期刊文献+

一种用于图像篡改定位的半脆弱数字水印算法

Semi-fragile digital watermarking algorithm for image tamper localization
下载PDF
导出
摘要 设计并实现了一种用于数字图像内容认证的半脆弱水印方案。算法中,图像块的水印选择Logistic映射作为混沌系统从该图像块本身产生一系列混沌序列,作用于水印的嵌入;每个图像块产生的水印按照Torus,自同构映射嵌入另一个映射块的LSB(Least Significant Bit),对应关系通过密钥来确定,这样建立起图像块之间的相关性;利用混沌对初值极端敏感性的特点,能够定位检测对加入水印图像的篡改,且水印提取不需要原始图像。实验结果表明,嵌入水印后的图像的视觉好;算法具有图像内容局部篡改检测的有效性、敏感性以及良好的篡改定位能力。 A new semi - fragile watermarking algorithm for image content authentication based on chaotic mapping is presented. Chaotic sequence generated from the block itself by means of Logistic mapping is used to generate watermarking embedding; then the generated watermarking information is embedded into LSB plane of another image block with Toms Automorphisra mapping, which the corresponding relation is determined by the secret key to establish the correlation among the image blocks. The results show that the method could localize the tampered watermarked image by using the high sensitivity on initial value of the chaotic mapping without host image in watermark extraction. Moreover, watermarked images obtained have good subjective quality, precise localization of tampered areas, and the algorithm is simple and safe.
作者 潘伟 庞彦军
出处 《河北工程大学学报(自然科学版)》 CAS 2010年第1期109-112,共4页 Journal of Hebei University of Engineering:Natural Science Edition
基金 国家自然科学基金项目(60474019) 河北省自然科学基金项目(F2005000482)
关键词 半脆弱水印 混沌 环面自同构映射 图像认证 semi-fragile digital watermark chaos torus automorphism mapping image authentication
  • 相关文献

参考文献6

  • 1KUNDUR D,HATZINAKOS D.Digital watermarking for telltale tamper-proofing and authentication[C]//Proceedings of the IEEE International Conference on Image Processing,Fort Collins,Colorado,1999.CA:IEEE Computer Society Press,c1999.
  • 2FRIDRICH J,GOLJAN M.Images with self-correcting capabilities[C]//Proceedings of the IEEE International Conference on Image Processing,Fort Collins,1999.CA:Computer Society Press,c1999.
  • 3FRIDRICH J,GOLJAN M,BALDOZA A C.New fragile authentication watermark for images[C]//Proceedings of ICJP,Vancouver,2000.Canada:[s.n.],2000.
  • 4FRIDRICH J.Image watermarking for tamper detection[C]// Proc ICIP,Chicago,1998.IL:Vieweg Publishing Company,d998.
  • 5张春田,张静.基于混沌映射的鲁棒性图像水印算法[J].电子学报,2002,30(1):69-72. 被引量:14
  • 6AKRITAS P,ANTONIOU I E,PRONKO G P.On the torus automorphisms analytic solution computability and quantization chaos[J].Chaos Solitons and Fractals,2001(12):2805-2814.

二级参考文献5

  • 1[1]G Voyatzis,I Pitas.Digital image watermarking using mixing systems[J].Computer & Graphic.1998,22(4):405-410.
  • 2[2]M Kutter.Watermarking resisting to translation,rotation and scaling[A].Proc.SPIE Int Symp.on Voice,Video and Data Communication [C].Nov.1998.
  • 3[3]D K Arrowsmith,C M Place.An introduction to dynamical system[M].Cambridge Univ.Press.1990.
  • 4[4]J R Hemandez,F Perez-Gonzalez.Statistical analysis of watermarking schemes for copyright protection of images [A].Proceedings of the IEEE[C].1999,87(7).
  • 5[5]M Kutter,F Jordan,F Bossen.Digital signature of color images using amplitude modulation [A].in Proc.Electronic imaging 1999(EI97) [C].San Jose,CA.Feb.1997.

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部