期刊文献+

可恢复的脆弱数字图像水印 被引量:10

Fragile Digital Image Watermarking with Restoration Capability
下载PDF
导出
摘要 该文提出一种用于图像内容认证和保护的脆弱数字图像水印算法 .该算法不但可以检测定位出图像中任何细微的篡改 ,而且可以恢复较大面积的被篡改的图像数据 .首先该文给出了一种被称之为基于块交叉交插RS编码的水印生成算法 ;随后使用基于块交叉交插RS码的校验符号作为水印并将其埋植到图像数据的最低位 ;最后利用基于块交叉交插RS解码实现水印信号检测以及对图像篡改数据的定位和恢复 .此外该文算法使用由密码生成的掩膜图像参与水印信号的生成和检测 ,很好地保证了水印的安全性和保密性 .经实验验证 ,该算法不但可以有效地检测出图像中被篡改内容的位置 ,而且能恢复被篡改的图像数据 . This paper gives an auto-restorable fragile watermarking algorithm for image content authentication, which can not only detect the location of any minute changes in images but also restore the altered image data. Firstly, authors give called cross-interleaved-RS code block generation scheme. Then authors use parities of the cross-interleaved-RS block-based codes as watermarking and embed them into the lowest bits of the image data. Finally, authors use these cross-interleaved-RS codes to detect watermarking, identify the change positions and restore the altered data in an image. In addition, a mask image generated by a secret algorithm is participated in the procedure of cross-interleaved-RS encoding to increase the security of watermarking and prevent forged watermarking. Experimental results demonstrate that the watermarking produced by above method is sensitive to tiny changes in images, and the method also provides very good results of detecting the tampered location and restoring the tampered data.
出处 《计算机学报》 EI CSCD 北大核心 2004年第3期371-376,共6页 Chinese Journal of Computers
基金 西北工业大学英才计划 香港理工大学UGC基金 悉尼大学ARC基金资助
关键词 脆弱数字图像水印算法 图像处理 图像数据 图像编码 RS码 里德索罗门码 Algorithms Data compression Image retrieval Signal detection Signal encoding
  • 相关文献

参考文献9

  • 1[1]Cox I.J., Miller M.L., Bloom J.A.. Digital Watermarking.San Fransisco, USA: Morgan Kaufmann Publishers, 2002 被引量:1
  • 2[2]Hartung F., Kutter M.. Multimedia watermarking techniques. Proceedings of the IEEE, 1999, 87(7): 1079~1107 被引量:1
  • 3[3]Friedman G.L.. The trustworthy camera: Restoring credibility to photographic image. IEEE Transactions on Consumer Electronics, 1993, 39(4): 905~910 被引量:1
  • 4[4]Walton S.. Information authentication for a sippery new age. Dr. Bobbs Journal, 1995, 20(4): 18~26 被引量:1
  • 5[5]Barreto P.S.L.M., Kim H.Y., Rijmen V.. Toward secure public-key blockwise fragile authentication watermarking. IEE Proceedings of Vision, Image and Signal Processing, 2002, 149(2): 57~62 被引量:1
  • 6[6]Lee Sang-Kwang, Ho Yo-Sung. Fragile watermarking scheme using a simple genetic algorithm. In: Proceedings of International Conference on Consumer Electronics of ICCE, 2002 Digest of Technical Papers, Auckland, New Zealand, 2002, 190~191 被引量:1
  • 7[7]Lee Jaejin, Won Chee Sun. Authentication and correction of digital watermarking images. Electronics Letters of IEE, 1999, 35(11): 886~887 被引量:1
  • 8[8]Wu Chuan-fu, Hsieh Wen-shyong. Image refining technique using digital watermarking. IEEE Transactions on Consumer Electronics, 2000, 46(1): 1~5 被引量:1
  • 9[9]Jiri Fridrich. Image watermarking for tamper detection. In: Proceedings of IEEE International Conference on Image Processing, Chicago Illinois, USA, 1998, 2: 404~408 被引量:1

同被引文献96

引证文献10

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部