期刊文献+

安全的变容量恢复水印方案 被引量:6

Safe Variable-Capacity Self-Recovery Watermarking Scheme
下载PDF
导出
摘要 针对现有水印算法大多无法准确定位并恢复被篡改区域的问题,兼顾水印嵌入容量和安全性,提出了一种安全的变容量恢复水印算法.该算法首先将原始图像分成纹理块和平滑块,纹理块除了保存常规信息外,还保存了"细节"信息,不同块将根据自身特点产生不同长度的"复合水印".所谓"复合水印"是指水印由认证水印和信息水印构成,其中认证水印用于检测篡改区域,信息水印用于恢复图像.然后采用新提出的"3级秘钥嵌入方案"(three level secret-key embedding scheme,TLSES)将图像块的"复合水印"随机嵌入在其他图像块中,再利用"3级篡改检测方案"(three level tamper detection scheme,TLTDS)定位被篡改图像块并进行恢复.实验结果表明,所提出的水印算法不仅能够准确检测篡改区域并恢复图像,而且能够有效地抵抗均值攻击和拼贴攻击. Since existing watermarking schemes usually cannot recover the tampered position, a safe variable-capacity self-recovery watermarking scheme is proposed. Both watermark embedding capacity and security are taken into account. The original image is divided into texture blocks and smooth blocks, and the texture blocks not only save traditional information, but also save the "details" information. The so-called "details" information refers to the texture information, which not only can effectively resist the mean attack, but also help to improve the quality of the restored image to meet the needs of practical work. And then according to the characteristics of different blocks, the different length compound watermarks are produced. The so-called "compound watermarks" include the authentication watermarks and information watermarks. Authentication watermarks are used to detect the tampered area, and the information watermarks which include basic watermark and additional watermark are used to restore image. Then the compound watermarks are inserted into the other blocks based on the new proposed scheme called three level secret-key embedding scheme (TLSES). And then the tamper blocks are detected and restored by the three level tamper detection scheme (TLTDS). The experimental results show that the scheme can not only accurately detect the tamper region and restore image, but also can effectively resist mean attack and collage attack.
作者 石慧 李明楚
出处 《计算机研究与发展》 EI CSCD 北大核心 2014年第8期1715-1726,共12页 Journal of Computer Research and Development
基金 国家自然科学基金项目(61272173)
关键词 恢复水印 安全 篡改检测 变容量 复合水印 3级密钥嵌入方案 self-recovery watermark security tamper detection variable-capacity compoundwatermark three level secret-key embedding scheme (TLSES)
  • 相关文献

参考文献5

二级参考文献59

  • 1刘九芬,黄达人,黄继武.图像水印抗几何攻击研究综述[J].电子与信息学报,2004,26(9):1495-1503. 被引量:43
  • 2沃焱,韩国强,张波.一种新的基于特征的图像内容认证方法[J].计算机学报,2005,28(1):105-112. 被引量:32
  • 3和红杰,张家树,田蕾.能区分图像或水印篡改的脆弱水印方案[J].电子学报,2005,33(9):1557-1561. 被引量:24
  • 4焦李成,孙强.多尺度变换域图像的感知与识别:进展和展望[J].计算机学报,2006,29(2):177-193. 被引量:45
  • 5和红杰,张家树.基于混沌置乱的分块自嵌入水印算法[J].通信学报,2006,27(7):80-86. 被引量:33
  • 6Yuan W G, Ling H F, Lu Z D, et al. Image content-based watermarking resistant against geometrical distortions [C]//Proc of the 8th Int Conf on Signal Processing. Piseataway, NJ: IEEE, 2006:2632-2635.
  • 7Shi L, Hong F, Cui G H. A quantization-based digital watermarking robust to geometrical transformations [C] // Proc of 2003 Int Conf on Machine Learning and Cybernetics. Los Alamitos, CA: IEEE Computer Society, 2003:2826-2830.
  • 8Kim B S, Choi J G, Park C H, et al. Robust digital image watermarking method against geometrical attacks [J]. Real- Time Imaging, 2003, 9(2): 139-149.
  • 9Kim B S, Choi I G, Park K H. RST-resistant image watermarking using invariant centroid and reordered Fourier Mellin transform [C] //LNCS2939: Proc of the 2nd Int Workshop on Digital Watermarking. Berlin: Springer, 2004: 370-381.
  • 10Zheng D, Zhao J. A rotation invariant feature and image normalization based image watermarking algorithm [C] // Proc of IEEE Int Conf on Multimedia and Expo. Piscataway, NJ: IEEE Signal Processing, 2007:2098-2101.

共引文献55

同被引文献44

  • 1崔屏.电子文件凭证性溯源及内涵研究[J].档案与建设,2013(9):4-7. 被引量:8
  • 2谢于明,程义民,汪云路,田源.基于整数线性变换的无损隐秘传输方法[J].中国图象图形学报,2007,12(9):1562-1567. 被引量:5
  • 3国家税务总局. 关于印发《"互联网+税务"行动计划》的通知[EB/OL]. http://www.chinatax.gov.cn/n810341/n810755/c1843071/content.html.
  • 4人民网-财经频道. 解决电子发票"入账报销难"两会委员呼吁推进立法[EB/OL]. http:// finance.people.com.cn/n/2015/0309/c1004-26661164.html.
  • 5国家税务总局. 关于推行通过增值税电子发票系统开具的增值税电子普通发票有关问题的公告[EB/OL]. http://www.chinatax.gov.cn/n810341/n810755/c1919901/content.html.
  • 6Feng J N. The improvement application and promotion of the electronic invoice [J]. Modern Business Magazine, 2012, 32: 65.
  • 7Guo L, Bao N. Electronic invoice development analysis [J]. Accounting Information, 2012, 6: 62-63.
  • 8Jiann D L, Yaw H C, Tao Y. Lossless data hiding for VQ indices based on neighboring correlation [J]. Information Science, 2013, 221: 419-438.
  • 9He H J, Zhang J S. Self-recovery fragile watermarking using block-neighborhood tampering characterization[C]//Information Hiding, International Workshop, 2009: 132-145.
  • 10Zhang X P, Qian Z X, Ren G R. Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction [J]. IEEE Transactions on Information Forensics and Security, 2011, 6(4): 1223-1232.

引证文献6

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部