期刊文献+

元胞自动机变换可恢复图像认证算法

Restorable Image Authentication with Cellular Automata Transform
下载PDF
导出
摘要 提出一种基于元胞自动机变换的可恢复图像认证算法,将图像分割成不重叠子块,对每个子块进行两层二维元胞自动机变换CAT,从第二层低频系数生成子块认证水印和恢复水印,分别嵌入当前子块和对应子块的第一层低频系数,形成含水印图像;用认证水印进行图像认证;用恢复水印恢复被篡改图像子块。实验表明,该算法安全性高,且具有很强的抗VQ攻击能力。 A restorable image authentication with cellular automata transform is proposed. The original image is splited into non-overlppin blocks and two layer cellular automata transform (CAT) is performed on each block. Authentication watermark and restoration watermark are produced from the second-layer low frequency coefficients and embedded into the first-layer low frequency coefficients of the current block and the corresponding block separately. Image authentication is played with the authentication watermark, and the tampered blocks can be restored with restoration watermark. Experiment results show that the scheme's security is strong and can resist vector quantization attack effectively.
作者 金军 舒红平
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2009年第6期1026-1030,1056,共6页 Journal of University of Electronic Science and Technology of China
基金 四川省青年科技基金(06ZQ026-054)
关键词 元胞自动机变换 图像认证 图像恢复 安全 篡改定位 cellular automata transform image authentication image restoration security tamper location
  • 相关文献

参考文献10

  • 1ALEXANDRE H, PAQUET, RABAB K W. Wavelet-based digital watermarking for image authentication[C]//IEEE Canadian Conference on Electrical and Computer Engineering 2002. [s.n.], 2002: 879-884. 被引量:1
  • 2MAENO K, SUN Q, CHANG S F, et al. New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization[J]. IEEE Transactions on Multimedia, 2006, 8(1): 32-45. 被引量:1
  • 3CELIK M, SHARMA G, SABER E, et al. Hierarchical watermarking for secure image authentication with localization[J]. IEEE Transactions on Image Processing, 2002, 11(6): 585-595. 被引量:1
  • 4FRIDRICH J, GOLJAN M. Protection of digital images using self embedding[C]//Proceedings of NJIT Symposium on Content Security and Data Hiding in Digital Media. Newark, New Jersty: Institute of Technology, 1999. 被引量:1
  • 5FRIDRICH J, GOLJAN M. Images with selfcorrecting capabilities[C]//Proceedings of International Conference on Image Processing. Koke, Japan: [s.n.], 1999: 25-28. 被引量:1
  • 6张鸿宾,杨成.图像的自嵌入及窜改的检测和恢复算法[J].电子学报,2004,32(2):196-199. 被引量:49
  • 7钱振兴,程义民,王以孝,田源.一种图像自嵌入方法[J].电子学报,2006,34(7):1347-1350. 被引量:12
  • 8HOLLIMAN M, MEMON N. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes[J]. IEEE Transactions on Image Processing, 2000, 9(3): 432-441. 被引量:1
  • 9WOLFRAM S. Theory and applications of cellular automata[M]. Singapore: World Scientific Publishing Company, 1986. 被引量:1
  • 10LAFE O. Cellular automata transforms: theory and applications in multimedia compression, encryption, and modeling[M]. Boston/Dordrecht/London: Kluwer Academic Publishers, 2000. 被引量:1

二级参考文献22

  • 1程义民,钱振兴,王以孝,田源.基于数位信息的信息隐藏方法[J].电子与信息学报,2005,27(8):1304-1309. 被引量:15
  • 2[1]Lin E T,Delp E J.A review of fragile image watermarks [A].Proc.of the Multimedia and Security Workshop (ACM Multimedia'99) [C].Orlando,1999.25-29. 被引量:1
  • 3[2]Walton S.Information authentication for a slippery new age [J].Dr.Dobbs Journal,1995,20(4):18-26. 被引量:1
  • 4[3]Yeung M,Mintzer F.Invisible watermarking for image verification [J].Journal of Electronic Imaging,1998,7(3):578-591. 被引量:1
  • 5[4]Wolfgang R B,Delp E J.A watermark for digital images [A].Proc.IEEE Int.Conf.on Image Processing [C].ACM Press,NY,1996.3.219-222. 被引量:1
  • 6[5]Schynael R van,Tirkel A,Osborce C.A digital watermark [A].Proc.of the IEEE ICIP [C].Austin,Texas,1994.2.86-90. 被引量:1
  • 7[6]Wolfgang R B,Delp E J.Fragile watermarking using the VW2D watermark [A].Proc.SPIE,Security and Watermarking of Multimedia Contents [C].San Jose,California,1999.204-213. 被引量:1
  • 8[7]Wong P W.A watermark for image integrity and ownership verification [A].Proc.IS&T PIC Conf.[C].Porland,OR,1998. 被引量:1
  • 9[8]Wong P W.A public key watermark for image verification and authentication [A].Proc.ICIP [C].Chicago,IL,Oct.1998. 被引量:1
  • 10[9]Wong P W,Memon N.Secret and public key image watermarking schemes for image authentication and ownership verification [J].IEEE Trans on Image Processing,2001,10(10):1593-1601. 被引量:1

共引文献51

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部