期刊文献+

基于纠错编码的图像篡改恢复方法的研究 被引量:4

Research of image tampering recovery based on correct-encode
下载PDF
导出
摘要 利用具有纠错功能的汉明码和置乱技术,提出了一种基于纠错编码技术与LSB结合的图像内容篡改恢复方法。提取图像的原始特征作为信息源码生成校验码,将生成的校验码经Arnold置乱后嵌入原始图像。当水印图像被篡改后,根据提取的校验码恢复图像的原始特征。实验结果表明,该算法对图像局部发生的篡改可以有效地检测并定位,并且具有较好的自恢复功能。 Hamming code and Arnold shuffling techniques are used in this paper. A method of image content tampering recovery based on correct-encode combined with the LSB is proposed. The original feature of image is picked up to generate correct code, which is embedded into the original image after being changed with Arnold shuffling techniques. When the watermarking image is tampered, the original feature can be recovered by the correct-encode which is picked up from the image. Experimental results show that proposed algorithm can detect and local the tampered areas effectively, and it has a good self-recovery function.
出处 《计算机工程与应用》 CSCD 2012年第30期205-209,共5页 Computer Engineering and Applications
关键词 纠错编码 汉明码 ARNOLD置乱 最低有效位(LSB) 自恢复 correct-encode Hamming code Arnold shuffling Least Significant Bi(tLSB) self-recovery
  • 相关文献

参考文献8

二级参考文献63

共引文献60

同被引文献40

  • 1徐祗军,吴晓娟,董文会.基于Chebyshev混沌序列的数字图像扩频水印[J].电子技术应用,2005,31(9):11-13. 被引量:7
  • 2Zhang Xinpeng,Wang Shuozhong,Qian Zhenxing,et al.Ref- erence sharing mechanism for watermark self-embedding[J]. IEEE Transactions on Image Processing,2011,20(2):485-495. 被引量:1
  • 3Chamlawi R, Khan A.Digital image authentication and recov- ery: employing integer transform based information embed- ding and extraction[J].Information Sciences, 2010, 180(3): 4909-4928. 被引量:1
  • 4He Hongjie, Zhang Jiashu, Chen Fan.Adjacent-block based statistical detection method for self-embedding watermark- ing techniques[J].Signal Processing, 2009,89(8) : 1557-1566. 被引量:1
  • 5LIN C Y, CItANG S F. A robust image anthentication method distin- guishing JPEG compression from malicious maniptdation [ J ]. IEEE Trans on Circuits and Systems for Video Technology,2001,11 (2) :153-168. 被引量:1
  • 6LU C S, LIAO H Y M. Structural digital signature for image anthenti- cation : an incidental distortion resistant scheme[ C ]//Proe of the 8th ACM International Cont'rence on Muhimedia. 2000 : 115-118. 被引量:1
  • 7CHESSA S. Mobile application security tot video streaming authenti- cation and data integrity combining digital signature and watermarking techniques[ C ]//Proc of the 65th IEEE Vehicular Technology Confe- rence. 2007:634-638. 被引量:1
  • 8SUN Qi-bin, CHANG S F. A secure and robust digital signaturescheme for JPEG2000 image authentication [ J ]. Proceedings of the IEEE Trans on Multimedia,2005,7(3 ) :480-494. 被引量:1
  • 9STALLINGS W. Network security essentials: application and stan- dards[ M ]. Upper Saddle River, NJ : Prentice-Hall ,2000. 被引量:1
  • 10WALTON S. Image authentication for a slippery new age [ J]. Dr. Dobb' s Journal, 1995,20(4 ) : 18-26. 被引量:1

引证文献4

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部