期刊文献+

可恢复的脆弱数字图像水印 被引量:10

Fragile Digital Image Watermarking with Restoration Capability
下载PDF
导出
摘要 该文提出一种用于图像内容认证和保护的脆弱数字图像水印算法 .该算法不但可以检测定位出图像中任何细微的篡改 ,而且可以恢复较大面积的被篡改的图像数据 .首先该文给出了一种被称之为基于块交叉交插RS编码的水印生成算法 ;随后使用基于块交叉交插RS码的校验符号作为水印并将其埋植到图像数据的最低位 ;最后利用基于块交叉交插RS解码实现水印信号检测以及对图像篡改数据的定位和恢复 .此外该文算法使用由密码生成的掩膜图像参与水印信号的生成和检测 ,很好地保证了水印的安全性和保密性 .经实验验证 ,该算法不但可以有效地检测出图像中被篡改内容的位置 ,而且能恢复被篡改的图像数据 . This paper gives an auto-restorable fragile watermarking algorithm for image content authentication, which can not only detect the location of any minute changes in images but also restore the altered image data. Firstly, authors give called cross-interleaved-RS code block generation scheme. Then authors use parities of the cross-interleaved-RS block-based codes as watermarking and embed them into the lowest bits of the image data. Finally, authors use these cross-interleaved-RS codes to detect watermarking, identify the change positions and restore the altered data in an image. In addition, a mask image generated by a secret algorithm is participated in the procedure of cross-interleaved-RS encoding to increase the security of watermarking and prevent forged watermarking. Experimental results demonstrate that the watermarking produced by above method is sensitive to tiny changes in images, and the method also provides very good results of detecting the tampered location and restoring the tampered data.
出处 《计算机学报》 EI CSCD 北大核心 2004年第3期371-376,共6页 Chinese Journal of Computers
基金 西北工业大学英才计划 香港理工大学UGC基金 悉尼大学ARC基金资助
关键词 脆弱数字图像水印算法 图像处理 图像数据 图像编码 RS码 里德索罗门码 Algorithms Data compression Image retrieval Signal detection Signal encoding
  • 相关文献

参考文献9

  • 1[1]Cox I.J., Miller M.L., Bloom J.A.. Digital Watermarking.San Fransisco, USA: Morgan Kaufmann Publishers, 2002
  • 2[2]Hartung F., Kutter M.. Multimedia watermarking techniques. Proceedings of the IEEE, 1999, 87(7): 1079~1107
  • 3[3]Friedman G.L.. The trustworthy camera: Restoring credibility to photographic image. IEEE Transactions on Consumer Electronics, 1993, 39(4): 905~910
  • 4[4]Walton S.. Information authentication for a sippery new age. Dr. Bobbs Journal, 1995, 20(4): 18~26
  • 5[5]Barreto P.S.L.M., Kim H.Y., Rijmen V.. Toward secure public-key blockwise fragile authentication watermarking. IEE Proceedings of Vision, Image and Signal Processing, 2002, 149(2): 57~62
  • 6[6]Lee Sang-Kwang, Ho Yo-Sung. Fragile watermarking scheme using a simple genetic algorithm. In: Proceedings of International Conference on Consumer Electronics of ICCE, 2002 Digest of Technical Papers, Auckland, New Zealand, 2002, 190~191
  • 7[7]Lee Jaejin, Won Chee Sun. Authentication and correction of digital watermarking images. Electronics Letters of IEE, 1999, 35(11): 886~887
  • 8[8]Wu Chuan-fu, Hsieh Wen-shyong. Image refining technique using digital watermarking. IEEE Transactions on Consumer Electronics, 2000, 46(1): 1~5
  • 9[9]Jiri Fridrich. Image watermarking for tamper detection. In: Proceedings of IEEE International Conference on Image Processing, Chicago Illinois, USA, 1998, 2: 404~408

同被引文献96

引证文献10

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部