首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The existing digital data verification methods are able to detect regions that have been tampered with, but are too fragile to resist incidental manipulations. This paper proposes a new digital signature scheme which makes use of an image's contents (in the wavelet transform domain) to construct a structural digital signature (SDS) for image authentication. The characteristic of the SDS is that it can tolerate content-preserving modifications while detecting content-changing modifications. Many incidental manipulations, which were detected as malicious modifications in the previous digital signature verification or fragile watermarking schemes, can be bypassed in the proposed scheme. Performance analysis is conducted and experimental results show that the new scheme is indeed superb for image authentication.  相似文献   

2.
This paper proposes an authentication scheme for JPEG images based on digital signature and semi-fragile watermarking. It can detect and locate malicious manipulations made to the image, and verify the ownership of the image at the same time. The algorithm uses the invariance of the order relationship between two DCT coefficients before and after JPEG compression to embed image content dependent watermark, therefore the watermark can survive the JPEG lossy compression. Since the scheme is based on the security of the cryptographic hash function and public key algorithm, it is believed to be secure to the extent that cryptography is believed to be. Theoretical analysis and experimental results show that the proposed scheme has the desired property and good performance for image authentication.  相似文献   

3.
We propose a new multipurpose audio watermarking scheme in which two complementary watermarks are used.For audio copyright protection,the watermark data with copyright information or signature are first encrypted by Arnold transformation.Then the watermark data are inserted in the low frequency largest significant discrete cosine transform(DCT) coefficients to obtain robustness performance.For audio authentication,a chaotic signal is inserted in the high frequency insignificant DCT coefficients to detect tampered regions.Furthermore,the synchronization code is embedded in the audio statistical characteristics to resist desynchronization attacks.Experimental results show that our proposed method can not only obtain satisfactory detection and tampered location,but also achieve imperceptibility and robustness to common signal processing attacks,such as cropping,shifting,and time scale modification(TSM).Comparison results show that our method outperforms some existing methods.  相似文献   

4.
一种新的JPEG图像认证半脆弱水印算法   总被引:3,自引:0,他引:3  
田冰  王伟 《计算机应用》2007,27(1):132-134
提出了一种用于JPEG图像认证的半脆弱数字水印算法,它根据JPEG图像压缩过程中的DCT系数的不变性原理进行水印生成和嵌入调制,并结合一种有效的算法隐性地考虑到所有非零DCT系数的符号、大小关系,在未增加水印信息嵌入强度的情况下,实现了图像应对变换域攻击的更有效保护。同时,在检测算法中加入对虚警区的判断,增加了对窜改区域定位的准确性。实验表明,该算法实现的水印有很好的视觉透明度,有效的承受JPEG压缩,同时对其他恶意篡改敏感并能够准确定位篡改位置。  相似文献   

5.
《Pattern recognition letters》2001,22(6-7):725-729
This paper is an attempt towards obtaining a method for validation of personal identification documents such as licenses, photo IDs. The method tries to obtain a photosignature from the image document by using certain image processing techniques. The method uses discrete cosine transform (DCT) based technique to obtain the required signature. This gives a substantially compressed signature which is quite unique for that particular document. In case of authentication from a large database the signature can be used as hashing function for indexing. Results of experiments done on a large database have validated the approach.  相似文献   

6.
An image watermarking scheme in the 2D DCT domain is proposed by exploring the advantages of using Zernike moments. Zernike transform has been used in image processing applications such as image recognition, authentication, protection, etc. Here, we propose to use the Zernike moments of the DCT transform to provide an efficient watermarking method. Particularly, the novelty of the proposed approach relies on the method for selection of features that will enable both preserving the image quality and robustness to attacks. Also, a criterion for selection of image blocks suitable for watermarking is given. It is based on the ? 1-norm of Zernike moments. The efficiency of the proposed watermarking algorithm is proved on several examples considering different types of attacks (compression, noise, filtering, geometrical attacks).  相似文献   

7.
For multimedia document, watermarking provides many advantages; however, its vulnerability due to attacks using signal processing methods offers challenge in designing robust techniques. This paper presents a novel method for enhancing robustness in copyright marking into mid-frequency discrete cosine transform (DCT) coefficients of an image. We establish that Weibull distribution suitably models mid-frequency coefficients well and use it for hiding copyright data. Our method is robust against JPEG compression attacks at both high and low compressions. Further, it is statistically undetectable in comparison to existing techniques of data hiding based on DCT coefficients. This is because it insignificantly affects the DCT coefficients of the stego image without compromising with data hiding capacity of the host image. Simulation result on Lena, Gibbon, Boat, and Peppers images illustrates that our algorithm offers lower bit error rate (BER) and higher peak signal to noise ratio (PSNR) leading to improved imperceptibility. Thus, it is useful in robust copyright marking.  相似文献   

8.
依据内容认证的特点和JPEG压缩原理提出一种半脆弱水印嵌入方法。该方法对原始图像进行分块DCT变换,每块取三个DCT低频系数,把这三个系数量化后取最低有效位,与水印的对应位进行异或运算得到密钥;再取三个高频系数进行异或等运算得到另一密钥。认证时使用这两个密钥来恢复水印信息。实验结果表明,该方法对JPEG压缩具有很好的鲁棒性,同时对滤波和加噪等处理具有很好的易碎性,适合于图像的内容认证。由于该水印方法不改变原图像,因而可应用于画面清晰度要求高的多媒体和认证系统中。  相似文献   

9.
峰度特征值在视频水印中的应用   总被引:2,自引:0,他引:2       下载免费PDF全文
提出一种基于峰度的视频水印新算法。峰度是一个能表征图像是否呈正态分布的特征值。选择峰度较小的视频帧,对亮度空间分块后实施离散余弦变换,在中频系数中嵌入水印。实验证明,该算法对有损压缩有较强的健壮性,较好的透明性。能经受添加噪声、剪切、视频格式转换及丢帧等常见视频信号处理及攻击。  相似文献   

10.
本文根据多媒体信息的特点和多媒体认证的具体要求,提出了一种新的数字图像可恢复性主动签名方法(RADS),采用RADS方法能近似地恢复被各种操作破坏了的数据,并能准确地定位被破坏的象素的位置,从而达到对数据的完整性和数据签发者的身份进行更高层次的主动认证,实验结果表明,RADS方法对数字图象各种类型的部分或全部替换、 、剪切都具有良好的可恢复性。  相似文献   

11.
余嘉  方杰  许可 《计算机工程与应用》2012,48(17):199-202,237
针对图像维数过高,计算复杂的问题,提出一种基于加权小波分析和DCT的人脸识别方法,通过对人脸图像进行小波分解,提取低频和加权高频分量的DCT变换系数作为识别特征向量,采用加权距离进行分类识别.该方法在ORL和YALE人脸库上进行了测试比较,结果表明,无论训练时间还是识别率,都优于传统的PCA方法,和小波结合PCA的方法相比较,识别率也明显提高.  相似文献   

12.
为了提高压缩域视频水印的安全性,提出一种基于压缩域的AVS视频认证水印新算法。它从视频空间的三维特性出发,利用I帧分块能量关系、GOP结构信息、帧结构信息等构造特征码。在嵌入算法上,将特征码同时嵌入到中频DCT系数和运动矢量中,在认证端将重建特征值和提取的双水印进行比较。仿真实验结果表明,该算法具有较好的窜改认证能力。  相似文献   

13.
Image authentication is becoming very important for certifying data integrity. A key issue in image authentication is the design of a compact signature that contains sufficient information to detect illegal tampering yet is robust under allowable manipulations. In this paper, we recognize that most permissible operations on images are global distortions like low-pass filtering and JPEG compression, whereas illegal data manipulations tend to be localized distortions. To exploit this observation, we propose an image authentication scheme where the signature is the result of an extremely low-bit-rate content-based compression. The content-based compression is guided by a space-variant weighting function whose values are higher in the more important and sensitive region. This spatially dependent weighting function determines a weighted norm that is particularly sensitive to the localized distortions induced by illegal tampering. It also gives a better compactness compared to the usual compression schemes that treat every spatial region as being equally important. In our implementation, the weighting function is a multifovea weighted function that resembles the biological foveated vision system. The foveae are salient points determined in the scale-space representation of the image. The desirable properties of multifovea weighted function in the wavelet domains fit nicely into our scheme. We have implemented our technique and tested its robustness and sensitivity for several manipulations.  相似文献   

14.
大量多媒体应用的发展使得数字图像很容易地被非法操作和篡改,提出一种基于 图像正则化和视觉特性的图像指纹算法,可以有效地实现图像的认证和识别。首先对图像进行 正则化预处理,消除几何形变对图像的影响,然后对图像进行分块DCT 变换,利用Watson 视 觉模型对DCT 系数进行处理,增大人眼敏感的频域系数在计算图像特征时的权重,经过量化形 成最终的指纹序列。在图像指纹序列生成过程中,加入密钥控制,提高了指纹的安全性。实验 结果表明,该方法的冲突概率在10–7 数量级,对JPEG 压缩、旋转、缩放等操作具有较好的稳 健性。  相似文献   

15.
一种抗JPEG压缩的半脆弱图像水印算法   总被引:25,自引:1,他引:25  
李春  黄继武 《软件学报》2006,17(2):315-324
半脆弱水印因为在多媒体内容认证方面的重要作用而受到人们密切的关注.为了能够区分偶然攻击与恶意篡改,半脆弱水印需要对一般的内容保护图像操作有一定的鲁棒性.由于JPEG压缩应用的普遍性,在保持较高的对篡改检测能力的情况下,提高抗JPEG压缩性能一直是半脆弱水印的重要问题.根据图像相邻小波高频系数之间的大小关系在JPEG压缩之后大多数没有发生变化这一事实,提出了一种新的抗JPEG压缩的半脆弱水印算法.实验结果表明,该算法计算简单,嵌入容量大,有很好的抗JPEG压缩性能,同时对篡改的定位也很精确.  相似文献   

16.
目前,在某一数字产品中仅仅嵌入一种水印已经不能满足人们的要求,在很多情况下,人们需要的是多重水印或多功能水印。本文基于混沌动力系统良好的随机性和初值敏感性,提出了一种空域和DCT域相结合的针对彩色图像的多功能数字水印算法,该算法在彩色图像的蓝色分量中基于混沌随机密钥和LSB技术重复分块嵌入了一幅半脆弱水印,以实现完整性认证及篡改检测,同时分别在红色分量DCT直流系数(DC)中和绿色分量DCT中频系数中各由混沌密钥控制随机嵌入一幅鲁棒水印,这些水印完成版权认证、附加信息检测等。实验结果表明,该算法较好地实现了多功能水印技术。  相似文献   

17.
提出了一种抗JPEG有损压缩的半脆弱图像数字水印算法。该算法充分利用混沌映射对初值的敏感性,并根据JPEG图像压缩过程中DCT系数的不变特性,将预先量化的DCT低频系数和水印密钥合成为混沌系统的初值,经过多次混沌迭代生成水印。根据水印调整DCT中频系数的大小,完成水印的嵌入调制。通过将图像块的编号映射为混沌系统的迭代次数,避免了针对块独立水印算法的诸如矢量量化等攻击。实验结果表明,该算法对JPEG有损压缩具有良好的鲁棒性,同时可对图像内容的恶意篡改进行精确的检测与定位。  相似文献   

18.
In this paper, a robust hash technique for image content authentication using histogram is proposed. The histogram based hash techniques reported in the literature are robust against Content Preserving Manipulations as well as incidental distortion. The major drawback of these techniques is that, they are not sensitive to Content Changing Manipulations and also un-altered histogram image modifications. To overcome these drawbacks, we present a novel hash technique which divides the image into non-overlapped blocks and distributes histogram bins of the image block into larger containers based on the Partial Sum of pixel count of histogram bins. An intermediate hash is produced by computing the ratio of pixel count between two neighbouring containers. The intermediate image hash is obtained by concatenating intermediate hashes of image blocks. Finally, the intermediate image hash is normalized and randomly permuted with a secret key to produce a robust and secure hash. The results shows that, the proposed method performs better when compared to the existing methods against the Content Preserving manipulations. Besides, the proposed method is more sensitive to Content Changing manipulations as well as un-altered histogram image modifications. The performance results on image authentication indicate that, the proposed method has high discriminative capability and strong robustness.  相似文献   

19.
针对数字音频版权保护和内容认证的问题, 提出了一种用于版权保护和内容认证的自适应双重音频水印算法。算法对每段原始音频信号进行离散小波变换和离散余弦变换, 分别提取混合变换域的低频系数和中低频系数作为水印的构造和嵌入域, 利用音频载体的统计特性自适应地构造零水印和嵌入半脆弱水印, 实现音频版权保护和内容认证。实验结果表明, 该算法的不可感知性很好, 在抵抗多种攻击时具有良好的鲁棒性, 并且能够对恶意窜改进行定位。  相似文献   

20.
Over the years, different watermarking techniques have been used for medical image authentication purposes. Some techniques have been presented to detect tampering in the medical image while others can also recover the tampered region after the tamper detection. Many of the previous medical image authentication schemes have successfully achieved their aims; however, the robustness of the authentication scheme against unintentional attacks has not been highlighted sufficiently. This paper presents a new medical image authentication scheme in which the medical image is divided into two regions (i.e., region of interest (ROI) and region of non-interest (RONI)). Then two watermarking methods based on Slantlet transform (SLT) are used to embed data in the ROI and the RONI. The proposed scheme can be used for tamper detection, localization, and recovery in addition to the data hiding. To generate the recovery information of the ROI, a new method has been proposed based on the integer wavelet transform (IWT) coefficients. The experiments that have been conducted to evaluate the proposed authentication scheme proved that it is efficient not only in achieving its main tasks that have been mentioned above but also in having robustness against unintentional attacks (i.e., JPEG compression, additive Gaussian noise (AGN), and salt-and-pepper noise) and that makes it more suitable for the practical applications.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号