• ISSN 0258-2724
  • CN 51-1277/U
  • EI Compendex
  • Scopus
  • Indexed by Core Journals of China, Chinese S&T Journal Citation Reports
  • Chinese S&T Journal Citation Reports
  • Chinese Science Citation Database
Volume 22 Issue 5
Mar.  2010
Turn off MathJax
Article Contents
SONG Wei, HOU Jianjun, LI Zhaohong. Fragile Watermarking Algorithm Based on Circular Structure[J]. Journal of Southwest Jiaotong University, 2009, 22(5): 672-676.
Citation: SONG Wei, HOU Jianjun, LI Zhaohong. Fragile Watermarking Algorithm Based on Circular Structure[J]. Journal of Southwest Jiaotong University, 2009, 22(5): 672-676.

Fragile Watermarking Algorithm Based on Circular Structure

  • Received Date: 04 Apr 2007
  • Publish Date: 12 Nov 2009
  • To improve the ability of tamper localization of watermarking,a novel fragile watermarking algorithm based on circular structure was proposed.In this algorithm,images are divided into blocks,and the blocks are modulated by the Logistic mapping to generate block watermarks.Then cat mapping is utilized to construct a circular structure in order to build a one-to-one circular relationship between image blocks.The block watermarks are embedded into LSB (least significant bit) of the corresponding blocks in light of the circular structure.The simulation results show that the proposed algorithm can not only localize the tampers correctly and accurately,but also resist the statistic attack and the counterfeiting attack.

     

  • loading
  • WONG P W.A public key watermark for image verification and authentication[C] ∥Proceedings of the International Conference on Image Processing.Chicago:IEEE Computer Society Press,1998:425-429.[2] HOLLIMAN M,MEMON N.Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes[J].IEEE Transactions on Image Processing,2000,9(3):432-441.[3] FRIDRICH J,GOLJAN M,MEMON N.Further attacks on Yeung-Mintzer fragile watermarking scheme[C] ∥Proc.SPIE Photonic West Electronic Imaging 2000,Security and Watermarking of Multimedia Contents.San Jose:SPIE,2000:24-26.[4] LIN Chingyung,CHANG Shihfu.A robust image authentication method distinguishing JPEG compression from malicious manipulation[J].IEEE Transactions on Circuits and Systems of Video Technology,2001,11(2):153-168.[5] MEMON N,SHENDE S,WONG P.On the security of the Yueng-Mintzer authentication watermark[C] ∥Proceedings of the IS & T PICS Symposium.Savannah:PICS,1999:301-306.[6] 丁科,何晨,王宏霞.一种定位精确的混沌脆弱数字水印技术[J].电子学报,2004,32(6):1009-1012.DING Ke,HE Chen,WANG Hongxia.A chaotic fragile watermarking technique with precise localization[J].Acta Electronica Sinca,2004,32(6):1009-1012.[7] 张小华,孟红云,刘芳.一类有效的脆弱型数字水印技术[J].电子学报,2004,32(1):114-117.ZHANG Xiaohua,MENG Hongyun,LIU Fang.A new kind of efficient fragile watermarking technique[J].Acta Electronica Sinca,2004,32(1):114-117.[8] LIU Lianshan,LI Renhou,GAO Qi.DWT-based robust color image watermarking scheme[J].Journal of Southwest Jiaotong University (English Edition),2005,13(2):130-134.[9] WANG Hongxia,LUO Jian.Connectivity-based watermarking robust to geometrical attacks[J].Journal of Southwest Jiaotong University (English Edition),2006,14(1):1-6.[10] 王宏霞,罗键.基于图像连通性的自适应水印同步方案[J].西南交通大学学报,2005,40(6):720-726.WANG Hongxia,LUO Jian.Self-adaptive watermarking synchronization scheme based on image connectivity[J].Journal of Southwest Jiaotong University,2005,40(6):720-726.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索
    Article views(1492) PDF downloads(318) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return