期刊文献+

基于环形自同构的半脆弱图像水印认证算法

Semi-Fragile Watermark Based on Toral Automorphisms for Image Authentication
下载PDF
导出
摘要 提出一种基于环形自同构的半脆弱数字图像水印认证算法,依据环形自同构结合图像DCT系数和图像版权信息生成水印,嵌入原始图像,水印的嵌入位置也由环形自同构决定.认证端从接收的图像中提取水印并恢复版权信息,同时生成新的水印,比较提取的水印和新的水印定位篡改区域.实验结果表明,该方法能够容忍一定程度有损压缩处理并检测定位对图像内容的恶意篡改,同时可恢复图像版权信息. A semi-fragile watermarking scheme based on toral automorphisms was proposed for image authentication and copyright protection. According to torus automorphism, the image's DCT coefficients and copyright information are used to generate the secure semi-fragile watermark, and the torus automorphism also decides which region of the image the watermark should be embedded into. The authenticator acquires the copyright information from the received watermarked image and indicates the specific locations that have been malicious manipulations. The proposed scheme can accept quantization based lossy compression to a determined degree.
出处 《上海交通大学学报》 EI CAS CSCD 北大核心 2005年第8期1284-1287,共4页 Journal of Shanghai Jiaotong University
基金 国家高技术研究发展计划(863)重大项目(2002AA145090)
关键词 数字图像 水印 认证 半脆弱水印 环形自同构 内容认证 版权 digital image watermark authentication semi-fragile watermark toral automorphisms content authentication copyright
  • 相关文献

参考文献7

  • 1Cox I J, Killian J, Leighton T. Secure spread spectrum watermarking for multimedia[J]. IEEE Transactions on Image Processing, 1997, 6 (12) : 1673-1687. 被引量:1
  • 2Voyatzis G, Pitas I. Applications of toral automorphisms in image watermarking [A]. Processings of the IEEE International Conferece on Image Processing[C]. Lausanne: IEEE, 1996. 16-19. 被引量:1
  • 3丁科,何晨,蒋铃鸽,王宏霞.基于地址码的脆弱数字水印技术[J].上海交通大学学报,2004,38(4):620-623. 被引量:5
  • 4Rey C, Dujelay J L. Blind detection of malicious alterations on still images using robust watermarks[A]. lEE Seminar on Secure Images and Image Authentication[C]. London: IEE, 2000. 7/1-7/6. 被引量:1
  • 5Wu M, Liu B. Watermarking for image authentication [A]. Proceedings of the IEEE International Conference on Image Processing [C].Chicago:IEEE,1998,2:437-441. 被引量:1
  • 6Lin C Y, Chang S F. Semi-fragile watermarking for authenticating JPEG visual content [A]. Processings of SPIE International Conference on Security and Watermarking of Multimedia Contents Ⅱ [C]. San Jose:IEEE, 2000,3971:140-151. 被引量:1
  • 7Fridrich J. Methods for detecting changes in digital images[A]. IEEE Workshop on Intelligent Signal Processing and Communication Systems [C]. Melbourne: ISPACS98,1998. 173-177. 被引量:1

二级参考文献9

  • 1Yen J C. Watermarks embedded in the permuted image[A]. Proc IEEE Int Symp on Circuits and Systems (ISCAS 2001 ) [C]. Sydney: IEEE 2001.53- 56. 被引量:1
  • 2Wang Y W, Doherty J F, Van Dyck R E. A wavelet-based watermarking algorithm for ownership verification of digital images[J]. IEEE Transactions on Image Processing, 2002, 11(2) :77-88. 被引量:1
  • 3Alturki F, Mersereau R. Secure fragile digital watermarking technique for image authentication [A].Proc IEEE Int Conference on Image Processing[C].Thessaloniki:IEEE, 2001. 3:1031-1034. 被引量:1
  • 4Walton S. Information authentication for a slippery new age[J]. Dr Dobbs Journal,1996,20(4):18-26. 被引量:1
  • 5Wolfgang A B, Delp E J. Watermark for digital images[A]. IEEE Int Conference on Image Processing[C]. Lausanne, Switz:IEEE. 1996. 219-222. 被引量:1
  • 6Wong P W, Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification [J]. IEEE Transactions on Image Processing, 2001,10(10): 1593- 1601. 被引量:1
  • 7Kundur D, Hatzinakos D. Digital watermarking for telltale tamper proofing and authentication[J]. Proceedings of the IEEE, 1999,87(7):1167-1180. 被引量:1
  • 8Ellis H, Sartaj S, Susan A F. Fundamentals of data structures in C[M]. New York: W H Freeman & Co, 1992. 被引量:1
  • 9王秋生,孙圣和,郑为民.数字音频信号的脆弱水印嵌入算法[J].计算机学报,2002,25(5):520-525. 被引量:50

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部