全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

抗拼贴攻击的二值图像认证算法

DOI: 10.3724/SP.J.1004.2014.01184, PP. 1184-1190

Keywords: 二值图像,拼贴攻击,块相关,邻域篡改特征

Full-Text   Cite this paper   Add to My Lib

Abstract:

?为提高算法抵抗拼贴攻击的能力,本文结合块相关思想提出一种二值图像认证算法.该算法首先将每个图像块中的像素点分为“可翻转”和“不可翻转”两类,将“不可翻转”像素点Hash生成水印信息,用其替代相应映射块的“可翻转”像素点实现水印嵌入.通过比较图像块重构水印及提取水印的一致性判断该图像块的真实性,并结合各图像块邻域篡改特征进一步提高篡改检测性能.实验结果表明,该算法不仅提高了在替换、添加、删除攻击下的篡改检测性能,而且能够有效抵抗拼贴攻击.

References

[1]  Huang F J, Huang J W, Shi Y Q. Detecting double JPEG compression with the same quantization matrix. IEEE Transactions on Information Forensics and Security, 2010, 5(4): 848-856
[2]  Peng F, Nie Y Y, Long M. A complete passive blind image copy-move forensics scheme based on compound statistics features. Forensic Science International, 2011, 212(1-3): e21-e25
[3]  Mahalakshmi S D, Vijayalakshmi K, Priyadharsini S. Digital image forgery detection and estimation by exploring basic image manipulations. Digital Investigation, 2012, 8(3-4): 215-225
[4]  Stamm M C, Liu K J R. Anti-forensics of digital image compression. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 1050-1065
[5]  Haouzia A, Noumeir R. Methods for image authentication: a survey. Multimedia Tools and Applications, 2008, 39(1): 1-46
[6]  Qi Ke, Xie Dong-Qing. Watermarking scheme against geometrical attacks based on second generation Bandelet. Acta Automatica Sinica, 2012, 38(10): 1646-1653(綦科, 谢冬青. 基于第二代Bandelet变换的抗几何攻击图像水印. 自动化学报, 2012, 38(10): 1646-1653)
[7]  Aldeeb N H H, Abuhaiba I S I. An improved watermarking scheme for tiny tamper detection of color images. International Journal of Image, Graphics and Signal Processing, 2013, 5(5): 1-14
[8]  He H J, Chen F, Tai H M, Kalker T, Zhang J S. Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 185-196
[9]  Tzeng C H, Tsai W H. A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement. IEEE Communications Letters, 2003, 7(9): 443-445
[10]  Yang H J, Alex C K. Binary image authentication with tampering localization by embedding cryptographic signature and block identifier. IEEE Signal Processing Letters, 2006, 13(12): 741-744
[11]  Xi Y H, Zhang M R. A document watermarking algorithm based on partitioned character image. In: Proceedings of the 2009 International Conference on E-Business and Information System Security. Wuhan, China: IEEE, 2009. 1-4
[12]  Kwon O J, Kim W G, Kim Y. Binary image watermarking with tampering localization in binary wavelet transform domain. International Journal of Multimedia and Ubiquitous Engineering, 2012, 7(2): 341-346
[13]  Wu M, Liu B D. Data hiding in binary image for authentication and annotation. IEEE Transactions on Multimedia, 2004, 6(4): 528-538
[14]  Zhu Cong-Xu, Chen Zhi-Gang. Sensitive chaotic fragile watermarking technique for binary images verification. Mini-Micro Systems, 2006, 27(1): 151-154(朱从旭, 陈志刚. 一种灵敏的文本图像认证混沌脆弱水印技术. 小型微型计算机系统, 2006, 27(1): 151-154)
[15]  Li Zhao-Hong, Hou Jian-Jun, Song Wei. Binary document image authentication watermarking technique based on hierarchical structure. Acta Automatica Sinica, 2008, 8(8): 841-848(李赵红, 侯建军, 宋伟. 基于等级结构的二值文本图像认证水印算法. 自动化学报, 2008, 8(8): 841-848)
[16]  Fridrich J, Goljan M, Memon N. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262-274
[17]  Wang Z, Bovik A C, Sheikh H R, Simoncelli E P. Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing, 2004, 13(4): 600-612
[18]  He Hong-Jie, Zhang Jia-Shu. Chaos-based scramble self-embedding watermarking algorithm. Journal on Communications, 2006, 27(7): 80-86, 93(和红杰, 张家树. 基于混沌置乱的分块自嵌入水印算法. 通信学报, 2006, 27(7): 80-86, 93)
[19]  He Hong-Jie. Digital Image Secure Authentication Watermarking Algorithms and Their Performance Analysis of Statistical Detection [Ph.D. dissertation]. Southwest Jiaotong University, China, 2009(和红杰. 数字图像安全认证水印算法及其统计检测性能分析 [博士学位论文], 西南交通大学, 中国, 2009)
[20]  Zhou Lin-Na. Study of Digital Forensics Based on Image Content [Ph.D. dissertation], Beijing University of Posts and Telecommunications, China, 2007 (周琳娜. 数字图像盲取证技术研究 [博士学位论文], 北京邮电大学, 中国, 2007)

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133