期刊文献+

基于图像奇异值的脆弱水印方案 被引量:3

Novel fragile watermarking based on image singular value
在线阅读 下载PDF
导出
摘要 针对精确定位型脆弱水印算法的安全性问题,提出一种基于图像奇异值的脆弱水印方案。该方案选取与图像内容密切相关的图像奇异值作为水印,用混沌系统对其加密来增强水印的安全性。认证时通过水印差值定位图像被篡改的位置,通过奇异值差值反映被篡改区域的篡改强度。实验仿真结果表明该算法不仅提高了精确定位型水印算法的安全性,而且还可以估计出被篡改区域的篡改强度。 A novel fragile watermarking based on image singular value was proposed to overcome the security problems of fragile watermarking with precise localization. The embedded watermark was obtained by converting the singular values of image matrix into a binary sequence. To improve watermark security, a chaotic system was applied to encrypt the watermark sequence. The tampered area of the watermarked image could be reflected in the watermarking difference map and the tampered intensity could be reflected in singular values difference. Simulation results show that the proposed method may not only improve the security of fragile watermarking with precise localization, but also point out the intensity of tampered areas.
出处 《计算机应用》 CSCD 北大核心 2006年第1期93-95,共3页 journal of Computer Applications
关键词 图像认证 脆弱水印 图像奇异值 混沌 image authentication fragile watermarking image singular value chaos
  • 相关文献

参考文献6

  • 1ZHU BB, SWANSON MD, TEWFIK AH. When Seeing Isn't Believing[J]. IEEE Signal Processing Magazine, 2004, 21(2):40-49.
  • 2YEUNG M, MINTZER F. Invisible Watermarking for Image Verification[J]. Journal of Electronic Imaging, 1998, 7(3) : 576 - 591.
  • 3HOLLIMAN M, MEMON N. Counterfeiting Aattacks on Oblivious Block-wise Independent Invisible Watermarking Schemes[J]. IEEE Trans on Image Processing, 2000, 3(9) :432 -441.
  • 4FRIDRICH J, GOLJAN M, MEMON N. Cryptanalysis of the Yeung-Mintzer Fragile Watermarking Technique[J]. Electronic Imaging, 2002, 11(2) : 262 -274.
  • 5FRIDRICH J. Security of Fragile Authentication Watermarks with Localization[A]. Proc. SPIE, Vol. 4675, Security and Watermarking of Multimedia Contents[C]. San Jose, California, 2002. 691 -700.
  • 6张家树,田蕾.一种新的基于密钥的混沌数字水印方法[J].通信学报,2004,25(8):96-101. 被引量:15

二级参考文献7

  • 1TSEKERIDOU S, SOLACHIDIS V, NIBOLAIDIS N, et al. Statistical of watermarking system based on Bernoulli chaotic sequence[J].Signal Processing, 2001,81(6):1273-1293.
  • 2ATHANASIOS N I, IOANNIS P. Comparison of different chaotic maps with application to image watermarking[A]. Proceedings of IEEE Circuits and System[C].Geneya,2000.509-512.
  • 3COX I J, KILIAN J, LEIGHTON T, et al. Secure spread spectrum watermarking for multimedia[J]. IEEE Trans Image Processing,1997, 6(12): 1673-1687.
  • 4HITZL D L, ZELE F. An exploration of the Hnon quadratic map[J]. Physica D, 1985, 14(3): 305-326.
  • 5GIOVANARDI A, MAZZINA G Frequency domain chaotic watermarking[A].Proceedings of IEEE Symposium on Circuits and System[C].Sydney, 2001.521-524.
  • 6黄继武,Yun Q.SHI,程卫东.DCT域图像水印:嵌入对策和算法[J].电子学报,2000,28(4):57-60. 被引量:292
  • 7张家树,肖先赐.基于广义混沌映射切换的混沌同步保密通信[J].物理学报,2001,50(11):2121-2125. 被引量:60

共引文献14

同被引文献24

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部