期刊文献+

用于图像认证的小波域量化盲水印算法 被引量:1

Wavelet domain quantization blind watermarking algorithm for image authentication
下载PDF
导出
摘要 提出了一种用于图像内容认证的半脆弱水印算法。该算法利用小波变换模极大值提取图像边缘特征,并结合经混沌映射后的小波低频域特征信息生成两个水印。一个主要用于篡改定位,另一个主要用于检测图像的内容篡改。水印嵌入在小波变换的中频域中。水印提取和认证不需要原始水印信息,提高了水印安全性。实验表明,该算法能有效区分偶然失真和恶意篡改,并能定位出篡改发生的位置。 A semi-fragile watermarking algorithm for image authentication is proposed.Edge-character is extracted by finding the maxima of a wavelet transform modulus.Low frequency character is generated by wavelet transform for another watermark.One watermark is used for indicating the modified location and another is used for checking content modification.Watermarks are embedded in the coefficients of middle frequency of wavelet transform.Image authentication and watermark extract need no information about the original watermark.Experimental results show that the proposed algorithm provides good classification of intentional and incidental tampering.
作者 马列红 王冰
出处 《计算机工程与应用》 CSCD 北大核心 2011年第9期188-191,232,共5页 Computer Engineering and Applications
基金 陕西省科技攻关基金资助项目No.200405-G25~~
关键词 图像认证 半脆弱水印 小波变换 image authentication semi-fragile watermark wavelet transform
  • 相关文献

参考文献3

二级参考文献25

  • 1王宏霞,何晨,丁科.基于混沌映射的鲁棒性公开水印[J].软件学报,2004,15(8):1245-1251. 被引量:50
  • 2吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70
  • 3沃焱,韩国强,张波.一种新的基于特征的图像内容认证方法[J].计算机学报,2005,28(1):105-112. 被引量:32
  • 4Kundur D, Hatzinakos D. Digital watermarking for telltale tamper proofing and authentication[J]. Proceedings of the IEEE, 1999, 87(7): 1167~1181
  • 5Hu Junquan, Huang Jiwu, Huang Daren, et al. Image fragile watermarking based on fusion of multi-resolution tamper detection[J]. Electronics Letters, 2002, 38(24): 1512~1513
  • 6Kundur D, Hatzinakos D. Digital watermarking using multiresolution wavelet[A]. In: Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, Seattle, Washington, 1998, 5: 2969~2972
  • 7Rivest R. The MD5 message digest algorithm[OL]. http://www.faqs.org/rfcs/rfc1321.html, 1992
  • 8Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding-A survey[J]. Proceedings of the IEEE, 1999, 87(7): 1063~1077
  • 9Wang P W, Memon Nasir. Secret and public key image watermarking schemes for image authentication and ownership verification[J]. IEEE Transactions on Image Proceedings, 2001, 10(10): 1593~1601
  • 10Wong P W. A public key watermark for image verification and authentication[A]. In: Proceedings of IEEE International Conference Image Processing, Chicago, IL, 1998. 425~429

共引文献30

同被引文献14

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部