期刊文献+

定位像素篡改的安全脆弱水印算法 被引量:6

Secure Fragile Watermarking Algorithm with Tampered-pixels Localization
下载PDF
导出
摘要 脆弱水印用于鉴定数字媒体的真实性和完整性,篡改检测性能和安全性是脆弱水印算法的两个重要指标。本文提出一种基于密钥生成和嵌入像素水印信息的安全脆弱水印算法,在不增加水印嵌入容量的前提下,采用邻域像素比较的篡改检测方法有效提高算法的篡改检测性能。本文首先利用混沌迭代生成水印信息,然后将生成的水印信息置乱加密后嵌入在原始图像的最低位。认证时,通过比较像素邻域中不一致像素数目与设定阈值的关系判定像素的有效性,并推导给出阈值的动态选取方法和篡改比例与虚、漏警概率关系。理论分析和实验结果表明该算法不仅能抵抗拼贴攻击(Collage Attack),而且提高精确定位水印算法的篡改检测性能。 Fragile watermarking is used to detect the authentication and integrity of digital media.The tamper detection performance and the security of a fragile watermarking scheme are two important evaluation measures.This paper proposes a secure pixel-based fragile watermarking scheme,in which the watermark data of each pixel is generated and embedded based on the secret key.Using the pixel-neighborhood comparison,the tamper detection performance is improved without increasing the watermark payload.In the proposed scheme,the chaos system is used to generate the binary watermark data according to the content of each pixel in the original image.The improved security binary watermark by scramble encryption was embedded into the least significant bit of the image data.In tamper detection process,the validity of the test pixel is determined by comparing the number of the inconsistent pixels in a pixel-neighborhood of it with the predefined threshold.The method of the dynamic threshold selection and the relationship between the tamper ratio and the probabilities of false acceptance and false rejection are discussed.Theoretical analysis and simulation results show that the proposed method can distinguish the modifications on the content from the watermark and resist the collage attack,and detect the tampered pixels with a probability of nearly 1.
作者 陈帆 王宏霞
出处 《铁道学报》 EI CAS CSCD 北大核心 2011年第1期63-68,共6页 Journal of the China Railway Society
基金 国家自然科学基金资助项目(60702025 60970122) 中央高校基本科研业务专项基金(SWJTU09CX039) 教育部高等学校博士学科点专项科研基金(20070613024 20090184120021)
关键词 图像认证 脆弱水印 拼贴攻击 漏警概率 image authentication fragile watermarking collage attack probability of false acceptance
  • 相关文献

参考文献11

  • 1ZHU B B,SWANSON M D,TEWF1K A H. When Seeing isn't Believing[J]. IEEE Signal Processing Magazine, 2004, 21(2): 40-49.
  • 2YEUNG M M, MINTZER F. An Invisible Watermarking Technique for Image Verification[C]//Proceedings of the ICIP'97. Santa Barbara, California : IEEE, 1997 : 680-683.
  • 3MEMON N, SHENDE S, WONG P. On the Security of the Yeung-Mintzer Authentication Watermark [C]// Proceedings of the IS & T PICS Symposium. Savannah, Georgia, 1999 : 301-306.
  • 4FRIDRICH J,GOLJAN M, MEMON N. Further Attacks on Yeung-Mintzer Fragile Watermarking Scheme [C]// Proceedings of the International Conference on Security and Watermarking of Multimedia Contents. San Jose, California, 2000 : 428-437.
  • 5FRIDRICH J, GOLJAN M, MEMON N. Cryptanalysis of the Yeung-Mintzer Fragile Watermarking Technique [J]. Journal of Electronic Imaging, 2002,11(2) : 262- 274.
  • 6丁科,何晨,王宏霞.一种定位精确的混沌脆弱数字水印技术[J].电子学报,2004,32(6):1009-1012. 被引量:25
  • 7LIU S H, YAO H X, GUO W, LIU Y L. An Image Fragile Watermark Scheme Based on Chaotic Image Pattern and Pixel-Pairs[J]. Applied Mathematics and Computation, 2007,185(2) :869 -882.
  • 8和红杰,张家树,田蕾.能区分图像或水印篡改的脆弱水印方案[J].电子学报,2005,33(9):1557-1561. 被引量:24
  • 9ZHANG X, WANG S. Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels[J]. IEEE Signal Processing Letters, 2007,14(10) : 727-731.
  • 10LIAN S, SUN J, WANG J,et al. A Chaotic Stream Cipher and the Usage in Video Protection[J]. Chaos, Solitons and Fractals, 2007,34(3) :851- 859.

二级参考文献13

  • 1张家树,田蕾.一种新的基于密钥的混沌数字水印方法[J].通信学报,2004,25(8):96-101. 被引量:15
  • 2C S Lu, H Y Mark Liao. Multipurpose watermarking for image authentication and protection[J]. IEEE Trans on Image Processing,2001, 10(10):1579-1592.
  • 3M U Celik, G Sharma, E Saber, et al. Hierarchical watermarking for secure image authentication with localization[J]. IEEE Trans on Image Processing. 2002,11(6):585-595.
  • 4P W Wong. Public key watermark for image verification and authentication[A] .Proc of 1998 IEEE Int Con on Image Processing[C]. Chicago, IL, USA: IEEE, 1998,1:455-459.
  • 5D Kundur, D Hatzinakos. Digital watermarking for telltale tamper profing and authentication[J]. Proc of the IEEE, 1999, 87(7):1167-1180.
  • 6YWWang,JFDoherty,REVanDyck. Awavelet-basedwatermarking algorithm for ownership verification of digital images[J]. IEEE Trans on Image Processing.2002,1(2):77-88.
  • 7C Hang, S Sun. Chaotic frequency hopping sequence[J]. IEEE Trans on Communications, 1998,46(11):1433-1437.
  • 8J S Zhang,et al.A new watermarking method based on chaotic map[A].IEEE International Conference on Multimedian an Expo[C].Taiwan:IEEE,2004.
  • 9P W Wong,et al.Secret and public key image watermarking schemes for image authentication and ownership verification[J].IEEE Trans on Image Processing,2001,10(10):1593-1601
  • 10M U Celik,et al.Hierarchical watermarking for secure image authentication with localization[J].IEEE Trans on Image Processing.2002,11(6):585-595.

共引文献45

同被引文献65

  • 1陈永红,黄席樾.基于混沌和数字签名的图像数字水印[J].计算机仿真,2005,22(1):147-149. 被引量:2
  • 2尹浩,林闯,邱锋,丁嵘.数字水印技术综述[J].计算机研究与发展,2005,42(7):1093-1099. 被引量:136
  • 3孙星明,黄华军,王保卫,孙光,黄俊伟.一种基于等价标记的网页信息隐藏算法[J].计算机研究与发展,2007,44(5):756-760. 被引量:17
  • 4邵利平,覃征,高洪江,衡星辰.二维非等长图像置乱变换[J].电子学报,2007,35(7):1290-1294. 被引量:26
  • 5王国栋,刘粉林,汪萍,耿楠楠.一种篡改检测与篡改定位分离的图像认证方案[J].计算机学报,2007,30(10):1880-1888. 被引量:13
  • 6DENG Xiao-hong, CHEN Zhi-gang, DENG Xiao-heng, et al. A novel dual-layer reversible watermarking for medical image authentication and electronic patient record hiding [ J ]. Advanced Science Let- ters ,2011,4( 11 ) : 3678-3684.
  • 7TONG Xiao-jun,LIU Yang,ZttANG Miao,et al. A novel chaos-based fragile watermarking for image tampering detection and self-recovery [ J]. Signal Processing: Image Communication, 2013,28 ( 3 ) : 301-308.
  • 8PHADIKAR A,MAITY S P, MANDAL M. Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images [ J ]. Journal of Visual Communication and Image Repre- sentation, 2012,23 ( 3 ) : 454 - 466.
  • 9RAWAT S, RAMAN B. A chaotic system based fragile watermarking scheme for image tamper detection [ J ]. AEU-Intemational Journal of Electronics and Communications,2011,65(10) :840-847.
  • 10Jemma W.A framework for learning comprehensible theories in XML document classification[J].IEEE Trans on Knowledge and Data Engineering,2012,24(1):1-14.

引证文献6

二级引证文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部