首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 171 毫秒
1.
基于双混沌系统的抗JPEG压缩的图像认证水印算法   总被引:1,自引:0,他引:1  
提出了一种新的兼具水印高安全性和高定位精度的抗JPEG压缩的图像认证水印算法.根据JPEG图像压缩过程中DCT系数的不变特性,将预先量化的DCT低频系数和水印密钥合成为混沌系统的初值.再将图像块的编号映射为混沌系统的迭代次数,经过logistic混沌迭代生成图像块水印.在水印嵌入过程中,利用另一混沌系统猫映射构造循环结构,建立图像块之间一一对应的循环关系,并将块水印嵌入到对应图像块的DCT中频系数中.实验结果表明,该算法对JPEG有损压缩具有良好的鲁棒性,同时可对图像内容的恶意篡改进行精确的检测与定位.  相似文献   

2.
提出一种抗JPEG压缩的图像认证算法。根据图像不同块中位置相同的DCT系数之间的大小关系在JPEG压缩之后几乎没有发生变化这一性质,对图像进行分析生成特征编码,并将特征编码加密后以水印方式嵌入图像。认证时只需将待测图像的特征编码与从中抽取出的解密水印进行比较,利用篡改矩阵鉴别是否有内容被篡改,并给出具体的篡改位置。实验结果表明,该算法有很好的抗JPEG压缩性能,并可有效地检测出恶意篡改及其发生的位置。  相似文献   

3.
一种基于半脆弱水印的图像内容认证算法   总被引:3,自引:0,他引:3  
本文提出了一种新的基于半脆弱水印的图像认证算法。利用JPEG压缩算法的不变属性,将原始图像先经过预定质量因子的压缩,并通过一种无损数据隐藏算法将基于图像内容特征的水印信息嵌入。认证过程中,将提取出的水印信息与计算出的图像特征信息比特的匹配百分比与设定的阈值比较,决定是否通过认证。实验结果表明:算法对高于预定质量因子的JPEG压缩具有良好的鲁棒性,拒绝恶意篡改并精确定位篡改位置,同时有效地挫败共谋攻击。  相似文献   

4.
提出了一种能够精确定位并能恢复原图像的半脆弱数字水印算法。本算法利用LSB(最低比特位)所含水印信息大容量的特点,由于在图像篡改和水印攻击情况下HSB(最高比特位)具有相对稳定性,故利用HSB作为水印信息,利用一种新的置乱算法产生水印嵌入位置,结合混沌序列,修改该位置图像像素的LSB,完成水印的嵌入调制。实验结果表明,该算法不仅可对图像内容的恶意篡改进行精确地检测与定位,而且能够大致恢复出被篡改的原图像信息,并对原图质量的影响非常小。  相似文献   

5.
一种面向内容认证的文档图像半脆弱数字水印算法   总被引:1,自引:0,他引:1  
提出了一种面向内容认证的文档图像半脆弱数字水印算法,该算法利用DCT变换域低频系数之间的关系生成水印信息,并将水印信息嵌入到矩阵的奇异值中,对文档图像进行认证时,不需要原始载体图像,也不需要额外存储水印信息,是一个完全的盲水印算法.实验表明,该算法具有较好的透明性,对JPEG有损压缩具有较好的鲁棒性;对剪切、替换等恶意篡改表现出脆弱性.该算法达到了半脆弱水印的基本要求,是一个安全且实用的半脆弱数字水印算法.  相似文献   

6.
用于JPEG2000图像认证的半脆弱性数字水印算法   总被引:23,自引:0,他引:23       下载免费PDF全文
张静  张春田 《电子学报》2004,32(1):157-160
本文给出一种适用于JPEG2000图像认证的半脆弱性数字水印算法,该算法与JPEG2000编、解码器相结合,它根据JPEG2000图像压缩过程中的不变参量进行水印生成和嵌入调制,利用小波变换特性对图像篡改区域进行定位.实验表明,采用该算法实现的水印不仅具有良好的视觉透明性,而且还有较佳的篡改区域指示功能.  相似文献   

7.
一种改进的图像篡改定位及恢复的双水印算法   总被引:1,自引:0,他引:1  
提出一种改进的图像篡改定位及恢复的双水印算法,首先将图像分成2×2大小的图像块,提取每个图像块的特征信息,2个图像块的特征信息形成的水印加密后嵌入在另外2个不重叠的图像块中,在篡改定位中,不仅采用校验码的验证,而且利用了图像块的信息及隐藏在其他图像块中该图像块水印的一致性,使篡改定位的能力进一步增强。实验表明,本文的方法有良好的篡改定位能力,尤其对于非连续的非整体篡改。  相似文献   

8.
陈自刚 《电视技术》2012,36(15):25-27,39
研究并实现基于JPEG XR图像稳定性和内容认证的半脆弱数字水印技术。对JPEG XR图像的频率结构和码流结构进行了分析和研究,提取码流中每个分割块的DC系数和LP系数构造基于图像的二值信息,作为数字水印置乱后嵌入到原图像对应像素点YUV色彩空间的Y分量的最低有效位中,然后再对含有水印的图像进行JPEG XR再编码实现水印嵌入。通过比较基于图像的二值信息和嵌入在图像的二值水印信息,进行篡改定位。对含水印图像进行压缩、噪声、剪切等常见攻击实验,结果表明具有较好的稳定性和内容认证能力。  相似文献   

9.
基于BJND的立体图像篡改定位及恢复水印方法   总被引:6,自引:6,他引:0  
针对立体图像内容的真实性认证和完整性保护等 问题,提出一种基于双目恰可觉察失 真(BJND)的立体图像 篡改定位及恢复水印方法。首先,利用奇异值的稳定特性,设计左右图像的定位水印;然后 ,根据BJND强度将左右图像 的定位水印嵌入到左图像中;最后,利用离散余弦变换(DCT)和JPEG量化压缩 生成恢复信息,并将右图像和左图像遮挡暴露区 域的恢复信息分别嵌入到右图像和左图像中。实验结果表明,本文方法所构造的水印对JPEG 压缩、椒盐噪声、高斯白噪声等偶然攻击比较鲁棒,而对剪切、拼接、旋转等恶意攻击较为 脆弱,同时对左右图像的恶意篡改区域检测率大于98%。由于充分利用了左右图像的匹配特 性,恢复的被篡改立体图像其左右图像PSNR达36.02dB ~41.29dB。  相似文献   

10.
用于图像认证的小波域半易损水印算法   总被引:6,自引:0,他引:6  
胡玉平  陈志刚 《电子学报》2006,34(4):653-657
提出了一种新颖的用于图像认证的半易损水印算法,该算法提取图像在小波低频域的特征信息生成两个水印,一个水印主要用于篡改定位,另一个水印主要用于区分图像所经历的偶然修改和恶意篡改,从而提供了一种有效的图像选择认证机制.此外,该算法的水印生成和嵌入都在图像本身中进行,图像认证时不需要原始图像和任何有关水印的附加信息,从而提高了水印的安全性和保密性.实验结果表明,此算法能很好地将对图像内容的恶意篡改和偶然修改区分开来,并可以给出内容篡改的位置.  相似文献   

11.
提出了一种新的脆弱盲水印生成算法用于图像完整性证明和内容篡改证明。首先将原始图像分块,对各分块进行一次整数小波变换;计算4个子带(LL,HL,LH,HH)小波系数绝对值的均值,分别映射为混沌初值,经过迭代、量化生成二值水印信息;最后将水印信息随机嵌入到4个子带中。实验结果表明,所提出的算法提高了篡改检测率,对图像的篡改具有高度敏感性和准确的篡改定位能力。水印提取为盲提取,篡改检测只用到了篡改后的水印图像。  相似文献   

12.
In this paper, a novel watermarking approach is proposed to provide enhanced tampering localization and self-recovery. A cross chaotic map is used to confuse the blocks generated by the original image. A sister block embedding scheme is proposed to improve the recovery effect after tampering. Flags and a combination of the most significant bit (MSB) and the least significant bit (LSB) mechanism are applied to improve the tampering detection rate and the defense of attacks. And an optimization scheme is given to make the recovered image have advanced visual effects. Experiment results show that the proposed schemes are more secure and have better effect on tampering detection and recovery even though the tampered area is relatively large.  相似文献   

13.
Two watermarks are embedded into the original image. One is the authentication watermark generated by secret key, which is embedded into the sub-LSB (Least Significant Bit) of the original image for tamper localization; the other is the recovery watermark for tamper recovering. The original image is divided into 8 x 8 blocks and each block is transformed by Discrete Cosine Transform (DCT). For each block, some lower frequency DCT coefficients are chosen to be quantized and binary encoded so as to gain the recovery watermark of each block, and the recovery watermark is embedded into the LSB of another block by chaos encryption and authentication chain technology. After the two watermarks being detected, the location of any minute changes in image can be detected, and the tampered image data can be recovered effectively. In the paper, the number of coefficients and their bit lengths are carefully chosen in order to satisfy with the payload of each block and gain the capability of self-recovering. The proposed algorithm can well resist against possible forged attacks. Experimental results show that the watermark generated by the proposed algorithm is sensitive to tiny changes in images, and it has higher accuracy of tamper localization and good capability of the tamper recovery.  相似文献   

14.
图像的自嵌入及窜改的检测和恢复算法   总被引:30,自引:2,他引:30       下载免费PDF全文
张鸿宾  杨成 《电子学报》2004,32(2):196-199
提出一种图像自嵌入的水印算法.它将一个图像的主要内容嵌入该图像自身之中.该算法不仅能检测和定位对图像的窜改,而且能恢复被损坏的图像内容.算法的基本思路是把一个图像块的主要DCT系数经过量化、编码和加密后,嵌入另一个图像块的最低位之中.依据大量图像DCT量化系数的统计性质,本文仔细设计了主要DCT系数的编码表,使它既能满足水印负荷的要求,又能保证图像恢复时有较好的质量.分析了水印嵌入块和原图像块间偏移值应该满足的条件和设计方法.该算法为单向、不可逆的,可以抵抗可能的伪造攻击.  相似文献   

15.
为保护数字图像版权和检测恶意篡改,实现高精度篡改定位,在充分挖掘图像特性的基础上,设计一种基于自适应半脆弱水印技术的图像篡改检测算法。算法根据感知特性将水印自适应嵌入到图像LSBs中,利用多数原则恢复水印信号,结合数学形态学滤波进行篡改检测与定位。仿真实验证实了该方案的有效性,在抵抗通常的内容保持攻击操作的同时,能实现精准篡改检测与定位。  相似文献   

16.
In this paper, we propose a novel fragile watermarking scheme with content restoration capability. Authentication-bits are produced using the image hashing method with a folding operation. The low-frequency component of the nonsubsampled contourlet transform (NSCT) coefficients is used to encode the restoration-bits for each block by the adaptive bit allocation mechanism. During the bit allocation, all the blocks are categorized into different types according to their degree of smoothness, and, complex blocks, which are deemed to have higher priority than smooth blocks, are allocated more bits. Two algorithms are utilized to adjust the block classification and the binary representations in order to guarantee that the numbers of the self-embedding authentication-bits and restoration-bits are exactly suitable for 1-LSB embedding capacity. On the receiver side, the extracted authentication-bits and the decoded restoration-bits are used to localize and restore the tampered blocks, respectively. Due to the low embedding volume, the visual quality of the watermarked image is satisfactory. Experimental results also show that the proposed scheme provides high restoration quality.  相似文献   

17.
图像拼接是最常用的图像篡改操作之一,针对篡改图像噪声水平不一致性的现象,本文提出了一种基于统计噪声水平分析的图像拼接检测方法。首先,将检测图像分割成大小相同的非重叠图像块,然后,利用一种非参数估计算法来估计每个图像块的噪声值,并且采取聚类法对图像块的噪声值进行聚类,聚类结果分为可疑部分和非可疑部分两大类。最后,通过一个由粗到细的两阶段策略对篡改区域进行定位。哥伦比亚未压缩图像拼接检测评估图像库的实验结果表明,本文方法能够准确地估计图像块的噪声和定位出拼接区域,性能优于现有方法。  相似文献   

18.
This paper proposes a novel Gauss–Jordan elimination-based image tampering detection and self-recovery scheme, aiming at dealing with the problem of malicious tampering on digital images. To deal with the copy–move tampering which is challenging because the tampered region may contain the watermark information, we propose the Improved Check Bits Generation algorithm during watermark generation, to generate the check bits for tampering detection. Meanwhile, the recovery bits are reconstructed according to the fundamental of Gauss–Jordan Elimination, for purpose of image contents self-recovery. To improve the accuracy of detection and the quality of recovered images, we propose the Morphological Processing-Based Enhancement method and the Edge Extension preprocessing respectively during and after the tampering detection Finally, the Gauss–JordanElimination-Based Self-Recovery method is proposed to recover the damaged content mathematically on basis of the detected results. By employing the unchanged recovery bits which are embedded in the non-tampered region, the failure in recovery caused by the damaged recovery bits can be completely avoided. A large number of experiments have been conducted to show the very good performance of the proposed scheme. The precision, recall, and F1 score are calculated for evaluation of tampering detection, while the PSNR values are calculated for evaluation of image recovery. The comparisons with the state-of-the-art methods show that the proposed scheme shows the superiorities in terms of imperceptibility, security and recovery capability. The experimental result indicates the average PSNR of recovered image is 44.415dB.  相似文献   

19.
关键字符双重验证的Word文档脆弱水印方法   总被引:1,自引:1,他引:0  
为提高文档水印方法的篡改检测性能和安全性,设 计一种关键字符双重验证的Word文档脆弱 水印方法。首先记录文档中的关键字符和非关键字符,将每个字符生成的8比特水印信息 嵌入自身字符 的特殊属性里以抵抗一般篡改;为提高检测关键字符篡改的能力,将关键字符生成的8比 特水印信息作 为第二重水印信息嵌入到非关键字符的其它特殊属性里以抵抗拼贴攻击,从而实现对关键字 符的双重验证; 通过统计实验,讨论了水印嵌入在字符特殊属性中对文档大小的影响。实验结果表明,在字 符的特殊属性 中嵌入水印能增加含水印文档的安全性,在非关键字符中嵌入双重水印能提高算法的篡改检 测性能。  相似文献   

20.
This paper presents a novel semi-fragile watermarking scheme for image content authentication with tampering localization. The proposed scheme uses a non-traditional quantization method to modify one chosen approximation coefficient of each non-overlapping block to ensure its robustness against incidental attacks and fragileness against malicious attacks. The image content authentication starts with extracting watermark using the parity of quantization results from the probe image, where the round operation is used to ensure the semi-fragile property. It then constructs a binary error map and computes two authentication measures with M1 measuring the overall similarity between extracted and embedded watermarks and M2 measuring the overall clustering level of tampered error pixels. These two measures are further integrated to confirm the image content and localize the possible tampered areas. Our experimental results show that our scheme outperforms four peer schemes and is capable of identifying intentional tampering and incidental modification, and localizing tampered regions.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号