期刊文献+

一种能进行篡改定位的文档认证水印算法

Document Authentication Watermarking Algorithm for Tampered Localization
下载PDF
导出
摘要 针对一些重要二值文档图像的完整性保护问题,提出一种能进行篡改定位的文档认证水印算法。给出可翻转像素选择标准,利用判断标准确定可嵌入块,然后将加密后水印信息代替可翻转像素实现水印嵌入。实验结果表明,本算法具有良好的不可见性,水印提取既不需要原始图像,也不需要原始水印,并能对图像的内容篡改进行定位。 In order to protect the binary document images' integrity, a document watermarking algorithm/or image authentica- tion, integrity verification and tampered localization is proposed. The selection criteria of the flippable plxels are presented and the embeddable blocks are determined by the criteria. The watermarked image can be obtained by inserting the watermarking into the flippable pixels. The watermarking is performed by extracting the central plxel in the embeddable blocks. Experiments show that the watermarked document image has good quality and the embedded watermarking can be extracted without the original docu- ment image and the original watermarking. The tampered content can-be detected and localized successfully.
作者 郗艳华
出处 《计算机与现代化》 2012年第9期118-122,158,共6页 Computer and Modernization
基金 陕西省教育厅专项基金资助项目(09JK808) 咸阳师范学院专项科研基金资助项目(07XSYK286)
关键词 文档水印 完整性认证 篡改定位 document watermarking integrity verification tampered localization
  • 相关文献

参考文献13

二级参考文献71

  • 1刘春庆,戴跃伟,王执铨.一种新的二值图像信息隐藏方法[J].东南大学学报(自然科学版),2003,33(z1):98-101. 被引量:16
  • 2王宏霞,何晨,丁科.基于混沌映射的鲁棒性公开水印[J].软件学报,2004,15(8):1245-1251. 被引量:50
  • 3[3]Eggers J, Bauml R, Girod B. A communications approach to image steganography [A]. In: Proceedings of SPIE [C], 2002, 4675: 26-37.
  • 4[4]Petitcolas F, Anderson R, Kuhn M. Information hiding - a survey [J]. Proceedings of the IEEE,1999,87(7):1062-1078.
  • 5[5]Brown A. S-tools for windows [EB/OL]. ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools4.zip,1996.
  • 6[6]Machado R. Ezstego, stego online, stego [EB/OL]. http://www.stego.com,1997.
  • 7[7]Hansmann F. Steganos, DeusEx machina communications [EB/OL]. http://www.steganography.com,1996.
  • 8[8]Chen M, Wong E K, Memon N, et al. Recent developments in document image watermarking and data hiding [A]. In: Proceedings of SPIE [C]. 2001, 4518:166-175.
  • 9[9]Fridrich J, Rui D. Secure steganographic methods for palette images [A]. In: Pfitzmann A, ed. Information Hiding: Third International Workshop, LNCS[C]. Springer-Verlag,1999, 1768: 47-60.
  • 10HARTUNG F, KUTTER M. Multimedia watermarking techniques[J]. Proc of IEEE, 1999, 87(7):1079-1107.

共引文献88

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部