期刊文献+

一种基于安全隐藏的图像分层窜改检测和内容恢复算法 被引量:5

Fragile watermarking based on secure embedding for hierarchical tampering detection and content recovery
下载PDF
导出
摘要 提出了一种可用于数字图像的分层窜改检测和内容恢复的脆弱水印算法。图像中每个分块产生的水印信息包括认证水印和内容恢复水印,其中认证水印由奇偶校验和平均强度信息生成,恢复水印由分块DCT系数量化编码后的信息得到。根据混沌映射和最远距离安全隐藏机制,将恢复水印嵌入到映射块中,可有效避免窜改一致性问题。在接收端,采用分层窜改检测方法,减少窜改分块的漏判和误判,有效提高了窜改精度和恢复质量。实验结果表明,提出的方法与已有方法相比,无论在小面积窜改或大面积窜改情况下均可取得较好的恢复效果。 This paper proposed a novel fragile image watermarking scheme for tampering detection and content recovery. The watermark information for each image block consist of the authentication bits and the recovery bits. It generated the authentication bits by the information of the parity and average intensity, and generated the recovery bits from the encoded DCT coefficients, which embedded into the mapped block according to the chaotic mapping and secure embedding mechanism. On the receiver side, it used the hierarchical tampering detection, which could effectively decrease the missing and misjudgments for tampered blocks. Experimental results show that the proposed scheme can achieve better recovery performance than the repor- ted schemes in both small and large tampered area.
出处 《计算机应用研究》 CSCD 北大核心 2015年第2期507-511,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(61303203) 上海市自然科学基金资助项目(13ZR1428400) 上海市教育委员会科研创新项目(14YZ087)
关键词 脆弱水印 图像认证 安全隐藏 分层检测 内容恢复 fragile watermarking image authentication secure embedding hierarchical detection content recovery
  • 相关文献

参考文献18

  • 1LIN C Y, CItANG S F. A robust image anthentication method distin- guishing JPEG compression from malicious maniptdation [ J ]. IEEE Trans on Circuits and Systems for Video Technology,2001,11 (2) :153-168.
  • 2LU C S, LIAO H Y M. Structural digital signature for image anthenti- cation : an incidental distortion resistant scheme[ C ]//Proe of the 8th ACM International Cont'rence on Muhimedia. 2000 : 115-118.
  • 3CHESSA S. Mobile application security tot video streaming authenti- cation and data integrity combining digital signature and watermarking techniques[ C ]//Proc of the 65th IEEE Vehicular Technology Confe- rence. 2007:634-638.
  • 4SUN Qi-bin, CHANG S F. A secure and robust digital signaturescheme for JPEG2000 image authentication [ J ]. Proceedings of the IEEE Trans on Multimedia,2005,7(3 ) :480-494.
  • 5STALLINGS W. Network security essentials: application and stan- dards[ M ]. Upper Saddle River, NJ : Prentice-Hall ,2000.
  • 6WALTON S. Image authentication for a slippery new age [ J]. Dr. Dobb' s Journal, 1995,20(4 ) : 18-26.
  • 7WONG P W. A public key watermark for image verification and au- thentication[ C]//Proc of IEEE International Conference on Image Processing. 1998:455-459.
  • 8WONG P W, MEMON N. Secret and public key image watermarking schemes for image authentication and ownership verification [ J ]. IEEE Trans on Image Processing,200[ ,10(10) :1593-1601.
  • 9HOLLIMAN M, MEMON N. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes [ J ]. IEEE Trans on Image Processing ,2000,9( 3 ) :432 -441.
  • 10LIN P L, HSIEH C K, HUANG P W. A hierarchical digital water- marking method for image tamper detection and recovery[ J]. Pattern Recognition, 2005,38 ( 12 ) : 2519 - 2529.

二级参考文献45

共引文献39

同被引文献41

  • 1徐祗军,吴晓娟,董文会.基于Chebyshev混沌序列的数字图像扩频水印[J].电子技术应用,2005,31(9):11-13. 被引量:7
  • 2王振飞,施保昌,王能超.基于小波变换和人类视觉系统的稳健水印算法[J].华中科技大学学报(自然科学版),2007,35(1):26-28. 被引量:10
  • 3Fridrich J, Goljan M. Images with self-correcting capabilities[C]//Proceedings of IEEE International Conference on Image Processing, 1999:792-796.
  • 4Qian Z X, Feng G R. Inpainting assisted self-recovery with decreased embedding data[J]. IEEE Signal Processing Letters, 2010, 17(11):929-932.
  • 5Suthaharan S. Fragile image watermarking using a gradient image for improved localization and security[J]. Pattern Recognition Letters, 2004, 25(16):1893-1903.
  • 6Walton S. Image authentication for a slippery new age[J]. Dr Dobb's Journal, 1995, 20(4):18-26.
  • 7Chang C C, Hu Y S, Lu T C. A watermarking-based image ownership and tampering authentication scheme[J]. Pattern Recognition Letters, 2006, 27(5):439-446.
  • 8He H J, Chen F, H. Tai M, Kalker T, Zhang J S. Performance analysis of a blockneighborhood-based self-recovery fragile watermarking scheme[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1):185-196.
  • 9Qin C, Chang C C, Chen K N. Adaptive self-recovery for tampered images based on VQ indexing and inpainting[J]. Signal Processing, 2013, 93(4):933-946.
  • 10Qin C, Chang C C, Chen P Y. Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism[J]. Signal Processing, 2012, 92(4):1137-1150.

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部