期刊文献+

用于图像内容认证的半脆弱水印新算法 被引量:6

Novel semi-fragile watermarking algorithm for image content authentication
下载PDF
导出
摘要 为了提升数字图像内容认证的准确性,提出一种新颖的半脆弱水印算法.引入相关块组的概念,并将相关块组进一步划分为子块组,轮流使用每个子块组内特定块生成水印,最终将水印嵌入到子块组内的其他块中.算法根据图像内容自适应选取量化步长,结合Slant变换高能量集中性及直流量化原理完成水印嵌入过程,认证过程中使用新的噪声过滤策略并通过投票方式确定篡改发生位置.实验表明:该算法能有效地提高含水印图像的质量及防止水印信息的未授权提取,在应对裁剪、替换等常规处理时定位精度提升明显.算法抵抗偶然攻击的能力强,新噪声策略有效地改善了针对篡改区域的识别效果. A novel semi-fragile watermarking algorithm was proposed to improve the accuracy of image content authentication.This algorithm introduced the conception of relevant-block-group,and divided each relevant-block-group into several sub-block-groups,generated the watermark information by using the particular block of the each sub-block-group by turn,finally,embedded the watermark into the other blocks of the sub-block-group.This algorithm selected the watermark quantization steps self-adaptively according to the content feature of the host image,finished the embedding process by combining the high energy concentration of the Slant transform and the principal of direct current coefficient quantization.Moreover,a noble noise-filtering strategy was proposed,and the voting method was applied to position the tampered area in the authentication process.Experimental results show that the proposed algorithm can improve the quality of the watermarked image effectively and prevent the watermark detection without authentication,and it can also significantly enhance the positioning accuracy when facing with conventional treatments,such as cutting,replacing,and etc.The algorithm has good ability of resisting accidental attacks,and the new noise strategy improves the recognition effect of the tampered region effectively.
出处 《浙江大学学报(工学版)》 EI CAS CSCD 北大核心 2013年第6期969-976,共8页 Journal of Zhejiang University:Engineering Science
基金 国家自然科学基金资助项目(60971089) 国家重大科技成果转化基金资助项目(财建[2010]341号)
关键词 Slant变换 半脆弱水印 图像认证 噪声过滤 Slant transform semi-fragile watermarking image authentication noise filtering
  • 相关文献

参考文献15

  • 1MAENO K, SUN Q, CHANG S, et al. New semi-frag- ile image authentication watermarking techniques using random bias and nonuniform quantization [J]. IEEE Transactions on Multimedia, 2006, 8(1): 32-45.
  • 2LIN C Y, CHANG S F. A robust image authentication method distinguish JPEG compression from malicious manipulation[J]. IEEE Transaction on Circuits and Sys- tems of Video Technology, 2001, 11(2) : 153 - 168.
  • 3LIN C H, SU T S, HSIEH W S. Semi-fragile water- marking scheme for authentication of JPEG images[J]. Tamkang Journal of Science and Engineering, 2007, 10 (1): 57-66.
  • 4KO C C, HUANG C H. A novel semi-fragile water- marking technique for image authentication[C]// Pro- ceeding Sixth lASTED International Conference on Signal and Image Processing. Honolulu: Hawaii, 2004: 2282 - 2285.
  • 5P1VA A, BARTOLINI F, CA1.DELLI R. Self recovery authentication of images in the DWT domain[J]. Inter- national Journal of Image and Graphics, 2005, 5 (1) : i49 - 65.
  • 6王向阳,陈利科.一种新的自适应半脆弱水印算法[J].自动化学报,2007,33(4):361-366. 被引量:17
  • 7段贵多,赵希,李建平,廖建明.一种新颖的用于图像内容认证、定位和恢复的半脆弱数字水印算法研究[J].电子学报,2010,38(4):842-847. 被引量:20
  • 8XIAO Jun-qi, XING Xin. A quantization-based semi- fragile watermarking scheme for image content authentication[J]. Journal of Visual Communication and Image Representation, 2011, 22(2) : 187 - 200.
  • 9HOU Z X, XU N N, CHEN H, et al. Fast slant trans- form with sequency increment and its application in im- age compression[C] //International Conference on Signal Processing. Beijing: IEEE, 2004: 65- 68.
  • 10HO T S, ZHU X Z. A slant transform watermarking for copyright protection of satellite images[C] //Pro- ceedings of the 2003 Joint Conference of the Fourth In- ternational Conference on Information, Communications and Signal Processing. Singapore, NTU:IEEE, 2003; 1178 - 1181.

二级参考文献43

共引文献69

同被引文献37

引证文献6

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部