期刊文献+

基于多描述编码的自恢复脆弱水印算法 被引量:1

Self-recovery Fragile Watermarking Scheme Based on Multiple Description Coding
下载PDF
导出
摘要 兼顾水印嵌入容量和篡改恢复质量,基于多描述编码提出一种自适应图像内容的可恢复脆弱水印算法。该算法在图像块自适应分类的基础上,将图像块的DCT系数分为两个独立且互补的变长描述编码,每个描述能独立地近似恢复图像块的内容,两个描述编码一起得到的恢复质量更高。水印嵌入时,两个描述编码基于密钥随机嵌在不同图像块中,以提高算法在不同攻击下的篡改检测性能。被篡改图像块,只要有一个描述有效即可恢复该篡改块,若两个描述同时有效,可进一步提高篡改块的恢复质量,有效缓解了同步攻击与数据浪费之间的矛盾。实验结果证明,该算法不仅有效降低了生成的恢复水印容量,同时提高了不同攻击下的篡改检测性能和篡改恢复质量。 To take watermark capacity and restoration quality into account,a kind of recoverable fragile water-marking scheme for adaptive image contents based on multiple description coding was proposed.For each block,two description codes with different lengths were generated according to its DCT coefficients based on a-daptive classification of image blocks.Each description code could independently and approximately restore the image block content and two description codes could achieve higher quality of the recovered block.In the water-mark embedding stage,two description codes were randomly embedded into other image blocks based on the secret key to improve the tamper detection performance under different attacks.The tampered image block could be approximately restored as long as there was a valid description code.If there were two valid descrip-tion codes of the tampered blocks,the quality of the recovered block of it could be further improved and the conflict of tampering coincidence and watermark-data waste could be effectively relieved.Results demonstrate that the proposed method effectively reduces the watermark capacity,and improves the tamper detection per-formance and the recovery quality under different attacks.
出处 《铁道学报》 EI CAS CSCD 北大核心 2015年第1期51-56,共6页 Journal of the China Railway Society
基金 国家自然科学基金(61373180 61461047) 四川省科技创新苗子工程(2014-058)
关键词 脆弱水印 可恢复水印 多描述编码 变容量 fragile watermarking self-recovery watermarking multiple description coding variable-capacity
  • 相关文献

参考文献14

  • 1FRIDRICH J, GOLJAN M. Protection of Digital Images Using Self Embedding[C]//Proceedings of IEEE Interna- tional Conference on Image Processing (ICIP1999). New York: EEE Press, 1999 : 792-796.
  • 2陈帆,王宏霞.定位像素篡改的安全脆弱水印算法[J].铁道学报,2011,33(1):63-68. 被引量:6
  • 3宁超魁,和红杰,陈帆,尹忠科.基于近似分量能量的半脆弱音频水印算法[J].铁道学报,2013,35(1):46-50. 被引量:7
  • 4HE Hone-Jie,ZHANG Jia-shu, TAI Heng-ming. Self-re- covery Fragile Watermarking Using Block-neighborhood Tampering Characterization[C]//Proceedings of 2009 In- formation Hiding Workshop(IH2009). Darmstadt, Ger- many: LNCS,2009 : 132-145.
  • 5HE Hone-Jie, ZHANG Jia-shu, CHEN Fan. Adjacent Block Based Statistical Detection Method for Self Embed- ding Watermarking Techniques [ J ]. Signal Processing, 2009,89(8) : 1557-1566.
  • 6ZHANG Xin-peng, WANG Shuo-zhong, QIAN Zhen-xin, et al. Reference Sharing Mechanism for Watermark Self-em- bedding [J]. IEEE Transactions on Image Processing, 2011, 20(2) :485-496.
  • 7QIN Chuan, CHANG Chin-chen, CHEN Pei yu. Self-em- bedding Fragile Watermarking with Restoration Capability Based on Adaptive Bit Allocation Mechanism[J].Signal Processing, 2012,92 (4) :1137-1150.
  • 8QIAN Zhen-xin, FENG Guo-rui, ZHANG Xin-peng,et al. Image Self-embedding with High-quality Restoration Capa- bility[J].Digital Signal Processing, 2011,21 (2) : 278-286.
  • 9LEE T Y, LIN S D. Dual Watermark for Image Tamper Detection And Recovery[J]. Pattern Recognition, 2008,41 (11) :3497-3506.
  • 10YANG Chun-wei, SHEN Jau-ji. Recover the Tampered Image Based on VQ Indexing [J]. Signal Processing, 2010,90(1): 331-343.

二级参考文献18

  • 1王宏霞,范明泉.基于质心的混合域半脆弱音频水印算法[J].中国科学:信息科学,2010,40(2):313-326. 被引量:12
  • 2李伟,袁一群,李晓强,薛向阳,陆佩忠.数字音频水印技术综述[J].通信学报,2005,26(2):100-111. 被引量:73
  • 3和红杰,张家树,田蕾.能区分图像或水印篡改的脆弱水印方案[J].电子学报,2005,33(9):1557-1561. 被引量:24
  • 4LIU S H, YAO H X, GUO W, LIU Y L. An Image Fragile Watermark Scheme Based on Chaotic Image Pattern and Pixel-Pairs[J]. Applied Mathematics and Computation, 2007,185(2) :869 -882.
  • 5ZHANG X, WANG S. Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels[J]. IEEE Signal Processing Letters, 2007,14(10) : 727-731.
  • 6LIAN S, SUN J, WANG J,et al. A Chaotic Stream Cipher and the Usage in Video Protection[J]. Chaos, Solitons and Fractals, 2007,34(3) :851- 859.
  • 7PAPOULIS A,PILLAI S U. Probability, Random Variables and Stochastic Processes[M]. 4th ed. Boston: McGraw-Hill, 2002.
  • 8ZHU B B,SWANSON M D,TEWF1K A H. When Seeing isn't Believing[J]. IEEE Signal Processing Magazine, 2004, 21(2): 40-49.
  • 9YEUNG M M, MINTZER F. An Invisible Watermarking Technique for Image Verification[C]//Proceedings of the ICIP'97. Santa Barbara, California : IEEE, 1997 : 680-683.
  • 10MEMON N, SHENDE S, WONG P. On the Security of the Yeung-Mintzer Authentication Watermark [C]// Proceedings of the IS & T PICS Symposium. Savannah, Georgia, 1999 : 301-306.

共引文献11

同被引文献5

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部