期刊文献+

一种精确定位篡改攻击位置的混沌数字水印算法

An Precise Positioning Tamper-Resistant Digital Watermarking Algorithm Based on Chaotic Transforming
在线阅读 下载PDF
导出
摘要 基于混沌变换良好的随机性和初始条件极端敏感性,提出了一种精确定位篡改位置的脆弱混沌数字水印算法.该算法将混沌加权后DCT中低频系数作为图像特征,利用混沌DCT匹配块对生成脆弱水印序列,最后嵌入到图像的DCT中频系数中.实验结果与分析表明,该算法几乎不影响图像的视觉质量,对图像篡改区域具有检测有效性和定位准确性,实现了盲认证.该算法不仅提高了篡改定位的精度,虚检率与漏检率也相应降低. Based on the good randomness and extreme sensitivity to initial value of the chaotic transformation,we propose a new tamper-resistant fragile digital watermarking algorithm with the function of precise positioning. The algorithm makes use of the low-frequency and middle-fre- quency of DCT coefficients weighted by chaotic sequence as image characteristic information,and generates fragile watermarking sequence by chaotic transformation, and then it embeds fragile wa- termarking sequence in the middle-frequency DCT coefficients. Experimental results and theoreti- cal analysis show that the algorithm almost does not affect the visual quality of the image, and the tamper region can be detected effectively and positioned accurately, and the source image is not re- quired in the process of the watermarking information extraction and verification. The proposed algorithm not only improves the precision ratio of positioning the tamper region, but also reduces the ratio of false positive and false negative.
出处 《军械工程学院学报》 2012年第4期48-52,共5页 Journal of Ordnance Engineering College
关键词 数字水印 混沌变换 防篡改 DCT 盲认证 digital watermarking chaotic transformation tamper-resistant DCT blind verification
  • 相关文献

参考文献6

  • 1LI C.-T. Digital fragile watermarking scheme for authentication of JPEG images[J].IEEE Proceedings:Vision Image and Signal Processing,2004,(06):460-466.
  • 2XIE Liehua,AREC R G,GRAVEMAN F R. Approximate image message authentication codes[J].IEEE Transactions on Multimedia,2001,(02):242-252.
  • 3WANG Hongxia,DING Ke,LIAO Changxing. Chaotic watermarking scheme for authentication of JPEG images[J].International Symposium on Biometrics and Security Technologies,2008.1-4.
  • 4张春田,张静.基于混沌映射的鲁棒性图像水印算法[J].电子学报,2002,30(1):69-72. 被引量:14
  • 5NIKOLAIDIS A,PITAS I. Asymptotically optimal detection for additive watermarking in the DCT and DWT domains[J].IEEE Transactions on Image Processing,2003,(05):563-571.doi:10.1109/TIP.2003.810586.
  • 6李睿,李明,张贵仓.基于随机分块的脆弱性水印算法设计[J].武汉大学学报(信息科学版),2006,31(9):832-834. 被引量:1

二级参考文献13

  • 1王宏霞,何晨,丁科.基于混沌映射的鲁棒性公开水印[J].软件学报,2004,15(8):1245-1251. 被引量:50
  • 2[1]G Voyatzis,I Pitas.Digital image watermarking using mixing systems[J].Computer & Graphic.1998,22(4):405-410.
  • 3[2]M Kutter.Watermarking resisting to translation,rotation and scaling[A].Proc.SPIE Int Symp.on Voice,Video and Data Communication [C].Nov.1998.
  • 4[3]D K Arrowsmith,C M Place.An introduction to dynamical system[M].Cambridge Univ.Press.1990.
  • 5[4]J R Hemandez,F Perez-Gonzalez.Statistical analysis of watermarking schemes for copyright protection of images [A].Proceedings of the IEEE[C].1999,87(7).
  • 6[5]M Kutter,F Jordan,F Bossen.Digital signature of color images using amplitude modulation [A].in Proc.Electronic imaging 1999(EI97) [C].San Jose,CA.Feb.1997.
  • 7CoxIJ MillerML BloomJA.数字水印[M].北京:电子工业出版社,2003..
  • 8Bender W, Gruhl D,Morimoto N, et al. Techniques for Data Hiding[J]. IBM System Journal, 1996,35(3/4) :313-335
  • 9Petitcolas F A P, Anderson R J, Kuhn M G. Information Diding: aSurvey[J]. IEEE, 1999,87(7):1062-1078
  • 10吴秋新,钮心析,杨义先,等.信息隐藏技术—隐写术与数字水印[M].北京:人民邮电出版社,2001

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部