期刊文献+

基于脆弱水印的可恢复图像认证方案 被引量:2

Restorable image authentication scheme based on fragile watermarking
下载PDF
导出
摘要 针对现有脆弱水印算法大多无法恢复被篡改区域的问题,提出了一种基于脆弱水印的可恢复图像认证方案:将分块的DCT系数量化、编码和加密后作为恢复水印,嵌入到偏移子块的次低位;待恢复水印嵌入后,由哈希算法产生分块的认证水印,并嵌入到自身的最低位.理论分析和实验结果表明:该方案在保证篡改定位精度和系统安全性的同时,可有效地恢复被篡改的区域. Since existing fragile watermarking schemes usually cannot recover the tampered position, a restorable image authentication scheme is proposed. The image is divided into small blocks and each block is DCT( discrete cosine transform) transformed. A specified number of the lower frequency DCT coefficients are encoded using a fixed number of bits. The resulting bit string as the recovery watermarks are embedded into the second LSB(least significiant bit) of the corresponding excursion block, then the authentication watermarks of each block are embedded into its LSB. Theoretical analysis and simulation 1 results show that the proposed algorithm can not only locate tampered blocks accurately, but also restore the tampered region effectively and ensure the system security.
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2007年第A01期211-214,共4页 Journal of Southeast University:Natural Science Edition
基金 国家高技术研究发展计划(863计划)资助项目(2006AA01Z409) 河南省科技攻关资助项目(0623021500)
关键词 脆弱水印 偏移子块 篡改定位 恢复 fragile watermarking excursion block temper location recovery
  • 相关文献

参考文献12

  • 1Zhu B B,Swanson M D,Tewfik A H.When seeing isnt believing[J].IEEE Signal Processing Magazine,2004,21(2):40-49. 被引量:1
  • 2Walton S.Image authentication for a slippery new age[J].Dr Dobbs Journal,1995,20(4):18-26. 被引量:1
  • 3Yeung M,Mintzer F.An invisible watermarking technique for image verification[C]//Proceedings of the IEEE International Conference on Image Processing.Santa Barbara,USA,1997,2:680-683. 被引量:1
  • 4Wong P W.A public key watermark for image verification and authentication[C]//Proceedings of the IEEE International Conference on Image Processing.Chicago,USA,1998,1:455-459. 被引量:1
  • 5Holliman M,Memon N.Counterfeiting attacks on oblivious blockwise independent invisible watermarking schemes[J].IEEE Transactions on Image Processing,2000,9(3):432-441. 被引量:1
  • 6Wong P W,Memon N.Secret and public key image watermarking schemes for image authentication and ownership verification[J].IEEE Transactions on Image Processing,2001,10(10):1593-1601. 被引量:1
  • 7Celik M U,Sharma G,Saber E.Hierarchical watermarking for secure image authentication with localization[J].IEEE Transactions on Image Processing,2002,11(6):585-595. 被引量:1
  • 8Ouda A H,El-Sakka M R.Localization and security enhancement of block-based image authentication[C]//Proceedings of IEEE International Conference on Image Processing (ICIP'2005).Genova,Italy,2005,1:673-676. 被引量:1
  • 9Fridrich J,Goljan M.Images with selfcorrecting capabilities[C]//Proceedings of International Conference on Image Processing.Koke,Japan,1999:25-28. 被引量:1
  • 10张鸿宾,杨成.图像的自嵌入及窜改的检测和恢复算法[J].电子学报,2004,32(2):196-199. 被引量:49

二级参考文献22

  • 1程义民,钱振兴,王以孝,田源.基于数位信息的信息隐藏方法[J].电子与信息学报,2005,27(8):1304-1309. 被引量:15
  • 2[1]Lin E T,Delp E J.A review of fragile image watermarks [A].Proc.of the Multimedia and Security Workshop (ACM Multimedia'99) [C].Orlando,1999.25-29. 被引量:1
  • 3[2]Walton S.Information authentication for a slippery new age [J].Dr.Dobbs Journal,1995,20(4):18-26. 被引量:1
  • 4[3]Yeung M,Mintzer F.Invisible watermarking for image verification [J].Journal of Electronic Imaging,1998,7(3):578-591. 被引量:1
  • 5[4]Wolfgang R B,Delp E J.A watermark for digital images [A].Proc.IEEE Int.Conf.on Image Processing [C].ACM Press,NY,1996.3.219-222. 被引量:1
  • 6[5]Schynael R van,Tirkel A,Osborce C.A digital watermark [A].Proc.of the IEEE ICIP [C].Austin,Texas,1994.2.86-90. 被引量:1
  • 7[6]Wolfgang R B,Delp E J.Fragile watermarking using the VW2D watermark [A].Proc.SPIE,Security and Watermarking of Multimedia Contents [C].San Jose,California,1999.204-213. 被引量:1
  • 8[7]Wong P W.A watermark for image integrity and ownership verification [A].Proc.IS&T PIC Conf.[C].Porland,OR,1998. 被引量:1
  • 9[8]Wong P W.A public key watermark for image verification and authentication [A].Proc.ICIP [C].Chicago,IL,Oct.1998. 被引量:1
  • 10[9]Wong P W,Memon N.Secret and public key image watermarking schemes for image authentication and ownership verification [J].IEEE Trans on Image Processing,2001,10(10):1593-1601. 被引量:1

共引文献51

同被引文献13

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部