首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
This paper presents an image authentication scheme that can verify the origin of the received image and, moreover, detect if the image has been tampered with. The underlying technologies of the scheme are digital watermarking and image secret sharing. Different from other schemes that use one piece of watermark information for one purpose and a different piece for another, the watermark information used for original verification is also utilized for tamper detection. Moreover, unlike other schemes that employ a fixed strength value for embedding watermarks, the scheme automatically utilizes two different strength values, one for flat regions and the other for complex regions. The experimental results prove that using different strength values increases the robustness of the watermark with little sacrifice in image quality. The results also demonstrate the effectiveness of the scheme for the origin verification as well as the tamper detection.  相似文献   

2.
Biometric images can be split into regions of salient (ROI) and regions of background (ROB) based on salient region detection. During the process of watermark embedding, salient regions which contain rich-information are less affected by the watermark, therefore can be embedded into more watermarks, and regions of background (ROB) are susceptible to the effect of watermarks, so that they should be embedded lighter or even none in order to preserve the recognition quality of biometric images. In this paper, a novel scheme for tamper detection and self-recovery of biometric images using salient region-based authentication watermarking is proposed. Firstly, we propose a novel multi-level authentication watermarking scheme, which is used to verify the integrity of biometric images. Secondly, biometric data of these biometric images which is used as information watermarks is embedded into themselves. As a result, verification systems can recover the damaged data of original biometric images with hidden information based on tampering detection result. Experimental results and theoretic analysis show that our proposed scheme can detect tampered regions, and recover biometric data while keeping the recognition quality.  相似文献   

3.
This paper presents a novel color image watermarking scheme for both tamper detection and tampered image recovery. The proposed scheme embeds watermarks consisting of the authentication data and the recovery data into image blocks. In the tamper detection process, instead of independently examining each embedded authentication data, we take all the authentication data embedded in an image into account and utilize a majority-voting technique to determine the legitimacy of image blocks. Experimental results show that the proposed scheme can effectively thwart collage attack and vector quantization (VQ) attack, while sustaining superior accuracy of tamper localization. Furthermore, the results reveal that the tampered images can be successfully recovered with acceptable visual quality.  相似文献   

4.
To authenticate integrity of the stereo image for three dimensional video systems, a new asymmetric self-recovery oriented stereo image watermarking method is proposed by considering inter-correlations between the left and right views of the stereo image. An asymmetric self-recovery mechanism is presented to conduct allocation of watermarking capacity for asymmetrically embedding recovery references of each view. The presented mechanism is also used to recover tampered left and right views asymmetrically to obtain high quality of the stereo image with the help of disparity when the tampered regions of the stereo image are authenticated. For security, a chaotic function is employed to generate authentication bits to detect tamper. The high-frequency energy of discrete wavelet transform is utilized to divide blocks of each view into smooth and complex types, so that the recovery reference with alterable bits is computed. Moreover, to obtain a trade-off between transparency and watermarking capacity, human visual characteristics are taken into account and then a just-noticeable difference model is exploited to classify the blocks into sensitive and insensitive types, which defines two or three least significant bits of pixels are allocated for embedding watermark. Experimental results demonstrate that the proposed method can reconstruct tamper efficiently and outperform other stereo image watermarking methods, especially for extensive tamper.  相似文献   

5.
提出了一种基于特征的易碎图像水印框架,来阻止VQ攻击.图像特征被提取出来,用 来处理原始水印或生成水印,使得要嵌入的水印信息不仅不被攻击者知道,而且依赖于原始图 像.因此,不同的原始图像嵌入了不同的水印信息,从而使得攻击者无法建立VQ码表,因而无法 实现VQ攻击.同时,为了提高水印的安全性和篡改的局部检测性,本文给出了该框架下水印嵌 入方法的基本要求.根据该易碎图像水印框架,本文设计了一种基于图像矩不变量的易碎水印算 法.分析和实验结果表明,该算法不仅可以很好地、局部地检测图像中的篡改.即使图像中仅有一 位被篡改时.同时,在不需任何额外的密码或图像索引号的情况下,成功地抵抗VQ攻击.  相似文献   

6.
The drawbacks of the current authentication watermarking schemes for JPEG images, which are inferior localization and the security flaws, are firstly analyzed in this paper. Then, two counterferiting attacks are conducted on them. To overcome these drawbacks, a new digital authentication watermarking scheme for JPEG images with superior localization and security is proposed. Moreover, the probabilities of tamper detection and false detection are deduced under region tampering and collage attack separately. For each image block, the proposed scheme keeps four middle frequency points fixed to embed the watermark, and utilizes the rest of the DCT coefficients to generate 4 bits of watermark information. During the embedding process, each watermark bit is embedded in another image block that is selected by its corresponding secret key. Since four blocks are randomly selected for the watermark embedding of each block, the non-deterministic dependence among the image blocks is established so as to resist collage attack completely. At the receiver, according to judging of the extracted 4 bits of watermark information and the corresponding 9-neighbourhood system, the proposed scheme could discriminate whether the image block is tampered or not. Owing to the diminishing of false detection and the holding of tamper detection, we improve the accuracy of localization in the authentication process. Theoretic analysis and simulation results have proved that the proposed algorithm not only has superior localization, but also enhances the systematic security obviously. Supported by the National Natural Science Foundation of China (Grant No. 60572027), the Program for New Century Excellent Talents in University of China (Grant No. NCET-05-0794), the Sichuan Youth Science & Technology Foundation (Grant No. 03ZQ026-033), the National Defense Pre-research Foundation of China (Grant No. 51430804QT2201) and the Application Basic Foundation of Sichuan Province, China (Grant No. 2006 J13-10)  相似文献   

7.
For 2D vector maps, obtaining good tamper localization performance and original content recovery with existing reversible fragile watermarking schemes is a technically challenging problem. Using an improved reversible watermarking method and a fragile watermarking algorithm based on vertex insertion, we propose a reversible fragile watermarking scheme that detects and locates tampered blocks with high accuracy while ensuring recovery of the original content. In particular, we propose dividing the features of the vector map into different blocks, calculating the block authentication watermarks and embedding the watermarks with different watermarking schemes. While the block division ensures superior accuracy of tamper localization, the reversible watermarking method and the fragile watermarking algorithm based on vertex insertion provide recovery of the original content. Experimental results show that the proposed scheme could detect and locate malicious attacks such as vertex/feature modification, vertex/feature addition, and vertex/feature deletion.  相似文献   

8.
The ability against the collage attack of semi-fragile watermarking is improved by embedding the watermark of a block in other blocks, but the tamper detection performance is impaired under general tampering. A two-stage detection method is proposed to improve the tamper detection performance of semi-fragile watermarking. For each 8 × 8 block, six-bit watermark data generated by the significant DCT (Discrete Cosine Transformation) coefficients are divided into two parts with the same length: general tampering watermark (GTW) and collage attack watermark (CAW). The GTW and CAW data of a block are embedded in the quantized DCT coefficients of itself and other blocks, respectively. In the first-stage detection, the general tampered regions are localized by the GTW data. To identify whether the collage attack exists in the received image, the identification parameter is defined by both GTW and CAW data. The selection of the predefined threshold of the identification parameter is derived and verified by the statistical experiments. If the identification parameter is larger than the given threshold, the second stage detection is performed to detect the collaged regions. Experimental results demonstrate that the proposed two-stage detection method is able to identify tampering with high probability under general tampering, collage attack and hybrid attack.  相似文献   

9.
Advances in three dimensional video is a strong stimulus for research in authentication of stereo image to avoid illegal modification. In this paper, a stereo image watermarking scheme is proposed for authentication with self-recovery capability using inter-view reference sharing. A mechanism of inter-view reference sharing in stereo image pairs is designed to reduce bits for recovery reference generation compared with independent references. Discrete wavelet transform coefficients are employed to generate the references, and two reference copies of each block embedded in two different mapping blocks are prepared for recover tamper. Moreover, detail information from high frequency coefficients is also embedded so as to improve the quality of tamper recovery. For the purpose of resisting collage attack and increasing the probability of tamper detection, disparities between pairs of matched blocks are checked to conduct tamper detection. Experimental results show that the proposed scheme can detect tampered blocks with the probabilities of more than 99 % after collage attack. When stereo images are cropped from 10 to 70 % with randomly tampering, they are recovered without losing main visual information and qualities of recovery are better than those of existing monocular image watermarking schemes extended to stereo images.  相似文献   

10.
11.
提出了一种改进的复合型水印嵌入方法,引入了通信中的纠错编码技术,在很大程度上增强了鲁棒水印的鲁棒性。两类水印均实现了盲提取,且算法是公开的。与改进前的算法相比较,该算法中的鲁棒性水印对图像增强、几何剪切、马赛克等常见攻击,尤其是对局部区域篡改、JPEG压缩的抵抗能力有了明显的改善。同时,脆弱性水印不仅能判断图像的真实性,还能够准确、直观地定位篡改位置。  相似文献   

12.
用于图像认证的变容量恢复水印算法   总被引:3,自引:0,他引:3  
兼顾水印嵌入容量和安全性,提出一种水印容量可变的数字图像可恢复水印算法.该算法提取2×2图像块特征生成变容量恢复水印——平滑块6比特,纹理块12比特.图像块的恢复水印基于密钥随机嵌入在其它图像块的低有效位,通过比较图像块特征与相应恢复水印重构的块特征并结合邻域特征判定图像块的真实性,变容量恢复水印用尽可能少的比特数保存足够的图像块信息,仅被嵌入一次且同时用于篡改检测与恢复,不仅有效降低了水印嵌入容量,而且提高了算法抵抗恒均值攻击的能力.实验仿真结果表明,该算法得到的含水印图像和恢复图像的质量好,且能有效抵抗拼贴攻击、恒均值攻击等已知伪造攻击.  相似文献   

13.
DCT域半易损水印技术   总被引:8,自引:0,他引:8  
钟桦  焦李成 《计算机学报》2005,28(9):1549-1557
该文提出了一种DCT域半易损水印技术用于图像内容认证.水印嵌入算法基于DCT域的JPEG压缩不变特性,对一定质量的JPEG压缩是稳健的.水印比特包括认证比特和恢复比特.认证比特是块自嵌入的。可以对不可接受的图像篡改进行准确的检测和定位,而恢复比特则可以对篡改的图像进行一定程度的恢复.该文还分析了DCT变换过程中取整误差的影响,从理论上证明了水印嵌入算法中迭代过程的收敛性.实验结果证明了该半易损水印可以容许一定程度的JPEG压缩和AWGN噪声,对局部发生的篡改可以有效地检测、精确定位并进行内容恢复.  相似文献   

14.
传统的可恢复水印算法往往是通过增加嵌入水印容量来提高篡改图像恢复质量,这将导致嵌入水印后图像质量的下降。针对这一问题,提出使用整数提升小波构建变容量恢复水印算法。该算法根据2×2图像块的纹理特征,使用小波系数生成长度可变的恢复水印,加密后嵌入其他映射图像块低位。使用恢复水印,结合相邻块特征进行篡改图像的检测与恢复。实验结果表明新算法能很好地满足水印不可见性要求,能有效抵抗剪切、拼贴及涂鸦等攻击,能更好地实现篡改图像的恢复。  相似文献   

15.
提出了基于人工神经网络的半脆弱零水印技术。首先在宿主图像中随机选择像素点,然后利用神经网络构建所选择像素点与其3×3邻域像素之间的关系,并与二值水印图像进行异或运算得到水印检测密钥,作为所构造的零水印。由于仅从宿主图像中抽取特征构造水印,而没有向图像中嵌入信息,避免了嵌入水印所导致的图像变形。该技术可以用于图像真实性、完整性认证,并可定位篡改发生的位置,且对于JPEG图像压缩具有一定的稳健性。实验结果证明了算法的有效性。  相似文献   

16.
一种抗裁剪的半脆弱音频水印算法   总被引:1,自引:0,他引:1  
半脆弱水印不但可以容忍一定程度的常规信号处理操作, 而且可以检测出对多媒体数据的恶意篡改并定位篡改区域. 本文提出一种抗裁剪的半脆弱音频水印算法, 具有以下特点: 1)充分利用多级置乱技术准确定位篡改区域, 最大限度改善被篡改后水印的视觉效果; 2)在篡改定位过程中, 无需原始水印参与; 3)利用水印的归一化相关系数, 可进行完整性认证并给出篡改程度的度量. 实验结果表明, 该算法计算简单, 有很好的抗裁剪性能, 同时对篡改的定位也很精确.  相似文献   

17.
一种抗几何攻击盲数字水印方法   总被引:1,自引:1,他引:0  
提出了一种抵抗几何攻击的数字图像水印方案,主要针对的是缩放攻击和剪切攻击。通过采用在每个分片上重复嵌入水印,并在载体图像上确定抗缩放攻击网格来抵抗剪切攻击和缩放攻击。实验证明,该方法能较好地恢复图像、提取水印信息,能够有效地抵抗剪切攻击和缩放攻击。  相似文献   

18.
当前空域脆弱水印算法存在安全性不高及不能有效抵抗矢量量化攻击的缺陷。针对该缺陷,提出一种用于数字图像完整性认证及内容篡改证明的脆弱水印算法。算法首先对图像进行8×8分块,利用Logistic混沌映射对图像分块进行置乱编号;再采用Hash函数生成基于图像分块内容和位置信息的水印信号;最后将水印信号嵌入到图像分块像素值的低两位平面。实验结果及理论分析表明,提出的脆弱水印算法在保证安全性的同时,有效地抵抗了矢量量化攻击。  相似文献   

19.
众多二值文本图像水印算法在嵌入水印时,都要对黑色像素进行变动,很容易引起图像失真,为解决此问题,提出一种新的水印算法,该算法按行列统计文本黑色像素信息并生成水印,将水印编码与差错控制码绑定,将文本分块,利用不可视黄点表征水印嵌入文本空白处。实验结果表明,嵌入水印后,图像效果良好,水印提取实现了盲提取,并具有完整性鉴定和窜改定位的功能。  相似文献   

20.
利用Harris特征点并结合图像的归一化原理提出了一种新的数字水印方案。由于Harris算子的算法简单,稳健性较好,图像的特征点在经过几何攻击后仍然可以保持。而且,归一化的图像对图像的旋转不太敏感,所以首先对每一个以特征点为圆心的互不重叠的圆归一化以确定水印的嵌入点,然后把水印嵌入到原来的图像中,这样,可以很好地解决水印嵌入和检测的同步问题。实验证明,该算法能很好地抵抗如旋转,缩放,剪切等形式的几何攻击与常规信号处理攻击。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号