期刊文献+

基于分层嵌入认证与恢复的自嵌入水印算法

Self-embedding Watermark Algorithm Based on Layered Embedded Authentication and Recovery
下载PDF
导出
摘要 为提高图像的篡改定位和恢复能力,提出一种空域与频域结合的分层自嵌入水印算法。第1层水印嵌入把2×2图像块内元素的奇偶校验码、异或校验码以及图像块的灰度均值信息作为水印进行加密后都嵌入到偏移块中,将处理过的偏移块元素的奇偶认证码嵌入其自身。第2层水印嵌入将嵌入第1层水印的图像分成8×8大小,提取每块频域特征加密后的信息嵌入到偏移块。分3层对图像进行检测定位与恢复,给出基于混沌序列与Torus同构映射结合的偏移值选取方法,以增强密钥安全性。实验结果表明,该算法可以同时抵抗字典搜索攻击、拼贴攻击、盲攻击以及大面积的剪切攻击,能准确地定位图像的篡改位置并且图像的恢复质量较高。 To improve the ability of image tamper detection and recovery, this paper proposes a layered watermark algorithm based on the combination of the spatial and frequency domain. In layer 1, one part of the watermark information authenticating a single pixel in a block with the size of 2 × 2 pixels is embedded into self-block, and the other part together with recovery watermark are embedded into the mapping block. In layer 2, the image processed in layer 1 is divided into blocks with the size of 8 × 8. The frequency information is extracted and embedded into the mapping block. Three layers are used for image detection and recovering tampered image. This paper also proposes an offset value selection scheme based on chaos sequence and Torus isomorphic mapping to improve the safety of the secret keys. Experimental results demonstrate that the proposed algorithm can not only resist dictionary search attack, collage attack,blind attack and large area cropping attack but also locates the tampered blocks precisely with high quality of the recovered image.
出处 《计算机工程》 CAS CSCD 北大核心 2016年第9期121-125,共5页 Computer Engineering
基金 国家自然科学基金资助项目(61272286) 陕西省自然科学基础研究计划基金资助项目(2014JM8346)
关键词 自嵌入水印 篡改定位 篡改恢复 图像认证 混沌 self-embedding watermark tamper location tamper recovery image authentication chaos
  • 相关文献

参考文献15

  • 1Chaluvadi S B,Prasad M V N. Efficient Image Tamper Detection and Recovery Technique Using Dual Watermark [ C ]//Proceedings of Nature & Biologically Inspired Computing. Washington D. C., USA: IEEE Press, 2009 : 993 -998. 被引量:1
  • 2张大兴,章建芬,韩锋.基于混沌映射的脆弱水印算法[J].杭州电子科技大学学报(自然科学版),2013,33(6):57-61. 被引量:1
  • 3Rawat S, Raman B. A Chaotic System Based Fragile Watermarking Scheme for Image Tamper Detection[ J]. AEU International Journal of Electronics and Communications ,2011,65 ( 10 ) :840-847. 被引量:1
  • 4Dadkhah S0 Manaf A A, Sadeghi S. Efficient Digital Image Authentication and Tamper Localization Technique Using 3Lsb Watermarking [ J ]. International Journal of Computer Science Issues,2012,9( I ). 被引量:1
  • 5潘蓉,田玉敏,董萱.一种图像内容可恢复的脆弱水印算法[J].华中科技大学学报(自然科学版),2012,40(7):67-70. 被引量:2
  • 6张君捧,张庆范,杨红娟.基于块特征和混沌序列的图像篡改检测与恢复[J].山东大学学报(工学版),2014,44(6):63-69. 被引量:2
  • 7Yang C W,Shen J J. Recover the Tampered Image Based on VQ lndexingl J]. Signal Process ,2010,90( 1 ) :331-343. 被引量:1
  • 8Lee T Y,Lin S D. Dual Watermark for Image Tamper Detection and Recovery [ J ]. Pattern Recognition, 2008, 41( 11 ) :3497-3506. 被引量:1
  • 9Chang C,Fan Y H, Tai W L. Four-scanning Attack on Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery I J ]. Pattern Recognition, 2008,41 ( 2 ) :654-661. 被引量:1
  • 10Fridrich J, Goljan M, Memon N. Cryptanalysis of the Yeung Mintzer Fragile Watermarking Technique [ J ]. Journal of Electronic Imaging ,2002,11 ( 2 ) :262-274. 被引量:1

二级参考文献51

共引文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部