基于圖像特征的易損水印技術(shù)
A novel fragile watermark technique based on image feature
-
摘要: 該文在 Yeung-Mintzer(1997)的方法基礎(chǔ)上提出了一種新穎的易損水印技術(shù)。為解決原算法存在的安全問(wèn)題,提出利用基于圖像特征的混沌密鑰控制易損水印的嵌入。理論分析和實(shí)驗(yàn)結(jié)果證明該算法可以有效地抵制由原算法所產(chǎn)生的攻擊問(wèn)題。由于水印在空域逐個(gè)像素地進(jìn)行嵌入,所提出的算法具有良好的局部修改檢測(cè)性能。
-
關(guān)鍵詞:
- 易損水印; 圖像認(rèn)證; 圖像特征; 混沌密鑰; 攻擊
Abstract: In this paper, a novel fragile watermark technique is proposed, which is based on the method of Yeung-Mintzers (1997). To resolve the existing security problem, a chaotic key which is based on image feature is used to control the embedding of fragile watermark. Theoretical analysis and experimental results demonstrate its effectiveness in resisting possible attacks. And because the watermark is embedded in pixel-wise order, the technique has good ability of detecting local alterations. -
G.L. Friedman, The trustworthy digital camera: Restoring credibility to the photographic image,IEEE Trans. on Consumer Electronics, 1993, 39(4), 905-910.[2]R.G. Schyndel, A. Z. Tirkel, C. F. Osborne, A digital watermark, In: Proc ICIP, Austin, Texas,1994, vol.2, 86-90.[3]M. Yeung, F. Mintzer, An invisible watermarking technique for image verification, In: Proc ICIP,Santa Barbara, California, 1997, 680-683.[4]M. Holliman, N. Memon, Counterfeiting attacks for block-wise independent watermarking techniques, IEEE Trans. on Image Processing, 2000, 9(3), 432-441.[5]J. Fridrich, M. Goljan, N. Memon, Further attacks on Yeung-Mintzer watermarking scheme, In:Proc. SPIE Photonic West, Electronic Imaging 2000, Security and Watermarking of Multimedia Contents, San Jose, California, January 24-26, 2000, 428-437.J. Fridrich, M. Goljan, A. C. Baldoza, New fragile authentication watermark for images, In: Proc ICIP, Vancouver, Canada, September 10-13, 2000, 446-449. -
計(jì)量
- 文章訪問(wèn)數(shù): 2049
- HTML全文瀏覽量: 113
- PDF下載量: 487
- 被引次數(shù): 0