期刊文献+

窜改认证与内容恢复分离的自嵌入脆弱水印算法 被引量:1

Self-embedding fragile watermarking algorithm with tamper authentication and content recovery separated
下载PDF
导出
摘要 为了提高可恢复水印的认证精度和恢复质量,降低虚警率,提出了一种窜改认证与内容恢复分离的自嵌入水印算法。该算法以2×2的图像块为认证单位,将认证水印与恢复水印分别嵌入到自身图像块和偏移图像块中,使认证虚警率降为0;同时提出一种基于线性函数和混沌映射的偏移值选取方案,使图像的恢复质量得到提高。理论分析和实验结果表明,该算法能在抵抗拼贴和量化攻击的同时,准确定位图像窜改并以较高的质量进行恢复。 To improve the accuracy of authentication and the quality of reconstructed image,reduce the probability of false rejection,this paper proposed an authentication and recovery separated self-embedding watermarking algorithm.It defined 2×2 image block as an authentication unit.It embedded the authentication watermark and recovery watermark respectively into the block itself and the corresponding excursion block,reducing the probability of false rejection to 0.It proposed an offset value selection sheme based on linear function and chaos mapping to improve the quality of the reconstructed image.Theoretical analysis and simulation results show that the proposed algorithm can not only thwart the collage and VQ attack,but also locate tampered blocks accurately and restore it effectively.
作者 聂雪莲 戴青
出处 《计算机应用研究》 CSCD 北大核心 2012年第7期2696-2699,共4页 Application Research of Computers
基金 河南省科技厅科技攻关计划基金资助项目(102102210053)
关键词 脆弱水印 自嵌入 认证精度 虚警率 混沌 fragile watermarking self-embedding accuracy of authentication probability of false rejection chaos
  • 相关文献

参考文献9

  • 1MEENAKSHIDEVI P,VENKATESAN M,DURAISWAMY K. A fragile watermarking scheme for image authentication with tamper localization using integer wavelet transform[J].Journal of Computer Science,2009,(11):831-837. 被引量:1
  • 2CHAMLAWI R,KHAN A,USMAN I. Authentication and recovery of images using multiple watermarks[J].Computers and Electrical Engineering,2010,(03):578-584.doi:10.1016/j.compeleceng.2009.12.003. 被引量:1
  • 3FRIDRICH J,GOLJAN M. Images with self-correction capabilities[A].[S.l.]:IEEE Press,1999.25-28. 被引量:1
  • 4张鸿宾,杨成.图像的自嵌入及窜改的检测和恢复算法[J].电子学报,2004,32(2):196-199. 被引量:49
  • 5和红杰,张家树.基于混沌置乱的分块自嵌入水印算法[J].通信学报,2006,27(7):80-86. 被引量:33
  • 6HASAN Y M Y,HASSAN A M. Tamper detection with self-correction hybrid spatial-DCT domains image authentication technique[A].[S.l.]:IEEE Press,2007.369-374. 被引量:1
  • 7LIEW S C,ZAIN J M. Tamper localization and lossless recovery watermarking scheme[A].[S.l.]:Springer,2011.555-566. 被引量:1
  • 8HE Hong-jie,ZHANG Jia-shu,WANG Hong-xia. Synchronous counterfeiting attacks on self-embedding watermarking schemes[J].International Journal of Computer Science and Network Security,2006,(1 B):251-257. 被引量:1
  • 9SAM U EL S,PENZHORN W T. Digital watermarking for copyright protection[A].[S.l.]:IEEE Press,2004.953-957. 被引量:1

二级参考文献28

  • 1张家树,田蕾.一种新的基于密钥的混沌数字水印方法[J].通信学报,2004,25(8):96-101. 被引量:15
  • 2和红杰,张家树,田蕾.能区分图像或水印篡改的脆弱水印方案[J].电子学报,2005,33(9):1557-1561. 被引量:24
  • 3[1]Lin E T,Delp E J.A review of fragile image watermarks [A].Proc.of the Multimedia and Security Workshop (ACM Multimedia'99) [C].Orlando,1999.25-29. 被引量:1
  • 4[2]Walton S.Information authentication for a slippery new age [J].Dr.Dobbs Journal,1995,20(4):18-26. 被引量:1
  • 5[3]Yeung M,Mintzer F.Invisible watermarking for image verification [J].Journal of Electronic Imaging,1998,7(3):578-591. 被引量:1
  • 6[4]Wolfgang R B,Delp E J.A watermark for digital images [A].Proc.IEEE Int.Conf.on Image Processing [C].ACM Press,NY,1996.3.219-222. 被引量:1
  • 7[5]Schynael R van,Tirkel A,Osborce C.A digital watermark [A].Proc.of the IEEE ICIP [C].Austin,Texas,1994.2.86-90. 被引量:1
  • 8[6]Wolfgang R B,Delp E J.Fragile watermarking using the VW2D watermark [A].Proc.SPIE,Security and Watermarking of Multimedia Contents [C].San Jose,California,1999.204-213. 被引量:1
  • 9[7]Wong P W.A watermark for image integrity and ownership verification [A].Proc.IS&T PIC Conf.[C].Porland,OR,1998. 被引量:1
  • 10[8]Wong P W.A public key watermark for image verification and authentication [A].Proc.ICIP [C].Chicago,IL,Oct.1998. 被引量:1

共引文献69

同被引文献14

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部