全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

用于图像认证的可恢复半脆弱数字水印

DOI: 10.11834/jig.20080706

Keywords: 图像认证,量化索引调制,半色调技术,篡改恢复

Full-Text   Cite this paper   Add to My Lib

Abstract:

为了提高图像认证的可靠性,提出了一种用于图像内容认证的可恢复半脆弱数字水印方案,该方案不仅能鉴别数字图像内容的真实性,还可近似恢复图像中被篡改的区域。该方案基于半色调处理技术,首先将图像半色调处理后生成的二值水印图像经JBIG2压缩后作为嵌入水印,然后经量化索引调制嵌入小波域。用该方案嵌入水印后的图像,在检测时,不但可以定位图像中被篡改的区域,还可以对提取的恢复水印进行解压,并可通过逆半色调处理来重建原图像,用它的对应部分替换被篡改区域来实现对被篡改图像的篡改恢复。此外,由于该算法采用密钥来控制水印的嵌入位置,从而保证了水印的安全性;仿真实验是采用一般性操作和篡改操作相结合的方法,实验结果表明,该算法在保护数字图像内容真实性方面是可行的。

References

[1]  Zhu B B, Swanson M D,Tewfik A H. When seeing isn\\' t believing [J]. IEEE Signal Processing Magazine, 2004, 21( 2 ) : 40 - 49.
[2]  Floyd R W, Steinberg L. An adaptive algorithm for spatial gray scale [J]. Proceedings of the Society for Information Displays, 1976, 17(2) : 75-77.
[3]  Wong P W. Adaptive error diffusion and its application in muhiresolution rendering [J]. IEEE Transactions on Image Processing, 1996, 5 (7) : 1184 - 1196.
[4]  Au O C, Fu M S, Wong P H W, et al. Hybrid inverse halftoning using adaptive filtering [ A ]. In: Proceedings of the IEEE International Symposium on Circuits and Systems [C] , Orlando, Florida, USA, 1999, 4:259 -262.
[5]  边文奎 何丕廉 徐梦苏.二值图像压缩标准-JBIG2[J].计算机工程与应用,2002(13):103-104.
[6]  沃焱 韩国强 张波.一种新的基于特征的图像内容认证方法[J].计算机学报,2005,28(1):105~112.
[7]  Lin C Y, Chang S F. Semi-fragile watermarking for authentication JPEG visual content [ A ]. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents 11 [C] , San Jose, CA, USA, 2000, 3971:140 - 151.
[8]  Lu C S, Liao H Y M. Muhipurpose watermarking for image authentication and protection [J] . IEEE Transactions on Image Processing, 2001, 10 (10) : 1579 - 1592.
[9]  Chen B, Wornell G W. Quantization index modulation: a class of provabty good methods for digitat watermarking and information embedding[J]. IEEE Transactions on Information Theory, 2001, 47(5) :1423 - 1433.
[10]  Bayer B E. An optimum method for two level rendition of continuous tone pictures[ A]. In: Proceedings of IEEE International Conference on Communications [C], New York, NY, USA, 1973, 1: 2611-2615.
[11]  Knuth D E. Digital halftones by dot diffusion [J]. ACM Transactions on Graphics, 1987, 6(4):245 -273.
[12]  Ulichney R A. Dithering with blue noise [J]. Proceedings of the IEEE, 1988, 76(1) : 56-79.
[13]  Analoui M, Allebach J P. New results on reconstruction of continuous-tone from halftone [ A ]. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing [C], San Francisco, CA, USA, 1992, 3:313-316.
[14]  Stevenson R L. Inverse halftoning via MAP estimation [J]. IEEE Transactions on Image Processing, 1997, 6(4) : 574 - 583.
[15]  Mese M, Vaidyanathan P P. Look up table (LUT) method for inverse halftoning [J]. IEEE Transactions on Image Processing, 2001, 10(10) : 1566 - 1578.
[16]  Kundur D, Hatzinakos D. Digital watermarking for telhale tamper proofing and authentication [J]. Proceedings of the IEEE, 1999, 87(7) :1167 - 1180.
[17]  蔡茂国 王小民.一种基于小波变换及图像边缘特征的盲水印算法[J].计算机工程与应用,2005,41(3):54-56.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133