期刊文献+

基于混沌置乱的分块自嵌入水印算法 被引量:33

Chaos-based scramble self-embedding watermarking algorithm
下载PDF
导出
摘要 针对分块自嵌入水印算法的安全性和不能有效判断图像篡改块的问题,提出一种基于混沌置乱的分块自嵌入算法。该算法将由图像块生成的水印按空间位置生成二值水印图像,利用混沌序列对其置乱加密后嵌入到图像的最低位,认证时根据设定的阈值能有效定位图像内容被篡改的图像块。实验仿真和理论分析表明,该算法在保持原算法篡改恢复效果的基础上,无论是否有水印被改变,均能有效判断图像内容被篡改的图像块,且具有更高的安全性。 A chaos-based scramble self-embedding watermarking algorithm was proposed to locate tamper block on the watermarked images and improve security of the existing self-embedding fragile watermarking algorithms that could not effectively locate tamper block. In proposed algorithm, the binary watermark image was generated from the watermark blocks putted together according to their positions, and the improved security binary watermark scrambled by chaotic systems was embedded into the LSB of the image data. While image authentication, the block of tampered content could be effectively localized according to the predefined threshold. Theoretic analysis and simulation results show that the proposed algorithms may not only improve security, but it also effectively locates tamper blocks whether watermark is altered or not.
出处 《通信学报》 EI CSCD 北大核心 2006年第7期80-86,93,共8页 Journal on Communications
基金 教育部新世纪优秀人才支持计划基金资助项目(NECT-05-0794) 四川省青年基金资助项目(03ZQ026-033) 国家预研基金资助项目(51430804QT2201)~~
关键词 脆弱水印 自嵌入 混沌 置乱 fragile watermarking self-embedding chaos scramble
  • 相关文献

参考文献14

  • 1ZHU B B,SWANSON M D,TEWFIK A H.When seeing isn't believing[J].IEEE Signal Processing Magazine,2004,3:40-49.
  • 2CELIK M U,GAURAV S,et al.Hierarchical watermarking for secure image authentication with localization[J].IEEE Trans on Image Processing,2002,11(6):585-595.
  • 3和红杰,张家树,田蕾.能区分图像或水印篡改的脆弱水印方案[J].电子学报,2005,33(9):1557-1561. 被引量:24
  • 4WONG P W,MEMON N.Secret and public key image watermarking schemes for image authentication and ownership verification[J].IEEE Trans on Image Processing,2001,10(10):1593-1601.
  • 5FRIDRICH J.Security of fragile authentication watermarks with Localization[A].Security and watermarking of multimedia contents[C].San Jose,California,2002.691-700.
  • 6和红杰,张家树.区分不同篡改的脆弱水印算法[A].第十二届全国图象图形学学术会议(NCIG2005)[C].2005.140-144.
  • 7FRIDRICH J,GOLJAN M.Images with self-correcting capabilities[A].ICIP'99[C].Kobe,Japan,1999.25-28.
  • 8张鸿宾,杨成.图像的自嵌入及窜改的检测和恢复算法[J].电子学报,2004,32(2):196-199. 被引量:49
  • 9LEE J,WON C S.A watermarking sequence using parities of error control coding for image authentication and correction[J].IEEE Transactions on Consumer Electronics,2000,46(2):313-317.
  • 10WU C W.On the design of content-based multimedia authentication systems[J].IEEE Trans.Multimedia,2002,4(9):385-393.

二级参考文献36

  • 1张家树,田蕾.一种新的基于密钥的混沌数字水印方法[J].通信学报,2004,25(8):96-101. 被引量:15
  • 2TSEKERIDOU S, SOLACHIDIS V, NIBOLAIDIS N, et al. Statistical of watermarking system based on Bernoulli chaotic sequence[J].Signal Processing, 2001,81(6):1273-1293.
  • 3ATHANASIOS N I, IOANNIS P. Comparison of different chaotic maps with application to image watermarking[A]. Proceedings of IEEE Circuits and System[C].Geneya,2000.509-512.
  • 4COX I J, KILIAN J, LEIGHTON T, et al. Secure spread spectrum watermarking for multimedia[J]. IEEE Trans Image Processing,1997, 6(12): 1673-1687.
  • 5HITZL D L, ZELE F. An exploration of the Hnon quadratic map[J]. Physica D, 1985, 14(3): 305-326.
  • 6GIOVANARDI A, MAZZINA G Frequency domain chaotic watermarking[A].Proceedings of IEEE Symposium on Circuits and System[C].Sydney, 2001.521-524.
  • 7[1]Lin E T,Delp E J.A review of fragile image watermarks [A].Proc.of the Multimedia and Security Workshop (ACM Multimedia'99) [C].Orlando,1999.25-29.
  • 8[2]Walton S.Information authentication for a slippery new age [J].Dr.Dobbs Journal,1995,20(4):18-26.
  • 9[3]Yeung M,Mintzer F.Invisible watermarking for image verification [J].Journal of Electronic Imaging,1998,7(3):578-591.
  • 10[4]Wolfgang R B,Delp E J.A watermark for digital images [A].Proc.IEEE Int.Conf.on Image Processing [C].ACM Press,NY,1996.3.219-222.

共引文献90

同被引文献349

引证文献33

二级引证文献152

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部