期刊文献+

一种基于压缩感知的无损图像认证算法 被引量:4

Lossless image authentication algorithm based on compressive sensing
下载PDF
导出
摘要 针对图像无损认证和篡改检测问题,提出了一种基于压缩感知的自嵌入水印算法.首先,将图像划分为若干分块;然后,利用压缩感知理论对各图像块进行观测,将得到的观测值作为图像内容特征,通过基于哈希的消息认证码算法生成图像摘要,并将摘要信息作为水印嵌入到图像小波域中,嵌入方式采用量化索引调制算法.在认证端提取水印并恢复图像,然后对图像进行压缩感知随机投影,将得到的摘要信息与提取的水印进行对比,实现图像认证和篡改检测.仿真实验结果表明,水印嵌入后图像的峰值信噪比可达到39 dB以上,说明该算法具有较好的不可感知性和隐蔽性.此外,该算法还具有较强的局部篡改定位性能,图像认证块大小可根据图像进行相应调整.若图像通过认证,则可以无损地恢复原始图像. A self-embedding watermarking algorithm based on compressive sensing is proposed for lossless image authentication and tamper detection.First,the image is divided into several sub-blocks.Secondly,each image block is observed by using the compressive sensing theory.Then,the compressive measurements,which are taken as the content features of the image,are used to generate the image digest by the hash-based message authentication code algorithm.Finally,the image digest is embedded into the wavelet coefficients as the watermark by the quantisation index modulation algorithm.During authentication,the watermark is extracted and the image is recovered.Then,random projection is conducted on the recovered image to generate the digest.By comparing the digest with the extracted watermark,image authentication and tamper detection are implemented.The simulation results show that after embedding watermark the peak signal-to-noise ratio is above 39dB,proving the imperceptibility and elusiveness of the proposed algorithm.Besides,the algorithm can accurately localize the tamper.The size of the authentication block can be adjusted according to the image.Once the image passes the authentication,the original image can be recovered without any loss.
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2013年第3期489-493,共5页 Journal of Southeast University:Natural Science Edition
基金 国家重点基础研究发展计划(973计划)资助项目(2011CB707904) 国家自然科学基金资助项目(60911130370 61073138 61201344 61271312) 教育部博士点基金资助项目(20110092110023 20120092120036) 江苏省自然科学基金资助项目(BK2012329) 江苏省"六大人才高峰"资助项目(DZXX-031).
关键词 压缩感知 消息认证码 量化索引调制 小波变换 无损认证 compressive sensing message authentication code quantization index modulation wavelet transform lossless authentication
  • 相关文献

参考文献12

  • 1张鸿宾,杨成.图像的自嵌入及窜改的检测和恢复算法[J].电子学报,2004,32(2):196-199. 被引量:49
  • 2Gao T,Gu Q. Reversible image authentication based oncombination of reversible and LSB algorithm [ C ]//Proceedings of 2007 International Conference on Com-putational Intelligence and Security Workshops. Harbin,China, 2007: 636-639.
  • 3Gu Q, Gao T. A new image authentication based on re-versible watermarking algorithm [ C ] //Proceedings ofthe 1th World Congress on Intelligent Control and Auto-mation. Chongqing, China, 2008: 2727 -2731.
  • 4文家福,王嘉祯,刘爱珍,刘会英.基于差值扩展和纠错编码的可逆图像认证[J].计算机工程,2009,35(22):125-127. 被引量:3
  • 5赵春晖,刘巍.基于分块压缩感知的图像半脆弱零水印算法[J].自动化学报,2012,38(4):609-617. 被引量:36
  • 6Candes E,Romberg J,Tao T. Robust uncertainty prin-ciples :exact signal reconstruction from highly incom-plete frequency information [ J]. IEEE Transactions onInformation Theory, 2006,52(2) : 489 -509.
  • 7Donoho D. Compressed sensing [J]. IEEE Transac-tions on Information Theory, 2006,52(4): 1289 -1306.
  • 8Candes E,Romberg J. The restricted isometry propertyand its implications for compressed sensing [ J ].Comptes Rendus Mathematique, 2008,346(9) : 589 -592.
  • 9Baraniuk R,Davenport M,Devore R, et al. A simpleproof of the restricted isometry property for random ma-trices [J]. Constructive Approximation,2008,28(3):253 -263.
  • 10Rachlin Y, Baron D. The secrecy of compressed sens-ing measurements [ C ] //Proceedings of the 46th Annu-al AUerton Conference on Communication, Controland Computing. Urbana-Champaign, IL,USA,2008 :813-817.

二级参考文献41

  • 1张立保,马新悦,陈琪.基于感兴趣区的图像零水印算法[J].通信学报,2009,30(S2):117-120. 被引量:8
  • 2付炜,邢广忠.置换DCT域中频系数的盲水印嵌入算法研究[J].计算机应用研究,2007,24(3):160-162. 被引量:4
  • 3Swanson M D, Tewfik A H. When Seeing Isn't Believing[J]. IEEE Signal Processing Magazine, 2004, 21 (2): 40-49.
  • 4Fridrich J, Goljan M. lnvertible Authentication[C]//Proc. of SPIE Photonics West. California, USA: Is. n.], 2001.
  • 5Tian Jun. Reversible Data Embedding Using a Difference Expansion[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2003, 12(8): 890-896.
  • 6Lee S. Reversible Image Authentication Based on Watermarking[C]// Proc. of IEEE International Conference on Multimedia and Expo. Toronto, Canada:[s. n.], 2006.
  • 7[1]Lin E T,Delp E J.A review of fragile image watermarks [A].Proc.of the Multimedia and Security Workshop (ACM Multimedia'99) [C].Orlando,1999.25-29.
  • 8[2]Walton S.Information authentication for a slippery new age [J].Dr.Dobbs Journal,1995,20(4):18-26.
  • 9[3]Yeung M,Mintzer F.Invisible watermarking for image verification [J].Journal of Electronic Imaging,1998,7(3):578-591.
  • 10[4]Wolfgang R B,Delp E J.A watermark for digital images [A].Proc.IEEE Int.Conf.on Image Processing [C].ACM Press,NY,1996.3.219-222.

共引文献88

同被引文献29

引证文献4

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部