期刊文献+

图像Hadamard变换域半脆弱水印算法

Semi-fragile Image Watermarking Algorithm in Hadamard Domain
在线阅读 下载PDF
导出
摘要 提出了一种基于图像Hadamard变换的半脆弱水印算法。首先对图像进行分块Hadamard变换,选取分块低频分量进行量化,并Hash操作生成具有固定长度的摘要,然后将摘要的若干位作为水印在密钥的作用下嵌入到其它分块的中频系数里形成含水印图像。实验结果表明,算法对常规操作鲁棒,能够检测对内容的恶意篡改,定位能力好,误检和漏检率低,安全性好,可作为图像内容真实性认证的算法。 This paper proposed a semi-fragile watermarking algorithm based on Hadamard transform.First,the original image is subdivided to blocks and executed Hadamard transform,then selected the lowest frequency components of specific positions from the blocks and quantized,encrypt them by the Hash function which generates the message digest with fixed length.Finally,chooses some bits of the message digest as the watermark and hides it into other Hadamard blocks of the mid region under key effect.Experiments show tha...
出处 《杭州电子科技大学学报(自然科学版)》 2009年第4期58-62,共5页 Journal of Hangzhou Dianzi University:Natural Sciences
关键词 哈达玛变换 图像认证 半脆弱水印 哈希函数 Hadamard transform image authentication semi-fragile watermark Hash function
  • 相关文献

参考文献2

二级参考文献56

  • 1徐新华.数字图像处理与分析[M].北京:科学出版社,1992..
  • 2Honsinger C.W., Jones P., Rabbani M., Stoffel J.C.. Lossless recovery of an original image containing embedded data. U.S. Patent No. 6,278,791, 2001
  • 3Fridrich J., Goljan M., Du R.. Lossless data embedding for all image formats. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 572~583
  • 4Tian J.. Wavelet-based reversible watermarking for authentication. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 679~690
  • 5Holliman M., Memon N.. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000, 9(3): 432~441
  • 6Fridrich J., Goljan M., Memon N.. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262~274
  • 7Wu J., Zhu B., Li S., Lin F.. Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes. In: Proceedings of the IEEE International Conference on Multimedia & Expo (ICME'04), Taiwan, 2004
  • 8Wu J., Zhu B., Li S., Lin F.. New attacks on SARI image authentication system. In:Proceedings of the SPIE,Vol.5306, Security and Watermarking of Multimedia Contents VI, San Jose, California, USA, 2004, 602~609
  • 9Yeung M., Mintzer F.. Invisible watermarking for image verification. Journal of Electronic Imaging, 1998, 7(3): 578~591
  • 10Wu M., Liu B.. Watermarking for image authentication. In: Proceedings of the IEEE International Conference on Image Processing, Chicago, USA, 1998, 2: 437~441

共引文献70

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部