期刊文献+

结合DCT和VQ编码的可恢复脆弱水印算法 被引量:2

Restorable Fragile Watermarking Algorithm Combined DCT with VQ Encoding
下载PDF
导出
摘要 由于编码效率和安全性不够理想,现有可恢复脆弱水印算法的篡改恢复性能有待进一步提高,结合DCT(Discrete Cosine Transform)和VQ(Vector Quantization)编码提出了一种编码方式可变的变容量可恢复水印算法。为了提高编码效率,根据8×8图像块的复杂程度,分别采用DCT或VQ编码生成变容量重要恢复水印信息。对4×4的高频分量块,利用VQ压缩生成8比特细节水印。将图像块的重要水印分成三部分及其细节水印基于密钥分别随机地嵌入在其他图像块中,以抵抗拼贴攻击。篡改检测时,综合四部分水印的不一致标识,判定图像块的真实性。为了提高恢复性能,利用提取的重要、细节水印信息和图像修复方法恢复篡改图像块。仿真结果表明,算法具有较好的编码效率和安全性,并且篡改恢复性能优于现有文献。 Due to the dissatisfactory coding efficiency and security,the tamper recovery performance of existing fragile watermarking schemes can be further improved.Combined DCT and VQ encoding,an alterable-capacity watermarking scheme with restoration capability is proposed,in which the encoding method can be alterable.To improve the coding efficiency,DCT or VQ encoding method is selected to generate the significant recovery watermark with alterable-capacity according to the complexity of each 8 × 8 image block.For each 4 × 4 high-frequency component block,the detail watermark with eight bits is generated by VQ compression.Then,based on the user key,the significant watermark which is divided into three parts and the detail watermark of the block are embedded in other image blocks to resist collage attack.In the tamper detection,the proposed scheme synthesizes the inconsistent marks corresponding to four parts of watermark to judge the authenticity of blocks.To improve the tamper recovery performance,the extracted significant,detail watermark and image inpainting method are used to recover the tampered image blocks.Simulation results show that the proposed scheme can not only achieve better coding efficiency and security,but also improve the restoration capability.
出处 《科学技术与工程》 北大核心 2013年第17期5004-5009,共6页 Science Technology and Engineering
基金 河南省自然科学基金研究项目资助(12230041173) 河南省教育厅科学技术研究重点项目(12A520043)资助
关键词 脆弱水印 可变编码方式 恢复性能 编码效率 安全性 fragile watermarking alterable encoding method recovery performance coding efficiency security
  • 相关文献

参考文献12

  • 1Zhu B B,Swanson M D,Tewfix A H. When seeing isn' t believing.IEEE Signal Processing, 2004 ; 21(2) :40—49.
  • 2Haouzia A,Noum,eor R. Methods for image authentication : a sur-vey. Multimedia Tools and Applications, 2008 ; 39( 1 ) :1-46.
  • 3魏伟一,张贵仓,秦娜.一种用于图像认证的半脆弱数字水印算法[J].计算机仿真,2008,25(7):121-124. 被引量:3
  • 4赵春晖,刘巍.基于压缩感知的交互支持双水印算法[J].电子学报,2012,40(4):681-687. 被引量:22
  • 5陈珂,牛丽,于复生.一种基于离散小波域的脆弱水印算法[J].计算机仿真,2011,28(6):145-148. 被引量:1
  • 6Chang C C, Chen K N, Lee C F, ef al. A secure fragile watermark-ing scheme based on chaos-and-hamming code. The Journal of Sys-tems and Software, 2011 ; 84: 1462—1470.
  • 7Zhang X P, Wang S Z, Qian ZX, et al. Reference sharing mecha-nism for watermarking self-embedding. IEEE Transaction on ImageProcessing, 2011; 20(2) : 485-495.
  • 8Yang C, Shen J. Recovered tke tampered image based on VQ inde-xing. Signal Processing, 2010; 90: 331—343.
  • 9Qian Z X, Feng G R, Zhang X P, ei al. Image self-embedding withhigh-quality restoration capability. Digital Signal Processing, 2011 ;21: 278—286.
  • 10吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70

二级参考文献82

共引文献92

同被引文献5

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部