期刊文献+

精确的图像篡改定位与恢复的三水印算法 被引量:3

Precise three-watermarking algorithm for image tamper localization and recovery
下载PDF
导出
摘要 针对目前图像篡改定位与恢复的水印算法在篡改定位精度和篡改恢复性能方面存在的不足,提出一种精确的图像篡改定位与恢复的三水印算法。该算法在最低有效位(LSB)方法的基础上,采用二进制编码的方式生成检测水印、定位水印和恢复水印等三种水印,并嵌入到图像的低位。篡改检测和篡改恢复采用基于分块的检测水印和恢复水印,篡改精确定位采用基于单像素的定位水印。仿真实验表明,该算法对任意大小的亮度图像、RGB图像具有高精度的篡改定位能力,并且具有很好的篡改恢复性能。 Concerning the shortage of the tamper localization accuracy and tamper recovery performance in the existing image tampers localization and recovery algorithms,the authors proposed a precise three-watermarking algorithm.It generated three types of watermarks such as detection watermark,localization watermark and recovery watermark by binary coding based on Least Significant Bit(LSB).The watermarks were imbedded into the low bits of image.Tamper detection and recovery were implemented by detection watermark and recovery watermark based on blocks,and precise localization was implemented by localization watermark based on single pixel.The simulation results show that the proposed algorithm has precise tamper localization to any size of brightness images and RGB images,and has good tamper recovery performance.
出处 《计算机应用》 CSCD 北大核心 2011年第4期966-969,共4页 journal of Computer Applications
基金 广东省自然科学基金资助项目(10152800001000016 10452800001004185 9151040701000002)
关键词 三水印算法 篡改检测 篡改定位 篡改恢复 二进制编码 three-watermark algorithm tamper detection tamper localization tamper recovery binary coding
  • 相关文献

参考文献7

二级参考文献60

共引文献59

同被引文献23

  • 1骆伟祺,黄继武,丘国平.鲁棒的区域复制图像篡改检测技术[J].计算机学报,2007,30(11):1998-2007. 被引量:65
  • 2LIN C Y, CItANG S F. A robust image anthentication method distin- guishing JPEG compression from malicious maniptdation [ J ]. IEEE Trans on Circuits and Systems for Video Technology,2001,11 (2) :153-168.
  • 3LU C S, LIAO H Y M. Structural digital signature for image anthenti- cation : an incidental distortion resistant scheme[ C ]//Proe of the 8th ACM International Cont'rence on Muhimedia. 2000 : 115-118.
  • 4CHESSA S. Mobile application security tot video streaming authenti- cation and data integrity combining digital signature and watermarking techniques[ C ]//Proc of the 65th IEEE Vehicular Technology Confe- rence. 2007:634-638.
  • 5SUN Qi-bin, CHANG S F. A secure and robust digital signaturescheme for JPEG2000 image authentication [ J ]. Proceedings of the IEEE Trans on Multimedia,2005,7(3 ) :480-494.
  • 6STALLINGS W. Network security essentials: application and stan- dards[ M ]. Upper Saddle River, NJ : Prentice-Hall ,2000.
  • 7WALTON S. Image authentication for a slippery new age [ J]. Dr. Dobb' s Journal, 1995,20(4 ) : 18-26.
  • 8WONG P W. A public key watermark for image verification and au- thentication[ C]//Proc of IEEE International Conference on Image Processing. 1998:455-459.
  • 9WONG P W, MEMON N. Secret and public key image watermarking schemes for image authentication and ownership verification [ J ]. IEEE Trans on Image Processing,200[ ,10(10) :1593-1601.
  • 10HOLLIMAN M, MEMON N. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes [ J ]. IEEE Trans on Image Processing ,2000,9( 3 ) :432 -441.

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部