期刊文献+

基于块特征和混沌序列的图像篡改检测与恢复 被引量:2

Images tamper detection and recovery based on block features and chaotic sequence
原文传递
导出
摘要 为提高图像篡改检测与恢复性能,提出一种基于块特征与混沌序列的图像认证水印方案。对2×2分块离散余弦变换系数编码产生块特征,嵌入到其他图像块像素的低两位,块嵌入的映射关系通过混沌序列产生;结合奇偶检测法对常规的认证方式进行改进,并通过提取有效块的特征信息实现被篡改区域的自恢复。试验表明,该方案嵌入水印信息量少,安全性高,对常规篡改可进行精确定位,并能较好的实现自恢复,还可以有效地检测出仅图像内容的攻击。 To improve the performance of images tamper detection and recovery,an authentication watermarking scheme based on block features and chaotic sequence was presented.For each block of size 2 ×2 pixels,discrete cosine trans-form(DCT)coefficients were used to generate watermarking and embedded into the two least significant bits of its map-ping block which was determined by chaotic sequence.The conventional authentication methods were improved by com-bining parity detection and the tampered region could be self-recovered by extracting characteristic information of the valid block.Experimental results demonstrated that the proposed method not only improved the quality and security of watermarked images,but also could detect tampered regions accurately and reconstruct images while keeping the recog-nition quality.Additionally,the scheme was not vulnerable to the content-only attack.
出处 《山东大学学报(工学版)》 CAS 北大核心 2014年第6期63-69,共7页 Journal of Shandong University(Engineering Science)
基金 国家自然科学基金资助项目(61303087)
关键词 图像认证 数字水印 篡改检测 自恢复 混沌 image authentication digital watermarking tamper detection self-recovery chaos
  • 相关文献

参考文献13

  • 1Wong P W,Memon N.Secret and public key image watermarking schemes for image authentication and ownership verification[J].IEEE Transactions on Image Processing,2001,10(10):1593-1601.
  • 2Ghoshal Nabin,Mandal Jyotsna Kumar.A novel technique for image authentication in frequency domain using discrete Fourier transformation technique[J].Malaysian Journal of Computer Science,2008,21(1):24-32.
  • 3Chun-Shien Lu,Hong-yuan Mark Liao.Structural digital signature for image authentication:an incidental distortion resistant scheme[J].Multimedia Security Workshop 8th ACM International Conference on Multimedia,2003,5(2):161-173.
  • 4Sun Q,Shih-Fu Chang.A secure and robust digital signature scheme for JPEG 2000 image authentication[J].IEEE Transactions on Multimedia,2005,7(3):480-494.
  • 5He Hong-jie,Zhang Jiashu,Chen Fan.Adjacent-block based statistical detection method for self-embedding watermarking techniques[J].Signal Processing,2009,89(8):1557-1566.
  • 6Radharani S,Valarmathi M L.A study on watermarking schemes for image authentication[J].International Journal of Computer Applications,2010,2(4):24-30.
  • 7Qian Zhenxing,Feng Guorui,Zhang Xinping,et al.Image self-embedding with high-quality restoration capability[J].Digital Signal Processing,2011,21(2):278-286.
  • 8金喜子,姜文哲.块级篡改定位的JPEG图像脆弱水印[J].电子学报,2010,38(7):1585-1589. 被引量:12
  • 9叶天语.自嵌入完全盲检测顽健数字水印算法[J].通信学报,2012,33(10):7-15. 被引量:11
  • 10Zhang Xinpeng,Wang Shuozhong.Fragile watermarking with error-free restoration capability[J].IEEE Trans Multimedia,2008,10(8):1490-1499.

二级参考文献37

  • 1牛少彰,钮心忻,杨义先,胡文庆.半色调图像中数据隐藏算法[J].电子学报,2004,32(7):1180-1183. 被引量:15
  • 2和红杰,张家树.基于混沌置乱的分块自嵌入水印算法[J].通信学报,2006,27(7):80-86. 被引量:33
  • 3李旭东,张振跃.图像双层划分和奇异值分解的数字水印算法[J].浙江大学学报(工学版),2006,40(12):2088-2092. 被引量:4
  • 4张宪海,杨永田.基于脆弱水印的图像认证算法研究[J].电子学报,2007,35(1):34-39. 被引量:35
  • 5F A P Petitcolas,R J Anderson,M G Kuhn.Information hidinga survey[J].Proc.IEEE,1999,87:1062-1078.
  • 6O Altun,G Sharma,M U Celik,M F Bocko.A set theoretic framework for watermarking and its application to semifragile tamper detection[J].IEEE Trans.on Information Forensics and Security,2006,1 (4):479-492.
  • 7K Maeno,Q Sun,S Chang,M Suto.New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization[J].IEEE Trans.on Multimedia,2006,8(1):32-45.
  • 8P W Wong,N Memon.Secret and public key image watermarking schemes for image authentication and ownership verification[J].IEEE Trans.on Image Processing,2001,10(10):1593-1601.
  • 9S Suthaharan.Fragile image watermarking using a gradient image for improved localization and security[J].Pattem Recognition Letters,2004,25:1893-1903.
  • 10H Yang,A C Kot.Binary image authentication with tampering localization by embedding cryptographic signature and block identifier[J].IEEE Signal Processing Letters,2006,13(12):741-744.

共引文献21

同被引文献21

  • 1和红杰,张家树.基于混沌置乱的分块自嵌入水印算法[J].通信学报,2006,27(7):80-86. 被引量:33
  • 2Chaluvadi S B,Prasad M V N. Efficient Image Tamper Detection and Recovery Technique Using Dual Watermark [ C ]//Proceedings of Nature & Biologically Inspired Computing. Washington D. C., USA: IEEE Press, 2009 : 993 -998.
  • 3Rawat S, Raman B. A Chaotic System Based Fragile Watermarking Scheme for Image Tamper Detection[ J]. AEU International Journal of Electronics and Communications ,2011,65 ( 10 ) :840-847.
  • 4Dadkhah S0 Manaf A A, Sadeghi S. Efficient Digital Image Authentication and Tamper Localization Technique Using 3Lsb Watermarking [ J ]. International Journal of Computer Science Issues,2012,9( I ).
  • 5Yang C W,Shen J J. Recover the Tampered Image Based on VQ lndexingl J]. Signal Process ,2010,90( 1 ) :331-343.
  • 6Lee T Y,Lin S D. Dual Watermark for Image Tamper Detection and Recovery [ J ]. Pattern Recognition, 2008, 41( 11 ) :3497-3506.
  • 7Chang C,Fan Y H, Tai W L. Four-scanning Attack on Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery I J ]. Pattern Recognition, 2008,41 ( 2 ) :654-661.
  • 8Fridrich J, Goljan M, Memon N. Cryptanalysis of the Yeung Mintzer Fragile Watermarking Technique [ J ]. Journal of Electronic Imaging ,2002,11 ( 2 ) :262-274.
  • 9Tong Xiaojun, Liu Yang, Zhang Miao, et al. A Novel Chaos-based Fragile Watermarking for Image Tampering Detection and Self-recovery I J ]- Signal Processing, 2013,28(3) :301-308.
  • 10Li Chunlei, Wang Yunhong, Ma Bin ,et al. A Novel Self- recovery Fragile Watermarking Scheme Based on Dual- redundant-ring Structure I J ]. Computer & Electrical Engineering ,2011,37:927-940.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部