期刊文献+

基于图像特征聚类的自嵌入水印算法 被引量:1

Self-embedded Watermarking Based on Characteristic Clustering of Image
下载PDF
导出
摘要 提出一种新的基于图像特征聚类的自嵌入水印算法(CCSW),用于图像内容的认证和恢复.通过将表征图像特征的DCT变换的直流系数和低频系数按块聚类,把块聚类号引入块索引后的码字作为水印信息分别嵌入到本块及其后继块的中频系数中,用于图像内容的篡改检测和恢复.实验结果证明了该算法不但能容忍图像的常规处理操作,而且对包括拼接、替换等在内的蓄意伪造、篡改能进行有效定位和恢复. In this paper, we present a novel self-embedded watermarking algorithm based on characteristic clustering (CCSW) for image tamper detection and recovery. The algorithm firstly clusters DCT direct coefficients and low frequency coefficients which represent the characteristics of image blocks, and then embeds the encrypted sequence of clustering by introducing block index as watermarks into both middle frequency domain of current image block and its successor block for tamper detection and recovery. The experimental results show that CCSW can not only tolerate certain distortion caused by normal image manipulations, but also can locate and recover malicious tampered region well.
出处 《小型微型计算机系统》 CSCD 北大核心 2011年第3期547-554,共8页 Journal of Chinese Computer Systems
基金 AMD大学合作计划项目资助
关键词 自嵌入水印 特征聚类 篡改检测 篡改恢复 self-embedded watermarking tamper detection tamper recovery characteristic clustering
  • 相关文献

参考文献8

二级参考文献123

  • 1吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70
  • 2和红杰,张家树,田蕾.能区分图像或水印篡改的脆弱水印方案[J].电子学报,2005,33(9):1557-1561. 被引量:24
  • 3李洁,高新波,焦李成.基于特征加权的模糊聚类新算法[J].电子学报,2006,34(1):89-92. 被引量:113
  • 4和红杰,张家树.基于混沌置乱的分块自嵌入水印算法[J].通信学报,2006,27(7):80-86. 被引量:33
  • 5和红杰,陈帆.自嵌入水印算法的安全性分析[J].电子学报,2007,35(3):557-562. 被引量:9
  • 6Honsinger C.W., Jones P., Rabbani M., Stoffel J.C.. Lossless recovery of an original image containing embedded data. U.S. Patent No. 6,278,791, 2001
  • 7Fridrich J., Goljan M., Du R.. Lossless data embedding for all image formats. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 572~583
  • 8Tian J.. Wavelet-based reversible watermarking for authentication. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 679~690
  • 9Holliman M., Memon N.. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000, 9(3): 432~441
  • 10Fridrich J., Goljan M., Memon N.. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262~274

共引文献1204

同被引文献16

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部