首页 | 官方网站   微博 | 高级检索  
     

实用的完全脆弱认证水印算法*
引用本文:黄良永,肖德贵,吴建生.实用的完全脆弱认证水印算法*[J].计算机应用研究,2009,26(7):2741-2743.
作者姓名:黄良永  肖德贵  吴建生
作者单位:1. 柳州师范高等专科学校,数学与计算机科学系,广西,柳州,545004
2. 湖南大学,计算机与通讯学院,长沙,410082
基金项目:广西青年科学基金资助项目(0832029)
摘    要:提出一种完全脆弱认证水印算法用于图像完整性认证、窜改定位和近似恢复被窜改部分。算法基于对原始图像2×2大小分块,计算图像块各像素高6 bit的灰度均值作为水印,利用混沌和置乱技术对水印信息进行加密和确定水印比特嵌入的位置。实验结果表明,该算法简单、安全性高,窜改精确定位到2×2图像块,可对窜改区域近似恢复,具有较好的实用性。

关 键 词:认证水印  脆弱  窜改定位

Practical complete fragile authentication watermarking
HUANG Liang yong,XIAO De gui,WU Jian sheng.Practical complete fragile authentication watermarking[J].Application Research of Computers,2009,26(7):2741-2743.
Authors:HUANG Liang yong  XIAO De gui  WU Jian sheng
Affiliation:(1.Dept. of Mathematics & Computer Science, Liuzhou Teachers College, Liuzhou Guangxi 545004, China; 2.School of Computer & Communication, Hunan University, Changsha 410082, China)
Abstract:The paper presented a fragile watermark algorithm for image integrity of the certification, and locate the tampering and image restoration. The algorithm based on the 2×2 pixel image block, then to calculate of high pixel image block the 6 bit gray average as a watermark, the use of chaos and scrambling technology to encrypt watermark information and determine the location of the embedded watermark bit. The results show that: the algorithm is simple, safe, accurate location to tamper with 2 × 2 blocks images can be tampered with the region similar to the recovery, has good practicality.
Keywords:authentication watermark  fragile  tampering location
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机应用研究》浏览原始摘要信息
点击此处可从《计算机应用研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号