期刊文献+

图像的自嵌入及窜改的检测和恢复算法 被引量:49

Tamper Detection and Self Recovery of Images Using Self-Embedding
下载PDF
导出
摘要 提出一种图像自嵌入的水印算法 .它将一个图像的主要内容嵌入该图像自身之中 .该算法不仅能检测和定位对图像的窜改 ,而且能恢复被损坏的图像内容 .算法的基本思路是把一个图像块的主要DCT系数经过量化、编码和加密后 ,嵌入另一个图像块的最低位之中 .依据大量图像DCT量化系数的统计性质 ,本文仔细设计了主要DCT系数的编码表 ,使它既能满足水印负荷的要求 ,又能保证图像恢复时有较好的质量 .分析了水印嵌入块和原图像块间偏移值应该满足的条件和设计方法 .该算法为单向、不可逆的 。 A scheme for self-embedding an image into itself is proposed as a means for detecting and locating tamper, and self-recovering. The image is divided into small 8×8 blocks and each block is DCT transformed. A specified number of the lower frequency DCT coefficients are quantized and encoded using a fixed number of bits. The number of coefficients and their bit lengths are carefully chosen, according to the statistical property of these coefficients, the resulting bit-string for each block satisfies the payload of each block and has good self-recovering capability. The information about one block B (the bit string) is inserted into the LSB of another distant block, which is separated from B with an offset. We analyzed the method for choosing the offset. The proposed scheme is an one way watermarking and secure algorithm, and can well resist possible forged attack.
作者 张鸿宾 杨成
出处 《电子学报》 EI CAS CSCD 北大核心 2004年第2期196-199,共4页 Acta Electronica Sinica
基金 国家自然科学基金 (No 60 0 750 0 2 ) 北京市自然科学基金 (No 4992 0 0 2 ) 863计划 (No 2 0 0 1AA1 4 4 0 80 ) 北京市教委科技发展计划
关键词 多媒体认证 数字水印 RSA公钥算法 自嵌入 Algorithms Cosine transforms Image reconstruction Image segmentation Public key cryptography Statistics
  • 相关文献

参考文献14

  • 1[1]Lin E T,Delp E J.A review of fragile image watermarks [A].Proc.of the Multimedia and Security Workshop (ACM Multimedia'99) [C].Orlando,1999.25-29. 被引量:1
  • 2[2]Walton S.Information authentication for a slippery new age [J].Dr.Dobbs Journal,1995,20(4):18-26. 被引量:1
  • 3[3]Yeung M,Mintzer F.Invisible watermarking for image verification [J].Journal of Electronic Imaging,1998,7(3):578-591. 被引量:1
  • 4[4]Wolfgang R B,Delp E J.A watermark for digital images [A].Proc.IEEE Int.Conf.on Image Processing [C].ACM Press,NY,1996.3.219-222. 被引量:1
  • 5[5]Schynael R van,Tirkel A,Osborce C.A digital watermark [A].Proc.of the IEEE ICIP [C].Austin,Texas,1994.2.86-90. 被引量:1
  • 6[6]Wolfgang R B,Delp E J.Fragile watermarking using the VW2D watermark [A].Proc.SPIE,Security and Watermarking of Multimedia Contents [C].San Jose,California,1999.204-213. 被引量:1
  • 7[7]Wong P W.A watermark for image integrity and ownership verification [A].Proc.IS&T PIC Conf.[C].Porland,OR,1998. 被引量:1
  • 8[8]Wong P W.A public key watermark for image verification and authentication [A].Proc.ICIP [C].Chicago,IL,Oct.1998. 被引量:1
  • 9[9]Wong P W,Memon N.Secret and public key image watermarking schemes for image authentication and ownership verification [J].IEEE Trans on Image Processing,2001,10(10):1593-1601. 被引量:1
  • 10[10]Wu M,liu B.Watermarking for image authentication [A].Proc.ICIP [C].Chicago,IL,1998. 被引量:1

同被引文献431

引证文献49

二级引证文献162

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部