期刊文献+

一种用于彩色图像认证的脆弱性数字水印方法 被引量:7

Fragile watermarking algorithm for color image authentication
下载PDF
导出
摘要 针对彩色图像认证问题,提出一种基于混合视觉双稳态置乱系统的脆弱性数字水印算法。该算法将图像分块,由各块亮度值确定混沌序列长度及嵌入深度,将各点位置信息、最高有效位颜色信息,以及自定义的密钥作为混沌系统的初值,各块不同深度地将水印序列嵌入各点RGB分量中。检测定位时比较提取的水印和生成的水印,直接得到差异图像。理论分析及实验结果证明,使用该方法嵌入水印后图像质量高,且篡改定位能力强。 A fragile watermarking algorithm based on a chaotic system is proposed for color image authentication,it divides the image into non-overlapped blocks,calculates the luminance of each block to decide the embedding depth and the length of chaotic sequence.For each pixel,an initial value is determined based on its prominent chrominance value,the position index,and the image protection key.Watermarking sequence is embedded into the embedding space of R,G,B respectively.Then it detects the temper by comparing the extracted watermarking and the produced one,so the error image is attained.Theoretical analysis and experiment result show that this algorithm to be in high quality and locate the tamper position exactly.
出处 《计算机工程与应用》 CSCD 北大核心 2011年第7期202-204,210,共4页 Computer Engineering and Applications
关键词 图像认证 篡改定位 混沌系统 脆弱水印 image authentication tamper location chaotic system fragile watermarking
  • 相关文献

参考文献11

  • 1Lin C H, Hsieh W S.Applying projection and B-spline to image authentication and remedy[J].IEEE Trans on Consumer Electron,2003,49(4) : 1234-1239.
  • 2Lin C Y, Chang S F.A robust image authentication method distinguishing JPEG compression from malicious manipulation[J]. IEEE Trans on Circuits and Systems Video Technology,2001,11 (2):153-168.
  • 3Barreto P S L M, Kim H Y, Rijmen V.Toward secure public key blockwise fragile authentication watermarking[J].lEE Proc Vision Image Signal Processing,2002,149(2):57-62.
  • 4Celik M U, Sharma G, Saber E, et al.Hierarchical watermarking for secure image authentication with localization[J].IEEE Tmns on Image Processing, 2002, 11 (6) :585-595.
  • 5Wong P W,Memon N.Secret and public key image watermarking schemes for image anthentication and ownership verification[J]. IEEE Trans on Image Processing, 2001, l 0 ( l 0) : 1593-1601.
  • 6张宪海,杨永田.基于脆弱水印的图像认证算法研究[J].电子学报,2007,35(1):34-39. 被引量:35
  • 7I Ni Rongrog,Ruan Qiuqi,Zhao Yao.Pinpoint authentication water- marking based on a chaotic system[J].Forensic Science Interna- tional, 2008,179: 54-62.
  • 8刘连山,李人厚,高琦.一种基于彩色图像绿色分量的数字水印嵌入方法[J].西安交通大学学报,2004,38(12):1256-1259. 被引量:28
  • 9Zhang H J, Dai J H, Wang P Y, et al.Bifurcation and chaos inan optically bistable liquid-crystal device[J].Optical Society of America B:Optical Physics, 1986,3(2) :231-235.
  • 10Wang Mingshi, Chen Weiche.A majority-voting based water- marking scheme for color image tamper detection and recov- ery[J].Computar Standards & Interfaces,2007,29( 5 ): 561-570.

二级参考文献29

  • 1吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70
  • 2刘镔,张永强,刘粉林.一种新的数字化混沌扰动方案[J].计算机科学,2005,32(4):71-74. 被引量:14
  • 3高山青,张士杰,刘镔,罗向阳,刘粉林.一种基于四值混沌阵列的数字图像加密算法[J].中国图象图形学报,2006,11(2):244-250. 被引量:6
  • 4张宪海,杨永田.基于脆弱水印的图像认证算法研究[J].电子学报,2007,35(1):34-39. 被引量:35
  • 5Tao B, Dickinson B. Adaptive watermarking in the DCT domain [A]. IEEE International Conference on Acoustics, Speech, and Signal Processing, Munich, DE, 1997.
  • 6Prodilchuk C, Zeng W. Perceptual watermarking of still image [A]. IEEE First Workshop on Multimedia Signal Processing, Princeton, USA, 1997.
  • 7Huang J W,Shi Y Q. Embedding gray level images [A]. 2001 IEEE International Symposium on Circuits and Systems, Sydney, 2001.
  • 8Cho J S, Shin S W. Enhancement of robustness of image watermarks into color image,based on WT and DCT [A]. International Conference on Information Technology: Coding and Computing, Las Vegas, USA, 2000.
  • 9Walton S.Image authentication for a slippery new age[J].Dr.Dobb's Journal,1995,20(4):18-26.
  • 10Yeung M,Mintzer F.An invisible watermarking technique for image verification[A].In Proceedings of the IEEE International Conference on Image Processing[C].Santa Barbara,USA,1997.680-683.

共引文献72

同被引文献75

引证文献7

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部