期刊文献+

基于支持向量机和混沌序列的空域图像双水印 被引量:1

Spatial domain image dual watermarking based on SVM and chaotic-sequence-mapping
下载PDF
导出
摘要 为解决图像同时具有版权保护和内容认证需求问题,提出了一种基于支持向量机的鲁棒水印和混沌序列与LSB相结合的脆弱水印的双重图像水印算法。利用图像邻域像素之间的相关性,通过训练回归型支持向量机模型实现鲁棒水印图像嵌入或提取操作。然后,再将已嵌入鲁棒水印的载体图像用最低有效位和混沌序列相结合的方法嵌入基于载体图像内容的脆弱水印。实验结果表明,该算法同时实现了图像的版权保护和内容篡改定位,提高了水印系统的安全性。 In order to solve the problem that some expensive images have the needs of not only protecting their copyrights but also assuring their integrity. A spatial domain image dual watermarking algorithm is proposed which is based on the machine-supporting robust water- marking and the chaotic-sequence-mapping fragile watermarking. SVM can learn the relationship between selected pixel and its 3 ×3 neighboring pixels with supported vector regression. Through the way of adjusting the output value between selected pixel the trained SVR, we embed or extract the robust watermarks. After that we combine LSB and the chaotic sequence mapping to embed the fragile watermark in the existed robust watermarks. The algorithm not only implements the copyright protection of the images and the tamper localization of the contents, but also improves the security of the watermarking system.
出处 《计算机工程与设计》 CSCD 北大核心 2009年第22期5294-5297,共4页 Computer Engineering and Design
基金 国家自然科学基金项目(60602062) 宁夏大学自然科学基金项目(ZR200816)
关键词 支持向量机 脆弱水印 内容认证 图像置乱 混沌序列 support vector machine tragile watermarking content authentication image scrambling chaotic sequence
  • 相关文献

参考文献9

二级参考文献99

  • 1罗永,成礼智,吴翊,徐志宏.小波变换结合纠错编码的半透明数字水印[J].计算机学报,2004,27(11):1533-1539. 被引量:7
  • 2Honsinger C.W., Jones P., Rabbani M., Stoffel J.C.. Lossless recovery of an original image containing embedded data. U.S. Patent No. 6,278,791, 2001
  • 3Fridrich J., Goljan M., Du R.. Lossless data embedding for all image formats. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 572~583
  • 4Tian J.. Wavelet-based reversible watermarking for authentication. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 679~690
  • 5Holliman M., Memon N.. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000, 9(3): 432~441
  • 6Fridrich J., Goljan M., Memon N.. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262~274
  • 7Wu J., Zhu B., Li S., Lin F.. Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes. In: Proceedings of the IEEE International Conference on Multimedia & Expo (ICME'04), Taiwan, 2004
  • 8Wu J., Zhu B., Li S., Lin F.. New attacks on SARI image authentication system. In:Proceedings of the SPIE,Vol.5306, Security and Watermarking of Multimedia Contents VI, San Jose, California, USA, 2004, 602~609
  • 9Yeung M., Mintzer F.. Invisible watermarking for image verification. Journal of Electronic Imaging, 1998, 7(3): 578~591
  • 10Wu M., Liu B.. Watermarking for image authentication. In: Proceedings of the IEEE International Conference on Image Processing, Chicago, USA, 1998, 2: 437~441

共引文献107

同被引文献10

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部