期刊文献+

基于最小扩展块合并的无损图像认证算法 被引量:1

Lossless Image Authentication Algorithm with Minimal Expansion
下载PDF
导出
摘要 为了在图像分块中嵌入水印信息,现有基于分块的无损图像认证算法需要合并较大的图像子区域,导致篡改定位精度降低.为此,提出基于最小扩展图像块合并的无损图像认证算法.该算法自适应地将图像分成若干认证块,每个认证块由若干细粒度基本块构成,采用递归三等分方式和邻接策略串联基本块,形成基本块链表,以基本块为单位扩展认证块.理论分析表明,该算法能根据图像特征自适应调整认证块大小,优化认证块尺度和邻接性.实验结果显示,采用16×16分块模式能获得较高认证精度;与同类算法相比,该算法认证块划分细密,认证块平均大小降低约19.2%,显著提高了篡改定位精度. As the existing block-wise lossless image authentication algorithms need to merge a larger image subregion to embed the watermark information and result in the degradation of the precision of locating distortions, a novel lossless image authentication algo- rithm with minimal expansion is proposed. In this algorithm, an image is splitted adaptively into some authentication blocks which are composed of a number of fine-grained basic blocks. A recursive trisection method and adjacent strategies are adopted to connect basic blocks in sequence into a link. When the watermark payload can't be embedded into an authentication block, the algorithm tries to merge only one basic block from the basic block link into current authentication block. Theoretical analysis shows that the algorithm can adaptively adjust the size of each authentication block according to the image features to optimize the scale and adjacency of the authentication block. Experimental results show that compared with other algorithms, the authentication block division in the algorithm is finer, and the authentication block size reduced by about 19.2% in average, the algorithm significantly improves the tamper localiza- tion accuracy.
作者 李向阳
出处 《小型微型计算机系统》 CSCD 北大核心 2014年第11期2572-2577,共6页 Journal of Chinese Computer Systems
基金 广东省高等职业教育教学改革立项项目(20120202029)资助
关键词 无损图像认证 最小扩展块合并 候选扩展块链表 递归三等分 篡改定位 lossless image authentication minimal expansion mergence candidate extension block list recursive trisection tamper localization
  • 相关文献

参考文献2

二级参考文献29

  • 1张鸿宾,杨成.基于公钥和脆弱水印的图像认证算法[J].计算机科学,2004,31(11):218-221. 被引量:8
  • 2Cox I J, Miller M L, Bloom J A, et al. Digital watermarking and steganography [ M ]. 2nd ed. Burlington: Morgan Kauff- man, 2008 : 375- 422.
  • 3Wong P W, Memon N. Secret and public key image water-marking schemes for image authentication and ownership verification [ J]. IEEE Transactions on Image Processing, 2001,10 ( 10 ) : 1593-1601.
  • 4Celik M U, Sharma G, Saber E, et al. Hierarchical water- marking for secure image authentication with localization [ J ]. IEEE Transactions on Image Processing, 2002, 11 (6) :585-595.
  • 5Fridrich J,Goljan M,Du R. Invertible authentication [ C ]// Proceedings of Security and Watermarking of Multimedia Contents Ⅲ. San Jose: SPIE ,2001 : 197-208.
  • 6Tian J. Wavelet-based reversible watermarking for authen- tication [ C ]// Proceedings of Security and Watermarking of Multimedia Contents Ⅳ. San Jose: SPIE, 2002: 679- 690.
  • 7Lee Sang-kwang, Suh Young-ho, Ho Yo-suug. Reversible image authentication based on watermarking [ C ]//Pro- ceedings of IEEE International Conference on Multimedia and Expo. Toronto : IEEE,2006 : 1521-1324.
  • 8Celik M U, Sharma G, Tekalp A M. Lossless watermarking for image authentication:a new framework and an imple- mentation [ J ]. IEEE Transactions on Image Processing, 2006,15 (4) : 1042 -1049.
  • 9Weng S W, Zhao Y, Pan J S. Reversible watermarking re- sistant to cropping attack [ J ]. IET Information Security, 2007,1(2) :91-95.
  • 10Ni Z, Shi Y Q, Ansari N. Reversible data hiding [ J ]. IEEE Transactions on Circuits and Systems for Video Technology ,2006,16 ( 3 ) :354-362.

共引文献9

同被引文献7

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部