首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In this paper, we present an efficient and effective digital watermarking method for image tamper detection and recovery. Our method is efficient as it only uses simple operations such as parity check and comparison between average intensities. It is effective because the detection is based on a hierarchical structure so that the accuracy of tamper localization can be ensured. That is, if a tampered block is not detected in level-1 inspection, it will be detected in level-2 or level-3 inspection with a probability of nearly 1. Our method is also very storage effective, as it only requires a secret key and a public chaotic mixing algorithm to recover a tampered image. The experimental results demonstrate that the precision of tamper detection and localization is 99.6% and 100% after level-2 and level-3 inspection, respectively. The tamper recovery rate is better than 93% for a less than half tampered image. As compared with the method in Celik et al. [IEEE Trans. Image Process. 11(6) (2002) 585], our method is not only as simple and as effective in tamper detection and localization, it also provides with the capability of tamper recovery by trading off the quality of the watermarked images about 5 dB.  相似文献   

2.
This paper presents a novel color image watermarking scheme for both tamper detection and tampered image recovery. The proposed scheme embeds watermarks consisting of the authentication data and the recovery data into image blocks. In the tamper detection process, instead of independently examining each embedded authentication data, we take all the authentication data embedded in an image into account and utilize a majority-voting technique to determine the legitimacy of image blocks. Experimental results show that the proposed scheme can effectively thwart collage attack and vector quantization (VQ) attack, while sustaining superior accuracy of tamper localization. Furthermore, the results reveal that the tampered images can be successfully recovered with acceptable visual quality.  相似文献   

3.
Multimedia Tools and Applications - Image watermarking can provide ownership identification as well as tamper protection. Transform domain based image watermarking has been proven to be more robust...  相似文献   

4.
An effective dual watermark scheme for image tamper detection and recovery is proposed in this paper. In our algorithm, each block in the image contains watermark of other two blocks. That is to say, there are two copies of watermark for each non-overlapping block in the image. Therefore, we maintain two copies of watermark of the whole image and provide second chance for block recovery in case one copy is destroyed. A secret key, which is transmitted along with the watermarked image, and a public chaotic mixing algorithm are used to extract the watermark for tamper recovery. By using our algorithm, a 90% tampered image can be recovered to a dim yet still recognizable condition (PSNR ). Experimental results demonstrate that our algorithm is superior to the compared techniques, especially when the tampered area is large.  相似文献   

5.
基于Contourlet变换的抗旋转攻击零水印算法   总被引:3,自引:0,他引:3  
现有的大多数基于变换域的零水印算法缺乏抵抗几何攻击的能力,例如将图像旋转微小角度即可导致水印检测的失败。为了提高变换域零水印算法抵抗图像旋转攻击的能力,本文提出了一种基于Contourlet变换的抗旋转攻击零水印算法。对于旋转造成的几何攻击,我们可以通过对数极坐标系将笛卡尔坐标系中的旋转变换转换为循环平移的性质,对于循环平移后的图像,在水印检测时我们可以使用穷举遍历的方法来检测测试图像是否包含水印信息。实验结果证明,该方法可以获得良好的图象视觉效果,同时对于加噪,滤波,JPEG压缩,剪切攻击也具有有很好的鲁棒性。  相似文献   

6.
提出了一种抵抗几何攻击的数字图像水印方案,主要针对的是缩放攻击和剪切攻击。通过采用在每个分片上重复嵌入水印,并在载体图像上确定抗缩放攻击网格来抵抗剪切攻击和缩放攻击。实验证明,该方法能较好地恢复图像、提取水印信息,能够有效地抵抗剪切攻击和缩放攻击。  相似文献   

7.
一种兼具版权保护及窜改认证双重功能的数字水印算法   总被引:1,自引:0,他引:1  
针对目前较多数字水印功能单一的不足,提出了一种新的具有双重功能的数字图像水印,首先在原始图像的小波中频区域中,通过比较中心系数与邻域系数均值关系来嵌入版权水印;其次在低频区域中自适应地嵌入半脆弱水印作为认证水印,实现版权保护和窜改认证的双重功能。两种水印的检测和提取都不需要原始图像。采用常规的图像处理操作和恶意窜改操作进行实验,结果表明,该方法透明性好, 版权保护水印对JPEG压缩、裁剪、噪声等攻击抵抗力强, 内容认证水印能够精确地定位窜改,具有很好的应用前景。  相似文献   

8.
灰度图像水印的自适应二维数字水印算法   总被引:4,自引:9,他引:4  
本文提出了一种采用可视灰度图像作为水印信号,根据人类视觉掩体特性进行分类,并结合系数自身的特点,通过修改DCT域中低频和次低频系数来嵌入不同强度水印的算法。实验结果表明,应用所提出的算法实现的水印对常见图像处理和噪声干扰具有很好的稳健性。  相似文献   

9.
提出了一种可用于数字图像的分层窜改检测和内容恢复的脆弱水印算法。图像中每个分块产生的水印信息包括认证水印和内容恢复水印,其中认证水印由奇偶校验和平均强度信息生成,恢复水印由分块DCT系数量化编码后的信息得到。根据混沌映射和最远距离安全隐藏机制,将恢复水印嵌入到映射块中,可有效避免窜改一致性问题。在接收端,采用分层窜改检测方法,减少窜改分块的漏判和误判,有效提高了窜改精度和恢复质量。实验结果表明,提出的方法与已有方法相比,无论在小面积窜改或大面积窜改情况下均可取得较好的恢复效果。  相似文献   

10.
医学图像在存储和传输过程中,不允许做有损压缩等变换。医院给出图像必须是要负责任的,所以医学图像不允许别人改动,特别是在病灶区不能改动。为了确保达到这一目的,一种新的采用符号动力学方法的数字水印被提出。根据这一方法,在嵌入水印的时候,可以使得图像中的关键部分不需要修改。一旦有人改动图像,马上可以从水印检查中发现,可以确保图像不被别人改动。  相似文献   

11.
基于对数极坐标映射(LPM),设计了图像数字水印技术中的模板匹配检测方法.该模板匹配检测方法的特点是:在图像数字水印的嵌入过程中,从对数极坐标域中切取一块模板匹配信息;计算该模板匹配信息与加入水印后的图像在LPM域中的相位谱的相关系数来进行水印的检测工作.这种方法不使用原始图像的全部信息,减少了相关性检验的计算时间,提高了工作效率.实验结果表明该方法对图像中数字水印具有较强的检测能力.  相似文献   

12.
针对目前图像篡改定位与恢复的水印算法在篡改定位精度和篡改恢复性能方面存在的不足,提出一种精确的图像篡改定位与恢复的三水印算法。该算法在最低有效位(LSB)方法的基础上,采用二进制编码的方式生成检测水印、定位水印和恢复水印等三种水印,并嵌入到图像的低位。篡改检测和篡改恢复采用基于分块的检测水印和恢复水印,篡改精确定位采用基于单像素的定位水印。仿真实验表明,该算法对任意大小的亮度图像、RGB图像具有高精度的篡改定位能力,并且具有很好的篡改恢复性能。  相似文献   

13.
Multimedia Tools and Applications - Photographs play a very crucial role in our lives, be it in the field of forensic investigation, military intelligence, scientific research, and publications....  相似文献   

14.
Self-recoverable fragile watermarking is meant for accurate tamper localization as well as image recovery with superior visual quality. However, most of the existing state of art approaches perform authentication and recovery on block basis owing to which the entire block is categorized as tampered in case of alteration of one or more pixels of it. This, results in staircase formation of tamper detected regions, hence lacking in accuracy. Furthermore, the visual quality of the recovered image also deteriorates as an approximate value is assigned to all the block pixels corresponding to the altered region. The proposed watermarking scheme performs both authentication and recovery pixelwise. The authentication of each pixel is done via multi level tamper detection(MLTD) through three authentication bits based on value, location and neighbourhood information. The domain for image recovery is chosen dynamically based on the content of the block, may it be in spatial domain for smooth blocks or frequency domain for the rough ones. This provides high accuracy in recovery. As the embedding of recovery information is done in the frequency domain, the imperceptibility of the watermarked image scheme remains high. Also, embedding of authentication information in the spatial domain maintains its fragile nature. Even for higher tampering ratios, the lost content is rebuilt with high peak signal to noise ratio(PSNR) of the recovered image. The probabilities of false rejection and false acceptance head towards the ideal value for most of the empirical analysis. Comparative study via metric evaluation of probability of false rejection (PFR), probability of false acceptance (PFA) and PSNR of recovered image for different standard test cover images demonstrate the efficacy of the proposed scheme over other existing state of art approaches. Further, the security of the proposed scheme remains high due to usage of multi-layered secret keys and chaos based random mapping handling worst tamper scenarios.  相似文献   

15.
Developing a watermarking method that is robust to cropping attack is a challenging task in image watermarking. The moment-based watermarking schemes show good robustness to common signal processing attacks and some geometric attacks but are sensitive to cropping attack. In this paper, we modify the moment-based approach to deal with cropping attack. Firstly, we find the probability density function (PDF) of the pixel value distribution from the original image. Secondly, we reshape and normalize the pdf of the pixel value distribution (PPVD) to form a two dimensional image. Then, the moment invariants are calculated from the PPVD image. Since PPVD is insensitive to cropping, the proposed method is robust to cropping attack. Besides, it also has high robustness against other common attacks. Theoretical analysis and experimental results demonstrate the effectiveness of the proposed method.  相似文献   

16.
Pattern Analysis and Applications - This study proposes an efficient dual image-based reversible fragile watermarking scheme (DI-RFWS) that can accurately detect and locate the tampering regions...  相似文献   

17.
岳晓丽  徐江峰 《计算机应用》2010,30(11):3044-3045
为了提高自嵌入水印算法篡改定位的精确度和抗JPEG压缩性能,提出了一种用于图像篡改定位和恢复的双水印算法。该算法对图像进行一级小波分解,分别在高频和低频分量中嵌入认证水印和自恢复水印。仿真实验表明,该算法不仅能对篡改区域实现精确定位,而且具有较好的鲁棒性,可以抵抗一定的JPEG压缩。  相似文献   

18.
用于图像认证的数字水印技术综述   总被引:5,自引:0,他引:5  
随着网络技术和媒体信息数字化的飞速发展,用于图像认证的数字水印技术成为目前研究的热点。主要阐述了当前用于认证的数字图像水印技术的特征、认证系统框架,详细讨论了脆弱水印和半脆弱水印的算法和研究现状,并对认证数字水印技术的未来发展方向进行了展望。  相似文献   

19.
针对现有基于脆弱水印方法的不足,提出了一种新的结合混沌系统和脆弱水印的图像篡改检测算法。算法首先利用Arnold cat映射对原始图像进行k次置乱,然后选取置乱图像的最低有效位(LSB)平面作为水印嵌入位置,实际嵌入的水印由Logistic混沌映射产生的随机二进制序列与原始水印异或得到,通过LSB替换算法嵌入。最后对LSB替换后图像进行T-k次的Arnold cat映射得到水印图像。实验结果表明,混沌系统的引入大大增强了脆弱水印的安全性;另外,针对不同种类的攻击,算法具有良好的篡改检测和定位精确性。  相似文献   

20.
《Real》2003,9(2):139-149
This paper proposes a new image watermarking scheme which is robust to RST attacks with cropping by improving Fourier–Mellin transform based watermarking (FMW). The proposed scheme reorders and modifies function blocks of FMW for improvement of realization and performance. Unlike FMW, our method uses log-polar map (LPM) in the spatial domain for scaling invariance, while translation invariance is provided by the use of an invariant centroid (IC) as the origin of LPM. IC is a gravity center of a central area on gray scale image that is invariant although an image is attacked by RST. For this, its calculation method is proposed. Also since LPM includes the property which transforms rotation of Cartesian coordinates system into a cyclic shift, 2-D DFT is performed on the LPM image and the magnitude spectrum extracted to provide a domain that is rotation invariant. The resulting domain, which is invariant to RST, is then used as the watermark-embedding domain. Furthermore, to prevent the watermarked image from degrading due to the coordinate system conversion, only LPM image of watermark signal is inverse mapped to Cartesian coordinates and add to the original image. Experimental results demonstrate that the proposed scheme is robust to RST attacks.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号