主页期刊介绍编委会编辑部服务介绍道德声明在线审稿编委办公编辑办公English
2018-2019年专刊出版计划 微信服务介绍 最新一期:2019年第10期
     
在线出版
各期目录
纸质出版
分辑系列
论文检索
论文排行
综述文章
专刊文章
美文分享
各期封面
E-mail Alerts
RSS
旧版入口
中国科学院软件研究所
  
投稿指南 问题解答 下载区 收费标准 在线投稿
和红杰,张家树.对水印信息篡改鲁棒的自嵌入水印算法.软件学报,2009,20(2):437-450
对水印信息篡改鲁棒的自嵌入水印算法
Self-Embedding Watermarking Algorithm with Robustness against Watermark Information Alterations
投稿时间:2007-04-02  修订日期:2007-09-19
DOI:
中文关键词:  脆弱水印  自嵌入  离散小波变换  标量量化
英文关键词:fragile watermarking  self-embedding  discrete wavelet transform  scalar quantization
基金项目:Supported by the Program for New Century Excellent Talents in University of China under Grant No.NCET-05-0794 (新世纪优秀人才支持计划); the Application Basic Foundation of Sichuan Province of China under Grant No.2006 J13-10 (四川省应用基础研究项目); the Doctors Innovation Funds of Southwest Jiaotong University of China under Grant No.2007 (西南交通大学博士生创新基金)
作者单位
和红杰 西南交通大学 信号与信息处理四川省重点实验室,四川 成都 610031 
张家树 西南交通大学 信号与信息处理四川省重点实验室,四川 成都 610031 
摘要点击次数: 3211
全文下载次数: 4469
中文摘要:
      为提高自嵌入水印算法在任意篡改条件下的篡改恢复质量,提出一种对水印信息篡改鲁棒性的空域自嵌入水印算法,分析了算法中阈值选取的合理性和检测篡改的可靠性.该算法首先基于密钥将原始图像的最低位和1/4次低位置零,通过对图像内容的小波低频系数实施均匀标量量化生成低频特征图像,将低频特征图像置乱加密后生成的二值编码嵌入原始图像的置零位;认证时通过设定的阈值识别图像内容被恶意篡改的图像块,从而提高自嵌入水印算法对水印信息篡改和信道噪声的鲁棒性.理论分析和仿真结果表明,无论水印信息被随机篡改还是区域篡改,算法均能根据阈值区分不同篡改并选用不同的方法对其进行篡改恢复,有效地提高了自嵌入算法在部分水印信息篡改时的恢复质量.
英文摘要:
      To improve the quality of the reconstructed image in any tamper condition, this work proposes a self-embedding watermarking scheme with robustness against watermark alterations, and discusses the reasonability of the predefined threshold and the reliability of tamper detection. The proposed scheme firstly sets the least significant bit (LSB) of three-quarter pixels and two LSBs of the residual pixels in the original image to zero. And then the low-frequency feature image is obtained by quantizing the low-frequency wavelet coefficients of the original image content. The improved security watermark, which is the binary code of the scramble version of the low-frequency feature image, is embedded into the LSBs which were set to zero. While the image authentication, the proposed method is able to discriminate the malicious modifications from the mild distortions according to the predefined threshold to enhance the robustness against innocuous alterations such as watermark changes and channel noise. Theoretical analysis and simulation results show that the proposed scheme can discriminate the different modifications according to the predefined threshold no matter the embedded watermark in the host image is randomly or regionally tampered. The quality of the recovery image can be effectively improved due to the fact that the different reconstructed methods are adopted for the different tamper blocks.
HTML  下载PDF全文  查看/发表评论  下载PDF阅读器
 

京公网安备 11040202500064号

主办单位:中国科学院软件研究所 中国计算机学会 京ICP备05046678号-4
编辑部电话:+86-10-62562563 E-mail: jos@iscas.ac.cn
Copyright 中国科学院软件研究所《软件学报》版权所有 All Rights Reserved
本刊全文数据库版权所有,未经许可,不得转载,本刊保留追究法律责任的权利