期刊文献+

一种图像自嵌入及自恢复算法 被引量:1

AN ALGORITHM OF IMAGE SELF-EMBEDDING AND SELF-RESTORING
下载PDF
导出
摘要 分析图像自嵌入过程及人眼视觉特性,提出了一种图像自嵌入及自恢复算法。算法压缩原始图像数据形成子块编码,选择合适的载体块,在子块编码与载体块之间建立一一对应,利用散列函数形成图像块认证信息,将子块编码、位置信息、认证信息等嵌入图像自身低字节中。实验结果表明,隐秘信息不可见性很好,可有效地对受损图像的完整性进行认证并恢复受损部分的内容。恢复出的图像视觉效果良好,可以很好地认证图像内容。 Through analysing self-embedded procedure and human vision characteristics,this paper presents an algorithm of image self-embedding and self-restoring.The algorithm compresses original image data to produce sub-block codes,selects appropriate carrier blocks and builds one-to-one correspondence between the sub-block codes and the carrier blocks;it forms image authentication information using hash function,and embeds sub-block codes,location information and authentication information into low bytes of the image itself.Experiments show that the invisibility of secret information is satisfied,and the algorithm can effectively authenticate the integrity of damaged image and restores the content of the damaged part.The restored image has very good vision effect,the image content can be well recognized.
出处 《计算机应用与软件》 CSCD 2011年第1期263-266,293,共5页 Computer Applications and Software
关键词 自嵌入 认证 自恢复 DCT Self-embedding Authentication Self-restoring DCT
  • 相关文献

参考文献8

二级参考文献32

  • 1程义民,钱振兴,王以孝,田源.基于数位信息的信息隐藏方法[J].电子与信息学报,2005,27(8):1304-1309. 被引量:15
  • 2和红杰,张家树,田蕾.能区分图像或水印篡改的脆弱水印方案[J].电子学报,2005,33(9):1557-1561. 被引量:24
  • 3和红杰,张家树.基于混沌置乱的分块自嵌入水印算法[J].通信学报,2006,27(7):80-86. 被引量:33
  • 4和红杰,陈帆.自嵌入水印算法的安全性分析[J].电子学报,2007,35(3):557-562. 被引量:9
  • 5[1]Lin E T,Delp E J.A review of fragile image watermarks [A].Proc.of the Multimedia and Security Workshop (ACM Multimedia'99) [C].Orlando,1999.25-29.
  • 6[2]Walton S.Information authentication for a slippery new age [J].Dr.Dobbs Journal,1995,20(4):18-26.
  • 7[3]Yeung M,Mintzer F.Invisible watermarking for image verification [J].Journal of Electronic Imaging,1998,7(3):578-591.
  • 8[4]Wolfgang R B,Delp E J.A watermark for digital images [A].Proc.IEEE Int.Conf.on Image Processing [C].ACM Press,NY,1996.3.219-222.
  • 9[5]Schynael R van,Tirkel A,Osborce C.A digital watermark [A].Proc.of the IEEE ICIP [C].Austin,Texas,1994.2.86-90.
  • 10[6]Wolfgang R B,Delp E J.Fragile watermarking using the VW2D watermark [A].Proc.SPIE,Security and Watermarking of Multimedia Contents [C].San Jose,California,1999.204-213.

共引文献72

同被引文献8

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部