首页 | 本学科首页   官方微博 | 高级检索  
     

基于分块的高效图像可逆认证方法
引用本文:钟亦友,黄方军.基于分块的高效图像可逆认证方法[J].软件学报,2023,34(12):5848-5861.
作者姓名:钟亦友  黄方军
作者单位:中山大学 网络空间安全学院, 广东 深圳 518107;广东省信息安全技术重点实验室, 广东 广州 510006
基金项目:国家自然科学基金(62072481, 61772572); 广州市科技计划(202201011587); 河南省网络空间态势感知重点实验室开放课题(HNTS2022014)
摘    要:图像可逆认证是一项将可逆信息隐藏和脆弱水印相结合的新技术,其既能实现对图像的脆弱认证,还能在提取认证信息的同时无失真地恢复出原始载体,对图像的原始性和完整性认证具有非常重要的意义.针对现有可逆认证方法认证精度低、对具有复杂纹理的图像或图像中部分纹理复杂区域无法实现有效保护的问题,提出一种新的图像可逆认证方法.首先对待认证图像进行分块,根据每个子块可嵌入容量将其分为差分块和平移块,并采用不同的可逆嵌入方法对不同类型的块进行认证码嵌入操作.为了增大嵌入容量以提高对每个子块的认证效果,还采取了分层嵌入的方式.在认证方,可以通过从每个子块中提取认证码实现子块的篡改检测和定位.此外,所提方法还可与形态学中的膨胀和腐蚀操作结合以细化篡改检测标记,进一步提高检测效果.实验结果表明,所提方法能够在同样的认证精度下对纹理平滑和纹理复杂的图像进行保护,同时还能够实现对几乎所有子块的独立认证和恢复,具有广泛的适用性.

关 键 词:图像认证  篡改检测  脆弱水印  可逆信息隐藏
收稿时间:2022/2/1 0:00:00
修稿时间:2022/6/22 0:00:00

Efficient Image Reversible Authentication Method Based on Blocks
ZHONG Yi-You,HUANG Fang-Jun.Efficient Image Reversible Authentication Method Based on Blocks[J].Journal of Software,2023,34(12):5848-5861.
Authors:ZHONG Yi-You  HUANG Fang-Jun
Affiliation:School of Cyber Science and Technology, Sun Yat-sen University, Shenzhen 518107, China;Guangdong Key Laboratory of Information Security Technology, Guangzhou 510006, China
Abstract:As a new technology that combines reversible data hiding and fragile watermarking, image reversible authentication (RA) can not only realize the fragile authentication of images but also recover the original carrier image without distortion while extracting the authentication code. Thus, it is of great significance to authenticate the originality and integrity of images. Existing reversible authentication methods have low authentication accuracy and cannot effectively protect images with complex textures or some areas with complex textures in the images. To this end, this study proposes a new reversible authentication method. Firstly, images to be authenticated are divided into blocks, and the obtained sub-blocks are classified as differential blocks (DB) and shifting blocks (SB) according to their embedding capacity. Different reversible embedding methods are employed to embed the authentication codes into different types of blocks. It also adopts a hierarchical embedding strategy to increase embedding capacity and improve the authentication effects of each sub-block. On the authentication side, tamper detection and localization can be realized by the authentication code extracted from each sub-block. In addition, this method can be combined with dilation and corrosion in morphology to refine tamper detection marks and further improve the detection accuracy rate. Experimental results show that the proposed method can protect images with smooth texture and complex texture under the same authentication accuracy, and can also realize independent authentication and restoration of almost all sub-blocks, which has widespread applicability.
Keywords:image authentication  tamper detection  fragile watermarking  reversible data hiding
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号