YANG Shan,LI De*.Image content authentication technology based on semi -fragile watermarking[J].Journal of Yanbian University,2020,46(01):43-48.
基于半脆弱水印的图像内容认证技术
- Title:
- Image content authentication technology based on semi -fragile watermarking
- 文章编号:
- 1004-4353(2020)01-0043-06
- 关键词:
- 半脆弱水印; 内容认证; 离散小波变换(DWT); 自适应嵌入; 篡改定位
- 分类号:
- TP309.7
- 文献标志码:
- A
- 摘要:
- 为了认证图像内容的真实性和可靠性,提出了一种用于图像内容认证和篡改检测定位的半脆弱水印算法.首先利用小波变换的系数分量近似生成表征图像内容的特征水印; 然后根据图像在小波变换后的能量分布特性,利用伪随机数发生系统确定特征水印的嵌入位置,以此实现水印的自适应嵌入.最后在小波系数中提取出嵌入的水印信息,并与图像生成的水印信息进行比对,以此实现图像的认证功能.实验结果显示,该算法能够区分常规信号的处理操作(如进行高质量的JPEG压缩、添加少量噪声)和恶意篡改操作(如图像剪切),并可对图像的篡改位置进行定位.
- Abstract:
- In order to authenticate the authenticity and reliability of image content, a semi -fragile watermarking algorithm for image content authentication and tamper detection and localization is proposed. Firstly, the wavelet transform is used to approximate the watermarking of image content. Then, according to the energy distribution of the image after wavelet transformation, the pseudo -random number generation system is used to determine the embedding position of the feature watermarking, so as to realize the adaptive embedding of the watermarking. Finally, the embedded watermarking information is extracted from the wavelet coefficients and compared with the watermarking information generated by the image to realize the image authentication function. Experimental results show that the algorithm can distinguish between conventional signal processing operations(such as high quality JPEG compression, adding a small amount of noise)and malicious tampering operations(such as image cutting), and can locate the tampering position of the image.
参考文献/References:
[1] COLLBERG C S, THOMBORSON C. Watermarking, tamper -proofing, and obfuscation -tools for software protection[J]. IEEE Transactions on Software Engineering SE, 2002,28(8):735-746.
[2] LIN C Y, CHANG S F. A robust image authentication method distinguishing JPEG compression from malicious manipulation[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2001,11(2):153-168.
[3] 胡玉平,张军.用于图像认证及恢复的半脆弱水印算法[J].计算机工程,2010,36(11):140-142.
[4] 赵春晖,刘巍.基于分块压缩感知的图像半脆弱零水印算法[J].自动化学报,2012,38(4):609-617.
[5] 高铁杠,谭琳,曹雁军.基于Hash函数和汉明码的半脆弱水印算法[J].光电子激光,2012,23(9):1808-1814.
[6] 王向阳,杨红颖,陈利科,等.基于视觉掩蔽的半脆弱水印技术研究[J].中国图像图形学报,2005,10(12):1548-1553.
[7] 王向阳,杨红颖,邬俊.一种基于自适应量化的半脆弱图像水印算法[J].小型微型计算机系统,2006,27(5):896-900.
[8] 高雪丽,李德.基于边缘特征的动画零水印算法[J].延边大学学报(自然科学版),2017,43(4):353-358.
[9] 侯振华,陈生潭.用于图像认证的半脆弱性数字水印研究[J].电视技术,2003(11):88-91.
[10] 黄开兴,罗永,成 礼智.基于方向小波和直方图平移的无损脆弱水印[J].计算机工程,2009,35(15):153-155.
[11] 王俊文,刘光杰,戴跃伟,等.一种估计JPEG双重压缩原始量化步长的新方法[J].电子与信息学报,2009,31(4):836-839.
[12] YANG H F, SUN X M. Semi -fragile watermarking for image authentication and tamper detection using HVS Model[C]//International Conference on Multimedia and Ubiquitous Engineering(MUE’07). Seoul: IEEE, 2007:1112-1117.
[13] QI X J, XIN X. A quantization -based semi -fragile watermarking scheme for image content authentication[J]. J Vis Commun Image R, 2011,22(2):187-200.
[14] BAE S H, KIM M. A novel image quality assessment with globally and locally consilient visual quality perception[J]. IEEE Transactions on Image Processing, 2016,25(5):2392-2406.
备注/Memo
收稿日期: 2019-06-10
基金项目: 吉林省教育厅“十三五”科学技术研究项目(吉教科合字[2016]第249号)
*通信作者: 李德(1972—),男,博士,教授,研究方向为数字内容安全、数字版权保护.