2.765

2022影响因子

(CJCR)

  • 中文核心
  • EI
  • 中国科技核心
  • Scopus
  • CSCD
  • 英国科学文摘

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

抗拼贴攻击的二值图像认证算法

秦瑶 和红杰 陈帆

秦瑶, 和红杰, 陈帆. 抗拼贴攻击的二值图像认证算法. 自动化学报, 2014, 40(6): 1184-1190. doi: 10.3724/SP.J.1004.2014.01184
引用本文: 秦瑶, 和红杰, 陈帆. 抗拼贴攻击的二值图像认证算法. 自动化学报, 2014, 40(6): 1184-1190. doi: 10.3724/SP.J.1004.2014.01184
QIN Yao, HE Hong-Jie, CHEN Fan. Binary Image Authentication Watermarking Scheme Against Collage Attack. ACTA AUTOMATICA SINICA, 2014, 40(6): 1184-1190. doi: 10.3724/SP.J.1004.2014.01184
Citation: QIN Yao, HE Hong-Jie, CHEN Fan. Binary Image Authentication Watermarking Scheme Against Collage Attack. ACTA AUTOMATICA SINICA, 2014, 40(6): 1184-1190. doi: 10.3724/SP.J.1004.2014.01184

抗拼贴攻击的二值图像认证算法

doi: 10.3724/SP.J.1004.2014.01184
基金项目: 

国家自然科学基金(61373180,60970122),中央高校基本科研业务专项基金资助(SWJTU09CX039,SWJTU10CX09),西藏自治区科技计划项目资助

详细信息
    作者简介:

    秦瑶 西南交通大学信息科学与技术学院硕士研究生. 主要研究方向为二值图像数字水印技术.E-mail:yaoqin525@yeah.ne

Binary Image Authentication Watermarking Scheme Against Collage Attack

Funds: 

Supported by National Natural Science Foundation of China (61373180, 60970122), the Central College Basic Scientific Research Business Special Fund (SWJTU09CX039, SWJTU10CX09), and Science and Technology Plan Projects of Tibet Autonomous Region

  • 摘要: 为提高算法抵抗拼贴攻击的能力,本文结合块相关思想提出一种二值图像认证算法.该算法首先将每个图像块中的像素点分为“可翻转”和“不可翻转”两类,将“不可翻转”像素点 Hash 生成水印信息,用其替代相应映射块的“可翻转”像素点实现水印嵌入.通过比较图像块重构水印及提取水印的一致性判断该图像块的真实性,并结合各图像块邻域篡改特征进一步提高篡改检测性能.实验结果表明,该算法不仅提高了在替换、添加、删除攻击下的篡改检测性能,而且能够有效抵抗拼贴攻击.
  • [1] Zhou Lin-Na. Study of Digital Forensics Based on Image Content [Ph.D. dissertation], Beijing University of Posts and Telecommunications, China, 2007 (周琳娜. 数字图像盲取证技术研究 [博士学位论文], 北京邮电大学, 中国, 2007)
    [2] Huang F J, Huang J W, Shi Y Q. Detecting double JPEG compression with the same quantization matrix. IEEE Transactions on Information Forensics and Security, 2010, 5(4): 848-856
    [3] Peng F, Nie Y Y, Long M. A complete passive blind image copy-move forensics scheme based on compound statistics features. Forensic Science International, 2011, 212(1-3): e21-e25
    [4] Mahalakshmi S D, Vijayalakshmi K, Priyadharsini S. Digital image forgery detection and estimation by exploring basic image manipulations. Digital Investigation, 2012, 8(3-4): 215-225
    [5] Stamm M C, Liu K J R. Anti-forensics of digital image compression. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 1050-1065
    [6] Haouzia A, Noumeir R. Methods for image authentication: a survey. Multimedia Tools and Applications, 2008, 39(1): 1-46
    [7] Qi Ke, Xie Dong-Qing. Watermarking scheme against geometrical attacks based on second generation Bandelet. Acta Automatica Sinica, 2012, 38(10): 1646-1653(綦科, 谢冬青. 基于第二代Bandelet变换的抗几何攻击图像水印. 自动化学报, 2012, 38(10): 1646-1653)
    [8] Aldeeb N H H, Abuhaiba I S I. An improved watermarking scheme for tiny tamper detection of color images. International Journal of Image, Graphics and Signal Processing, 2013, 5(5): 1-14
    [9] He H J, Chen F, Tai H M, Kalker T, Zhang J S. Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 185-196
    [10] Tzeng C H, Tsai W H. A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement. IEEE Communications Letters, 2003, 7(9): 443-445
    [11] Yang H J, Alex C K. Binary image authentication with tampering localization by embedding cryptographic signature and block identifier. IEEE Signal Processing Letters, 2006, 13(12): 741-744
    [12] Xi Y H, Zhang M R. A document watermarking algorithm based on partitioned character image. In: Proceedings of the 2009 International Conference on E-Business and Information System Security. Wuhan, China: IEEE, 2009. 1-4
    [13] Kwon O J, Kim W G, Kim Y. Binary image watermarking with tampering localization in binary wavelet transform domain. International Journal of Multimedia and Ubiquitous Engineering, 2012, 7(2): 341-346
    [14] Wu M, Liu B D. Data hiding in binary image for authentication and annotation. IEEE Transactions on Multimedia, 2004, 6(4): 528-538
    [15] Zhu Cong-Xu, Chen Zhi-Gang. Sensitive chaotic fragile watermarking technique for binary images verification. Mini-Micro Systems, 2006, 27(1): 151-154(朱从旭, 陈志刚. 一种灵敏的文本图像认证混沌脆弱水印技术. 小型微型计算机系统, 2006, 27(1): 151-154)
    [16] Li Zhao-Hong, Hou Jian-Jun, Song Wei. Binary document image authentication watermarking technique based on hierarchical structure. Acta Automatica Sinica, 2008, 8(8): 841-848(李赵红, 侯建军, 宋伟. 基于等级结构的二值文本图像认证水印算法. 自动化学报, 2008, 8(8): 841-848)
    [17] Fridrich J, Goljan M, Memon N. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262-274
    [18] Wang Z, Bovik A C, Sheikh H R, Simoncelli E P. Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing, 2004, 13(4): 600-612
    [19] He Hong-Jie, Zhang Jia-Shu. Chaos-based scramble self-embedding watermarking algorithm. Journal on Communications, 2006, 27(7): 80-86, 93(和红杰, 张家树. 基于混沌置乱的分块自嵌入水印算法. 通信学报, 2006, 27(7): 80-86, 93)
    [20] He Hong-Jie. Digital Image Secure Authentication Watermarking Algorithms and Their Performance Analysis of Statistical Detection [Ph.D. dissertation]. Southwest Jiaotong University, China, 2009(和红杰. 数字图像安全认证水印算法及其统计检测性能分析 [博士学位论文], 西南交通大学, 中国, 2009)
  • 加载中
计量
  • 文章访问数:  1770
  • HTML全文浏览量:  76
  • PDF下载量:  551
  • 被引次数: 0
出版历程
  • 收稿日期:  2013-01-25
  • 修回日期:  2013-05-29
  • 刊出日期:  2014-06-20

目录

    /

    返回文章
    返回