期刊文献+

基于地址码的脆弱数字水印技术 被引量:5

A Fragile Watermark Technique Based on Address Code
下载PDF
导出
摘要 提出了一种适用于数字产品的认证、内容篡改证明和完整性证明的脆弱数字水印算法.用置乱后的水印生成地址码,根据地址码在载体图像的DCT域块上找到对应的参考位置,并根据一个混沌随机序列改变该参考位置邻域的系数值.由于把水印从单个bit转换成了一组bit来形成一个参考点的地址,这样有效地减少了修改载体图像DCT系数的个数,从而提高了含水印图像的不可见性.实验结果表明,所提出的水印方案对篡改证明的有效性和敏感性. A new fragile watermarking scheme was presented, which is capable of authentication, tamper-proofing and integrity verification of digital products. It uses permuted watermark to generate address codes, then finds the corresponding position in DCT domain blocks of host image and changes the coefficient value of the neighboring pixels according to a chaotic pseudo-random sequence. This method succeeds in the transformation of the watermark information from individual pixel to a group of pixels that forms relative address, hence greatly reduces the number of changed coefficients and obtains a high peak signal-to-noise ratio (PSNR) as expected. The proposed scheme is blind because the original image is not required during the watermark extraction process. The simulation results show the effectiveness and sensitivity of this technique.
出处 《上海交通大学学报》 EI CAS CSCD 北大核心 2004年第4期620-623,共4页 Journal of Shanghai Jiaotong University
基金 国家高技术研究发展计划(863)资助项目(2002AA144110) 国家自然科学基金资助项目(60272082)
关键词 脆弱数字水印 地址码 认证 混沌置乱 静态哈希 fragile watermark address code verification chaotic permutation static Hashing
  • 相关文献

参考文献9

  • 1Yen J C. Watermarks embedded in the permuted image[A]. Proc IEEE Int Symp on Circuits and Systems (ISCAS 2001 ) [C]. Sydney: IEEE 2001.53- 56. 被引量:1
  • 2Wang Y W, Doherty J F, Van Dyck R E. A wavelet-based watermarking algorithm for ownership verification of digital images[J]. IEEE Transactions on Image Processing, 2002, 11(2) :77-88. 被引量:1
  • 3Alturki F, Mersereau R. Secure fragile digital watermarking technique for image authentication [A].Proc IEEE Int Conference on Image Processing[C].Thessaloniki:IEEE, 2001. 3:1031-1034. 被引量:1
  • 4Walton S. Information authentication for a slippery new age[J]. Dr Dobbs Journal,1996,20(4):18-26. 被引量:1
  • 5Wolfgang A B, Delp E J. Watermark for digital images[A]. IEEE Int Conference on Image Processing[C]. Lausanne, Switz:IEEE. 1996. 219-222. 被引量:1
  • 6Wong P W, Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification [J]. IEEE Transactions on Image Processing, 2001,10(10): 1593- 1601. 被引量:1
  • 7Kundur D, Hatzinakos D. Digital watermarking for telltale tamper proofing and authentication[J]. Proceedings of the IEEE, 1999,87(7):1167-1180. 被引量:1
  • 8Ellis H, Sartaj S, Susan A F. Fundamentals of data structures in C[M]. New York: W H Freeman & Co, 1992. 被引量:1
  • 9王秋生,孙圣和,郑为民.数字音频信号的脆弱水印嵌入算法[J].计算机学报,2002,25(5):520-525. 被引量:50

二级参考文献6

  • 1Voyatzis G, Pitas I. The use of watermarks in the protection of digital multimedia products. Proceedings of the IEEE, 1999, 87(7):1197-1207 被引量:1
  • 2Wolfgang R B, Podilchuk C I, Delp E J. Proceedings of the IEEE, 1999, 87(7):1108-1126 被引量:1
  • 3Bender W, Gruhl D, Morimoto N. Techniques for data hiding. IBM Systems Journal, 1996, 35(3-4): 313-336 被引量:1
  • 4Basia P, Pitas I. Robust audio watermarking in the time-domain. In:Proc of EUSIPCO'98, Rhodes, Greece, 1998.25-28 被引量:1
  • 5Boney L, Tewfik A H, Hamdy K N. Digital watermarks for audio signals. In:Proc International Conference on Multimedia Computing and Systems, Hiroshima, Japan, 1996. 473-480 被引量:1
  • 6钮心忻,杨义先.基于小波变换的数字水印隐藏与检测算法[J].计算机学报,2000,23(1):21-27. 被引量:129

共引文献49

同被引文献43

引证文献5

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部