首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Self-recoverable fragile watermarking is meant for accurate tamper localization as well as image recovery with superior visual quality. However, most of the existing state of art approaches perform authentication and recovery on block basis owing to which the entire block is categorized as tampered in case of alteration of one or more pixels of it. This, results in staircase formation of tamper detected regions, hence lacking in accuracy. Furthermore, the visual quality of the recovered image also deteriorates as an approximate value is assigned to all the block pixels corresponding to the altered region. The proposed watermarking scheme performs both authentication and recovery pixelwise. The authentication of each pixel is done via multi level tamper detection(MLTD) through three authentication bits based on value, location and neighbourhood information. The domain for image recovery is chosen dynamically based on the content of the block, may it be in spatial domain for smooth blocks or frequency domain for the rough ones. This provides high accuracy in recovery. As the embedding of recovery information is done in the frequency domain, the imperceptibility of the watermarked image scheme remains high. Also, embedding of authentication information in the spatial domain maintains its fragile nature. Even for higher tampering ratios, the lost content is rebuilt with high peak signal to noise ratio(PSNR) of the recovered image. The probabilities of false rejection and false acceptance head towards the ideal value for most of the empirical analysis. Comparative study via metric evaluation of probability of false rejection (PFR), probability of false acceptance (PFA) and PSNR of recovered image for different standard test cover images demonstrate the efficacy of the proposed scheme over other existing state of art approaches. Further, the security of the proposed scheme remains high due to usage of multi-layered secret keys and chaos based random mapping handling worst tamper scenarios.  相似文献   

2.
为了提高可恢复水印的认证精度和恢复质量,降低虚警率,提出了一种窜改认证与内容恢复分离的自嵌入水印算法。该算法以2×2的图像块为认证单位,将认证水印与恢复水印分别嵌入到自身图像块和偏移图像块中,使认证虚警率降为0;同时提出一种基于线性函数和混沌映射的偏移值选取方案,使图像的恢复质量得到提高。理论分析和实验结果表明,该算法能在抵抗拼贴和量化攻击的同时,准确定位图像窜改并以较高的质量进行恢复。  相似文献   

3.
Dual watermarking implies embedding of robust as well as fragile watermarks into the same cover image. It facilitates integration of copyright protection and integrity verification into the same scheme. However, most of such existing state of art approaches either lacked the feature of tamper detection and original content recovery or provided an approximation using coarser block level approach. The proposed self recoverable dual watermarking scheme integrates all the aforementioned functionalities of copyright protection, tamper detection and recovery into one scheme. The scheme is independent of the order of embedding of robust and fragile watermarks as these are embedded in different regions of the cover image. It performs tamper detection and recovery, both at the pixel level. The scheme obtains recovery information for each 2×2 image block in just eight bits which are further encoded to only four bits via mapping table. This reduction in recovery bits allows efficient embedding of copyright information which is tested against comprehensive set of attacks. The scheme is found to be robust against noises, filtering, histogram equalization, rotation, jpeg compression, motion blur etc. Besides the normalized cross correlation value, the evaluation of the extracted copyright information is also being done using various objective error metrics based on mutual relation between pixels, their values and locations respectively. The imperceptibility and visual quality of the watermarked as well as recovered image is found to be satisfactorily high. Three major categories of images: natural, texture as well as satellite have been tested in the proposed scheme. Even minute alterations can be chalked out as the detection accuracy rate has been enumerated on pixel basis. The scheme can tolerate tampering ratios upto 50 percent though the visual quality of the recovered image deteriorates with increasing tampering ratio. Comparative results based on normalized cross correlation, probability of false acceptance, probability of false rejection and peak signal to noise ratio metrics validate the efficacy of the proposed scheme over other existing state of art approaches.  相似文献   

4.
The drawbacks of the current authentication watermarking schemes for JPEG images, which are inferior localization and the security flaws, are firstly analyzed in this paper. Then, two counterferiting attacks are conducted on them. To overcome these drawbacks, a new digital authentication watermarking scheme for JPEG images with superior localization and security is proposed. Moreover, the probabilities of tamper detection and false detection are deduced under region tampering and collage attack separately. For each image block, the proposed scheme keeps four middle frequency points fixed to embed the watermark, and utilizes the rest of the DCT coefficients to generate 4 bits of watermark information. During the embedding process, each watermark bit is embedded in another image block that is selected by its corresponding secret key. Since four blocks are randomly selected for the watermark embedding of each block, the non-deterministic dependence among the image blocks is established so as to resist collage attack completely. At the receiver, according to judging of the extracted 4 bits of watermark information and the corresponding 9-neighbourhood system, the proposed scheme could discriminate whether the image block is tampered or not. Owing to the diminishing of false detection and the holding of tamper detection, we improve the accuracy of localization in the authentication process. Theoretic analysis and simulation results have proved that the proposed algorithm not only has superior localization, but also enhances the systematic security obviously. Supported by the National Natural Science Foundation of China (Grant No. 60572027), the Program for New Century Excellent Talents in University of China (Grant No. NCET-05-0794), the Sichuan Youth Science & Technology Foundation (Grant No. 03ZQ026-033), the National Defense Pre-research Foundation of China (Grant No. 51430804QT2201) and the Application Basic Foundation of Sichuan Province, China (Grant No. 2006 J13-10)  相似文献   

5.
This paper proposes a self-embedding watermarking scheme that reduces the watermark payload significantly while maintaining good recovery quality and security. The embedded watermark contributes to the tamper detection and content recovery and is composed of only the compression codes of the image content. The compression codes with variable length are generated according to the roughness of the image. To improve the security, a chaos-based pseudorandom sequence generator is adopted to generate block-mapping sequence and encrypt compression codes. The proposed method takes into account the invisibility, recovery quality, and security using the flexible watermark payload, which preserves sufficient information of the image block with as few bits as possible. Experimental results demonstrate that the proposed scheme not only outperforms conventional self-embedding fragile watermarking algorithms in tamper detection and recovery, but also improve the security against the various counterfeiting attacks.  相似文献   

6.

In this paper, we propose a self-embedding fragile watermarking scheme using vector quantization (VQ) and index sharing. First, the principle contents of original image are compactly represented by a series of VQ indices. Then, after permutation, the binary bits of VQ indices are extended to generate reference-bits by a random binary matrix, which can make all reference-bits share the information of VQ index bits from different regions of the whole image. The image is embedded with watermark-bits including hash-bits for tampering localization and reference-bits for content recovery, and is transmitted to receiver side. Tampered regions in the received, suspicious image can be accurately located and then be recovered by VQ index reconstruction. Experimental results demonstrate that the proposed scheme can achieve successful content recovery for larger tampering rate and obtain better visual quality of recovered results than the reported schemes.

  相似文献   

7.

Authenticating the veracity and integrity of digital media content is the most important application of fragile watermarking technique. Recently, fragile watermarking schemes for digital audio signals are developed to not only detect the malicious falsification, but also recover the tampered audio content. However, they are fragile against synchronization counterfeiting attack, which greatly narrows the applicability of audio watermarking schemes. In this paper, a novel source coding scheme for authenticating audio signal based on set partitioning in hierarchical trees (SPIHT) encoding and chaotic dynamical system with capability of self-recovery and anti-synchronization counterfeiting attack is proposed. For self-recovery feature, the compressed version of audio signal generated by SPIHT source coding and protected against maliciously tampering by repeated coding is embedded into the original audio signal. Besides, for robustness against synchronization counterfeiting attack feature, based on the position and content of audio section, check bits are generated by Hash algorithm and chaotic sequence, and taken as part of fragile watermark. Simulation results show the self-embedding audio authentication scheme is recoverable with proper audio quality, and it has capability against synchronization counterfeiting attack.

  相似文献   

8.
Statistical fragile watermarking is capable of accurately locating tampered pixels and resisting the collage attack. However, the constraint of the tamper ratio may be too stringent. This paper proposes a neighborhood characteristic based detection model for statistical fragile watermarking to lift the constraints of the tampered area from 4% to 14% of the host image. The neighborhood characteristic is used to effectively decrease the probability of false rejection, while the low probability of false acceptance is guaranteed by selecting proper threshold. The tamper detection performance of the proposed detection model is analytical analyzed in the different conditions. Analytical and experimental results demonstrate that the neighborhood characteristic based detection model effectively reduce the total number of false decisions and detect the tampered pixels with high probability.  相似文献   

9.
Advances in three dimensional video is a strong stimulus for research in authentication of stereo image to avoid illegal modification. In this paper, a stereo image watermarking scheme is proposed for authentication with self-recovery capability using inter-view reference sharing. A mechanism of inter-view reference sharing in stereo image pairs is designed to reduce bits for recovery reference generation compared with independent references. Discrete wavelet transform coefficients are employed to generate the references, and two reference copies of each block embedded in two different mapping blocks are prepared for recover tamper. Moreover, detail information from high frequency coefficients is also embedded so as to improve the quality of tamper recovery. For the purpose of resisting collage attack and increasing the probability of tamper detection, disparities between pairs of matched blocks are checked to conduct tamper detection. Experimental results show that the proposed scheme can detect tampered blocks with the probabilities of more than 99 % after collage attack. When stereo images are cropped from 10 to 70 % with randomly tampering, they are recovered without losing main visual information and qualities of recovery are better than those of existing monocular image watermarking schemes extended to stereo images.  相似文献   

10.
基于邻域比较的JPEG 脆弱水印算法及性能分析   总被引:1,自引:0,他引:1  
霍耀冉  和红杰  陈帆 《软件学报》2012,23(9):2510-2521
为提高篡改检测性能和协调安全性与不可见性之间的矛盾,提出一种利用邻域比较判定图像块真实性的JPEG脆弱水印算法.该算法将原始图像分成8×8的图像块,基于图像块保护DCT系数生成的4比特水印基于密钥随机嵌入到其他4个图像块量化步长较小的DCT系数最低位.通过比较该图像块与相应4个水印嵌入块8邻域中不一致图像块个数来判定该图像块的真实性,推导给出一般篡改和拼贴攻击下算法的虚/漏警率,并利用统计实验对理论分析结果进行验证.理论分析和实验统计结果表明,通过比较图像块与其相应水印嵌入块8邻域中不一致图像块个数能够提高篡改检测性能,在量化步长较小DCT系数的最低位嵌入水印,解决了保护DCT系数个数与不可见性之间的矛盾.  相似文献   

11.
For traditional fragile watermarking schemes, isolated-block tamper which will destroy the minutiae of the fingerprint image can hardly be efficiently detected. In this paper, we propose a multi-block dependency based fragile watermarking scheme to overcome this shortcoming. The images are split into image blocks with size of 8 × 8; a 64-bit watermark is generated for each image block, and then equally partitioned into eight parts. Each part of the watermark is embedded into another image block which is selected by the corresponding secret key. Theoretic analysis and experimental results demonstrate that the proposed method not only can detect and localize the isolated-block tamper on fingerprint images with high detection probability and low false detection probability, but also enhances the systematic security obviously.  相似文献   

12.
自嵌入空域易损水印技术   总被引:3,自引:0,他引:3  
提出了一种新颖的自嵌入易损水印技术用于图像的完整性认证.提出引入基于图像的不确定性来克服其他算法中存在的安全缺陷.通过结合图像特征及相机密钥来产生基于图像的密钥来实现这一目的.相机密钥的惟一性解决了密钥的管理问题.算法把图像本身的信息作为水印嵌入,认证时可直接进行而不需要其他的水印参照信息.给出了性能分析,表明当嵌入的信息量较大时可以得到较高的篡改检测概率.分析了可能的攻击方式并给出了相应的攻击概率和检测概率.实验结果表明该算法是有效的.  相似文献   

13.
基于数字水印的图像认证技术   总被引:40,自引:1,他引:40  
吴金海  林福宗 《计算机学报》2004,27(9):1153-1161
伴随着数字水印技术的发展,用来解决数字图像的真实性问题的图像认证技术在近年来发展迅速.它主要包括两大部分:篡改检测与篡改定位.有两种技术手段可供它使用:数字签名和数字水印.该文详细讨论了在设计基于数字水印的图像认证算法时常见的若干关键问题,阐述了基于数字水印的精确认证和模糊认证算法各自的发展过程及其国内外现状,并指出了将来继续努力的方向.  相似文献   

14.
针对现有基于脆弱水印方法的不足,提出了一种新的结合混沌系统和脆弱水印的图像篡改检测算法。算法首先利用Arnold cat映射对原始图像进行k次置乱,然后选取置乱图像的最低有效位(LSB)平面作为水印嵌入位置,实际嵌入的水印由Logistic混沌映射产生的随机二进制序列与原始水印异或得到,通过LSB替换算法嵌入。最后对LSB替换后图像进行T-k次的Arnold cat映射得到水印图像。实验结果表明,混沌系统的引入大大增强了脆弱水印的安全性;另外,针对不同种类的攻击,算法具有良好的篡改检测和定位精确性。  相似文献   

15.
一种双重变换域图像半脆弱水印算法   总被引:3,自引:0,他引:3  
提出了一种DCT域和DWT域相结合的双重变换域半脆弱图像数字水印算法。充分利用了DWT变换提取图像特征方面的优势和DCT变换与JPEG压缩过程结合紧密的特点,使用自行设计的篡改估计函数,有效地实现了篡改检测和篡改定位,而且检测时不需要原始图像。使用密钥控制生成的混沌序列对水印进行加密处理,保证了系统的安全性。实验结果表明,该算法对于JPEG压缩等常规图像处理具有较强的鲁棒性,对于恶意篡改具有高度的敏感性,并且能够准确定位篡改发生的位置。  相似文献   

16.
基于RS码的二值图像认证及篡改定位算法   总被引:1,自引:1,他引:1  
用于二值图像内容认证和篡改定位的数字水印技术具有重要的实际价值,但却面临着二值图像像素单一、嵌入容量有限且分布不均匀等问题.根据纠错码--RS码的检错原理,提出一种用于二值图像内容认证和篡改定位的脆弱的数字水印算法.该算法利用二值图像的像素值来构造RS码,通过嵌入其校验码来实现对图像的内容认证和篡改定位,一方面保证了其优越的检错能力;另一方面,具有较低的嵌入负载.经实验证明,该算法能有效地检测出二值图像是否被篡改以及篡改发生的位置.此外,在水印信号的生成和提取过程中使用了密钥,确保了水印的安全.  相似文献   

17.
岳晓丽  徐江峰 《计算机应用》2010,30(11):3044-3045
为了提高自嵌入水印算法篡改定位的精确度和抗JPEG压缩性能,提出了一种用于图像篡改定位和恢复的双水印算法。该算法对图像进行一级小波分解,分别在高频和低频分量中嵌入认证水印和自恢复水印。仿真实验表明,该算法不仅能对篡改区域实现精确定位,而且具有较好的鲁棒性,可以抵抗一定的JPEG压缩。  相似文献   

18.
Chen  Fan  He  Hongjie  Huo  Yaoran 《Multimedia Tools and Applications》2017,76(7):9681-9712
Multimedia Tools and Applications - To improve the imperceptibility, security and tamper detection performance, a self-embedding watermarking scheme against JPEG compression is proposed in this...  相似文献   

19.
针对当前基于DCT(离散余弦变换)的自嵌入水印算法对恢复图像细节能力不足的问题,提出了一种基于小波域内嵌编码的自嵌入水印算法。小波变换克服了DCT在图像压缩中的局限性,SPIHT编码则利用了小波变换系数的特性,提高了压缩性能,在同等的嵌入容量时,使水印含有更多图像信息,从而在保证水印透明性的前提下,较传统方法提高了图像恢复质量。同时,鉴于SPIHT算法为内嵌编码,可根据需要调节水印大小从而改变嵌入强度,这也是传统方法所不具备的。Logistic和Cat双重混沌映射的应用,提高了水印安全性和水印检测的能力。最后,进行了算法性能测试实验,验证了本文算法的有效性。  相似文献   

20.
基于压缩传感和LDPC码的图像水印算法研究   总被引:1,自引:0,他引:1  
现有的数字水印算法在鲁棒性和篡改检测方面存在不足,提出一种新的水印算法.该算法通过对原始图像进行线性随机投影,得到的压缩测量值经过LDPC(Low Density Parity Check,低密度奇偶校验码)编码,以水印方式嵌入到原始图像中;篡改检测时,同样对篡改图像进行线性随机投影,得到的测量值作为边信息,对提取的水印进行LDPC译码.通过估计原始图像和篡改图像的压缩测量值,并求解一个l1范数问题,实现图像的篡改检测.仿真实验证明,该算法不仅具有较强的抗攻击能力,还具有较好的篡改检测能力.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号