首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
一种用于彩色图像认证的脆弱性数字水印方法   总被引:1,自引:0,他引:1       下载免费PDF全文
针对彩色图像认证问题,提出一种基于混合视觉双稳态置乱系统的脆弱性数字水印算法。该算法将图像分块,由各块亮度值确定混沌序列长度及嵌入深度,将各点位置信息、最高有效位颜色信息,以及自定义的密钥作为混沌系统的初值,各块不同深度地将水印序列嵌入各点R,G,B分量中。检测定位时比较提取的水印和生成的水印,直接得到差异图像。理论分析及实验结果证明,使用该方法嵌入水印后图像质量高,且篡改定位能力强。  相似文献   

2.
彩色图像脆弱水印自嵌入认证算法   总被引:3,自引:2,他引:3  
彭玉忠  陈勤  周律 《计算机工程与设计》2004,25(12):2208-2209,2212
脆弱水印是图像认证的一种有效手段,基于图像内容的脆弱水印可通过水印重建被修改的图像。通过在图像最低位嵌入基于图像内容的水印,提出了一种彩色图像脆弱水印自嵌入认证算法,并进行了大量实验。实验结果表明,该算法具有较强的抗图像剪切及涂改等攻击能力。  相似文献   

3.
基于图像特征和公钥密码系统的易损水印算法   总被引:2,自引:0,他引:2  
提出一种基于图像特征和公钥密码系统的易损水印算法,在图像认证中能够定位图像被篡改的位置。水印算法根据图像特征和私钥信息,将用于完整性验证和局部篡改检测的图标嵌入到图像中。水印提取过程中使用与嵌入过程中私钥相对应的公钥提取水印信息。该算法不仅能解决现有易损水印算法存在的安全问题,而且在不需要交换密钥的情况下允许水印的公共检测,可用于数码相机、互联网图像的真实性认证。最后,通过理论分析和实验论证该算法的有效性。  相似文献   

4.
A fragile watermarking algorithm for image authentication and tamper detection is proposed. It uses a gradient image and its structure to achieve localization and security requirements. It provides superior localization with greater security against many attacks including vector quantization attack.  相似文献   

5.
针对图像篡改取证定位问题,提出利用混沌序列和图像QR分解相结合的脆弱水印算法判定图像篡改情况。该算法选取QR分解实现图像分解,图像分解后嵌入水印,同时利用混沌系统对其加密以增强水印的安全性。实验结果发现,所提算法不仅提高了定位型水印算法的安全性,而且还可以估计被篡改区域的篡改强度。  相似文献   

6.
以DeepFake为代表的AI换脸技术为人们的生活带来诸多负面影响,现有的人脸窜改检测算法鲁棒性较弱,缺乏可解释性。针对这一问题提出一种离散小波变换(DWT)、离散余弦变换(DCT)、奇异值分解(SVD)相结合的人脸频域水印算法(face frequency-domain watermarking,Face-FW),通过提取图像人脸特征并压缩加密生成二值水印嵌入图像频域以达到检测人脸窜改、认证原人脸归属人的目的,同时提出动态特征融合算法以降低Face-FW适用范围。选取人脸图像标准数据集CASIA-FaceV5和IMDB-WIKI部分图像嵌入水印并窜改人脸生成测试集CASIA-DF和IMDB-DF。实验结果表明,Face-FW在两个测试集上分别有97.6%和96.9%的检测窜改成功率,优于对比方法,并且算法能够根据非特征融合水印提供人脸认证,具有较强的鲁棒性和可解释性。  相似文献   

7.
用于图像认证的数字水印技术综述   总被引:5,自引:0,他引:5  
随着网络技术和媒体信息数字化的飞速发展,用于图像认证的数字水印技术成为目前研究的热点。主要阐述了当前用于认证的数字图像水印技术的特征、认证系统框架,详细讨论了脆弱水印和半脆弱水印的算法和研究现状,并对认证数字水印技术的未来发展方向进行了展望。  相似文献   

8.
一种新的JPEG图像认证半脆弱水印算法   总被引:3,自引:0,他引:3  
田冰  王伟 《计算机应用》2007,27(1):132-134
提出了一种用于JPEG图像认证的半脆弱数字水印算法,它根据JPEG图像压缩过程中的DCT系数的不变性原理进行水印生成和嵌入调制,并结合一种有效的算法隐性地考虑到所有非零DCT系数的符号、大小关系,在未增加水印信息嵌入强度的情况下,实现了图像应对变换域攻击的更有效保护。同时,在检测算法中加入对虚警区的判断,增加了对窜改区域定位的准确性。实验表明,该算法实现的水印有很好的视觉透明度,有效的承受JPEG压缩,同时对其他恶意篡改敏感并能够准确定位篡改位置。  相似文献   

9.
面向图像内容认证的半脆弱数字水印算法   总被引:1,自引:1,他引:1  
吕林涛  郝亮 《计算机应用》2010,30(5):1239-1242
提出一种半脆弱数字水印算法,用于确认图像内容的真实性和完整性。算法首先将缩放图像的边缘作为特征信息,并对特征信息进行混沌调制和私钥加密得到水印信息;然后结合人类视觉系统将水印信息嵌入到载体图像的小波域中;最后用户利用公钥从水印图像中提取特征信息,并与重建的特征信息进行匹配来实现认证。实验结果表明:该算法对常规操作具有免疫性,对恶意处理能够实现准确认证和篡改定位。  相似文献   

10.
Semi-fragile watermarking techniques aim at detecting malicious manipulations on an image, while allowing acceptable manipulations such as lossy compression. Although both of these manipulations are considered to be pixel value changes, semi-fragile watermarks should be sensitive to malicious manipulations but robust to the degradation introduced by lossy compression and other defined acceptable manipulations. In this paper, after studying the characteristics of both natural images and malicious manipulations, we propose two new semi-fragile authentication techniques robust against lossy compression, using random bias and nonuniform quantization, to improve the performance of the methods proposed by Lin and Chang.  相似文献   

11.
提出了一种用于图像内容认证的半脆弱水印算法。该算法利用小波变换模极大值提取图像边缘特征,并结合经混沌映射后的小波低频域特征信息生成两个水印。一个主要用于篡改定位,另一个主要用于检测图像的内容篡改。水印嵌入在小波变换的中频域中。水印提取和认证不需要原始水印信息,提高了水印安全性。实验表明,该算法能有效区分偶然失真和恶意篡改,并能定位出篡改发生的位置。  相似文献   

12.
Advances in three dimensional video is a strong stimulus for research in authentication of stereo image to avoid illegal modification. In this paper, a stereo image watermarking scheme is proposed for authentication with self-recovery capability using inter-view reference sharing. A mechanism of inter-view reference sharing in stereo image pairs is designed to reduce bits for recovery reference generation compared with independent references. Discrete wavelet transform coefficients are employed to generate the references, and two reference copies of each block embedded in two different mapping blocks are prepared for recover tamper. Moreover, detail information from high frequency coefficients is also embedded so as to improve the quality of tamper recovery. For the purpose of resisting collage attack and increasing the probability of tamper detection, disparities between pairs of matched blocks are checked to conduct tamper detection. Experimental results show that the proposed scheme can detect tampered blocks with the probabilities of more than 99 % after collage attack. When stereo images are cropped from 10 to 70 % with randomly tampering, they are recovered without losing main visual information and qualities of recovery are better than those of existing monocular image watermarking schemes extended to stereo images.  相似文献   

13.

Developing new watermarking approaches that consider special features of medical images become increasingly necessary. This paper proposes a new watermarking approach to ensure medical images authenticity, using MinEigen value features, chaotic sequence, and Quantization Index Modulation (QIM) in the spatial domain. The idea is to choose the 3?×?3 non overlapping blocks around MinEigen values points, then embed the watermark bits in these blocks using a novel blind way based on chaotic sequence and QIM. The proposed technique is purely blind and fast in terms of execution time. Experimental results demonstrate that the proposed approach is robust against all DICOM JPEG compression attacks while keeping high imperceptibility.

  相似文献   

14.
Tan  Lina  Hu  Kai  Zhou  Xinmin  Chen  Rongyuan  Jiang  Weijin 《Multimedia Tools and Applications》2019,78(10):13189-13211
Multimedia Tools and Applications - In this paper, a novel contour feature-based text image watermarking scheme against print and scan processes is proposed. We employ a mathematical multiplicative...  相似文献   

15.
实现版权保护和内容认证是数字水印的两个最主要功能,而现有同时实现这两个功能的数字水印方案并不完美。提出了结合人类视觉系统在图像的绿色分量中嵌入版权信息,实现版权保护,在蓝色分量中嵌入二值图像,实现内容认证。实验证明该方法透明性好,版权保护水印对JPEG压缩、高斯噪声等攻击抵抗力强,内容认证水印能有效地刻画攻击和定位篡改。  相似文献   

16.
This paper proposes a new reversible, imperceptible, semi fragile watermarking scheme for the authentication of digital fundus images that satisfies eight mandatory requirements. They are reversible, tamper detection, localization of modification, imperceptibility, capacity, complete blind detection, semi fragility and security. The proposed scheme generates the watermark dynamically using chaotic system and it is embedded using integer transform in reversible way. It precisely locates the tampering areas in the images and detects the watermark in complete blind approach without using the knowledge of both original image and watermark. It is found subjectively that 30,000 bits is the best size of the watermark for the proposed scheme to ensure the security and it is achieved for the PSNR value of around 60 dB at an average by retaining good level of imperceptibility. The proposed scheme is sensitive to the jittering, geometrical and filtering attacks and it modifies around 40 % of bits in the watermark for jittering and geometrical attacks, around 45 % of the bits in the watermark for filtering attacks to authenticate the images.  相似文献   

17.
In recent years, end users can easily capture digital images using several devices, such as smartphones, mobile devices and digital imaging cameras, allowing such images to be easily copied, manipulated, transmitted or format converted without any restrictions. This fact suggests the necessity to develop digital tools, such as digital watermarking, to solve the issues associated with copyright protection and ownership authentication of digital images. To claim the ownership of a digital image, we propose a camouflaged, unseen-visible watermarking technique based on luminance and texture properties in conjunction with an image enhancement criterion. The proposed method has some advantages over invisible and visible watermarking methodologies in terms of readability and imperceptibility of the watermark, respectively. The experimental results demonstrate that the proposed scheme is effective and applicable for digital images on a variety of topics, including natural scenes and man-made objects, both indoors and outdoors. A comparison with previously reported methods based on unseen-visible watermarking techniques is also provided.  相似文献   

18.
提出了一种针对彩色图像认证的半脆弱水印方案,彩色图像亮度信息通过线性变化处理后进行离散小波变换(DWT),对低频子图分块后进行奇异值分解(SVD),将置乱后的二值水印信息通过自适应量化嵌入到奇异值中实现内容认证。线性变化处理能改善由水印带来的对彩色图像明暗度的影响,同时利用一维Tent混沌的特性构成混沌二维置换网络,只需要一个初值,使算法更加简单。由实验结果表明该算法对JPEG压缩稳健,而对恶意操作敏感,同时水印提取是盲提取的。  相似文献   

19.
This paper presents an image authentication scheme that can verify the origin of the received image and, moreover, detect if the image has been tampered with. The underlying technologies of the scheme are digital watermarking and image secret sharing. Different from other schemes that use one piece of watermark information for one purpose and a different piece for another, the watermark information used for original verification is also utilized for tamper detection. Moreover, unlike other schemes that employ a fixed strength value for embedding watermarks, the scheme automatically utilizes two different strength values, one for flat regions and the other for complex regions. The experimental results prove that using different strength values increases the robustness of the watermark with little sacrifice in image quality. The results also demonstrate the effectiveness of the scheme for the origin verification as well as the tamper detection.  相似文献   

20.
Shi  Hui  Wang  Ying  Li  Yanni  Ren  Yonggong  Guo  Cheng 《Multimedia Tools and Applications》2021,80(16):24631-24667

Medical images are widely used in telemedicine, sharing and electronic transmission between hospitals. While enjoying convenience, medical images also face privacy disclosure, illegal copy and malicious tamper, etc. It is highly important to ensure privacy and integrity of medical images. Cogitating the above needs, a reversible medical image watermarking algorithm for privacy protection and integrity authentication is proposed. Firstly, the medical image is divided into the ROI (Region of Interest) and RONI (Region of Non-Interest) based on active contour model. Then, the proposed “Three-Dimensional Watermarks” are generated, including authentication watermark, restoration watermark and privacy watermark, which are produced by the novel Parallel Lattice Hash Function, the proposed Neighborhood Difference Method, and the proposed encryption algorithm, respectively. Moreover, “Double-Layer Reversible Embedding Strategy Based on Difference Expansion” is modified in ROI to improve embedding capacity, and “Histogram Modification Reversible Embedding Strategy of Difference Image” is modified to adaptively acquire four or more peak points, which is more flexible than common algorithms. Experimental results confirm the efficient of the proposed scheme, and demonstrate it not only realizes privacy protection, integrity authentication, reversibility, but also holds the characteristics of higher security, larger capacity and better restoration quality.

  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号