期刊文献+

基于显著性分类的数字图像自嵌入方法 被引量:1

Self-Embedding Based on Saliency Distribution
下载PDF
导出
摘要 数字图像自嵌入与恢复是在图像中嵌入与自身相关的信息,用于接收端判断图像是否被篡改并恢复被篡改区域的内容.提出一种基于显著性分类的数字图像自嵌入方法,根据图像自身的特点对图像进行分类,动态决定每个区域的参考数据量和嵌入容量,采用喷泉码对参考数据进行编码,并将其嵌入到原图像的不同区域中.与传统方法相比,所提出的方法主要有以下两点优势:在生成参考数据方面,所提出的方法可根据内容分类确定编码长度,在保证整体恢复质量的同时,能重点保护显著性区域;在数据嵌入方面,选择在不同区域中嵌入不等的数据量,可避免传统均匀嵌入法导致图像伪轮廓等缺陷,保证含密图像具有良好的质量. The purpose of image self-embedding is to achieve content authentication and self-recovery by imperceptibly embedding relevant information into the host image. This paper proposes a novel self-embedding method based on significance classification. After classifying the image into three kinds of regions dynamically, the code length and embedding capacity of each block ave determined. Using fountain coding, the reference information is embedded into the entire image. The proposed method is superior to the traditional methods in two aspects. First, the method assigns different code length to different regions so that the recovery quality for the whole image is good and significant regions can be protected effectively. Second, the method embeds different amounts of data into different regions thus avoiding false contour and ensuring good quality of the stego-image.
出处 《应用科学学报》 CAS CSCD 北大核心 2014年第2期178-184,共7页 Journal of Applied Sciences
基金 国家自然科学基金(No.61103181 No.61071187) 上海自然科学基金(No.11ZR1413200) 上海市教委创新基金(No.11YZ10)资助
关键词 自嵌入 自恢复 信息隐藏 显著性 self-embedding, self-recovery, data hiding, significant region
  • 相关文献

参考文献1

二级参考文献14

  • 1[1]Lin E T,Delp E J.A review of fragile image watermarks [A].Proc.of the Multimedia and Security Workshop (ACM Multimedia'99) [C].Orlando,1999.25-29.
  • 2[2]Walton S.Information authentication for a slippery new age [J].Dr.Dobbs Journal,1995,20(4):18-26.
  • 3[3]Yeung M,Mintzer F.Invisible watermarking for image verification [J].Journal of Electronic Imaging,1998,7(3):578-591.
  • 4[4]Wolfgang R B,Delp E J.A watermark for digital images [A].Proc.IEEE Int.Conf.on Image Processing [C].ACM Press,NY,1996.3.219-222.
  • 5[5]Schynael R van,Tirkel A,Osborce C.A digital watermark [A].Proc.of the IEEE ICIP [C].Austin,Texas,1994.2.86-90.
  • 6[6]Wolfgang R B,Delp E J.Fragile watermarking using the VW2D watermark [A].Proc.SPIE,Security and Watermarking of Multimedia Contents [C].San Jose,California,1999.204-213.
  • 7[7]Wong P W.A watermark for image integrity and ownership verification [A].Proc.IS&T PIC Conf.[C].Porland,OR,1998.
  • 8[8]Wong P W.A public key watermark for image verification and authentication [A].Proc.ICIP [C].Chicago,IL,Oct.1998.
  • 9[9]Wong P W,Memon N.Secret and public key image watermarking schemes for image authentication and ownership verification [J].IEEE Trans on Image Processing,2001,10(10):1593-1601.
  • 10[10]Wu M,liu B.Watermarking for image authentication [A].Proc.ICIP [C].Chicago,IL,1998.

共引文献48

同被引文献8

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部