期刊文献+

基于分块的小波域图像半脆弱水印认证算法 被引量:1

A Semi-fragile Watermarking Authentication Algorithm Based on Block and Wavelet Domain of Image
下载PDF
导出
摘要 提出一种图像半脆弱水印认证算法,该算法将图像分成四块,从三级小波分解的低频系数中提取每部分图像的特征作为水印,嵌入到载体图像的各分块中,水印提取既不需要原始图像,也不需要原始水印信息.理论分析及实验结果表明,该算法可以对任意大小的载体图像进行水印嵌入,具有很好的透明性,不仅能抵御噪声、有损压缩等非恶意攻击,还能有效地检测定位剪切、替换等恶意攻击. A new semi-fragile watermarking authentication algorithm is proposed,the algorithm first divides the image into four blocks,then the feature of each block of image is extracted from low frequency coefficient of three level wavelet transform,and then the feature as the watermark is embedded into corresponding block of image,the four blocks embedded into watermark were combined into a new image.The watermark can be extracted without involving either the host image or the original watermark.Theoretical analysis and experimental results show that the algorithm can be carriers of images of any size,and with good transparency,and it can not only resist non-malicious attacks,such as noise and lossy compression,it can also effectively detect and locate the cut,replaced,and other malicious attacks.
出处 《郑州大学学报(工学版)》 CAS 北大核心 2012年第2期10-13,18,共5页 Journal of Zhengzhou University(Engineering Science)
基金 国家自然科学基金资助项目(61071211)
关键词 半脆弱水印 分块 小波变换 图像认证 semi-fragile watermark block wavelet transform image authentication
  • 相关文献

参考文献5

二级参考文献45

  • 1侯振华,陈生潭.脆弱性数字水印研究[J].计算机应用,2003,23(z2):106-108. 被引量:17
  • 2郑林涛,阎晓东,范延军,孙燮华.一种基于块均值的盲检测水印算法[J].中国计量学院学报,2004,15(4):281-283. 被引量:2
  • 3闫晓东,孙燮华.数字水印图像的置乱加密预处理研究[J].中国计量学院学报,2005,16(1):42-46. 被引量:5
  • 4徐纯,孙燮华,班素荣.一种图像的置乱度及其破密攻击[J].中国计量学院学报,2007,18(2):131-135. 被引量:4
  • 5DAVID W C, RAJAN P K. A New Fragile watermarking technique for image authentication[C] // Proceedings of the 38th Southeastern Symposium on System Theory. Cookville: Tennessee, 2006 : 221-225.
  • 6HUI Y Q, ZHENG D, JI Y Z. Human visual system based adaptive digital image watermarking[J]. Signal Processing, 2008,88 (1):174-188.
  • 7BARNI M,BARTOLINI F. Watermarking Systems Engineering Enabling Digital Assets Security and Other Applications[M]. USA: Routledge, 2004.
  • 8LEWIS A S, KNOWLES G. Image compression using the 2-D wavelet transform[J].Image Processing, 1992,2 (1) 244-250.
  • 9[1]Walton S. Information authentication for a slippery new age [J]. Dr Dobbs Journal,1995,20(4):18-26.
  • 10[2]Wong PW. A public key watermark for image verification and authentication[A]. Proceedings of the IEEE International Conference on Image Processing[C]. Chicago,Illinois,USA,1998,1.455-459.

共引文献62

同被引文献5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部