Fragile Watermarking Algorithm Based on Circular Structure
-
摘要: 为提高水印的篡改定位能力,提出了一种基于循环结构的脆弱型数字水印算法.该算法首先将图像进行分块,利用Logistic映射调制图像块生成水印,然后利用猫映射构造循环结构,建立图像块之间一一对应的循环关系,并将块水印嵌入到对应图像块的最低有效位(LSBs)中.实验结果显示,所提出的算法不仅能准确定位,而且可以有效地抵抗统计攻击和矢量量化攻击.
-
关键词:
- 脆弱型数字水印 /
- 图像认证 /
- Logistic映射 /
- 猫映射 /
- 循环结构
Abstract: To improve the ability of tamper localization of watermarking,a novel fragile watermarking algorithm based on circular structure was proposed.In this algorithm,images are divided into blocks,and the blocks are modulated by the Logistic mapping to generate block watermarks.Then cat mapping is utilized to construct a circular structure in order to build a one-to-one circular relationship between image blocks.The block watermarks are embedded into LSB (least significant bit) of the corresponding blocks in light of the circular structure.The simulation results show that the proposed algorithm can not only localize the tampers correctly and accurately,but also resist the statistic attack and the counterfeiting attack.-
Key words:
- fragile watermarking /
- image authentication /
- Logistic mapping /
- cat mapping /
- circular structure
-
WONG P W.A public key watermark for image verification and authentication[C] ∥Proceedings of the International Conference on Image Processing.Chicago:IEEE Computer Society Press,1998:425-429.[2] HOLLIMAN M,MEMON N.Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes[J].IEEE Transactions on Image Processing,2000,9(3):432-441.[3] FRIDRICH J,GOLJAN M,MEMON N.Further attacks on Yeung-Mintzer fragile watermarking scheme[C] ∥Proc.SPIE Photonic West Electronic Imaging 2000,Security and Watermarking of Multimedia Contents.San Jose:SPIE,2000:24-26.[4] LIN Chingyung,CHANG Shihfu.A robust image authentication method distinguishing JPEG compression from malicious manipulation[J].IEEE Transactions on Circuits and Systems of Video Technology,2001,11(2):153-168.[5] MEMON N,SHENDE S,WONG P.On the security of the Yueng-Mintzer authentication watermark[C] ∥Proceedings of the IS & T PICS Symposium.Savannah:PICS,1999:301-306.[6] 丁科,何晨,王宏霞.一种定位精确的混沌脆弱数字水印技术[J].电子学报,2004,32(6):1009-1012.DING Ke,HE Chen,WANG Hongxia.A chaotic fragile watermarking technique with precise localization[J].Acta Electronica Sinca,2004,32(6):1009-1012.[7] 张小华,孟红云,刘芳.一类有效的脆弱型数字水印技术[J].电子学报,2004,32(1):114-117.ZHANG Xiaohua,MENG Hongyun,LIU Fang.A new kind of efficient fragile watermarking technique[J].Acta Electronica Sinca,2004,32(1):114-117.[8] LIU Lianshan,LI Renhou,GAO Qi.DWT-based robust color image watermarking scheme[J].Journal of Southwest Jiaotong University (English Edition),2005,13(2):130-134.[9] WANG Hongxia,LUO Jian.Connectivity-based watermarking robust to geometrical attacks[J].Journal of Southwest Jiaotong University (English Edition),2006,14(1):1-6.[10] 王宏霞,罗键.基于图像连通性的自适应水印同步方案[J].西南交通大学学报,2005,40(6):720-726.WANG Hongxia,LUO Jian.Self-adaptive watermarking synchronization scheme based on image connectivity[J].Journal of Southwest Jiaotong University,2005,40(6):720-726.
点击查看大图
计量
- 文章访问数: 1492
- HTML全文浏览量: 66
- PDF下载量: 318
- 被引次数: 0