期刊文献+

基于DWT具有篡改定位的半脆弱水印算法

Semi-Fragile Watermarking Algorithm Based on DWT with Tamper Localization
下载PDF
导出
摘要 半脆弱水印因为在多媒体内容认证方面的重要作用而受到人们密切的关注.为了能够区分偶然攻击与恶意篡改,半脆弱水印需要对一般的内容保护图像操作有一定的鲁棒性.根据图像相邻小波高频系数之间的大小关系在JPEG压缩之后大多数没有发生变化这一事实,提出了一种新的基于DWT变换的具有篡改定位的半脆弱水印算法,该算法主要思想是根据图像相邻小波高频系数之间的大小关系来嵌入水印.仿真实验结果表明:该算法嵌入容量大,有很好的抗JPEG压缩性能,同时也能对恶意篡改精确定位. Semi-fragile watermarking has attracted much attention because of its important role in multimedia content authentic.ation. In order to distinguish accidental attacks and malicious tamperingi semi-fragile watermarks must have the robustness to process general content protection and image manipulation. After JPEG compression, most of the size relationships between the highfrequency coefficients of adjacent wavelets of an image have no changes. According to this fact,this paper proposes a new semi-fragile watermarking algorithm based on DWT transform with tamper localization. The watermark is embedded according to the size relationship between the high-frequency coefficients of the adiccent wavelets of the image. The results of simulation experiments show that the algorithm has large embedded capacity and good anti-JPEG compression performance. At the same time, the positioning for malicious tampering is also very accurate.
作者 李子臣 宋培非 丁海洋 Ll Ziehen;Song Peifei;Ding Haiyang(School of Information Engineering,Beijing Institute of Graphic Communication,Beijing 102600)
出处 《信息安全研究》 2019年第2期162-167,共6页 Journal of Information Security Research
基金 国家自然科学基金项目(61370188) 北京市教委科研计划一般项目(KM201610015002 KM201510015009) 北京市教委科研计划重点项目(KZ201510015 KZ201710015010) 科技创新服务能力建设科研水平提高定额项目(PXM2017_014223_000063) 北京印刷学院校级资助项目(Ec201803 Ed201802 Ea201806)
关键词 半脆弱水印 恶意篡改 JPEG压缩 小波系数 高频系数 semi-fragile watermarking malicious tampering JPEG wavelet coefficients high frequency coefficient
  • 相关文献

参考文献4

二级参考文献21

  • 1汪飞,檀结庆.基于DWT和均值量化的音频水印算法[J].计算机应用,2009,29(2):444-446. 被引量:13
  • 2张兵路,姜建国,冯复科.基于DWT的音频“零数字”水印技术研究[J].计算机工程,2005,31(18):148-149. 被引量:13
  • 3[1]Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding a survey[J]. Proceedings of the IEEE, 1999,87(7):1062~1078.
  • 4[2]Peticolas F A P, Anderson R J, Kuhn M G. Attacks on copyright marking system [ A ]. In: Second International Workshop on Information Hiding[C], Portland, Oregon. U.S.A., April 14-17, 1998, Published in: Lecture Notes in Computer Science[J], 1998,1525: 218~238.
  • 5[3]Cox I J, Miller M L. A review of watermarking and the importance of perceptual modeling [J]. Proc. SPIE Conf. on Human Vision and Electronic Imaging, 1987,3016: 92 ~ 99.
  • 6[4]Friedman G L. The trustworthy digital camera: restoring credibility to the photographic image [J]. IEEE Trans. on Consumer Electronics, 1993.39(10) :905~ 910.
  • 7[5]Kutter M, Bhattacharjee S K, Ebrahimi T. Towards second generation watermarking schemes [A]. In: Proceedings 6th International Conference on Image Processing (ICIP'99)[C],Kobe. Japan. October 24-28, 1999:320~323.
  • 8[6]Kundur Deepa. Hatzinakos Dimitrios. Digital watermarking for telltale tamper-proofing and authentication [J]. Proceedings of the IEEE: Special Issue on Identification and Protection of Multimedia Information, 1999,87(7) :1167~1180.
  • 9[7]Calderbank A R. Daubeehies I, Sweldens W et al. Wavelet ransforms that map integers to integers [J]. Applied and Computational Harmonics Analysis, 1998, (5) :332~369.
  • 10付永钢.一种新颖的半脆弱图像水印认证技术[J].集美大学学报(自然科学版),2009,14(2):203-208. 被引量:3

共引文献52

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部