期刊文献+

抗拼贴攻击的二值图像认证算法 被引量:4

Binary Image Authentication Watermarking Scheme Against Collage Attack
下载PDF
导出
摘要 为提高算法抵抗拼贴攻击的能力,本文结合块相关思想提出一种二值图像认证算法.该算法首先将每个图像块中的像素点分为"可翻转"和"不可翻转"两类,将"不可翻转"像素点Hash生成水印信息,用其替代相应映射块的"可翻转"像素点实现水印嵌入.通过比较图像块重构水印及提取水印的一致性判断该图像块的真实性,并结合各图像块邻域篡改特征进一步提高篡改检测性能.实验结果表明,该算法不仅提高了在替换、添加、删除攻击下的篡改检测性能,而且能够有效抵抗拼贴攻击. To improve the ability against collage attack, a watermarking scheme for binary image authentication is proposed by introducing dependence of blocks in this paper. In the proposed algorithm, all pixels in each block are divided into the flipped pixels and the unflipped ones. The watermark information of each block is generated by hashing the unfiipped pixels of it, and embedded in the flipped pixels of the corresponding mapping block. The authenticity of each block is detected by comparing the consistency between the reconstructed watermark and the extracted one. The neighborhood tampering feature is used to improve the tamper detection performance. Experimental results show that the proposed algorithm can not only improve the performance of tamper detection in the general tampering such as replace, add, delete, etc., but also effectively resist collage attack.
出处 《自动化学报》 EI CSCD 北大核心 2014年第6期1184-1190,共7页 Acta Automatica Sinica
基金 国家自然科学基金(61373180 60970122) 中央高校基本科研业务专项基金资助(SWJTU09CX039 SWJTU10CX09) 西藏自治区科技计划项目资助~~
关键词 二值图像 拼贴攻击 块相关 邻域篡改特征 Binary image, collage attack, block correlation, neighborhood tampering feature
  • 相关文献

参考文献20

  • 1周琳娜..数字图像盲取证技术研究[D].北京邮电大学,2007:
  • 2Huang F J, Huang J W, Shi Y Q. Detecting double JPEG compression with the same quantization matrix. IEEE Transactions on Information Forensics and Security, 2010, 5(4): 848-856. 被引量:1
  • 3Peng F, Nie Y Y, Long M. A complete passive blind image copy-move forensics scheme based on compound statistics features. Forensic Science International, 2011, 212(1-3): e21-e25. 被引量:1
  • 4Mahalakshmi S D, Vijayalakshmi K, Priyadharsini S. Digital image forgery detection and estimation by exploring basic image manipulations. Digital Investigation, 2012, 8(3-4): 215-225. 被引量:1
  • 5Stamm M C, Liu K J R. Anti-forensics of digital image compression. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 1050-1065. 被引量:1
  • 6Haouzia A, Noumeir R. Methods for image authentication: a survey. Multimedia Tools and Applications, 2008, 39(1): 1-46. 被引量:1
  • 7綦科,谢冬青.基于第二代Bandelet变换的抗几何攻击图像水印[J].自动化学报,2012,38(10):1646-1653. 被引量:4
  • 8Aldeeb N H H, Abuhaiba I S I. An improved watermarking scheme for tiny tamper detection of color images. International Journal of Image, Graphics and Signal Processing, 2013, 5(5): 1-14. 被引量:1
  • 9He H J, Chen F, Tai H M, Kalker T, Zhang J S. Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 185-196. 被引量:1
  • 10Tzeng C H, Tsai W H. A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement. IEEE Communications Letters, 2003, 7(9): 443-445. 被引量:1

二级参考文献52

共引文献54

同被引文献22

  • 1朱从旭,陈志刚.一种灵敏的文本图像认证混沌脆弱水印技术[J].小型微型计算机系统,2006,27(1):151-154. 被引量:16
  • 2Haouzia A, Noumeir R. Methods for image authentication : a survey[ J] . Multimedia tools and applications , 2008,39( 1) :1 -46. 被引量:1
  • 3Yang H J, Alex C K. Binary image authentication with tampering localization by embedding cryptographic signature and block Identifier[ J].IEEE Signal Processing Letters, 2006,13( 12) :741 .744. 被引量:1
  • 4Xi Yanhua,ZHANG Min-Hui. A document watermarking algorithm based on partitioned character image[ J] . IEEE International Conference on E-Business and Information System Security( EBISS). Wuhan, Beijing,2009 : 1 -4. 被引量:1
  • 5Wu M , Liu B D. Data hiding in binary images for authentication and annotation[ J] . IEEE Transactions on Multimedia,2004,6(4) :528 .538. 被引量:1
  • 6Fridrich J , Goljan M , Memon N. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique[ J]. Electronic Imaging, 2002,11(4) :262-274. 被引量:1
  • 7Kwon 0 J , Kim W G, Kim Y. Binary image watermarking with tampering localization in binary wavelet transform domain [ J ]. InternationalJournal of Multimedia and Ubiquitous Engineering, 2012, 7(2) : 341 -346. 被引量:1
  • 8Wang Z, BovikAC, Sheikh H H, et al. Image quality assessment : from error visibility to structural similarity [ J]. IEEE Transactions on ImageProcessing, 2004, 13(4) :600 -612. 被引量:1
  • 9李赵红,侯建军,宋伟.基于等级结构的二值文本图像认证水印算法[J].自动化学报,2008,34(8):841-848. 被引量:9
  • 10李赵红,黄亮,张文礼.用于二值图像认证的数字水印技术[J].北京邮电大学学报,2010,33(5):66-69. 被引量:5

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部