期刊文献+

基于视觉感知的图像自适应半脆弱水印算法 被引量:3

An Image Adaptive Semi-fragile Watermarking Algorithm Based on Visual Perception
在线阅读 下载PDF
导出
摘要 在充分考虑图像视觉感知特性的基础上,提出一种图像自适应半脆弱水印算法。首先利用图像亮度、纹理特性确定水印嵌入比特深度;然后采用自适应LSB替换方法嵌入水印信息,水印嵌入强度依赖于载体图像特征;最后应用优化像素调整进一步提高水印透明性。实验结果表明,算法对偶然攻击有一定的鲁棒性而对恶意攻击比较敏感,且能有效识别图像攻击类型。此外,理论分析与仿真实验均说明本文算法比同类算法具有更高的透明性,其隐秘图像PSNR值要高约2.90dB。 An image adaptive semi-fragile watermarking algorithm was proposed by considering the human visual perception. First, the bit depth to be embedded was determined by exploiting the luminance, and texture masking characteristics. Then, the watermark is embedded into the host image with adaptive least significant Bit substitution. The watermark strength is dependent on the host image features due to the use of the visual perception features. Finally, an optimal pixel adjustment process is used to further enhance the transparency. Experiment results show that the proposed algorithm is sensitive to malicious attacks while robust to incidental attacks, and can classify effectively the type of attacks encountered on the watermarked image. When compared with some existing semi-fragile watermarking methods, the proposed scheme achieves about 2.90 dB higher PSNR
作者 杨恒伏 孙光
出处 《光电工程》 CAS CSCD 北大核心 2011年第2期51-58,共8页 Opto-Electronic Engineering
基金 国家自然科学基金(61073191) 湖南省自然科学基金(10JJ6090)资助项目 湖南省高校科技创新团队支持计划([2010]212号)
关键词 半脆弱水印 篡改检测 视觉感知 优化像素调整 透明性 semi-fragile watermarking tampering detection visual perception optimal pixel adjustment transparency
  • 相关文献

参考文献15

  • 1ZHANG D X, PAN Z G, L1 H H. A Contour-Based Semi-Fragile Image Watermarking Algorithm in DWT Domain [C]// Proceedings of 2010 Second International Workshop on Education Technology and Computer Science, Wuhan, China, March 6-7, 2010. Washington D C, US: 1EEE Computer Society, 2010: 228-231.
  • 2叶天语,钮心忻,杨义先.基于奇异值分解和混沌映射的脆弱认证水印[J].光电工程,2008,35(9):138-144. 被引量:7
  • 3WANG X Q, WANG J, PENG H. A Semi-Fragile Image Watermarking Resisting to JPEG Compression [C]//Praceedings of 2009 International Conference on Management of e-Commerce and e-Government, Nanchang, China, September 16-19, 2009. Washington D C, US: IEEE Computer Society, 2009: 498-502.
  • 4LU Z M, LIN C H, XU D G, et al. Semi-Fragile Image Watermarking Method Based on Index Constrained Vector Quantization [J]. Electronics Letters(S0013-5194), 2003, 39(1): 35-36.
  • 5Chamlawi R, Khan A, Idris A, et al. A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images Based on Wavelet Transform [J]. World Academy of Science, Engineering and Technology(S1307-6892), 2006, 23(11): 49-53.
  • 6Ishihara N, Abe K. A Semi-Fragile Watermarking Scheme Using Weighted Vote With Sieve And Emphasis For Image Authentication [J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (S0916-8508), 2007, E90-A(5): 1045-1054.
  • 7Seng W C, Du J, Pham B. Semi Fragile Watermark with Self Authentication and Self Recovery [J]. Malaysian Journal of Computer Science(S0127-9084), 2009, 22(1): 64-84.
  • 8Ko H H, Park S J. Semi-Fragile Watermarking for Telltale Tamper Proofing and Authenticating [C]//Proceediugs of the 17th International Technical Conference on Circuits/Systems Computers and Communications (ITC-CSCC 2002), Phuket, Thailand, July 16-19, 2002: 623-626.
  • 9王向阳,陈利科.一种新的自适应半脆弱水印算法[J].自动化学报,2007,33(4):361-366. 被引量:17
  • 10Lin C H, Su T S, Hsieh W S. Semi-fragile Watermarking Scheme for Authentication of JPEG Images [J]. Tamkang Journal of ScieneeandEngineering(S1560-6686), 2007, 10(1): 57-66.

二级参考文献16

共引文献22

同被引文献33

  • 1王向阳,杨红颖,陈利科.基于人眼视觉系统的自适应量化数字水印算法研究[J].小型微型计算机系统,2005,26(9):1525-1529. 被引量:24
  • 2彭翔,张鹏,位恒政,于斌.双随机相位加密系统的已知明文攻击[J].物理学报,2006,55(3):1130-1136. 被引量:22
  • 3彭翔,汤红乔,田劲东.双随机相位编码光学加密系统的唯密文攻击[J].物理学报,2007,56(5):2629-2636. 被引量:44
  • 4张忠梅,金聪.基于系数相关性的自适应水印算法[J].武汉大学学报(理学版),2007,53(3):309-313. 被引量:1
  • 5QIN W, PENG X. Asymmetric cryptosystem based on phase-truncated Fourier transforms [J]. Optics Letters(S0146-9592), 2010, 35(2): 118-120.
  • 6WANG X G, ZHAO D M. Security enhancement of a phase-truncation based image encryption algorithm [J]. Applied Optics(S0003-6935), 2011, 50(36): 6645-6651.
  • 7CHEN W, CHEN X D. SHEPPARD C J R. Optical image encryption based on diffractive imaging [J]. Optics Letters(S0146-9592), 2010, 35(22): 3817-3819.
  • 8REFREGIER P, JAVIDI B. Optical image encryption based on input plane and Fourier plane random encoding [J]. Optics Letters(SO146-9592), 1995, 20(7): 767-769.
  • 9PENG X, ZHANG P, WEI H Z, et al. Known-plaintext attack on optical encryption based on double random phase keys [J]. OpticsLetters(S0146-9592), 2006, 31(8): 1044-1046.
  • 10UNNIKRISHNAN G, JOSEPH J, SINGH K. Optical encryption by double-random phase encoding in the fractional Fourier domain [J]. Opties Letters(S0146-9592), 2000, 25(12): 887-889.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部