首页 | 官方网站   微博 | 高级检索  
     

支持预览的版权图像共享
引用本文:肖祥立,叶茜,张玉书,温文媖,张新鹏.支持预览的版权图像共享[J].电子与信息学报,2023,45(3):800-809.
作者姓名:肖祥立  叶茜  张玉书  温文媖  张新鹏
作者单位:1.南京航空航天大学计算机科学与技术学院 南京 2111062.江西财经大学信息管理学院 南昌 3300323.复旦大学计算机科学技术学院 上海 201203
基金项目:国家重点研发计划(2021YFB3100400)
摘    要:针对数字水印技术均不考虑版权图像共享场景中用户的预览需求,以及软件控制方法和附加信息方法的局限性,该文提出一个支持直接从加密图像预览原图像部分视觉内容的版权图像共享方案。为此,将缩略图保持加密的思想引入到用户端嵌入的水印方案中,通过像素调整在加密图像上呈现原图像内容的模糊版本。用于调整的像素位被事先以信息隐藏的方法嵌入隐藏区域中,以保证解密的正确性。此外,用户水印被在解密的同时嵌入到图像中,用于实现对未授权重分发行为的追踪。这样一来,不仅满足了共享过程中用户的预览需求还同时保护了图像的版权。理论分析和实验测试的结果展现了所提方案的安全性、可行性、高效性和鲁棒性。

关 键 词:数字水印    图像加密    信息隐藏    纠错码
收稿时间:2022-05-12

Preview-supported Copyright Image Sharing
XIAO Xiangli,YE Xi,ZHANG Yushu,WEN Wenying,ZHANG Xinpeng.Preview-supported Copyright Image Sharing[J].Journal of Electronics & Information Technology,2023,45(3):800-809.
Authors:XIAO Xiangli  YE Xi  ZHANG Yushu  WEN Wenying  ZHANG Xinpeng
Affiliation:1.College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, China2.School of Information Management, Jiangxi University of Finance and Economics, Nanchang 330032, China3.School of Computer Science, Fudan University, Shanghai 201203, China
Abstract:In view of the fact that digital watermarking technology does not consider the preview needs of users in copyright image sharing scenarios, as well as the limitations of software control method and additional information method, a copyright image sharing scheme that supports previewing part of the visual content of the original image directly from the encrypted image is proposed. To this end, the idea of thumbnail preserving encryption is introduced into the user-side embedded watermarking scheme, and a blurred version of the original image content is presented on the encrypted image through pixel adjustment. The pixel bits to be adjusted are embedded into the hidden area by means of information hiding in advance to ensure the correctness of decryption. Moreover, the user watermark is embedded into the image at the same time of decryption, which is used to track the unauthorized redistribution behavior. In this way, not only the preview needs of the user during the sharing process is met, but also the copyright of the image is protected. The results of theoretical analysis and experimental tests demonstrate the security, feasibility, efficiency, and robustness of the proposed scheme.
Keywords:
点击此处可从《电子与信息学报》浏览原始摘要信息
点击此处可从《电子与信息学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号