期刊文献+

一种基于人眼视觉特征的图像内容认证算法

Image Content Authentication Algorithm Based on Human Visual System
在线阅读 下载PDF
导出
摘要 该文提出了一种用于精确认证的脆弱水印算法。该算法结合人类视觉系统特性,利用模糊C-均值聚类技术,基于亮度、纹理、对比度等提取类成员关系度作为认证水印,通过修改图像块各象素的最低有效位实现水印信息的嵌入。在认证端,从接收到的图像提取其中所隐藏信息,判断内容发生变化的位置,实现了盲检测。实验结果表明,该算法生成的含水印图像透明性好,能够准确检测并定位篡改发生的位置。 This paper presents a fragile watermarking algorithm for exact authentication.Combining with the characteristics of human visual system,it takes class membership degree as the authentication watermark based on the luminance,texture and contrast by using the fuzzy c-means clustering technique,and embeds the watermark by modifying the least significant bit of each pixel.In the authentication side,the algorithm extracts the hidden information from the received image to determine the locations where the content is changed and achieves the blind detection.Experimental results show that the watermarked image have good transparency;meanwhile,it can detect and locate the tampered areas accurately.
出处 《杭州电子科技大学学报(自然科学版)》 2011年第5期143-146,共4页 Journal of Hangzhou Dianzi University:Natural Sciences
关键词 脆弱水印 图像认证 人类视觉系统 fragile watermark image authentication human visual system
  • 相关文献

参考文献5

  • 1吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70
  • 2Chang C C,Hu Y S,Lu T C.A watermarking-based image ownership and tampering authentication scheme[J].PatternRecognition Letters,2006,27(5):439-446.
  • 3ChenWei Che,Wang Ming Shi.A fuzzy c-means clustering-based fragile watermarking scheme for image authentication[J].Expert Systems with Applications,2009,36(2):1 300-1 307.
  • 4Li Yang,Yu Fusheng.A new validity function for fuzzy clustering[C].Wuhan:International Conference on CINC,2009:462-465.
  • 5唐向宏,岳恒立.基于人眼视觉模型的图像水印技术[J].杭州电子科技大学学报(自然科学版),2005,25(1):1-5. 被引量:2

二级参考文献66

  • 1Honsinger C.W., Jones P., Rabbani M., Stoffel J.C.. Lossless recovery of an original image containing embedded data. U.S. Patent No. 6,278,791, 2001
  • 2Fridrich J., Goljan M., Du R.. Lossless data embedding for all image formats. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 572~583
  • 3Tian J.. Wavelet-based reversible watermarking for authentication. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 679~690
  • 4Holliman M., Memon N.. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000, 9(3): 432~441
  • 5Fridrich J., Goljan M., Memon N.. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262~274
  • 6Wu J., Zhu B., Li S., Lin F.. Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes. In: Proceedings of the IEEE International Conference on Multimedia & Expo (ICME'04), Taiwan, 2004
  • 7Wu J., Zhu B., Li S., Lin F.. New attacks on SARI image authentication system. In:Proceedings of the SPIE,Vol.5306, Security and Watermarking of Multimedia Contents VI, San Jose, California, USA, 2004, 602~609
  • 8Yeung M., Mintzer F.. Invisible watermarking for image verification. Journal of Electronic Imaging, 1998, 7(3): 578~591
  • 9Wu M., Liu B.. Watermarking for image authentication. In: Proceedings of the IEEE International Conference on Image Processing, Chicago, USA, 1998, 2: 437~441
  • 10Memon N., Shende S., Wong P.. On the security of the Yeung-Mintzer authentication watermark. In:Proceedings of the IS&T PICS Symposium, Savannah, Georgia, 1999, 301~306

共引文献70

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部