期刊文献+

一种带反馈的半脆弱认证水印算法 被引量:2

SAF: semi-fragile authentication watermarking with feedback
下载PDF
导出
摘要 针对变换域的认证水印对舍入误差及像素值溢出非常敏感的问题,提出了一种新的带反馈的半脆弱水印算法(SAF算法),通过在嵌入过程中加入检测模块,并将检测模块的结果反馈,作为嵌入过程是否完成的判决条件,从而达到降低虚警概率的目的.由于运用了预量化原理,SAF算法能够对有损压缩后的系数进行重构,从而彻底地解决了JPEG压缩对水印信号破坏的问题.实验结果表明,SAF算法是一种有效且实用的认证水印算法. The well-known adage that seeing is believing is no longer true due to the pervasive and powerful multimedia manipulation tools. To prevent image manipulations and fraudulent use of modified images, multimedia authentication techniques are being developed. But unfortunately there is a big problem in authentication watermarking algorithms which are in the transform (e.g., DCT) domain. Converting the modified transform coefficients back to the integer pixel domain and then converting them again to the transform domain may not get the same result. As a result, such a scheme would not authenticate images, even through they may not have been manipulated otherwise. Combining the embedding process with the performance analysis, a new semi-fragile authentication watermarking with feedback, called SAF, is presented. The embedding process in some image blocks is performed several times according to the results of the performance analysis of the watermarking detecting process. By the reconstruction of the DCT coefficient, SAF can accept JPEG lossy compression on the watermarked image to a pre-determined quality factor, and reject malicious attacks. The experimental results show its effectiveness in protecting the content-integrity of images.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2004年第5期724-727,752,共5页 Journal of Xidian University
基金 教育部优秀青年教师资助计划资助项目
关键词 检测模块 水印算法 JPEG压缩 认证 脆弱水印 嵌入 反馈 虚警概率 变换域 有损压缩 Algorithms Cosine transforms Feedback Image compression Security of data
  • 相关文献

参考文献6

二级参考文献28

  • 1[1]J Cox,J Kilian,T Leighton et al. Secure spread spectrum watermarking for multimedia[J].IEEE Trans on Image Processing,1997;6(12)
  • 2[2]JPEG2000 final committee draft[S].version 1.0,ISO/IEC FCD15444-1,2000
  • 3[3]Shapiro J M.Embedded image coding using zerotree of wavelet coefficients[J].IEEE Trans on Signal Processing, 1993 ;41 (12) :3445~3462
  • 4[4]A Said,W A Pearlman.A new,fast,and efficient image codec based on set partitioning in hierarchical trees[J].IEEE Trans on Circutes and System for Video Technology, 1996;6(3) :243~250
  • 5[5]M Ramkumar,A N Akansu,A A Alatan. On the choice of transforms for data hiding in compressed Video[C].In:Proce of ICASSP'99,Phoenix, AZ, USA, 1999: 3049~3052
  • 6[6]D Kundur,D Hatzinakos. Mismatching perceptual models for effective watermarking in the presence of compression[C].In:Proceedings of the SPIE Conference on Multimedia Systems and Applications,Boston,MA,USA
  • 7[7]R B Wolfgang,C I Podilchuk,E J Delp. The effect of matching watermark and compression transforms in compressed color images[C].In:ICIP'98, Chicago, IL, USA, 1998
  • 8[8]Mitchell D Swanson,Bin zhu,Ahmed H Tenfik. Multiresolution video watermarking using perceptual models and scene segmentation[C].In:ICIP97, California, USA, 1997
  • 9[9]Andrew B Waston,Gloria Y Yang,Joshua A Solomon et al.Visibility of wavelet quantization noise[J].IEEE Trans on Image Processing, 1997
  • 10[10]Raymond B Wolfgang,Christine I Podilchuk,Edward J Delp. Perceptual watermarks for digital images and video[J].Proceedings of the IEEE,Special issue on Identification and Protection of Multimedia Information, 1999; 87(7): 1108~1126

共引文献36

同被引文献10

  • 1LIN C Y, CHANG S F. Issues and solutions for authenticating MPEG video[A]. SPIE, Electronic Imaging 1999, Security and Watermarking of Multimedia Contents[C].San Jose, CA, 1999.54-65.
  • 2MOBASSERI B, SIEFFERT M, SIMARD R. Content authentication and tamper detection in digital video[A]. IEEE International Conference on Image Processing[C]. Vancover, 2000. 458-461.
  • 3TZENG C H, TSAI W H. A new technique for authentication of image/video for multimedia applications[J]. Signal Processing, 2001, 66 (3): 337-341.
  • 4DITTMANN J, STEINEBACH M, RIMAC I, et al. Combined audio and video watermarking: embedding content information in multimedia data[A]. SPIE Security and Watermarking of Multimedia Contents II, EI'00[C]. San Jose, CA, 2000. 176-185.
  • 5FRIDRICH J, GOLIAN M, DU R. Invertible authentication watermark for/PEG images[A]. ITCC 2001[C]. Las Vegas, Nevada, 2001, 446-449.
  • 6YE D, MAO Y, DAI Y, et al. A multi-feature based invertible authentication watermarking for JPEG images[A]. IWDW 2004[C]. Seoul, 2004. 152-162.
  • 7胡军全,黄继武,黄达人.一种基于HVS的图像易碎水印[J].电子学报,2003,31(7):1057-1061. 被引量:5
  • 8郭磊,郭宝龙,陈龙谭,陈生谭.基于小波零树结构的图像水印算法[J].西安电子科技大学学报,2003,30(5):677-681. 被引量:10
  • 9张静,张春田.用于JPEG2000图像认证的半脆弱性数字水印算法[J].电子学报,2004,32(1):157-160. 被引量:21
  • 10郭宝龙,张永平,郭磊.基于DCT系数重构的分层认证水印算法[J].西安电子科技大学学报,2004,31(1):1-5. 被引量:6

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部