期刊文献+

A novel fragile watermarking scheme for image tamper detection and recovery 被引量:2

A novel fragile watermarking scheme for image tamper detection and recovery
原文传递
导出
摘要 We propose a fragile watermarking scheme capable of image tamper wise dependency mechanism. Initially, the image is divided into detection and recovery with a block blocks with size improve image tamper localization precision. By combining image local properties of 2~2 in order to with human visual system, authentication data are acquired. By computing the class membership degree of each image block property, data are generated by applying k-mean clustering technique to cluster all image blocks. The recovery data are composed of average intensity obtained by truncating the two least significant bits (LSBs) of each pixel within each block. Finally, the logistic chaotic encrypted feature watermark consisting of 2-bit authentication data and 6-bit recovery data of image block is embedded into the two LSBs of each pixel within its corresponding mapping block. Experimental results show that the proposed algorithm does not only achieve superior tamper detection and locate tiny tampered positions in images accurately, it also recovers tampered regions effectively. We propose a fragile watermarking scheme capable of image tamper wise dependency mechanism. Initially, the image is divided into detection and recovery with a block blocks with size improve image tamper localization precision. By combining image local properties of 2~2 in order to with human visual system, authentication data are acquired. By computing the class membership degree of each image block property, data are generated by applying k-mean clustering technique to cluster all image blocks. The recovery data are composed of average intensity obtained by truncating the two least significant bits (LSBs) of each pixel within each block. Finally, the logistic chaotic encrypted feature watermark consisting of 2-bit authentication data and 6-bit recovery data of image block is embedded into the two LSBs of each pixel within its corresponding mapping block. Experimental results show that the proposed algorithm does not only achieve superior tamper detection and locate tiny tampered positions in images accurately, it also recovers tampered regions effectively.
出处 《Chinese Optics Letters》 SCIE EI CAS CSCD 2010年第7期661-665,共5页 中国光学快报(英文版)
关键词 AUTHENTICATION Cluster computing Clustering algorithms Image processing PIXELS RECOVERY WATERMARKING Authentication   Cluster computing   Clustering algorithms   Image processing   Pixels   Recovery   Watermarking
  • 相关文献

参考文献15

  • 1S. Zhu and J. Liu, Chin. Opt. Lett. 7, 580 (2009).
  • 2J. Zheng, D. Feng, Y. Zhang, and R. Zhao, Chin. J. Computers (in Chinese) 27, 371 (2004).
  • 3P. L. Lin, C.-K. Hsieh, and P.-W. Huang, Pattern Recognition 38, 2519 (2005).
  • 4C.-C. Chang, Y.-H. Fan, and W.-L. Tai, Pattern Recognition 41, 654 (2008).
  • 5M.-S. Wang and W.-C. Chen, Computer Standards & Interfaces 29, 561 (2007).
  • 6X. Zhang and S. Wang, IEEE Trans. Multimedia 10, 1490 (2008).
  • 7H.-J. He, J.-S. Zhang, and H.-M. Tai, Lecture Notes in Computer Science 5806, 132 (2009).
  • 8M. Li, J. Tian, and F. Chen, Pattern Recognition Lett. 29, 392 (2008).
  • 9Z. Jiang and Y.-X. Huang, Information Sci. 179, 2002 (2009).
  • 10R.-Z. Wang and Y.-D. Tsai, Pattern Recognition 40, 398 (2007).

同被引文献10

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部