期刊文献+

用于JPEG2000图像认证的半脆弱性数字水印算法 被引量:21

Semi-Fragile Watermarking for JPEG2000 Image Authentication
下载PDF
导出
摘要 本文给出一种适用于JPEG2 0 0 0图像认证的半脆弱性数字水印算法 ,该算法与JPEG2 0 0 0编、解码器相结合 ,它根据JPEG2 0 0 0图像压缩过程中的不变参量进行水印生成和嵌入调制 ,利用小波变换特性对图像篡改区域进行定位 .实验表明 ,采用该算法实现的水印不仅具有良好的视觉透明性 ,而且还有较佳的篡改区域指示功能 . In this paper,a semi-fragile watermarking algorithm is proposed for JPEG2000 image authentication.The algorithm is combined with the JPEG2000 image coding process.The watermark is generated and embedded based on an invariant property of DWT coefficients during the JPEG2000 compression.Once the watermarked image is tampered,the alteration regions can be located according to primary properties of the wavelet transform.The experimental results demonstrate that the watermarked image possesses good perceptual transparence,and that the proposed algorithm can detect any change to the watermarked JPEG2000 image as well as locate the tampered areas.
作者 张静 张春田
出处 《电子学报》 EI CAS CSCD 北大核心 2004年第1期157-160,共4页 Acta Electronica Sinica
基金 国家自然科学基金 (No .60 2 0 2 0 0 9 No .69972 0 32 ) 天津市自然科学基金 (No .0 1 360 1 31 1 )
关键词 JPEG2000 图像认证 数字水印 JPEG2000 image authentication digital watermarking
  • 相关文献

参考文献1

二级参考文献7

  • 1[1]Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding a survey[J]. Proceedings of the IEEE, 1999,87(7):1062~1078.
  • 2[2]Peticolas F A P, Anderson R J, Kuhn M G. Attacks on copyright marking system [ A ]. In: Second International Workshop on Information Hiding[C], Portland, Oregon. U.S.A., April 14-17, 1998, Published in: Lecture Notes in Computer Science[J], 1998,1525: 218~238.
  • 3[3]Cox I J, Miller M L. A review of watermarking and the importance of perceptual modeling [J]. Proc. SPIE Conf. on Human Vision and Electronic Imaging, 1987,3016: 92 ~ 99.
  • 4[4]Friedman G L. The trustworthy digital camera: restoring credibility to the photographic image [J]. IEEE Trans. on Consumer Electronics, 1993.39(10) :905~ 910.
  • 5[5]Kutter M, Bhattacharjee S K, Ebrahimi T. Towards second generation watermarking schemes [A]. In: Proceedings 6th International Conference on Image Processing (ICIP'99)[C],Kobe. Japan. October 24-28, 1999:320~323.
  • 6[6]Kundur Deepa. Hatzinakos Dimitrios. Digital watermarking for telltale tamper-proofing and authentication [J]. Proceedings of the IEEE: Special Issue on Identification and Protection of Multimedia Information, 1999,87(7) :1167~1180.
  • 7[7]Calderbank A R. Daubeehies I, Sweldens W et al. Wavelet ransforms that map integers to integers [J]. Applied and Computational Harmonics Analysis, 1998, (5) :332~369.

共引文献21

同被引文献121

引证文献21

二级引证文献78

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部