期刊文献+

基于均值运算和系数分类的半脆弱水印算法 被引量:5

Semi-fragile Watermark Algorithm Based on Mean Computation and Coefficient Classification
下载PDF
导出
摘要 提出一种基于均值运算和系数分类的半脆弱水印算法。在空域对原始图像进行分块,根据每个子块均值运算所得矩阵系数小数部分的规律性将系数分为2类。将图像各像素的高4bit向右移位,通过每一子块2类系数的个数比较产生零水印。利用篡改前后每类系数个数的不一致性检测算法的篡改定位能力。实验结果表明,该算法的不可见性和鲁棒性较好,能抵抗常规图像处理操作,且具有定位篡改的能力,漏警概率低,能抗拼贴攻击。 A semi-fragile watermark algorithm based on mean computation and coefficient classification is proposed. It divides the original image into blocks, and carries through mean computation on each block. The decimals of those coefficients derived from mean computation follow certain rule. The rule is used to classify those coefficients into two groups. It makes the high four bits of every pixel right shift, and derives zero-watermark sequence by comparing the quantities of coefficients in the two groups. The inconsistency between the quantities of coefficients in every group resulted from tamper is used to test its ability to tamper location. Experimental result shows that the algorithm has good transparency and enough robustness to resist the common image processing operations. It is able to locate the tampered areas and it has low probability of miss. It is able to resist collage attack.
作者 崔尚勇
出处 《计算机工程》 CAS CSCD 北大核心 2010年第21期152-153,156,共3页 Computer Engineering
关键词 均值运算 系数分类 半脆弱水印 零水印 篡改定位 mean computation coefficient classification semi-fragile watermark zero-watermark tamper location
  • 相关文献

参考文献5

  • 1Kundur D,Hatzinakos D.Digital Watermarking for Telltale Tamper-proofing and Authentication[J].Proceedings of the IEEE Special Issue on Identification and Protection of Multimedia Information,1999,87(7): 1167-1180.
  • 2Lin C Y,Chang S F.A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation[J].IEEE Transactions on Circuits and Systems of Video Technology.2001,11(2):153-168.
  • 3Barreto P S L M,Kim H Y,Rijmen V.Toward Secure Public-key Blockwise Fragile Authentication Watermarking[C]//Proceedings of International Conference on Image Proceedings.Piscataway,USA: IEEE Press,2001: 494-497.
  • 4李春,黄继武.一种抗JPEG压缩的半脆弱图像水印算法[J].软件学报,2006,17(2):315-324. 被引量:40
  • 5车生兵,黄达,李光.基于视觉特性的半脆弱水印算法[J].通信学报,2007,28(10):134-140. 被引量:14

二级参考文献13

  • 1张静,张春田.用于图象认证的数字水印技术[J].中国图象图形学报(A辑),2003,8(4):367-378. 被引量:29
  • 2王向阳,杨红颖,陈利科,赵红.基于视觉掩蔽的半脆弱水印技术研究[J].中国图象图形学报,2005,10(12):1548-1553. 被引量:12
  • 3张专成,张殿富,闫小萍.一种鲁棒的基于DWT域自适应量化步长的图像盲水印算法[J].中国图象图形学报,2006,11(6):840-847. 被引量:9
  • 4LU C S,LIAO H Y M.Multipurpose watermarking for image authentication and protection[J].IEEE Transactions on Image Processing,2001,10(10):1579-1592.
  • 5FRIDRICH J.Security of fragile authentication watermarks with localizaon[A].Proceedings of SPIE Photonic West Electronic Imaging 2002,Security and Watermarking of Multimedia Contents[C].San Jose,California,2002.691-700.
  • 6QUELUZ M P.Spatial watermark for image content authentication[J].Journal of Electronic Imaging,2002,11(2):275-285.
  • 7COX I J,MILLER M I.The first 50 years of electronics watermarking[J].Journal of Applied Signal Processing,2002,56(2):126-132.
  • 8GUO J Y,LU C S,LIAO H Y M.Mean quantization based fragile watermaking for image authentication[J].Optical Engineering,2001,40(7):1396-1408.
  • 9EKICI(O),SANKUR B,AKCAY M.Comparative assessment of semi fragile watermarking methods[J].Journal of Electronic Imaging,2004,13(1):209-216.
  • 10LEWIS A S,KNOWLES G.Image compression using the 2-D wavelet transformation[J].IEEE Transactions on Image Processing,1992,1(4):244-250.

共引文献52

同被引文献30

引证文献5

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部