首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
一种基于HVS的图像易碎水印   总被引:6,自引:0,他引:6  
胡军全  黄继武  黄达人 《电子学报》2003,31(7):1057-1061
作为多媒体认证和篡改检测的一种新技术,易碎水印正得到越来越多的关注.基于小波变换,结合量化调制过程,本文提出了一个易碎水印算法.该算法具有以下特点:(1)构造水印金字塔,便于实现水印的多分辨率检测;(2)结合视觉特性量化调制,尽可能减小视觉失真;(3)结合图像融合技术的多分辨率检测,使检测结果更准确;(4)抵抗一定程度的JPEG有损压缩.为了实现篡改的检测,本文给出了一个攻击判别方案,以区分恶意攻击和偶然攻击.实验表明,嵌入的水印在脆弱性和鲁棒性上达到了较好的统一,能够抵抗一定程度的压缩而不影响篡改检测的精确性.  相似文献   

2.
基于小波变换,结合量化调制过程,论文提出了一种易损水印算法。该算法具有构造分层水印,便于实现水印的多分辨率嵌入;结合视觉特性量化调制,尽可能减小视觉失真;结合图像融合技术的多分辨率检测,使检测结果更准确;以技抵抗一定程度的JPEG有损压缩等特点。实验表明,嵌入的水印在易损性和鲁棒性上达到了较好的统一,能够抵抗一定程度的压缩而不影响篡改检测的精确性。  相似文献   

3.
用于图像篡改定位和恢复的分层半脆弱数字水印算法   总被引:1,自引:0,他引:1  
刘泉  江雪梅 《通信学报》2007,28(7):104-110
设计并实现了一种基于分层的半脆弱数字水印算法,用于图像内容完整性认证,篡改定位和恢复。在嵌入方,将水印信息嵌入到原始图像所有像素的2bit最低有效比特,其中认证水印由奇偶校验码和块与子块之间灰度平均值的比较组成;恢复水印为环面自同构映射块的平均灰度值。在检测方,采用分层思想,分3层对水印进行篡改定位和恢复。实验结果表明,该算法对局部发生的篡改可以有效地检测,精确定位并进行内容恢复,同时能够有效的抵抗矢量量化攻击。  相似文献   

4.
Recover the tampered image based on VQ indexing   总被引:1,自引:0,他引:1  
In this paper, a tampered image recovery scheme is proposed by creating an index table of the original image via vector quantization (VQ) and embedding it into the original image as a basis for recovery. In order to complete the goal of image authentication and recovery, Wong's watermarking scheme [P.W. Wong, N. Memon, Secret an public key image watermarking schemes for image authentication and ownership verification, IEEE Trans. Image Process 10 (10) (2001) 1593–1601] is employed to perform tamper detection. Wong's watermarking scheme can be used to accurately locate tampered regions. If an image has been tampered, the index table can be used to recover the tampered regions. The experimental results indicate that our scheme has the higher probability of image recovery. Besides, compared with Lee and Lin's [Dual watermark for image tamper detection and recovery, Pattern Recognition 41 (2008) 3497–3506] scheme, our scheme provides not only a better quality of recovered images but also better results at edge regions.  相似文献   

5.
叶天语 《通信学报》2013,34(3):148-156
利用子块区域分割思想和自嵌入技术提出了一种只利用攻击图像就能进行版权鉴别和内容认证的全盲多功能图像水印算法。将原始图像分割成不重叠的子块,对每个子块进行离散余弦变换,将每个子块离散余弦变换矩阵分成为区域1和区域2两部分,然后对区域1进行奇异值分解,通过判断奇异值均值的最高位数字奇偶性产生特征水印,然后通过调整区域2的2个离散余弦变换交流系数大小自嵌入特征水印,最后对每个子块进行逆离散余弦变换得到含水印图像。算法通过结合将区域1产生的特征水印自嵌入区域2和在区域2盲提取认证水印实现全盲检测和多功能。实验结果表明,算法既能实现版权保护又能实现内容认证,而且还具有区分恶意篡改和无意篡改的能力。  相似文献   

6.
基于纠错编码的彩色图像双水印算法研究   总被引:1,自引:0,他引:1  
提出一种基于纠错编码的彩色图像双水印算法,用于版权保护和图像篡改定位与恢复。算法在图像的红色分量的频域中嵌入鲁棒水印,在绿色分量的空域中嵌入认证水印。其中,认证水印为从三个颜色分量的DCT系数中提取的二进制编码序列。为提高认证水印的安全性和定位能力.对认证水印进行纠错编码,并利用M序列对认证水印进行加密。仿真实验表明,认证水印能够检测篡改并进行恢复,版权保护水印具有较好的鲁棒性。  相似文献   

7.
This paper proposes a self-embedding watermarking scheme for digital images. It exploits a digital halftoning technique to transform the host image to a halftone image, in which the content features of the host image are well preserved. This halftone image is utilized as an approximate or compressed version of the host image and further adopted as a watermark. Unlike most available self-embedding watermarking techniques, in which watermark embedding, tamper detection and image recovery are block-wise-based, our scheme is a pixel-wise and block-wise composite scheme. That is, the watermark is pixel-wise permuted and embedded in the least-significant-bit plane of the host image, while in tamper detection and image recovery, a block-wise strategy is employed. This pixel-wise and block-wise complementary mechanism can overcome a common disadvantage of previous block-wise-based self-embedding watermarking techniques. Our scheme can be used for tamper detection and alteration location. Moreover, the tampered area can be approximately recovered using the extracted watermark. Experimental results demonstrate the effectiveness of the proposed scheme.  相似文献   

8.
Multiscale fragile watermarking based on the Gaussian mixture model.   总被引:5,自引:0,他引:5  
In this paper, a new multiscale fragile watermarking scheme based on the Gaussian mixture model (GMM) is presented. First, a GMM is developed to describe the statistical characteristics of images in the wavelet domain and an expectation-maximization algorithm is employed to identify GMM model parameters. With wavelet multiscale subspaces being divided into watermarking blocks, the GMM model parameters of different watermarking blocks are adjusted to form certain relationships, which are employed for the presented new fragile watermarking scheme for authentication. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. A secret embedding key is designed to securely embed the fragile watermarks so that the new method is robust to counterfeiting, even when the malicious attackers are fully aware of the watermark embedding algorithm. It is shown that the presented new method can securely embed a message bit stream, such as personal signatures or copyright logos, into a host image as fragile watermarks. Compared with conventional fragile watermark techniques, this new statistical model based method modifies only a small amount of image data such that the distortion on the host image is imperceptible. Meanwhile, with the embedded message bits spreading over the entire image area through the statistical model, the new method can detect and localize image tampering. Besides, the new multiscale implementation of fragile watermarks based on the presented method can help distinguish some normal image operations such as JPEG compression from malicious image attacks and, thus, can be used for semi-fragile watermarking.  相似文献   

9.
基于混沌置乱的分块自嵌入水印算法   总被引:18,自引:0,他引:18  
针对分块自嵌入水印算法的安全性和不能有效判断图像篡改块的问题,提出一种基于混沌置乱的分块自嵌入算法.该算法将由图像块生成的水印按空间位置生成二值水印图像,利用混沌序列对其置乱加密后嵌入到图像的最低位,认证时根据设定的阈值能有效定位图像内容被篡改的图像块.实验仿真和理论分析表明,该算法在保持原算法篡改恢复效果的基础上,无论是否有水印被改变,均能有效判断图像内容被篡改的图像块,且具有更高的安全性.  相似文献   

10.
In this paper, on the basis of the theories and methods of Watson’s perceptual model and rational dither modulation (RDM), a hybrid quantization-based watermarking in the discrete wavelet transform (DWT) and discrete cosine transform (DCT) domains is studied. In the design of the quantization-based watermarking, quantization step-size plays an important role in many watermarking algorithms. RDM at both the embedder and decoder adopts a gain-invariant adaptive quantization step-size. Therefore, we investigated combining the modified Watson’s perceptual model with RDM. Its improved robustness is due to the embedding in the high entropy region of low-frequency sub-band image and adaptive control of its quantization step-size. The Euclidean distance decoder is used to extract the watermark data. The performance of the proposed scheme is analytically calculated and verified by simulation. Experimental results confirm the imperceptibility of the proposed watermarking and its higher robustness against attacks compared to alternative watermarking methods in the literature.  相似文献   

11.
This paper proposes an approach for the combined image authentication and compression of color images by making use of a digital watermarking and data hiding framework. The digital watermark is comprised of two components: a soft-authenticator watermark for authentication and tamper assessment of the given image, and a chrominance watermark employed to improve the efficiency of compression. The multipurpose watermark is designed by exploiting the orthogonality of various domains used for authentication, color decomposition and watermark insertion. The approach is implemented as a DCT-DWT dual domain algorithm and is applied for the protection and compression of cultural heritage imagery. Analysis is provided to characterize the behavior of the scheme under ideal conditions. Simulations and comparisons of the proposed approach with state-of-the-art existing work demonstrate the potential of the overall scheme.  相似文献   

12.
Fragile digital watermarking has been applied for authentication and alteration detection in images. Utilizing the cosine and Hartley transforms over finite fields, a new transform domain fragile watermarking scheme is introduced. A watermark is embedded into a host image via a blockwise application of two-dimensional finite field cosine or Hartley transforms. Additionally, the considered finite field transforms are adjusted to be number theoretic transforms, appropriate for error-free calculation. The employed technique can provide invisible fragile watermarking for authentication systems with tamper location capability. It is shown that the choice of the finite field characteristic is pivotal to obtain perceptually invisible watermarked images. It is also shown that the generated watermarked images can be used as publicly available signature data for authentication purposes.  相似文献   

13.
This paper presents a fragile watermarking scheme for tamper localization using Singular Value Decomposition (SVD) and logistic map. The proposed scheme divides the image into blocks of size 2 × 2 pixels and generates an 8-bit watermark from each block. The watermark is computed by permuting the six Most Significant Bits (MSBs) of each pixel in the block using the logistic map, followed by SVD. To secure, the watermark thus generated is further encrypted using the logistic map. This encrypted watermark is embedded into 2 Least Significant Bits (LSBs) of each pixel to enable tamper detection and localization. The experimental results demonstrate that the proposed scheme can precisely locate tampered regions under copy-paste, content removal, text addition, noise addition, vector quantization, collage, content only, and constant feature attacks. Tamper localization accuracy is better or comparable to the state-of-the-art tamper localization algorithms.  相似文献   

14.
In 2007, Wang-Chen proposed a majority-voting based self-recovery watermarking scheme, in which the additional authentication watermark of each block was embedded in the less significant bits and used to examine the authenticity of the same block. In this paper we examine the security of the Wang-Chen self-recovery watermarking scheme and show that it is vulnerable to the proposed XOR-equivalent attack. Specifically, given a watermarked image, one can forge the authentication watermark it contains into another image by the proposed XOR-equivalent attack. Experimental results are given to support our conclusions and demonstrate that our attack is successful in forging watermarked image. This implies that it is insecure to detect the validity of image block only by the additive authentication watermark embedded in the same block in self-recovery watermarking techniques.  相似文献   

15.
李文  李宏昌 《电子科技》2012,25(3):8-10
引入虚拟水印的概念,结合自恢复技术,小波变换等水印技术,提出了一种新的数字图像双水印嵌入算法。文中将原图像二次小波变换后的低频分量LL2作为第一重水印,将数字产品公司标识作为第二重水印,同时利用双水印技术所特有的属性,在两重水印之间构筑函数关系,将其结合在一起。实验结果表明,该算法简单高效,可同时具有水印恢复、版权认证和篡改区定位恢复等多方面的功能。  相似文献   

16.
Two watermarks are embedded into the original image. One is the authentication watermark generated by secret key, which is embedded into the sub-LSB (Least Significant Bit) of the original image for tamper localization; the other is the recovery watermark for tamper recovering. The original image is divided into 8 x 8 blocks and each block is transformed by Discrete Cosine Transform (DCT). For each block, some lower frequency DCT coefficients are chosen to be quantized and binary encoded so as to gain the recovery watermark of each block, and the recovery watermark is embedded into the LSB of another block by chaos encryption and authentication chain technology. After the two watermarks being detected, the location of any minute changes in image can be detected, and the tampered image data can be recovered effectively. In the paper, the number of coefficients and their bit lengths are carefully chosen in order to satisfy with the payload of each block and gain the capability of self-recovering. The proposed algorithm can well resist against possible forged attacks. Experimental results show that the watermark generated by the proposed algorithm is sensitive to tiny changes in images, and it has higher accuracy of tamper localization and good capability of the tamper recovery.  相似文献   

17.
This paper presents an efficient, robust, and imperceptible video watermarking technique based on singular value decomposition (SVD) performed in the Discrete Wavelet Transform (DWT) domain. In the proposed DWT-based SVD video watermarking method, the video frames are transformed with the DWT using two resolution levels. The high frequency band HH and the middle frequency bands LH and HL are SVD transformed and the watermark is hidden in them. The proposed DWT-based SVD video watermarking method is characterized by two improvements: (1) a cascade of two powerful mathematical transforms; the Discrete Wavelet Transform (DWT)-based SVD using additive method, and (2) an error correction code is applied and embeds the watermark with spatial and temporal redundancy. The aim of these improvements is to increase robustness against attacks based on video characteristics and the robustness against image processing attacks, realize high security level, protect the watermark against bit errors and obtain good perceptual quality. The proposed DWT-based SVD video watermarking method has been tested in the presence of video and image processing attacks and experimental results proved that the proposed DWT-based SVD video watermarking method survives attacks based on video characteristics and image processing techniques.  相似文献   

18.
A content authentication technique based on JPEG-to-JPEG watermarking is proposed in this paper. In this technique, each 8x8 block in a JPEG compressed image is first processed by entropy decoding, and then the quantized discrete cosine transform (DCT) is applied to generate DCT coefficients: one DC coefficient and 63 AC coefficients in frequency coefficients. The DCT AC coefficients are used to form zero planes in which the watermark is embedded by a chaotic map. In this way, the watermark information is embedded into JPEG compressed domain, and the output watermarked image is still a JPEG format. The proposed method is especially applicable to content authentication of JPEG image since the quantized coefficients are modified for embedding the watermark and the chaotic system possesses an important property with the high sensitivity on initial values. Experimental results show that the tamper regions are localized accurately when the watermarked JPEG image is maliciously tampered.  相似文献   

19.
A content authentication technique based on JPEG-to-JPEG watermarking is proposed in this paper. In this technique, each 88 block in a JPEG compressed image is first processed by entropy decoding, and then the quantized discrete cosine transform (DCT) is applied to generate DCT coefficients: one DC coefficient and 63 AC coefficients in frequency coefficients. The DCT AC coefficients are used to form zero planes in which the watermark is embedded by a chaotic map. In this way, the watermark information is embedded into JPEG compressed domain, and the output watermarked image is still a JPEG format. The proposed method is especially applicable to content authentication of JPEG image since the quantized coefficients are modified for embedding the watermark and the chaotic system possesses an important property with the high sensitivity on initial values. Experimental results show that the tamper regions are localized accurately when the watermarked JPEG image is maliciously tampered.  相似文献   

20.
Fragile watermarking scheme for image authentication   总被引:5,自引:0,他引:5  
A simple fragile watermarking scheme for image authentication is proposed. The insertion of a binary watermark is accomplished by replacing the least significant bit of the host image with a random binary image obtained by random permutations and suitable XOR operations among bitplanes. The proposed scheme is secure, fast, and capable of detecting and localising modification, and is immune of the well-known quantisation attack.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号