期刊文献+

基于模糊聚类的DWT域图像半脆弱水印算法

Semi-fragile image watermarking based on DWT domain and fuzzy clustering theory
下载PDF
导出
摘要 提出了一种基于小波变换和模糊聚类的新颖的半脆弱水印算法,该算法将噪声可视函数作为模糊聚类的一个特征,根据聚类结果确定半脆弱水印的嵌入位置和取值。仿真实验结果表明,该算法不仅具有较好的透明性和水印嵌入位置自适应性,对常规图像处理操作具有较好的鲁棒性,而且能对拼贴攻击、替换部分图像等恶意图像篡改进行检测和定位。 A DWT-based novel image semi-fragile watermarking scheme utilizing fuzzy clustering theory is proposed.According to the classification of image’s noise visibility function,gradient etc.we can decide the location and value of watermark.Experimental results show that our semi-fragile watermarking scheme is invisible and is robust to common image processing.The proposed watermarking algorithm is invisible and fragile to content modification and can detect effectively the tampered regions.
作者 唐晓芬 吕科
出处 《计算机工程与设计》 CSCD 北大核心 2010年第13期3100-3102,3107,共4页 Computer Engineering and Design
基金 国家自然科学基金项目(60602062) 宁夏大学自然科学基金项目(ZR200816)
关键词 半脆弱水印 内容认证 混沌序列映射 模糊聚类 篡改检测 semi-fragile watermarking content authentication chaotic sequences mapping fuzzy clustering tamper localization
  • 相关文献

参考文献6

二级参考文献95

  • 1Honsinger C.W., Jones P., Rabbani M., Stoffel J.C.. Lossless recovery of an original image containing embedded data. U.S. Patent No. 6,278,791, 2001
  • 2Fridrich J., Goljan M., Du R.. Lossless data embedding for all image formats. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 572~583
  • 3Tian J.. Wavelet-based reversible watermarking for authentication. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 679~690
  • 4Holliman M., Memon N.. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000, 9(3): 432~441
  • 5Fridrich J., Goljan M., Memon N.. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262~274
  • 6Wu J., Zhu B., Li S., Lin F.. Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes. In: Proceedings of the IEEE International Conference on Multimedia & Expo (ICME'04), Taiwan, 2004
  • 7Wu J., Zhu B., Li S., Lin F.. New attacks on SARI image authentication system. In:Proceedings of the SPIE,Vol.5306, Security and Watermarking of Multimedia Contents VI, San Jose, California, USA, 2004, 602~609
  • 8Yeung M., Mintzer F.. Invisible watermarking for image verification. Journal of Electronic Imaging, 1998, 7(3): 578~591
  • 9Wu M., Liu B.. Watermarking for image authentication. In: Proceedings of the IEEE International Conference on Image Processing, Chicago, USA, 1998, 2: 437~441
  • 10Memon N., Shende S., Wong P.. On the security of the Yeung-Mintzer authentication watermark. In:Proceedings of the IS&T PICS Symposium, Savannah, Georgia, 1999, 301~306

共引文献89

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部