期刊文献+

基于精细认证和迭代补偿机制的图像认证与恢复算法

Refining-Localization-Based Image Authentication and Recovery Scheme Using Iterative Compensation Mechanism
下载PDF
导出
摘要 针对基于分块思想的图像定位算法定位精度不高和恢复性能不好的问题,本文提出了一种基于精细认证和迭代补偿机制的图像认证与恢复算法。在认证算法中,包含基本认证和精细认证,融合基本认证和精细认证这两次认证的结果,并根据连通篡改区域中像素个数的多少进行优化,得到定位精度较高的定位结果。在恢复算法中,考虑到可嵌入的信息容量,提出利用迭代补偿机制恢复图像中被篡改的像素。理论分析和实验结果表明:本文提出的算法对于局部发生篡改的图像,能提高其定位的精度,而且恢复的性能也得到了提高。 To enhance the accuracy of tamper localization and the performance of recovery, refining-localization-based image authentication and recovery scheme are proposed using iterative compensation mechanism. The authentication algorithm contains the basic authentication and the refining authentication. It fuses the twice authentication results and takes several post-pro- cessing measures based on connected tampered region to obtain the accurate authentication result. According to embedding capacity, the recovery scheme uses iterative compensation mech- anism to recover the tampered pixels. Theoretical analysis and simulation results show that the proposed algorithm can improve the accuracy of tamper localization and the probability of recovering the tampered pixels.
出处 《数据采集与处理》 CSCD 北大核心 2013年第1期51-57,共7页 Journal of Data Acquisition and Processing
基金 国家杰出青年科学基金(61025013)资助项目 国家自然科学基金(61073159)资助项目 中央高校基本科研业务费专项资金(2012JBM042)资助项目
关键词 基本认证 精细认证 连通篡改区域 迭代补偿机制 basic authentication refining authentication connected tampered region iterative compensation mechanism
  • 相关文献

参考文献10

  • 1周四清,余英林.数字图像水印技术及其应用[J].数据采集与处理,2001,16(3):353-357. 被引量:7
  • 2He Hongjie,Zhang Jiashu,Tai Hengming. A wavelet-based fragile watermarking scheme for secure image authentication[A].New York:springer-verlag,2006.422-431.
  • 3Liu Hongtao,Shen Ruiming,Chung Fulai. Fragile watermarking scheme for image authentication[J].Electronics Letters,2003,(12):898-900.doi:10.1049/el:20030589.
  • 4Liu Shaohui,Yao Hongxun,Gao Wen. An image fragile watermark scheme based on chaotic image pattern and pixel-pairs[J].Applied Mathematics and Computation,2007,(02):869-882.doi:10.1016/j.amc.2006.07.036.
  • 5Wang Shiming,Chen Weiche. A majority-voting based watermarking scheme for color image tamper detection and recovery[J].Computer Standards and Interfaces,2007,(05):561-570.
  • 6He Hongjie,Zhang Jiashu,Fan Chen. Adjacentblock based statistical detection method for self-embedding watermarking techniques[J].Signal Processing,2009,(08):1557-1566.doi:10.1016/j.sigpro.2009.02.009.
  • 7Li Chunlei,Wang Yunhong,Ma Bin. A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure[J].Computers and Electrical Engineering,2011,(06):927-940.
  • 8He Hongjie,Chen Fan,Tai Hengming. Performance analysis of a block-neighborhood based selfrecovery fragile watermarking scheme[J].IEEE Transactions on Information Forensics and Security,2012,(01):185-196.
  • 9Zhang Xinpeng,Wang Shuozhong,Qian Zhenxing. Reference sharing mechanism for watermark self-embedding[J].IEEE Transactions on Image Processing,2011,(02):485-495.
  • 10Holliman M,Memon N. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes[J].IEEE Transactions on Image Processing,2000,(03):432-441.

二级参考文献13

  • 1[1]Schyndel R G van, Tirkel A A, Osbome C F. A digital watermark[C]. In: Proceedings IC1P IEEE, 1994,2 : 86~89
  • 2[2]Petitcolas F A P, Anderson R, Kuhn M G. Information hiding-a survey[J]. Proceedings of the IEEE, 1999,87(7):1062~1078
  • 3[3]Swanson M D, Kobayashi M, Tewfik A H. Multimedia data embedding and watermarking technologies [J].Proc of the IEEE, 1998,86(6): 1064~1087
  • 4[4]Hartung F, Kutter M. Multimedia watermarking tech niques. Proceedings of the IEEE, 1999,87(7)
  • 5[5]Bender W, Gruhl D, Morimoto N. Techniques for data hiding[J]. Proceedings of the SPIE, San Jose, CA,Feb. 1995,2420:11~19
  • 6[6]Puate J, Jordan F. Using fractal compression scheme to embed a digital signature into an image[J]. Proceedings of the SPIE, 1996,2915:108 ~ 118
  • 7[7]Bas P, Chassery J M. Using the fractal code to water mark images [J ]. Proc IEEE International Conf on Im age Processing, ICIP-98, 1998,1:469~473
  • 8[8]Cox I J, Kilian K, Leighton T, et al. Secure spread spectrum watermarking of images, audio and video[J].Proc IEEE International Conf on Image Processing,ICIP-96,1996,3: 243~ 246
  • 9[9]Hsu Chioutig. Digital watermarking for images and videos[D]. [dissertation]. 1997
  • 10[10]Hartung F, Girod B. Watermarking of uncompressed and compressed Video[J]. Signal Processing, 1998,66(3) :283~301

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部