期刊文献+

基于混沌的图像自恢复安全双水印算法 被引量:4

Chaos-based secure dual self-recovery watermark algorithm for image authentication
下载PDF
导出
摘要 为提高图像自恢复双水印算法的安全性,提出一种基于混沌的安全双水印算法。该算法首先利用混沌映射将双水印信息加密后再嵌入其他图像块的低位,然后结合图像块内容和嵌入在图像块低位的恢复水印信息,利用混沌映射随机生成用于检测图像块真实性的认证数据。理论分析和实验结果表明该算法在保持篡改恢复质量和不可见性的基础上,有效提高了自恢复双水印算法抵抗内容篡改攻击和字典搜索攻击的能力。 To improve the security of dual self-recovery watermark, a chaos-based dual self-recovery watermark scheme for image authentication was proposed in this paper. In the proposed scheme, the chaotic map was first adopted to encrypt the dual watermark data, and then the data were embedded into the image block of less significant bits. And then the authentication data of each block was randomly generated with reference to its content and the recovery watermark embedded according to the chaotic mapping. Theoretical analysis and simulation results show that the proposed scheme can not only maintain the good tamper recovery quality and invisibility of dual self-recovery watermark, but also improve the security against the only-content tampering attack and the dictionary searching attack.
出处 《计算机应用》 CSCD 北大核心 2010年第1期203-206,273,共5页 journal of Computer Applications
基金 国家科技重大专项(2008ZX05046-01) 高等学校博士学科点专项科研基金资助项目(20070613024)
关键词 图像认证 双水印 混沌 篡改恢复质量 峰值信噪比 image authentication dual watermark chaos tamper recovery quality Peak Signal-to-Noise Ratio (PSNR)
  • 相关文献

参考文献10

  • 1和红杰,张家树.基于混沌置乱的分块自嵌入水印算法[J].通信学报,2006,27(7):80-86. 被引量:33
  • 2ZHU B B, SWANSON M D, TEWFIK A H. When seeing isn't believing multimedia authentication technologies[J]. IEEE Signal Processing Magazine, 2004, 21(2): 40-49.
  • 3FRIDRICH J, GOLJAN M. Images with self-correcting capabilities [C]// ICIP 99: International Conference on Image Processing. Washington, DC: IEEE, 1999,3:792-796.
  • 4张鸿宾,杨成.图像的自嵌入及窜改的检测和恢复算法[J].电子学报,2004,32(2):196-199. 被引量:49
  • 5LIN P L, HSIEH C K, HUANG P W. A hierarchical digital watermarking method for image tamper detection and recovery [ J]. Pattern Recognition, 2005, 38 (12): 2519-2529.
  • 6和红杰,张家树,陈帆.一种高定位精度的可恢复水印算法[J].中国科学(E辑),2008,38(4):533-552. 被引量:9
  • 7LEE T Y, LIN S D. Dual watermark for image tamper detection and recovery [ J]. Pattern Recognition, 2008, 41 (11) : 3497 - 3506.
  • 8CHANG C, FAN Y H, TAI W L. Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery [J]. Pattem Recognition, 2008, 41(2): 654-661.
  • 9LIU S H, YAO H X, GAO W, et al. An image fragile watermark scheme based on chaotic image pattern and pixel-pairs [J]. Applied Mathematics and Computation, 2007, 185(2): 869-882.
  • 10和红杰,张家树,田蕾.能区分图像或水印篡改的脆弱水印方案[J].电子学报,2005,33(9):1557-1561. 被引量:24

二级参考文献53

共引文献89

同被引文献33

  • 1牛少彰 舒南飞.基于DCT域的数字图像双水印算法.计算机研究与发展,2009,.
  • 2刘磊,陈生潭.一种基于量化和关系嵌入的双重水印算法[J].电子技术应用,2007,33(10):154-157. 被引量:2
  • 3Zhenjun TangXianquan Zhang.Secure Image Encryption without Size Limitation Using Arnold Transform and Random Strategies[J].Jour-nal of Multimedia,2011,6(2):202-206.
  • 4Shi Dongcheng,Wang Qi,Liang Chao.Digital watermarkingalgorithm for print—一and一一scan process used for printed matteranti—counter-feit / Proc of Congress on Image and SignalProcessing.os Alamitos:IEEE Computer Society,2008:97-701.
  • 5Zhang Jun’Wang Nengchao,iong Feng.iding a Logo Watermark into the Multiwavelet Domain Using Neural Networks[C]//Proc.f IITAW ’ 08.[S.1.]:IEEE Press,2008.
  • 6LEE C F,HEN H L,S0 H K. Embedding capacity raising in reversible dala hiding based on prediction of difference expansion[J] Journalof Systems and Software.2010,83(10):1864-1872.
  • 7蔡立军,易叶青,刘云如.一种基于边缘检测技术的DCT域非嵌人式认证水印[J].湖南大学学报洎然科学版2012,39⑴:87-92.
  • 8Zhang Xinpeng,Wang Shuozhong,Qian Zhenxing,et al.Ref- erence sharing mechanism for watermark self-embedding[J]. IEEE Transactions on Image Processing,2011,20(2):485-495.
  • 9Chamlawi R, Khan A.Digital image authentication and recov- ery: employing integer transform based information embed- ding and extraction[J].Information Sciences, 2010, 180(3): 4909-4928.
  • 10He Hongjie, Zhang Jiashu, Chen Fan.Adjacent-block based statistical detection method for self-embedding watermark- ing techniques[J].Signal Processing, 2009,89(8) : 1557-1566.

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部