首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
A content authentication technique based on JPEG-to-JPEG watermarking is proposed in this paper. In this technique, each 88 block in a JPEG compressed image is first processed by entropy decoding, and then the quantized discrete cosine transform (DCT) is applied to generate DCT coefficients: one DC coefficient and 63 AC coefficients in frequency coefficients. The DCT AC coefficients are used to form zero planes in which the watermark is embedded by a chaotic map. In this way, the watermark information is embedded into JPEG compressed domain, and the output watermarked image is still a JPEG format. The proposed method is especially applicable to content authentication of JPEG image since the quantized coefficients are modified for embedding the watermark and the chaotic system possesses an important property with the high sensitivity on initial values. Experimental results show that the tamper regions are localized accurately when the watermarked JPEG image is maliciously tampered.  相似文献   

2.
基于双混沌系统的抗JPEG压缩的图像认证水印算法   总被引:1,自引:0,他引:1  
提出了一种新的兼具水印高安全性和高定位精度的抗JPEG压缩的图像认证水印算法.根据JPEG图像压缩过程中DCT系数的不变特性,将预先量化的DCT低频系数和水印密钥合成为混沌系统的初值.再将图像块的编号映射为混沌系统的迭代次数,经过logistic混沌迭代生成图像块水印.在水印嵌入过程中,利用另一混沌系统猫映射构造循环结构,建立图像块之间一一对应的循环关系,并将块水印嵌入到对应图像块的DCT中频系数中.实验结果表明,该算法对JPEG有损压缩具有良好的鲁棒性,同时可对图像内容的恶意篡改进行精确的检测与定位.  相似文献   

3.
能区分图像或水印篡改的脆弱水印方案   总被引:17,自引:2,他引:15       下载免费PDF全文
和红杰  张家树  田蕾 《电子学报》2005,33(9):1557-1561
针对现有脆弱型水印方案不能区分是图像内容还是水印被篡改的问题,提出一种能区分图像或水印篡改的脆弱水印方案.该方案用原始图像高7位的小波低频系数非均匀量化后生成的低频压缩图像作为水印,并用混沌系统对水印进行置乱加密,将安全性得到增强的水印直接嵌入到图像的LSB位;认证时通过差值图像定位图像内容被篡改的位置并指出图像中的水印是否被篡改.理论分析和仿真实验表明:该算法不但能精确定位图像内容被篡改的位置,而且能区分是图像内容被篡改、水印被篡改还是两者同时被篡改.  相似文献   

4.
A new blind digital image watermarking algorithm with watermark embedded in discrete cosine transform (DCT) coefficients is presented in this paper. The proposed scheme exploits correlation between DCT coefficients in neighborhood blocks for embedding. The watermark is embedded by modifying two DCT coefficients, one pertaining to a block in which watermark bit (0 or 1) is to be embedded and the other corresponding to the selected neighborhood block. Both the selected coefficients are modified by a modification factor so that the difference between the pair of coefficients is brought to a predefined zone. This difference between two DCT coefficients is used to extract watermark. The proposed technique has been tested for different attacks like JPEG compression, rotation, cropping, filtering, gaussian noise, salt and pepper noise, histogram equalization etc. It has been observed that the scheme is highly robust not only for the above mentioned attacks used singularly, but also for different possible combinations of simultaneous attacks. A comparison of the proposed technique with some state of art existing algorithms reveals that our scheme provides better results in terms of quality of watermarked images, payload and robustness.  相似文献   

5.
用于JPEG2000图像认证的半脆弱性数字水印算法   总被引:23,自引:0,他引:23       下载免费PDF全文
张静  张春田 《电子学报》2004,32(1):157-160
本文给出一种适用于JPEG2000图像认证的半脆弱性数字水印算法,该算法与JPEG2000编、解码器相结合,它根据JPEG2000图像压缩过程中的不变参量进行水印生成和嵌入调制,利用小波变换特性对图像篡改区域进行定位.实验表明,采用该算法实现的水印不仅具有良好的视觉透明性,而且还有较佳的篡改区域指示功能.  相似文献   

6.
Multiple watermarking based techniques are receiving more attention in recent times for its wide variety of applications in different fields. To protect the copyright ownership and validate the authenticity of multiple owners, in this paper a color multiple watermarking method based on DCT (Discrete Cosine Transform) and repetition code is proposed and simulated. Initially, green and blue components of color host image are selected for inserting multiple watermarks. Then, each green and blue component of the image is decomposed into non overlapping blocks and subsequently DCT is employed on each block. In this technique, a binary bit of watermark is embedded into green/blue component’s transformed block by modifying some middle significant AC coefficients using repetition code. During multiple watermarks embedding in green and blue components of the proposed method, DC and some higher AC coefficients are kept intact after zigzag scanning of each DCT block to ensure the imperceptibility of the watermarked host image. The proposed scheme is experimented to establish the validity by extracting adequate multiple watermark data from the restructured cover image after applying common geometric transformation attacks (like rotation, cropping, scaling and deletion of lines/columns etc.), common enhancement technique attacks (like lowpass filtering, histogram equalization, sharpening, gamma correction, noise addition etc.) and JPEG compression attacks.  相似文献   

7.
基于格的灰度级水印技术   总被引:1,自引:0,他引:1  
李晓强 《电子学报》2006,34(B12):2438-2442
提出一个新的灰度级水印算法.首先,使用量化技术对灰度级水印进行预处理,实现灰度级水印的数据压缩;然后,对原始图像进行小波分解,在小波域中使用格矢量量化技术构造水印的嵌人和提取算法.提取水印不需要原图像.为增强水印的安全性,使用混沌序列作为密钥对水印序列进行调制.实验结果表明,与同类算法相比该算法在获得较好感知质量含水印图像的同时提高了水印的鲁棒性.  相似文献   

8.
提出了一种基于DCT的彩色图像水印算法,通过修改彩色图像绿色分量的DCT系数实现水印的嵌入。原始二值水印图像经Arnold置乱加密后,嵌入到绿色分量的DCT中频系数中,并能够根据原始图像提取出来。实验证明,该算法能有效抵抗JPEG压缩、裁剪、加噪、图像增强等攻击,具有良好的不可感知性和很强的鲁棒性。  相似文献   

9.
提出一种抗JPEG压缩的图像认证算法。根据图像不同块中位置相同的DCT系数之间的大小关系在JPEG压缩之后几乎没有发生变化这一性质,对图像进行分析生成特征编码,并将特征编码加密后以水印方式嵌入图像。认证时只需将待测图像的特征编码与从中抽取出的解密水印进行比较,利用篡改矩阵鉴别是否有内容被篡改,并给出具体的篡改位置。实验结果表明,该算法有很好的抗JPEG压缩性能,并可有效地检测出恶意篡改及其发生的位置。  相似文献   

10.
范成博  张春田 《信号处理》2003,19(3):266-268
本文提出一种适用于JPEG图像认证的脆性盲水印算法,采用DCT整型变换避免舍入误差产生的误报,水印由DCT域checksum算法生成,并在水平、垂直二个方向检测。实验表明,水印图像具有良好的主观质量,并可准确定位篡改区域。  相似文献   

11.
Two watermarks are embedded into the original image. One is the authentication watermark generated by secret key, which is embedded into the sub-LSB (Least Significant Bit) of the original image for tamper localization; the other is the recovery watermark for tamper recovering. The original image is divided into 8 x 8 blocks and each block is transformed by Discrete Cosine Transform (DCT). For each block, some lower frequency DCT coefficients are chosen to be quantized and binary encoded so as to gain the recovery watermark of each block, and the recovery watermark is embedded into the LSB of another block by chaos encryption and authentication chain technology. After the two watermarks being detected, the location of any minute changes in image can be detected, and the tampered image data can be recovered effectively. In the paper, the number of coefficients and their bit lengths are carefully chosen in order to satisfy with the payload of each block and gain the capability of self-recovering. The proposed algorithm can well resist against possible forged attacks. Experimental results show that the watermark generated by the proposed algorithm is sensitive to tiny changes in images, and it has higher accuracy of tamper localization and good capability of the tamper recovery.  相似文献   

12.
文章首先运用混沌序列对灰度的图像水印进行置乱预处理,置乱后的每个水印图像像素进行位分解后依照系数量化的规则嵌入载体图像的8×8DCT块系数中的8个最低频系数中,同时实现了水印的盲提取。实验结果表明,该算法对JPEG有损压缩、图像剪切等常见的图像处理操作有较强的鲁棒性,具有一定的实用价值。  相似文献   

13.
本文提出了一种新的用于图像数字版权的自适应水印方案,在该方案中,使用混沌映射将商标图像的像素在空间区域中进行随机置乱,然后将置乱的信息埋入在图像的DCT变换域中。为了使水印的分布集中在图像显著的边缘特征中,提出了基于图像像素的模糊熵测度算法,对图像特征系数的修改则是局部自适应的,使得水印埋入的强度随着图像局部变化而变化。嵌入的商标能够在随后的相关检测以及重构中得到很好的恢复以表明数字产品的版权。  相似文献   

14.
In this work, a semi-fragile watermarking scheme, for grayscale image authentication and tamper detection, is proposed. The proposed watermarking scheme is based on implementing a modified DWT quantization-based algorithm by embedding a random watermark bit sequence into the DWT domain using an expanded-bit multiscale quantization-based technique with adjusted watermarked location. Here, the watermark bit is expanded into three similar bits and embedded in a multiscale fashion into the DWT low-frequency subbands of the 2nd DWT levels (LL2, LLHL1 and LLLH1). An adjustment of the quantized coefficients is provided based on modifying their values to fall in more secure locations within the quantization interval. Several designed criteria were used to judge the received image by classifying it into: authenticated, incidentally or maliciously attacked with high accuracy in detecting and classifying attacks. Experimental results have shown the suitability of the proposed approach for tamper detection and accurate authentication.  相似文献   

15.
一种定位精确的混沌脆弱数字水印技术   总被引:20,自引:2,他引:18       下载免费PDF全文
丁科  何晨  王宏霞 《电子学报》2004,32(6):1009-1012
提出了一种特别适用于数字产品的认证、内容篡改证明和完整性证明的脆弱数字水印算法.原始图像的象素灰度值映射为混沌的初值,经过若干次迭代生成水印图像,然后把它嵌入象素灰度值的LSB(Least Significant Bit)平面.利用混沌对初值极端敏感性的特点,能够精确地定位对加入水印图像的篡改,并且水印提取不需要原始图像.实验结果表明了所提出水印方案对篡改证明的有效性,敏感性以及良好的篡改定位能力.  相似文献   

16.
陈自刚 《电视技术》2012,36(15):25-27,39
研究并实现基于JPEG XR图像稳定性和内容认证的半脆弱数字水印技术。对JPEG XR图像的频率结构和码流结构进行了分析和研究,提取码流中每个分割块的DC系数和LP系数构造基于图像的二值信息,作为数字水印置乱后嵌入到原图像对应像素点YUV色彩空间的Y分量的最低有效位中,然后再对含有水印的图像进行JPEG XR再编码实现水印嵌入。通过比较基于图像的二值信息和嵌入在图像的二值水印信息,进行篡改定位。对含水印图像进行压缩、噪声、剪切等常见攻击实验,结果表明具有较好的稳定性和内容认证能力。  相似文献   

17.
一种基于H.264/AVC的视频可逆脆弱水印算法   总被引:1,自引:0,他引:1  
结合H.264压缩编码标准的特性,该文提出一种新的基于H.264/AVC的视频可逆脆弱水印算法。算法先计算当前宏块预测残差块量化的离散余弦变换(DCT)系数的哈希值生成认证码,再把认证码作为水印信息嵌入到下一个相邻宏块活性最大的4′4块的最后一个非零量化DCT系数中。在解码端,通过比较认证码和提取的水印信息进行视频数据完整性的认证。实验结果表明,该算法对视频质量和码率的影响较小,并且能对认证通过的视频数据进行还原和对认证失败的视频Ⅰ帧遭篡改区域进行有效的定位。  相似文献   

18.
In this paper two watermarking algorithms for image content authentication with localization and recovery capability of the tampered regions are proposed. In both algorithms, a halftone version of the original gray-scale image is used as an approximated version of the host image (image digest) which is then embedded as a watermark sequence into given transform domains of the host image. In the first algorithm, the Integer Wavelet Transform (IWT) is used for watermark embedding which is denominated WIA-IWT (Watermarking-based Image Authentication using IWT), while in the second one, the Discrete Cosine Transform (DCT) domain is used for this purpose, we call this algorithm WIA-DCT (Watermarking-based Image Authentication using DCT). In the authentication stage the tampered regions are detected using the Structural Similarity index (SSIM) criterion, which are then recovered using the extracted halftone image. In the recovery stage, a Multilayer Perceptron (MLP) neural network is used to carry out an inverse halftoning process to improve the recovered image quality. The experimental results demonstrate the robustness of both algorithms against content preserved modifications, such as JPEG compression, as well as an effective authentication and recovery capability. Also the proposed algorithms are compared with some previously proposed content authentication algorithms with recovery capability to show the better performance of the proposed algorithms.  相似文献   

19.
基于Logistic混沌映射的DCT域脆弱数字水印算法   总被引:16,自引:0,他引:16  
李赵红  侯建军 《电子学报》2006,34(12):2134-2137
本文提出了一种新的混沌脆弱数字水印算法.利用混沌系统对初值的极端敏感性和块不相关水印技术,将图像DCT次高频系数和水印密钥合成为logistic混沌映射初值从而生成水印,再将水印嵌入到图像DCT的高频系数中得到水印图像.利用图像DCT系数之间的关系,实现了水印的盲检测.实验结果表明,该算法可以精确检测到对水印图像的一个像数点的改变,并具有良好的定位篡改能力.  相似文献   

20.
为了提高数字水印抗击各种图像攻击的性能和保持图像的稳健性和不可见性,提出了一种基于离散小波变换(DWT),SVD(singular value decomposition)奇异值分解水印图像和原始载体图像的离散余弦变换(DCT)的自适应水印嵌入算法,主要是将水印图像的两次小波变换后的低频分量潜入到原始图像分块经过SVD分解的S分量矩阵中,同时根据图像的JPEG压缩比的不同计算各个图像块的水印调节因子。实验证明该算法在抗击JPEG压缩、中值滤波、加噪等均具有很好的鲁棒性,嵌入后的图像的PSNR达到38,具有良好的视觉掩蔽性  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号