 FSKD 2007 Fourth International Conference on Fuzzy Systems and Knowledge Discovery[C]. Haikou, China, 2007. 303-307.

二级参考文献12

  • 1C S Lu, H Y Mark Liao. Multipurpose watermarking for image authentication and protection[J]. IEEE Trans on Image Processing,2001, 10(10):1579-1592.
  • 2M U Celik, G Sharma, E Saber, et al. Hierarchical watermarking for secure image authentication with localization[J]. IEEE Trans on Image Processing. 2002,11(6):585-595.
  • 3P W Wong. Public key watermark for image verification and authentication[A] .Proc of 1998 IEEE Int Con on Image Processing[C]. Chicago, IL, USA: IEEE, 1998,1:455-459.
  • 4D Kundur, D Hatzinakos. Digital watermarking for telltale tamper profing and authentication[J]. Proc of the IEEE, 1999, 87(7):1167-1180.
  • 5YWWang,JFDoherty,REVanDyck. Awavelet-basedwatermarking algorithm for ownership verification of digital images[J]. IEEE Trans on Image Processing.2002,1(2):77-88.
  • 6C Hang, S Sun. Chaotic frequency hopping sequence[J]. IEEE Trans on Communications, 1998,46(11):1433-1437.
  • 7Jui-Cheng Yen.Watermark embedded in the permuted image[A].Proc of 2001 IEEE International Conference on Circuits and Systems:Symposim[C].Sydney,NSW:IEEE,2001,2:53-56.
  • 8Tefas A,Pitas L.Image authentication using chaotic mixing systems[A].Proc of 2000 IEEE International Conference on Circuits and Systems:Symposium[C].Geneva:IEEE,2000,1:216-219.
  • 9Voyatzis G,Pitas I.Chaotic watermarks for embedding in the spatial digital image domain[A].Proc of 1998 IEEE International Conference on Image Processing[C].Chicago,IL:IEEE,1998,2:432-436.
  • 10Chi Kin Ho.Chang-Tsun Li.Semi-fragile watermarking scheme for authentication of JPEG images[A].Proc of 2004 IEEE International Conference on Information Technology:Coding and Computing[C].IEEE,2004,1:7-11

共引文献57

同被引文献59

引证文献5

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部