期刊文献+

基于混沌和脆弱水印的图像篡改检测算法 被引量:6

Image tamper detection scheme based on chaotic system and fragile watermarking
下载PDF
导出
摘要 针对现有基于脆弱水印方法的不足,提出了一种新的结合混沌系统和脆弱水印的图像篡改检测算法。算法首先利用Arnold cat映射对原始图像进行k次置乱,然后选取置乱图像的最低有效位(LSB)平面作为水印嵌入位置,实际嵌入的水印由Logistic混沌映射产生的随机二进制序列与原始水印异或得到,通过LSB替换算法嵌入。最后对LSB替换后图像进行T-k次的Arnold cat映射得到水印图像。实验结果表明,混沌系统的引入大大增强了脆弱水印的安全性;另外,针对不同种类的攻击,算法具有良好的篡改检测和定位精确性。 In order to solve the shortage of the method based on fragile watermarking, a new chaotic system and fragile watermarking based image tamper detection algorithm was proposed. Firstly, the method used Arnold cat map k times to scramble the original image, and then chose the Least Significant Bit (LSB) plane of the scrambled image as the embedding position. The actual watermark information was formed by using exclusive-or operation between a random binary sequence produced by Logistic map and the original watermark, and the LSB replacement method was utilized to embed watermark. Finally, the watermarked image was obtained by utilizing Arnold cat map T - k times. The experimental results show that, the introduction of chaotic system to a great extend improves the security of the proposed scheme. In addition, the proposed method achieves superior tamper detection and localization accuracy under different common attacks.
出处 《计算机应用》 CSCD 北大核心 2013年第5期1371-1373,共3页 journal of Computer Applications
基金 国家自然科学基金资助项目(61103202 61272494) 江西理工大学校级科研项目(jxxj12149)
关键词 混沌映射 脆弱水印 篡改检测 定位 安全性 chaotic map fragile watermarking tamper detection localization security
  • 相关文献

参考文献12

  • 1MART1NO F D, SESSA S. Fragile watermarking tamper detection with images compressed by fuzzy transform[ J]. lnfornmtion Sci- ences, 2012, 195(1): 62-90.
  • 2DENG X H, CHEN Z G, DENG X H, et al. A novel dual-layer re- versible watermarking for medical image authentication and EPR hid- ing[J]. Advanced Science Letters, 2011, 4(11) : 3678 -3684.
  • 3CHIANG K H, CHIEN K C C, CHANG R F, et al. Tamper detec- tion and restoring system for medical images using wavelel-based re- versible data embedding[ J]. Journal of Digital hnaging, 2008, 21 (1): 77-90.
  • 4GUO X T. ZHUANG T G. L.ossless watermarking for verifying the integrity of medical images with tamper localization[ J]. Jounlal of Digital hnaging, 2009, 22(6): 620-628.
  • 5PHADIKAR A. MALTY S P, MANDAL M. Novel wawelel - based QIM data hiding technique for tamper detection and correction of digital images[ J]. Journal of Visual Communication and Image Rep- resentation, 2012, 23(3): 454-466.
  • 6LI C L, WANG Y H, MA B, et al. Tamper detection and self-re- covery of biometric images using salient region-based authentication watermarking scheme [ J ]. Computer Standards and Interlaces, 2012, 34(4): 367-379.
  • 7黄斌,史亮,邓小鸿,陈志刚.自适应高容量医学图像可逆数据隐藏算法[J].计算机应用,2012,32(10):2779-2782. 被引量:8
  • 8ZHU Z I,, ZHANG W, WONG K W, et al. A chaos-based symmet- ric image encryption scheme using a bit-level permutation[ J]. Infor- mation Sciences, 2011, 181(6) : 1171 - 1186.
  • 9WANG Y, WONG K W, LIAO X F, et al. A new chaos-based fast image eneryption algorithm[ J]. Applied Soft Computing, 2011, 11 (1): 514-522.
  • 10朱从旭,黄大足,郭迎.结合多混沌映射和输出反馈的图像加密算法[J].武汉大学学报(信息科学版),2010,35(5):528-531. 被引量:6

二级参考文献36

共引文献12

同被引文献63

  • 1全笑梅,张鸿宾.用于篡改检测及认证的脆弱音频水印算法[J].电子与信息学报,2005,27(8):1187-1192. 被引量:14
  • 2顾流,万仲保,石红芹.基于web页信息隐藏的研究与实现[J].微计算机信息,2006,22(08X):186-187. 被引量:10
  • 3孙有发,张成科,高京广,邓飞其.带反馈的混沌并行GA及其在非线性约束优化中的应用[J].计算机学报,2007,30(3):424-430. 被引量:8
  • 4AL-QERSHI O M,KHOO B E.Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images [J].Journal of Digital Imaging,2011,24(1):114-125.
  • 5LI C-T,LI Y.Medical images authentication through repetitive index modulation based watermarking [J].International Journal of Digital Crime and Forensics,2009,1(4):32-39.
  • 6LI C,WANG Y,MA B,et al.Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme [J].Computer Standards and Interfaces,2012,34(4):367-379.
  • 7CHIANG K-H,CHANG K-C,CHANG R-F,et al.Tamper detection and restoring system for medical images using wavelet-based reversible data embedding [J].Journal of Digital Imaging,2008,21(1):77-90.
  • 8GUO X-T,ZHUANG T-G.Lossless watermarking for verifying the integrity of medical images with tamper localization [J].Journal of Digital Imaging,2009,22(6):620-628.
  • 9DENG X-H,CHEN Z-G,ZENG F,et al.Authentication and recovery of medical diagnostic image using dual reversible digital watermarking [J].Journal of Nanoscience and Nanotechnology,2013,13(3):2099-2107.
  • 10KIM K S,LEE M J,LEE J W,et al.Region-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging [J].Computer Vision and Image Understanding,2011,115(9):1308-1323.

引证文献6

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部