期刊文献+

一种新的图像窜改检测与自恢复算法 被引量:1

New algorithm for image tamper detect and self-recovery
下载PDF
导出
摘要 提出一种新的图像窜改检测与自恢复算法,不但可以检测定位出图像中任何细微的窜改,而且可以恢复被较大面积窜改的图像数据。首先,在环面自同构映射的基础上采用列偏移方法优化块序列,随后将关联块的组合水印分别嵌入到各映射块内每个像素的三位最低有效比特,最后按照像素尺寸对图像窜改进行逐级检测,并以最小分块为单元来自恢复图像。经实验证明,该算法能有效地进行窜改检测与内容恢复,尤其窜改区域较大时具有显著的效果。 This paper gave a new algorithm for image tamper detect and self-recovery, which could not only detect the location of any minute changes in images but also recover the largely altered image data. Firstly, based on torus automorphism mapping, adopted column sidelong move method to optimize the position of columns. Then embedded the combined watermark of the correlative block to 3 LSB of each pixel in the mapping block respectively. Finally, the image blocks of different sizes could be detected and the smallest block was viewed as the unit for image self-recovery. Experiment results show that the proposed algorithm has significant effect on tamper detection and recovery, especially when the tamper area is very large.
出处 《计算机应用研究》 CSCD 北大核心 2009年第10期3938-3940,3950,共4页 Application Research of Computers
基金 国家科技支撑计划资助项目(2006BAD11A17) 鲁东大学科研资助项目(L20076101)
关键词 数字水印 窜改定位 自恢复 关联块 digital watermarking tamper locating self-recovery correlative block
  • 相关文献

参考文献7

  • 1COX I J, KILIAN J, LEIGHTON F T, et al. Secure spread spectrum watermarking for multimedia [J]. IEEE Trans on Image Processing, 1997, 6 ( 12 ) : 1673-1687. 被引量:1
  • 2FRIEDMAN G L. The trustworthy camera: restoring credibility to photographic image [J].IEEE Trans on Consumer Electronics, 1993, 39(4) :905-910. 被引量:1
  • 3BARRETO P S L. M, KIM H Y, RIJMEN V. Toward secure public key block wise fragile authentication watermarking [J]. IEEE Proceedings of Vision, Image and Signal Processing, 2002, 149 (2) :57-62. 被引量:1
  • 4LEE S K, HO Y S. Fragile watermarking scheme using a simple genetic algorithm [ C ]//Proc of International Conference on Consumer Electronics. 2002: 190-191. 被引量:1
  • 5WU Chuan-fu, HSIEH W S. Image refining technique using digital watermarking [ Jl. IEEE Trans on Consumer Electronics, 2000, 46(1) : 1-5. 被引量:1
  • 6CELIK M U. Hierarchical watermarking for secure image authentication with localization [ J ]. IEEE Trans on Image Processing, 2002, 11 (6) : 585-595. 被引量:1
  • 7LIN P L, HSIEH C K,HUANG P W. A hierarchical digital watermarking method for image tamper detection and recovery [ J]. Pattern Recognition ,2005, 38( 11 ) :2519-2529. 被引量:1

同被引文献8

  • 1瞿治国,金聪.一种稳健的可恢复双重数字水印技术[J].武汉大学学报(理学版),2007,53(3):314-318. 被引量:6
  • 2QU Z,JIN C.Self restoring dual watermarking technology[DB/OL].(2007-04-10)[2011-10-11].http://www.ieeesose2007.org/aduanceprogram.pdf. 被引量:1
  • 3JIN C,QU Z G,ZHANG Z M,et al.Web watermarking tech-nology vaing an xml document[J].Institution of Engineer-ing and Technology,2007,1(1):37-42. 被引量:1
  • 4FRATTOLILLO F,D'ONOFRIO S.An image watermarkingprocedure based on xml documents[DB/OL].(2006-10-05)[2011-10-20].http://www.springerlink.com. 被引量:1
  • 5FRATTOLILLO F,D'ONOFRIO S.A video watermarking pro-cedure based on XML documents[C].In Proceedings ofICIAP.2005,568-575. 被引量:1
  • 6刘泉 江雪梅.用于图像窜改定位和恢复的分层半脆弱数字水印算法.通信学报,2007,:104-110. 被引量:1
  • 7PODILCHUK C I,ZENG W J.Image adaptive watermarkingusing visual models[J].IEEE Journal on Selected Areas inCommunications,1998,16(4):525-539. 被引量:1
  • 8CELIK M U.Hierarchical watermarking for secure image au-thentication with localization[J].IEEE Trans on Image Pro-cessing,200,211(6):585-595. 被引量:1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部