期刊文献+

一种图像自嵌入方法 被引量:12

A Method of Image Self-Embedding
在线阅读 下载PDF
导出
摘要 描述了一种图像的自嵌入保护方法,将图像分成8×8的子块,每个子块的压缩编码与偏移子块的认证信息嵌入到偏移子块中.数据嵌入时,最多只改变原图像子块最低位数据的一半,对原图像影响相对较小,当原图像有缺损或被篡改时,可较准确地确定其位置,并可较好地恢复原图像. This paper presents a method of image protection using self-embedding. The image is divided into 8× 8 block , compressed codes of each block and authentication information of the block offset are embedded into the block offset. When data is embedded, only no more than half of the data on the least significant bits need to be modified, and relatively the influence to the original image is on the small side. Changes to the image can be detected, located and corrected with this method.
出处 《电子学报》 EI CAS CSCD 北大核心 2006年第7期1347-1350,共4页 Acta Electronica Sinica
关键词 自嵌入 定位 恢复 脆弱水印 self-embedding tamper locating image recovery fragile watermark
  • 相关文献

参考文献8

  • 1Mohamed A S,Mohammad S O.Digital watermarkingbased DCT and JPEG model[J].IEEE Transactions on Instrumentation and Measurement.2003,52 (5):1640-1647.
  • 2C S Lu,Y M Liao.Multipurpose watermarking for image authentication and protection[J].IEEE Transactions On Image Processing.2001,10(10):1579-1592
  • 3Fridrich J,Goljan M.Protection of digital images using self embedding[A].Proceeding of NJIT Symposium on Content Security and Data Hiding in Digital Media,(Newark,NJ)[C].New Jersey Institute of Technology May,1999.
  • 4张鸿宾,杨成.图像的自嵌入及窜改的检测和恢复算法[J].电子学报,2004,32(2):196-199. 被引量:49
  • 5A M Tekalp,Digital Video Processing[M].Prentice Hall,1998.397-399.
  • 6A Menezes,P van Oorchot.Handbook of Applied Cryptography[M].Boca Raton,FL:CRC,1997.
  • 7M U Celik,G Sharma.Hierarchical watermarking for secure image authentication with localization[J].IEEE Transactions on Image Processing.June,2002,11 (6):585-595.
  • 8程义民,钱振兴,王以孝,田源.基于数位信息的信息隐藏方法[J].电子与信息学报,2005,27(8):1304-1309. 被引量:15

二级参考文献19

  • 1[1]Lin E T,Delp E J.A review of fragile image watermarks [A].Proc.of the Multimedia and Security Workshop (ACM Multimedia'99) [C].Orlando,1999.25-29.
  • 2[2]Walton S.Information authentication for a slippery new age [J].Dr.Dobbs Journal,1995,20(4):18-26.
  • 3[3]Yeung M,Mintzer F.Invisible watermarking for image verification [J].Journal of Electronic Imaging,1998,7(3):578-591.
  • 4[4]Wolfgang R B,Delp E J.A watermark for digital images [A].Proc.IEEE Int.Conf.on Image Processing [C].ACM Press,NY,1996.3.219-222.
  • 5[5]Schynael R van,Tirkel A,Osborce C.A digital watermark [A].Proc.of the IEEE ICIP [C].Austin,Texas,1994.2.86-90.
  • 6[6]Wolfgang R B,Delp E J.Fragile watermarking using the VW2D watermark [A].Proc.SPIE,Security and Watermarking of Multimedia Contents [C].San Jose,California,1999.204-213.
  • 7[7]Wong P W.A watermark for image integrity and ownership verification [A].Proc.IS&T PIC Conf.[C].Porland,OR,1998.
  • 8[8]Wong P W.A public key watermark for image verification and authentication [A].Proc.ICIP [C].Chicago,IL,Oct.1998.
  • 9[9]Wong P W,Memon N.Secret and public key image watermarking schemes for image authentication and ownership verification [J].IEEE Trans on Image Processing,2001,10(10):1593-1601.
  • 10[10]Wu M,liu B.Watermarking for image authentication [A].Proc.ICIP [C].Chicago,IL,1998.

共引文献62

同被引文献150

引证文献12

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部