Fragile Watermarking Scheme with Abilities of Self-restoration and Discrimination of Tampers on Image Content or Watermark
-
摘要: 分析了现有算法的缺陷,提出了一种能有效区分图像内容或水印篡改的自恢复安全脆弱水印算法.该方案利用检测水印实现篡改定位和篡改区分的功能,采用恢复水印恢复被篡改的图像内容.理论分析和实验仿真均表明,所提出的算法具有很好的篡改区分、篡改定位和篡改恢复的能力,能够抵抗同步伪造攻击和密钥分析攻击.Abstract: Based on the fact that the current fragile watermarking scheme with the ability of tamper discrimination can not discriminate tampers effectively,a novel fragile watermarking scheme with the abilities of self-restoration and discrimination of tampers on image content or watermark was proposed.In this scheme,the authentication watermark is used to localize and discriminate tampers,and the resumptive watermark is utilized to resume the tampered image content.Theoretical analysis and experimental simulation show that the proposed scheme has good abilities of tamper discrimination,tamper localization and tamper restoring,even more the ability of resisting synchronization counterfeit attack and key analysis attack.
-
Key words:
- image authentication /
- fragile watermarking /
- tamper discrimination /
- tamper localization /
- tamper restoring /
- chaos
-
FRIDRICHJ,GOLJAN M.Images with self-correcting capahilities[C] //In Proceedings of the IEEE International Conference on Image Processing.Kobe:IEEE Press,1999:25-28.[2] TEFAS A,PITAS L.Image authentication using chaotic mixing systems[C] //Proceedings of IEEE International Conference on Circuits and Systems:Symposium.Sydeney:IEEE Press,2000:216-219.[3] WONG P W,MEMON N.Secret and public key image watermarking schemes for image authentication and ownership verification[J].IEEE Tram.on Image Processing,2001,10(10):1 593-1 601.[4] LU C S,MARK LIAO H Y.Multipurpese watermarking for image authentication and protection[J].IEEE Trans.on Image Processing,2001,10(10):1 579-1 592.[5] CELIK M U,SHARMA G,SABER E.Hierarchical watermarking for secure image authentication with localization[J].IEEE Trans.on Image Processing,2002,11(6):585-595.[6] WONG P W.A public key watermark for image verification and authentication[C] //In Proceedings of the IEEE International Conference on Image Processing.Chicago:IEEE Press,1998:455-459.[7] 和红杰,张家树,田蕾.能区分图像或水印篡改的脆弱水印方案[J].电子学报,2005,33(9):1 557-1 561.HE Hongjie,ZHANG Jiashu,TIAN Lei.A fragile watermarking scheme with discrimination of tampers on image or watermark[J].Acta Electronica Sinica,2005,33 (9):1 557-1 561.[8] 王宏霞,罗键.基于图像连通性的自适应水印同步方案[J].西南交通大学学报,2005,40(6):720-726.WANG Hongxia,LUO Jian.Selfadaptive watermarking synchronization scheme based on image connectivity[J].Journal of Southwest Jiaotong University,2005,40(6):720-726.[9] WANG Hongxia,LUO Jian.Connectivity-based watermarking robust to geometrical attacks[J].Journal of Southwest Jiaotong University,2006,14(1):1-6.[10] 和红杰,张家树.一种安全的自嵌入及篡改检测和恢复算法[J].哈尔滨工业大学学报(增刊),2006,38:889-892.HE Hongjie,ZHANG Jiashu.A secure self embedding watermarking scheme with tamper detection and restoration[J].Journal of Harbin Institute of Technology,2006,38:889-892.
点击查看大图
计量
- 文章访问数: 1578
- HTML全文浏览量: 63
- PDF下载量: 338
- 被引次数: 0