首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
This paper proposes a self-embedding watermarking scheme for digital images. It exploits a digital halftoning technique to transform the host image to a halftone image, in which the content features of the host image are well preserved. This halftone image is utilized as an approximate or compressed version of the host image and further adopted as a watermark. Unlike most available self-embedding watermarking techniques, in which watermark embedding, tamper detection and image recovery are block-wise-based, our scheme is a pixel-wise and block-wise composite scheme. That is, the watermark is pixel-wise permuted and embedded in the least-significant-bit plane of the host image, while in tamper detection and image recovery, a block-wise strategy is employed. This pixel-wise and block-wise complementary mechanism can overcome a common disadvantage of previous block-wise-based self-embedding watermarking techniques. Our scheme can be used for tamper detection and alteration location. Moreover, the tampered area can be approximately recovered using the extracted watermark. Experimental results demonstrate the effectiveness of the proposed scheme.  相似文献   

2.
3.
用于图像篡改定位和恢复的分层半脆弱数字水印算法   总被引:1,自引:0,他引:1  
刘泉  江雪梅 《通信学报》2007,28(7):104-110
设计并实现了一种基于分层的半脆弱数字水印算法,用于图像内容完整性认证,篡改定位和恢复。在嵌入方,将水印信息嵌入到原始图像所有像素的2bit最低有效比特,其中认证水印由奇偶校验码和块与子块之间灰度平均值的比较组成;恢复水印为环面自同构映射块的平均灰度值。在检测方,采用分层思想,分3层对水印进行篡改定位和恢复。实验结果表明,该算法对局部发生的篡改可以有效地检测,精确定位并进行内容恢复,同时能够有效的抵抗矢量量化攻击。  相似文献   

4.
This paper proposes a tamper detection and correction technique using semi-fragile data hiding that aims to achieve high perceptual quality of images at the user-end even after malicious modifications. A binary signature and an image digest are embedded by modulating integer wavelet coefficients using dither modulation based quantization index modulation. Half-toning technique is used to obtain image digest from the low-resolution version of the host image itself. Decoder extracts the binary signature from the watermarked image for tamper detection, while the extracted image digest is used to correct the tamper region. Unlike previously proposed techniques, this novel approach distinguishes malicious changes from various common image processing operations more efficiently and also correct tapered regions effectively. Experimental results show that the proposed technique provides a superior performance in terms of probability of miss and false alarm as well as in tamper correction, compared to several existing semi-fragile watermarking techniques.  相似文献   

5.
In the present work, a novel image watermarking algorithm using vector quantization (VQ) approach is presented for digital image authentication. Watermarks are embedded in two successive stages for image integrity verification and authentication. In the first stage, a key based approach is used to embed robust zero level watermark using properties of indices of vector quantized image. In the second stage, semifragile watermark is embedded by using modified index key based (MIKB) method. Random keys are used to improve the integrity and security of the designed system. Further, to classify an attack quantitatively as acceptable or as a malicious attack, pixel neighbourhood clustering approach is introduced. Proposed approach is evaluated on 250 standard test images using performance measures such as peak signal to noise ratio (PSNR) and normalized hamming similarity (NHS). The experimental results shows that propose approach achieve average false positive rate 0.00024 and the average false negative rate 0.0012. Further, the average PSNR and tamper detection/localization accuracy of watermarked image is 42 dB and 99.8% respectively; while tamper localization sensitivity is very high. The proposed model is found to be robust to common content preserving attacks while fragile to content altering attacks.  相似文献   

6.
叶天语 《通信学报》2013,34(3):148-156
利用子块区域分割思想和自嵌入技术提出了一种只利用攻击图像就能进行版权鉴别和内容认证的全盲多功能图像水印算法。将原始图像分割成不重叠的子块,对每个子块进行离散余弦变换,将每个子块离散余弦变换矩阵分成为区域1和区域2两部分,然后对区域1进行奇异值分解,通过判断奇异值均值的最高位数字奇偶性产生特征水印,然后通过调整区域2的2个离散余弦变换交流系数大小自嵌入特征水印,最后对每个子块进行逆离散余弦变换得到含水印图像。算法通过结合将区域1产生的特征水印自嵌入区域2和在区域2盲提取认证水印实现全盲检测和多功能。实验结果表明,算法既能实现版权保护又能实现内容认证,而且还具有区分恶意篡改和无意篡改的能力。  相似文献   

7.
基于混沌置乱的分块自嵌入水印算法   总被引:18,自引:0,他引:18  
针对分块自嵌入水印算法的安全性和不能有效判断图像篡改块的问题,提出一种基于混沌置乱的分块自嵌入算法.该算法将由图像块生成的水印按空间位置生成二值水印图像,利用混沌序列对其置乱加密后嵌入到图像的最低位,认证时根据设定的阈值能有效定位图像内容被篡改的图像块.实验仿真和理论分析表明,该算法在保持原算法篡改恢复效果的基础上,无论是否有水印被改变,均能有效判断图像内容被篡改的图像块,且具有更高的安全性.  相似文献   

8.
In this work, a semi-fragile watermarking scheme, for grayscale image authentication and tamper detection, is proposed. The proposed watermarking scheme is based on implementing a modified DWT quantization-based algorithm by embedding a random watermark bit sequence into the DWT domain using an expanded-bit multiscale quantization-based technique with adjusted watermarked location. Here, the watermark bit is expanded into three similar bits and embedded in a multiscale fashion into the DWT low-frequency subbands of the 2nd DWT levels (LL2, LLHL1 and LLLH1). An adjustment of the quantized coefficients is provided based on modifying their values to fall in more secure locations within the quantization interval. Several designed criteria were used to judge the received image by classifying it into: authenticated, incidentally or maliciously attacked with high accuracy in detecting and classifying attacks. Experimental results have shown the suitability of the proposed approach for tamper detection and accurate authentication.  相似文献   

9.
Self-recovery is a tamper-detection and image recovery methods based on data hiding. It generates two types of data and embeds them into the original image: authentication data for tamper detection and reference data for image recovery. In this paper, a region-based scalable self-recovery (RSS) method is proposed for salient-object images. As the images consist of two main regions, the region of interest (ROI) and the region of non-interest (RONI), the proposed method is aimed at achieving higher reconstruction quality for the ROI. Moreover, tamper tolerability is improved by using scalable recovery. In the RSS method, separate reference data are generated for the ROI and RONI. Initially, two compressed bitstreams at different rates are generated using the embedded zero-block coding source encoder. Subsequently, each bitstream is divided into several parts, which are protected through various redundancy rates, using the Reed-Solomon channel encoder. The proposed method is tested on 10 000 salient-object images from the MSRA database. The results show that the RSS method, compared to related methods, improves reconstruction quality and tamper tolerability by approximately 30% and 15%, respectively.  相似文献   

10.
Fragile digital watermarking has been applied for authentication and alteration detection in images. Utilizing the cosine and Hartley transforms over finite fields, a new transform domain fragile watermarking scheme is introduced. A watermark is embedded into a host image via a blockwise application of two-dimensional finite field cosine or Hartley transforms. Additionally, the considered finite field transforms are adjusted to be number theoretic transforms, appropriate for error-free calculation. The employed technique can provide invisible fragile watermarking for authentication systems with tamper location capability. It is shown that the choice of the finite field characteristic is pivotal to obtain perceptually invisible watermarked images. It is also shown that the generated watermarked images can be used as publicly available signature data for authentication purposes.  相似文献   

11.
Recover the tampered image based on VQ indexing   总被引:1,自引:0,他引:1  
In this paper, a tampered image recovery scheme is proposed by creating an index table of the original image via vector quantization (VQ) and embedding it into the original image as a basis for recovery. In order to complete the goal of image authentication and recovery, Wong's watermarking scheme [P.W. Wong, N. Memon, Secret an public key image watermarking schemes for image authentication and ownership verification, IEEE Trans. Image Process 10 (10) (2001) 1593–1601] is employed to perform tamper detection. Wong's watermarking scheme can be used to accurately locate tampered regions. If an image has been tampered, the index table can be used to recover the tampered regions. The experimental results indicate that our scheme has the higher probability of image recovery. Besides, compared with Lee and Lin's [Dual watermark for image tamper detection and recovery, Pattern Recognition 41 (2008) 3497–3506] scheme, our scheme provides not only a better quality of recovered images but also better results at edge regions.  相似文献   

12.
多功能双水印算法   总被引:9,自引:0,他引:9  
该文针对单水印算法往往存在功能单一的问题,利用奇异值的稳定性,提出一种多功能双水印算法。先在图像分块的奇异值上嵌入鲁棒水印,然后在含鲁棒水印图像的空域LSB嵌入脆弱水印,并设计了判别恶意篡改和无意篡改的准则。实验不仅考察鲁棒水印抵抗攻击的鲁棒性,而且还考察脆弱水印对鲁棒性的影响和篡改检测与定位的能力。实验结果表明:鲁棒水印具备很强的抗攻击鲁棒性;脆弱水印对篡改敏感,而且篡改定位精确。因此算法具备版权保护和内容认证双重功能。  相似文献   

13.
Two watermarks are embedded into the original image. One is the authentication watermark generated by secret key, which is embedded into the sub-LSB (Least Significant Bit) of the original image for tamper localization; the other is the recovery watermark for tamper recovering. The original image is divided into 8 x 8 blocks and each block is transformed by Discrete Cosine Transform (DCT). For each block, some lower frequency DCT coefficients are chosen to be quantized and binary encoded so as to gain the recovery watermark of each block, and the recovery watermark is embedded into the LSB of another block by chaos encryption and authentication chain technology. After the two watermarks being detected, the location of any minute changes in image can be detected, and the tampered image data can be recovered effectively. In the paper, the number of coefficients and their bit lengths are carefully chosen in order to satisfy with the payload of each block and gain the capability of self-recovering. The proposed algorithm can well resist against possible forged attacks. Experimental results show that the watermark generated by the proposed algorithm is sensitive to tiny changes in images, and it has higher accuracy of tamper localization and good capability of the tamper recovery.  相似文献   

14.
In this paper, an effective tamper detection and self-recovery algorithm based on singular value decomposition (SVD) is proposed. This method generates two distinct tamper detection keys based on the singular value decomposition of the image blocks. Each generated tamper detection and self-recovery key is distinct for each image block and is encrypted using a secret key. A random block-mapping sequence and three unique optimizations are employed to improve the efficiency of the proposed tamper detection and the robustness against various security attacks, such as collage attack and constant-average attack. To improve the proposed tamper localization, a mixed block-partitioning technique for 4×4 and 2×2 blocks is utilized. The performance of the proposed scheme and its robustness against various tampering attacks is analyzed. The experimental results demonstrate that the proposed tamper detection is superior in terms of tamper detection efficiency with a tamper detection rate higher than 99%, security robustness and self-recovery image quality for tamper ratio up to 55%.  相似文献   

15.
针对云存储系统中的数据安全问题,提出了一种面向云存储安全的可自愈拜占庭Quorum系统.该系统以虚拟机作为后端存储设备构建虚拟存储节点,利用虚拟机多样化操作系统,以及动态迁移、快速部署等机制构建动态异构的存储系统架构.在拜占庭容错门限的基础上,提出自愈门限的概念,并设计相应系统安全协议,实现存储节点的自动化异常检测和状态复原.实验结果表明,提出的云存储系统具有较高的鲁棒性,能有效提高存储数据的安全性.  相似文献   

16.
基于小波变换,结合量化调制过程,论文提出了一种易损水印算法。该算法具有构造分层水印,便于实现水印的多分辨率嵌入;结合视觉特性量化调制,尽可能减小视觉失真;结合图像融合技术的多分辨率检测,使检测结果更准确;以技抵抗一定程度的JPEG有损压缩等特点。实验表明,嵌入的水印在易损性和鲁棒性上达到了较好的统一,能够抵抗一定程度的压缩而不影响篡改检测的精确性。  相似文献   

17.
段贵多  赵希  李建平  廖建明 《电子学报》2010,38(4):842-0847
 本文提出了一种半脆弱,分块和基于内容的数字水印技术。该算法可以准确的实现篡改区域的认证,定位和恢复。算法基于独立分块技术将用于认证的水印比特嵌入到每个块的Slant变换域的中频区域。嵌入过程是基于我们通过实验发现大部分的Slant中频系数的正负符号在非恶意操作前后保持不变这一性质。在恢复系统中,恢复比特来源于原图压缩后的数据并将此数据嵌入到图像的最低有效位以实现自恢复。认证度由虚警检测率和误警检查率测定。仿真实验表明我们的算法能够准确的检测和定位出篡改区域并能实现篡改区域的近似恢复。另外,与基于DCT和PST变换的算法相比,我们的算法能够更有效的抵抗一些恶意和非恶意操作同时实施的操作。  相似文献   

18.
A content authentication technique based on JPEG-to-JPEG watermarking is proposed in this paper. In this technique, each 8x8 block in a JPEG compressed image is first processed by entropy decoding, and then the quantized discrete cosine transform (DCT) is applied to generate DCT coefficients: one DC coefficient and 63 AC coefficients in frequency coefficients. The DCT AC coefficients are used to form zero planes in which the watermark is embedded by a chaotic map. In this way, the watermark information is embedded into JPEG compressed domain, and the output watermarked image is still a JPEG format. The proposed method is especially applicable to content authentication of JPEG image since the quantized coefficients are modified for embedding the watermark and the chaotic system possesses an important property with the high sensitivity on initial values. Experimental results show that the tamper regions are localized accurately when the watermarked JPEG image is maliciously tampered.  相似文献   

19.
In this paper an image tamper localisation scheme is proposed in which authentication bits of a 2 × 2 image block are generated using the chaotic maps. Further the scheme is improved by including a self-recovery method to recover the tampered regions. To improve the quality of the recovered image, two different sets of restoration bits of a block are generated and each one is embedded into randomly selected distinct blocks. The proposed tamper detection scheme performs better than some of the recent schemes proposed by the researchers. The experimental results demonstrate the accuracy and fragility of the tamper detection scheme, and the efficacy of the recovery method.  相似文献   

20.
针对现有方法所提取的特征值不能灵活适应图像 的纹理变化导致被篡改图像恢复质量不高的问题, 提出一种根据图像块纹理特征进行块类型划分的篡改定位和恢复水印算法。首先把宿主图像 分3×3大小的 子块,再利用方差和Canny边缘检测算子将图像子块划分为简单块、复杂块和边缘块;然后 根据图像子块 类型,自适应地生成水印信息;最后采用Torus自同构映射方式找到水印嵌入位置,并且对 篡改区域进行恢 复时根据图像子块类型自适应的恢复。当图像遭到篡改时,采用本文算法恢复图像的平均峰 值信噪比(PSNR)较现有方 法提5.60%左右。实验表明,本文算法能够对图像纹理复杂区 域生成更精确的 恢复信息,有效提高了图像篡 改区域的恢复质量,同时降低含水印图像失真。算法适用于医学、军事和卫星等领域。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号