• ISSN 0258-2724
  • CN 51-1277/U
  • EI Compendex
  • Scopus 收录
  • 全国中文核心期刊
  • 中国科技论文统计源期刊
  • 中国科学引文数据库来源期刊

能区分图像内容或水印篡改的自恢复脆弱水印

范明泉 王宏霞

范明泉, 王宏霞. 能区分图像内容或水印篡改的自恢复脆弱水印[J]. 西南交通大学学报, 2008, 21(6): 799-805.
引用本文: 范明泉, 王宏霞. 能区分图像内容或水印篡改的自恢复脆弱水印[J]. 西南交通大学学报, 2008, 21(6): 799-805.
FAN Mingquan, WANG Hongxia. Fragile Watermarking Scheme with Abilities of Self-restoration and Discrimination of Tampers on Image Content or Watermark[J]. Journal of Southwest Jiaotong University, 2008, 21(6): 799-805.
Citation: FAN Mingquan, WANG Hongxia. Fragile Watermarking Scheme with Abilities of Self-restoration and Discrimination of Tampers on Image Content or Watermark[J]. Journal of Southwest Jiaotong University, 2008, 21(6): 799-805.

能区分图像内容或水印篡改的自恢复脆弱水印

基金项目: 

国家自然科学基金资助项目(60702025)

四川省青年科技基金资助项目(07ZQ026-004)

高等学校博士科学点专项科研基金资助项目(20070613024)

西南交通大学发展基金(2006A04)的资助

详细信息
    作者简介:

    范明泉(1982- ),男,博士研究生,研究方向为隐写检测、脆弱水印,E-mail:mqfan_se@163.com

    通讯作者:

    王宏霞(1973- ),女,教授,博士,主要研究方向为保密通信、信息隐藏和多媒体编码技术,E-mail:hxwang@swim.edu.cn

Fragile Watermarking Scheme with Abilities of Self-restoration and Discrimination of Tampers on Image Content or Watermark

  • 摘要: 分析了现有算法的缺陷,提出了一种能有效区分图像内容或水印篡改的自恢复安全脆弱水印算法.该方案利用检测水印实现篡改定位和篡改区分的功能,采用恢复水印恢复被篡改的图像内容.理论分析和实验仿真均表明,所提出的算法具有很好的篡改区分、篡改定位和篡改恢复的能力,能够抵抗同步伪造攻击和密钥分析攻击.

     

  • FRIDRICHJ,GOLJAN M.Images with self-correcting capahilities[C] //In Proceedings of the IEEE International Conference on Image Processing.Kobe:IEEE Press,1999:25-28.[2] TEFAS A,PITAS L.Image authentication using chaotic mixing systems[C] //Proceedings of IEEE International Conference on Circuits and Systems:Symposium.Sydeney:IEEE Press,2000:216-219.[3] WONG P W,MEMON N.Secret and public key image watermarking schemes for image authentication and ownership verification[J].IEEE Tram.on Image Processing,2001,10(10):1 593-1 601.[4] LU C S,MARK LIAO H Y.Multipurpese watermarking for image authentication and protection[J].IEEE Trans.on Image Processing,2001,10(10):1 579-1 592.[5] CELIK M U,SHARMA G,SABER E.Hierarchical watermarking for secure image authentication with localization[J].IEEE Trans.on Image Processing,2002,11(6):585-595.[6] WONG P W.A public key watermark for image verification and authentication[C] //In Proceedings of the IEEE International Conference on Image Processing.Chicago:IEEE Press,1998:455-459.[7] 和红杰,张家树,田蕾.能区分图像或水印篡改的脆弱水印方案[J].电子学报,2005,33(9):1 557-1 561.HE Hongjie,ZHANG Jiashu,TIAN Lei.A fragile watermarking scheme with discrimination of tampers on image or watermark[J].Acta Electronica Sinica,2005,33 (9):1 557-1 561.[8] 王宏霞,罗键.基于图像连通性的自适应水印同步方案[J].西南交通大学学报,2005,40(6):720-726.WANG Hongxia,LUO Jian.Selfadaptive watermarking synchronization scheme based on image connectivity[J].Journal of Southwest Jiaotong University,2005,40(6):720-726.[9] WANG Hongxia,LUO Jian.Connectivity-based watermarking robust to geometrical attacks[J].Journal of Southwest Jiaotong University,2006,14(1):1-6.[10] 和红杰,张家树.一种安全的自嵌入及篡改检测和恢复算法[J].哈尔滨工业大学学报(增刊),2006,38:889-892.HE Hongjie,ZHANG Jiashu.A secure self embedding watermarking scheme with tamper detection and restoration[J].Journal of Harbin Institute of Technology,2006,38:889-892.
  • 加载中
计量
  • 文章访问数:  1578
  • HTML全文浏览量:  63
  • PDF下载量:  338
  • 被引次数: 0
出版历程
  • 收稿日期:  2007-05-15
  • 刊出日期:  2008-12-25

目录

    /

    返回文章
    返回