期刊文献+

一种彩色图像内容认证混沌脆弱水印算法 被引量:5

Chaotic Fragile Watermarking Algorithm for Color Image Content Authentication
下载PDF
导出
摘要 提出了一种结合彩色图像分量内容和混沌系统的脆弱数字水印算法.将原始图像R分量和B分量的像素值经混沌序列调制后映射成另一个混沌系统的初值,经多次迭代生成4灰度级的水印图像;然后把它嵌入原始图像G分量的最低2比特平面.利用混沌对初值极端敏感性的特点,能够精确地定位对加入水印图像的篡改,并且水印提取不需要原始图像.实验结果表明了所提出水印方案对篡改证明的有效性、敏感性以及良好的篡改定位能力. A fragile watermarking algorithm combined with color components content of image and chaotic system was proposed. Let the pixel values of R and B components of host image, which were modulated by the first chaotic system, map the initial values of the second chaotic mapping. The watermarks obtained by iterating several times of the second chaotic mapping were embedded into the two low hit-planes of the host image. The proposed scheme can localize the tampers on the watermarked image by using the high sensitivity on the initial value of the chaotic mapping. Moreover, no host image is needed in watermark extraction. Simulation results have shown the effectiveness, sensitivity and localization of the tamper-proofing of this algorithm.
作者 贺文华
出处 《湖南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2009年第1期55-58,共4页 Journal of Hunan University:Natural Sciences
基金 湖南省自然科学基金资助项目(06JJ5098) 湖南省教育厅科研资助项目(06C437)
关键词 彩色图像 脆弱水印 认证 混沌 color image fragile watermark authentication chaos
  • 相关文献

参考文献8

二级参考文献29

  • 1[1]I J Cox,J Kilian,T Leighton,T Shamoon.Secure spread spectrum watermarking for multimedia[J].IEEE Trans,1997,IP-6(12):1673-1687.
  • 2[2]M Yeung,F Mintzer.An invisible watermarking technique for image verification[A].Proc.Int.Conf.Image Processing[C].Barbara California,1997.680-683.
  • 3[3]Wong P W.A public key watermark for image verification and authentication[A].Proc.IEEE ICIP[C].Chicago,USA,1998.425-429.
  • 4[4]J Zhao,E Koch.Embedding robust labels into images for copyright protection,Intellectual Property Rights New Technologies[A].Proc.KnowRight'95 Conf[C].California,1995.242-251.
  • 5[5]Matth Holliman,Nasir Memon,Counterfeiting attacks on oblivious block-wise independent invisible watermark schemes[J].IEEE Trans,2000,IP-19(3):432-441.
  • 6[6]Fridrich J,Goljan M,Memon N.Further attacks on Yeung-Mintzer watermarking scheme[A].Proc.SPIE Security and Watermarking of Multimedia Contents[C].San Jose,California,2000.428-437.
  • 7C S Lu, H Y Mark Liao. Multipurpose watermarking for image authentication and protection[J]. IEEE Trans on Image Processing,2001, 10(10):1579-1592.
  • 8M U Celik, G Sharma, E Saber, et al. Hierarchical watermarking for secure image authentication with localization[J]. IEEE Trans on Image Processing. 2002,11(6):585-595.
  • 9P W Wong. Public key watermark for image verification and authentication[A] .Proc of 1998 IEEE Int Con on Image Processing[C]. Chicago, IL, USA: IEEE, 1998,1:455-459.
  • 10D Kundur, D Hatzinakos. Digital watermarking for telltale tamper profing and authentication[J]. Proc of the IEEE, 1999, 87(7):1167-1180.

共引文献87

同被引文献25

引证文献5

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部