期刊文献+

基于公钥的可逆数字水印 被引量:2

Reversible digital watermarking based on public key system
下载PDF
导出
摘要 为了提高可逆数字水印的安全性和透明性,增加嵌入容量,提出了一种基于公钥的可逆数字水印。该方法首先对载体图像直方图中峰值点与左右两侧的零值点之间的像素点进行移位,然后提取载体图像的特征值,将该特征值与经过混沌系统加密的数字水印进行异或处理后,采用公钥将其嵌入到处理后的载体图像内。图像的验证过程是嵌入过程的逆过程,验证完成后,根据峰值点及其与零值点之间的关系将移位的像素点复原,即可完全复原原始图像。采用公钥系统和混沌系统充分保证了系统的安全性,峰值点与其两侧的零值点之间的像素移位既保证了能够嵌入更多的信息和较高的峰值信噪比,又保证了所有的像素点都能被认证。通过对大量的图像进行仿真分析,结果显示该方法具有较高的安全性,与同类方法相比,能够嵌入更多的信息量,同时具有更高的透明性。 A reversible digital watermarking based on public key system was proposed to improve the security,transparency and embedding capacity.This technique shifted the pixels between the peak and zero in the histogram,extracted the characteristics of the original image,used the Boolean exclusive OR operator between the characteristics value and the watermark image processed with chaotic system,and finally embedded the value into the image with the public key.Verification process was the inverse process of the embedding.After the verification,the shifted pixels were recovered depending on the relationships of the peak and zero in the histogram,and the image was recovered.The public key system and chaotic system guarantee the system security.The shift between the peak and zero pixels ensured more embedded information,higher peak signal-to-noise ration,and authentication of all the pixels.The process was simulated with lots of images.The results show that the method is safer than others,can embed more information,and has more transparency.
出处 《计算机应用》 CSCD 北大核心 2012年第4期971-975,共5页 journal of Computer Applications
基金 国家自然科学基金资助项目(60873117) 天津市自然科学基金资助项目(11JCZDJC16000) 天津职业技术师范大学科研发展基金资助项目(KJ2009023)
关键词 公钥系统 可逆数字水印 混沌系统 直方图 峰值 public key system reversible watermarking chaotic system histogram peak value
  • 相关文献

参考文献13

  • 1LIN C-C,TAI W-L,CHANG C-C.Multilevel reversible data hidingbased on histogram modification of difference images[J].PatternRecognition,2008,41(12):3582-3591.
  • 2AWRANGJEB M.An overview of reversible data hiding[C]//Inter-national Conference on Computer and Information Technology.Ban-gladesh:IEEE,2003:75-79.
  • 3CELIK M U,SHARMA G,TEKALP A M,et al.Reversible datahiding[C]//Proceedings of the IEEE International Conference onImage Processing.New York:IEEE,2002:157-1600.
  • 4De VLEESCHOUWER C,DELAIGLE J E,MACQ B.Circular in-terpretation of bijective transformation in lossless watermarking formedia asset management[J].IEEE Transactions on Multimedia,2003,5(1):97-105.
  • 5YANG QUNTING,GAO TIEGANG,LI FAN.Reversible robust da-ta hiding scheme based on histogram shifting in multi-wavelet domain[J].International Journal of Advancements in Computing Technolo-gy,2011,3(5):185-193.
  • 6COLTUC D.Low distortion transform for reversible watermarking[J].IEEE Transactions on Image Processing,2011,99(7):1057-7149.
  • 7PENG FEI,LEI YU-ZHOU,LONG MIN,et al.A reversible water-marking scheme for two-dimensional CAD engineering graphicsbased on improved difference expansion[J].Computer-Aided De-sign,2011,43(8):1018-1024.
  • 8MEMONAB N A,KHANC A,GILANID S A M,et al.Reversiblewatermarking method based on adaptive thresholding and compand-ing technique[J].International Journal of Computer Mathematics,2011,88(8):1573-1594.
  • 9THAMPI S M,JACOB A J.Securing biometric images using revers-ible watermarking[J].International Journal of Image Processing,2011,5(4):382-389.
  • 10LUO LI-XIN,CHEN ZHEN-YONG,CHEN MING,et al.Reversi-ble image watermarking using interpolation technique[J].IEEETransactions on Information Forensics and Security,2010,5(1):187-193.

二级参考文献11

  • 1Yeung, Mintzer FC. Invisible watermarking for image verification[J]. Electron Imag, 1998,7(3):578-591.
  • 2Tian J. Reversible data embedding using a difference expansion [J]. IEEE Transaction on Circuits and Systems for Video Technology,2003,13(8): 890-896.
  • 3Chang C C, Tai W L, Lin M H. A reversible data hiding scheme with modified side match vector quantization[C].Taiwan: Proceedings of the International Conference on Advanced Information networking and Applications,2005:947-952.
  • 4Vleeschouwer C D, Delaigle J E, Macq B. Circular interpretation of histogram for reversible watermarking [C]. France: Proceedings of the IEEE 4th Workshop on Multimedia Signal Processing,2001:345 -350.
  • 5Leest A, Veen M, Bruekers F. Reversible image watermarking [C]. Barcelona, Spain:Proceedings of IEEE International Conference on Image Processing,2003:731-734.
  • 6Xuan G, Zhu J, Chen J, et al. Distortionless data hiding based on integer wavelet transform[J]. IEEE, Electronics Letters, 2002,38 (25): 1646-1648.
  • 7Ni Z, Shi Y, Ansari N, et al. Reversible data hiding [J]. IEEE Tran On Circuits and System for Video Technology,2006,16(3): 354-362.
  • 8Wang Ran-Zan, Lin Chi-Fang, Lin Ja-Chen. Hiding data in images by optimal moderately-significant-bit replacement[J]. Electronics Letters,2000,36(25):2069-2070.
  • 9Celik M U, Sharma G, Tekalp A M, et al.Reversible data hiding [C]. NY, USA: IEEE Int Conf on Image Processing, 2002: 157-160.
  • 10Tian J. Wavelet-based reversible watermarking for authentication[C].California,USA:Proc SPIE Security and Watermarking of Multimedia Contents Ⅳ,2002:679-690.

共引文献9

同被引文献29

  • 1唐明,王丽娜,张焕国.动态多重数字水印设计方案[J].计算机应用研究,2006,23(3):28-30. 被引量:7
  • 2赵翔,郝林.数字水印综述[J].计算机工程与设计,2006,27(11):1946-1950. 被引量:46
  • 3陈传波,祝中涛.RSA算法应用及实现细节[J].计算机工程与科学,2006,28(9):13-14. 被引量:25
  • 4YANG QUNTING, GAO TIGANG, LI FAN. Reversible robust data hiding scheme based on histogram shifting in multi - wavelet domain [ J]. International Journal of Advancements in Computing Technolo- gy, 2011,3(5): 185 -193.
  • 5PENG FEI, LEI YU-ZHOU, LONG MIN, et al. A reversible water- marking scheme for two-dimensional CAD engineering graphics based on improved difference expansion[ J]. Computer-Aided De- sign, 2011,43(8) : 1018 - 1024.
  • 6TIAN J. Reversible data embedding using a difference expansion [ J]. IEEE Transactions on Circuits and Systems for Video Technolo- gy, 2003, 13(8) : 890 - 896.
  • 7ALATFAR A M. Reversible watermark using the difference expan- sion of a generalized integer transform[ J]. IEEE Transactions on Im- age Processing, 2004, 13(8) : 1147 - 1156.
  • 8CHEN C C, TSAI Y H. Adaptive reversible image watermarking scheme[ J]. The Journal of Systems and Software, 2011,84:428 - 434.
  • 9TAN C K, NG J C, XU X T, et al. Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability [ J]. Journal of Digital Imaging, 2011, 24(3) : 528 - 540.
  • 10DENG X H, CHEN Z G, DENG XH, et al. A novel dual-layer re- versible watermarking for medical image authentication and EPR hid- ing[ J]. Advanced Science Letters, 2011,4(11) : 3678 - 3684.

引证文献2

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部