共查询到17条相似文献,搜索用时 156 毫秒
1.
针对目前脆弱水印算法大多无法区分水印被篡改还是内容被篡改的问题,本文基于多重水印技术提出了一种能区分水印或内容篡改的脆弱水印算法.该算法由子块的主要DCT系数生成恢复水印,将其嵌入到偏移子块的次低位;待恢复水印嵌入后,将恢复水印作为子块内容的一部分生成认证水印,将其嵌入到子块的最低位.理论分析和实验结果表明:本文算法在抵抗量化攻击的同时,不仅能准确定位图像内容被篡改的位置,而且能区分是水印被篡改还是图像内容被篡改,并且在一定条件下可以对内容被篡改的区域进行恢复. 相似文献
2.
提出了一种新颖的用于图像认证的半易损水印算法,该算法提取图像在小波低频域的特征信息生成两个水印,一个水印主要用于篡改定位,另一个水印主要用于区分图像所经历的偶然修改和恶意篡改,从而提供了一种有效的图像选择认证机制.此外,该算法的水印生成和嵌入都在图像本身中进行,图像认证时不需要原始图像和任何有关水印的附加信息,从而提高了水印的安全性和保密性.实验结果表明,此算法能很好地将对图像内容的恶意篡改和偶然修改区分开来,并可以给出内容篡改的位置. 相似文献
3.
4.
JPEG是一种常见的图像格式,在JPEG图像中进行准确的篡改定位具有重要意义. 本文提出一种新的JPEG图像脆弱水印方案,将每个小块主要内容的Hash比特重新分组,并将每组的模2和作为水印信息. 也就是说每一个小块都对应多个水印比特,每个水印比特也对应多个小块. 载体图像的每个小块中仅嵌入于1比特水印,保证了良好的隐蔽性. 认证时依据图像内容与水印比特的整体匹配情况估计篡改率,再根据每个小块对应的水印信息的被破坏程度判别该小块是否曾被篡改. 理论分析和实验结果标明该方法可以在篡改区域小于1%的情况下准确地找到所有篡改小块. 相似文献
5.
基于混沌置乱的分块自嵌入水印算法 总被引:18,自引:0,他引:18
针对分块自嵌入水印算法的安全性和不能有效判断图像篡改块的问题,提出一种基于混沌置乱的分块自嵌入算法.该算法将由图像块生成的水印按空间位置生成二值水印图像,利用混沌序列对其置乱加密后嵌入到图像的最低位,认证时根据设定的阈值能有效定位图像内容被篡改的图像块.实验仿真和理论分析表明,该算法在保持原算法篡改恢复效果的基础上,无论是否有水印被改变,均能有效判断图像内容被篡改的图像块,且具有更高的安全性. 相似文献
6.
7.
8.
基于计算全息图编码的水印技术是一种脆弱水印技术,由于其极容易被破坏的特性,非常适合用于图像内容的认证,在图像的认证鉴定的时候,通过比较提取的水印和初始水印的相关性鉴定图像内容的完整性,可以有效防止篡改和对修改图像的欺骗性应用。同时,图像的内容被篡改时,水印信息应该提供图像被伪造的证据。利用计算全息图作为水印,嵌入的水印可能被使用傅里叶变换恢复,进而,宿主图像也能被利用同样的全息模式进行篡改和嵌入水印,为了避免这种弊端,还需要引入加密方法。 相似文献
9.
提出了一种医学图像脆弱水印算法.该算法对原始医学图像感兴趣区域进行整数小波压缩,提取其低频子带LL,生成水印标志;对原始医学图像和水印图像分块处理,且对其做行列RH再进行量化处理变换,实现水印的嵌入.实验结果表明,该算法对于嵌入水印后的图像具有良好的透明性,可检测出1bit篡改,对图像篡改具有很高的敏感性和定位能力. 相似文献
10.
11.
A content authentication technique based on JPEG-to-JPEG watermarking is proposed in this paper. In this technique, each 8x8 block in a JPEG compressed image is first processed by entropy decoding, and then the quantized discrete cosine transform (DCT) is applied to generate DCT coefficients: one DC coefficient and 63 AC coefficients in frequency coefficients. The DCT AC coefficients are used to form zero planes in which the watermark is embedded by a chaotic map. In this way, the watermark information is embedded into JPEG compressed domain, and the output watermarked image is still a JPEG format. The proposed method is especially applicable to content authentication of JPEG image since the quantized coefficients are modified for embedding the watermark and the chaotic system possesses an important property with the high sensitivity on initial values. Experimental results show that the tamper regions are localized accurately when the watermarked JPEG image is maliciously tampered. 相似文献
12.
13.
基于Logistic混沌映射的DCT域脆弱数字水印算法 总被引:16,自引:0,他引:16
本文提出了一种新的混沌脆弱数字水印算法.利用混沌系统对初值的极端敏感性和块不相关水印技术,将图像DCT次高频系数和水印密钥合成为logistic混沌映射初值从而生成水印,再将水印嵌入到图像DCT的高频系数中得到水印图像.利用图像DCT系数之间的关系,实现了水印的盲检测.实验结果表明,该算法可以精确检测到对水印图像的一个像数点的改变,并具有良好的定位篡改能力. 相似文献
14.
A content authentication technique based on JPEG-to-JPEG watermarking is proposed in this paper. In this technique, each 88 block in a JPEG compressed image is first processed by entropy decoding, and then the quantized discrete cosine transform (DCT) is applied to generate DCT coefficients: one DC coefficient and 63 AC coefficients in frequency coefficients. The DCT AC coefficients are used to form zero planes in which the watermark is embedded by a chaotic map. In this way, the watermark information is embedded into JPEG compressed domain, and the output watermarked image is still a JPEG format. The proposed method is especially applicable to content authentication of JPEG image since the quantized coefficients are modified for embedding the watermark and the chaotic system possesses an important property with the high sensitivity on initial values. Experimental results show that the tamper regions are localized accurately when the watermarked JPEG image is maliciously tampered. 相似文献
15.
Contourlet-based image adaptive watermarking 总被引:2,自引:0,他引:2
Haohao Song Songyu Yu Xiaokang Yang Li Song Chen Wang 《Signal Processing: Image Communication》2008,23(3):162-178
In the contourlet transform (CT), the Laplacian pyramid (LP) decomposes an image into a low-frequency (LF) subband and a high-frequency (HF) subband. The LF subband is created by filtering the original image with 2-D low-pass filter. However, the HF subband is created by subtracting the synthesized LF subband from the original image but not by 2-D high-pass filtering the original image. In this paper, we propose a contourlet-based image adaptive watermarking (CIAW) scheme, in which the watermark is embedded into the contourlet coefficients of the largest detail subbands of the image. The transform structure of the LP makes the embedded watermark spread out into all subbands likely in which the LF subbands are included when we reconstruct the watermarked image based on the watermarked contourlet coefficients. Since both the LF subbands and the HF subbands contain watermarking components, our watermarking scheme is expected to be robust against both the LF image processing and the HF image processing attacks. The corresponding watermarking detection algorithm is proposed to decide whether the watermark is present or not by exploiting the unique transform structure of LP. With the new proposed concept of spread watermark, the watermark is detected by computing the correlation between the spread watermark and the watermarked image in all contourlet subbands fully. The proposed CIAW scheme is particularly superior to the conventional watermarking schemes when the watermarked image is attacked by some image processing methods, which destroy the HF subbands, thanks to the watermarking components preserved in the LF subbands. Experimental results show the validity of CIAW in terms of both the watermarking invisibility and the watermarking robustness. In addition, the comparison experiments prove the high-efficiency of CIAW again. 相似文献
16.
17.
本文提出一种适用于JPEG图像认证的脆性盲水印算法,采用DCT整型变换避免舍入误差产生的误报,水印由DCT域checksum算法生成,并在水平、垂直二个方向检测。实验表明,水印图像具有良好的主观质量,并可准确定位篡改区域。 相似文献