期刊文献+

用于图像认证的小波域半易损水印算法 被引量:12

Wavelet Domain Semi-fragile Watermarking Algorithm for Image Authentication
在线阅读 下载PDF
导出
摘要 提出了一种新颖的用于图像认证的半易损水印算法,该算法提取图像在小波低频域的特征信息生成两个水印,一个水印主要用于篡改定位,另一个水印主要用于区分图像所经历的偶然修改和恶意篡改,从而提供了一种有效的图像选择认证机制.此外,该算法的水印生成和嵌入都在图像本身中进行,图像认证时不需要原始图像和任何有关水印的附加信息,从而提高了水印的安全性和保密性.实验结果表明,此算法能很好地将对图像内容的恶意篡改和偶然修改区分开来,并可以给出内容篡改的位置. A new semi-fragile watermarking algorithm for image authentication is introduced. In this algorithm, two watermarks are generated by extracting the image feature from the low frequency domain, one of the watermark is used for classifying of the intentional content modification,and another is used for indicating the modified location, so it has provided a effective mechanism for image authentication. In addition, the watermark generation and watermark embedment are disposed in the image itself, and the received image authentication needs no information about the original image or watermark, so it will increase the security of watermark and prevent forged watermark. Experimental results show the algorithm provides very good classification of intentional content modification and incidental tampering, and also can indicate the locations that have been modified.
出处 《电子学报》 EI CAS CSCD 北大核心 2006年第4期653-657,共5页 Acta Electronica Sinica
基金 国家自然科学基金(No.60573045) 中南大学博士后科学基金(No.05022)
关键词 认证 半易损水印 易损性 小波变换 authentication semi-fragile watermarking fragility wavelet transform
作者简介 胡玉平,男,1969年生于湖南省双峰县,1991年获湖南师范大学物理专业学士学位,1996年获中国科学院云南天文台天体测量专业硕士学位,2005年获华中科技大学计算机系统结构专业博士学位,博士后,副教授,主要研究方向为计算机视觉与图像处理,发表论文30余篇,其中EI检索6篇.E—mail:hypzlh@tom.com 陈志刚,男,1964年生于湖南长沙市,教授、博士生导师,研究方向为计算机网络、网络信息安全.
  • 相关文献

参考文献10

  • 1Kundur D, Hatzinakos D. Digital watermarking for telltale tampering proofing and authentication [ J ]. Proceeding of IEEE, 1999,87 ( 7 ) : 1167 - 1181.
  • 2Hu Junquan, Huang Jiwu, Huang Daren, et al. Image fragile watermarking based on fusion of multi-resolution tamper detection [ J ]. Electronics Letters, 2002, 38(24) : 1512 - 1513.
  • 3Kundur D, Htazinakos D. Digital watermarking using multiresolution [ A ]. In: Proceeding of the 1998 IEEE International Conference on Acoustic, Speech and Signal Processing, Seattle [ C ]. Washington, 1998.2969 -2972.
  • 4张中月,齐开国.应用Hash函数增强数字图像半易损性水印的易损性[J].计算机辅助设计与图形学学报,2004,16(6):845-849. 被引量:4
  • 5Yang Zhao, Patrizio. Dual domain watermarking for authentication and compression of cultural heritage images[ J ]. IEEE Transaction on Image Processing, 2004, 13(3) :430 -447.
  • 6Lin C Y, Chang S F. A robust image authentication method distinguishing JPEG compression from malicious manipulation[J]. IEEE Trans on Circuit and System for Video Technology ,2001,11 (2) : 153 - 168.
  • 7W Stalings. Network Security Essentials: Applications and Standards[ S ] :Prentice Hall ,2002.
  • 8Chang S G, Yu B, etterli M, Adaptive wavelet thresholding for image denoising and compression [ J ]. IEEE Transaction on Image Processing, 2000,9 (9) : 1532 -1546.
  • 9Servetto D S, Ramchandran K, Morchard T. Image coding on morphological representation of wavelet data[J]. IEEE Trans on Image Processing, 1999,8 ( 9 ) :1161 -1174.
  • 10Rivest R. The MD5 message digest algorithm [ Z ]. http ://www. faqs. org/rfcs ,2004.

二级参考文献9

  • 1Kundur D, Hatzinakos D. Digital watermarking for telltale tamper proofing and authentication[J]. Proceedings of the IEEE, 1999, 87(7): 1167~1181
  • 2Hu Junquan, Huang Jiwu, Huang Daren, et al. Image fragile watermarking based on fusion of multi-resolution tamper detection[J]. Electronics Letters, 2002, 38(24): 1512~1513
  • 3Kundur D, Hatzinakos D. Digital watermarking using multiresolution wavelet[A]. In: Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, Seattle, Washington, 1998, 5: 2969~2972
  • 4Rivest R. The MD5 message digest algorithm[OL]. http://www.faqs.org/rfcs/rfc1321.html, 1992
  • 5Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding-A survey[J]. Proceedings of the IEEE, 1999, 87(7): 1063~1077
  • 6Wang P W, Memon Nasir. Secret and public key image watermarking schemes for image authentication and ownership verification[J]. IEEE Transactions on Image Proceedings, 2001, 10(10): 1593~1601
  • 7Wong P W. A public key watermark for image verification and authentication[A]. In: Proceedings of IEEE International Conference Image Processing, Chicago, IL, 1998. 425~429
  • 8丁玮,闫伟齐,齐东旭.基于Arnold变换的数字图像置乱技术[J].计算机辅助设计与图形学学报,2001,13(4):338-341. 被引量:364
  • 9张华熊,仇佩亮.置乱技术在数字水印中的应用[J].电路与系统学报,2001,6(3):32-36. 被引量:107

共引文献3

同被引文献95

引证文献12

二级引证文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部