期刊文献+

基于三叉树划分技术的无损图像认证算法 被引量:1

Image authentication algorithm based on trisected image basic blocks
下载PDF
导出
摘要 在目前基于分块的无损图像认证算法中,在图像分块中嵌入水印需要合并较大的图像区域,这将导致窜改定位的精度降低。为提高认证精确性,提出基于三叉树划分的认证算法。该算法预先串联对图像三等分后产生的基本块,形成基本块链表;然后选定适当大小的图像块作为认证块进行水印嵌入,当水印无法嵌入时,从基本块链表中选取一个基本块进行认证块扩展。基本块的细粒度特性降低了为嵌入水印信息而对图像认证精度造成的影响。在对认证信息进行签名时,通过重复嵌入无损水印的方式来提高算法的鲁棒性,防止矢量量化攻击。实验结果表明该算法窜改定位能力优于基于自适应图像块组合的无损图像认证算法。 As the existing block-wise lossless image authentication algorithms will sacrifice the precision of locating distortions,this paper proposed the lossless image authentication algorithm based on trisected image basic blocks. The algorithm trisected the original image recursively and connected all the basic blocks into a link. An authentication block was made up of several basic blocks. When the watermark couldn't be embedded into the authentication block,the algorithm tried to merge only one basic block from the link into current authentication block. As a result,it expanded each authentication block's size at a minimum level. Moreover,in order to prevent vector quantization attack,it took a digital signature algorithm and repeatedly embedded the signature into the authentication block via a lossless watermarking algorithm. The experimental results demonstrate that the algorithm is more accuracy than the algorithm based on adaptive combinations of image basic blocks.
作者 李向阳
出处 《计算机应用研究》 CSCD 北大核心 2014年第7期2224-2227,2232,共5页 Application Research of Computers
基金 广东省高等职业教育教学改革立项项目(20120202029) 广东农工商职业技术学院院级课题(XYYB1107)
关键词 无损图像认证 可逆图像认证 三叉划分图像认证块 矢量量化攻击 lossless image authentication reversible image authentication trisected image basic blocks vector quantization attack
  • 相关文献

参考文献11

  • 1COX I J,MILLER M L, BLOOM J A,et al. Digital watermarking and steganography [ M ]. San Francisco : Morgan Kanffman ,2008:375-422.
  • 2FRIDRIEH J, GOLJAN M, DU R. Invertible authentication [ C ]//Proc of International Conference on Security and Watermarking of Multime- dia Contents Ⅲ. San Jose:SPIE,2001:197-208.
  • 3CELIK M U, SHARMA G, TEKALP A M. Lossless watermarking for image authentication: a new framework and an implementation [ J ]. IEEE Trans on Image Processing,2006,15 (4) : 1042-1049.
  • 4罗剑高,韩国强,沃焱,梁鹏.篡改定位精度可动态调整的无损图像认证算法[J].华南理工大学学报(自然科学版),2011,39(7):121-126. 被引量:7
  • 5罗剑高,韩国强,沃焱,李向阳.基于自适应图像块组合的无损图像认证算法[J].通信学报,2012,33(6):64-72. 被引量:7
  • 6TIAN jun. Reversible data embedding using a difference expansion[J]. IEEE Trans on Circuits and Systems for Video Technolo- gy,2003,13(8) :890-896.
  • 7NI Zhi-cheng,SHI Y Q ,ANSARI N ,et al. Reversible data hiding[ J]. IEEE Trans on Circuits and Systems for Video Technology, 2006,16(3) :354-362.
  • 8THODI D M, RODRIGUEZ J J. Expansion embedding techniques for reversible watermarking [ J]. IEEE Trans on Image Processing, 2007,16(3) :721-730.
  • 9TAI W L,YEH C M,CHANG C C. Reversible data hiding based on histogram modification of pixel differences [ J ]. IEEE Trans on Cir- cuits and Systems for Video Technology,2009,19 (6) :906-910.
  • 10WENG S W,ZHAO Y,PAN J S. Reversible watermarking resistant to cropping attack [ J ]. I ET information Secu rity,2007,1 ( 2 ) : 91 - 95.

二级参考文献29

  • 1张鸿宾,杨成.基于公钥和脆弱水印的图像认证算法[J].计算机科学,2004,31(11):218-221. 被引量:8
  • 2Cox I J, Miller M L, Bloom J A, et al. Digital watermarking and steganography [ M ]. 2nd ed. Burlington: Morgan Kauff- man, 2008 : 375- 422.
  • 3Wong P W, Memon N. Secret and public key image water-marking schemes for image authentication and ownership verification [ J]. IEEE Transactions on Image Processing, 2001,10 ( 10 ) : 1593-1601.
  • 4Celik M U, Sharma G, Saber E, et al. Hierarchical water- marking for secure image authentication with localization [ J ]. IEEE Transactions on Image Processing, 2002, 11 (6) :585-595.
  • 5Fridrich J,Goljan M,Du R. Invertible authentication [ C ]// Proceedings of Security and Watermarking of Multimedia Contents Ⅲ. San Jose: SPIE ,2001 : 197-208.
  • 6Tian J. Wavelet-based reversible watermarking for authen- tication [ C ]// Proceedings of Security and Watermarking of Multimedia Contents Ⅳ. San Jose: SPIE, 2002: 679- 690.
  • 7Lee Sang-kwang, Suh Young-ho, Ho Yo-suug. Reversible image authentication based on watermarking [ C ]//Pro- ceedings of IEEE International Conference on Multimedia and Expo. Toronto : IEEE,2006 : 1521-1324.
  • 8Celik M U, Sharma G, Tekalp A M. Lossless watermarking for image authentication:a new framework and an imple- mentation [ J ]. IEEE Transactions on Image Processing, 2006,15 (4) : 1042 -1049.
  • 9Weng S W, Zhao Y, Pan J S. Reversible watermarking re- sistant to cropping attack [ J ]. IET Information Security, 2007,1(2) :91-95.
  • 10Ni Z, Shi Y Q, Ansari N. Reversible data hiding [ J ]. IEEE Transactions on Circuits and Systems for Video Technology ,2006,16 ( 3 ) :354-362.

共引文献9

同被引文献4

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部