期刊文献+

一种图像内容可恢复的脆弱水印算法 被引量:2

Fragile watermarking algorithm with capability of restoring image contents
原文传递
导出
摘要 提出一种图像内容可恢复的脆弱水印算法,采用数字签名的MD5算法提取分块图像的特征值生成水印.在恢复系统中,恢复比特来源于原图压缩后的数据并将此数据嵌入到图像的最低有效位以实现自恢复.实验结果表明:该算法简单,安全性高,不但具有检测篡改的能力,而且能够对被篡改区域进行修复;对局部发生的篡改可以有效地检测和精确定位,能够有效地抵抗拼贴攻击. A fragile watermarking algorithm used to restore the image content was proposed,which could not only detect tampering,but also restore the tampered area.The generation of the watermark was based on the eigenvalues of the blocks of an image using MD5algorithm of digital signature.In the recovery mechanism,the recovery bits generated from the compressed original image were embedded into the least significant bits(LSB)of the image.Experimental results demonstrate that this algorithm is simple and secure which can effectively detect and precisely locate the tampering in the local area,and also detect collage-attack effectively.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2012年第7期67-70,共4页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(61070045) 国家部委预研基金资助项目 中央高校基本科研业务费专项资金资助项目 陕西省自然科学基础计划资助项目(2010JM8011)
关键词 图像认证 水印算法 脆弱性水印 自嵌入水印 水印信息 image authentication watermark algorithm fragile watermark self-embedding watermark watermark information
  • 相关文献

参考文献10

  • 1Patile P,Sonavane S.Fragile watermarking schemefor image tamper detection[C]∥International Con-ference on Communication Systems and NetworkTechnologies.Jammu:IEEE,2011:531-535.
  • 2Zhang Xinpeng,Wang Shuozhong.Fragile water-marking with error-free restoration capability[J].IEEE Transactions on Multimedia,2008,10(8):1490-1499.
  • 3Amira H,Rhouma R,Belghith S.An eigen valuebased watermarking scheme for tamper detection ingray level images[C]∥7th International Multi-Con-ference on Systems Signals and Devices.Philadel-phia:IEEE,2010:1-5.
  • 4Fridrich J,Goljan M.Protection of digital images u-sing self embedding[C]∥Symposium Content Securi-ty and Data Hiding in Digital Media.Newark:NewJersey Institute of Technology,1999:5-9.
  • 5Fridrich J,Goljan M.Images with self-correcting ca-pabilities[C]∥IEEE International Conference on Im-age Processing.Kobe:IEEE,1999,3:792-796.
  • 6He Hongjie,Zhang Jiashu,Chen Fan.Fuzzy data-base mining and information retrieval a chaos-basefragile Watermarking scheme with recovery[C]∥4thInternational Conference on Fuzzy System andKnowledge Discovery.Haikou:IEEE,2007:303-307.
  • 7Makeno K,Sun Q,Chang S F.New semi-fragile im-age authentication watermarkin techniques using ran-dom bias and none-uniform quantization[J].IEEETrasactions on Multimedia,2008,8(1):32-45.
  • 8杨格兰,奚浩波.基于DWT与SVD自适应公开水印技术[J].微计算机信息,2007,23(21):67-68. 被引量:3
  • 9Wong P W.A public key watermark for image verifi-cation and authentication[C]∥Proceedings of theIEEE International Conference on Image Processing.Chicago:IEEE,1998:455-459.
  • 10易红军,佘名高.MD5算法与数字签名[J].计算机与数字工程,2006,34(5):44-46. 被引量:23

二级参考文献6

共引文献24

同被引文献20

  • 1和红杰,张家树.基于混沌置乱的分块自嵌入水印算法[J].通信学报,2006,27(7):80-86. 被引量:33
  • 2Chaluvadi S B,Prasad M V N. Efficient Image Tamper Detection and Recovery Technique Using Dual Watermark [ C ]//Proceedings of Nature & Biologically Inspired Computing. Washington D. C., USA: IEEE Press, 2009 : 993 -998.
  • 3Rawat S, Raman B. A Chaotic System Based Fragile Watermarking Scheme for Image Tamper Detection[ J]. AEU International Journal of Electronics and Communications ,2011,65 ( 10 ) :840-847.
  • 4Dadkhah S0 Manaf A A, Sadeghi S. Efficient Digital Image Authentication and Tamper Localization Technique Using 3Lsb Watermarking [ J ]. International Journal of Computer Science Issues,2012,9( I ).
  • 5Yang C W,Shen J J. Recover the Tampered Image Based on VQ lndexingl J]. Signal Process ,2010,90( 1 ) :331-343.
  • 6Lee T Y,Lin S D. Dual Watermark for Image Tamper Detection and Recovery [ J ]. Pattern Recognition, 2008, 41( 11 ) :3497-3506.
  • 7Chang C,Fan Y H, Tai W L. Four-scanning Attack on Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery I J ]. Pattern Recognition, 2008,41 ( 2 ) :654-661.
  • 8Fridrich J, Goljan M, Memon N. Cryptanalysis of the Yeung Mintzer Fragile Watermarking Technique [ J ]. Journal of Electronic Imaging ,2002,11 ( 2 ) :262-274.
  • 9Tong Xiaojun, Liu Yang, Zhang Miao, et al. A Novel Chaos-based Fragile Watermarking for Image Tampering Detection and Self-recovery I J ]- Signal Processing, 2013,28(3) :301-308.
  • 10Li Chunlei, Wang Yunhong, Ma Bin ,et al. A Novel Self- recovery Fragile Watermarking Scheme Based on Dual- redundant-ring Structure I J ]. Computer & Electrical Engineering ,2011,37:927-940.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部