[1]陈惠明.一种具有纠错能力的半脆弱水印算法[J].计算机技术与发展,2012,(04):242-245.
 CHEN Hui-ming.A Semi-Fragile Watermarking Algorithm with Ability to Correct Mistakes[J].,2012,(04):242-245.
点击复制

一种具有纠错能力的半脆弱水印算法()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2012年04期
页码:
242-245
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
A Semi-Fragile Watermarking Algorithm with Ability to Correct Mistakes
文章编号:
1673-629X(2012)04-0242-04
作者:
陈惠明
忻州师范学院计算机系
Author(s):
CHEN Hui-ming
Department of Computer Science,Xinzhou Teachers University
关键词:
半脆弱水印图像认证汉明码鲁棒性JPEG攻击
Keywords:
semi-fragile watermarking authentication of image Hamming code robustness JPEG attack
分类号:
TP391
文献标志码:
A
摘要:
随着数字技术和互联网的飞速发展,图像数据的安全保护问题日益严重,而数字水印技术已成为一种保护数据安全的有效途径。文中提出了一种基于汉明码的用于图像版权保护的半脆弱水印盲算法。首先对二值水印信号进行汉明编码并调制,然后将调制后的水印号采用自适应分块算法嵌入到原始图像中,最后利用了汉明码的纠错算法进行了水印的提取。算法较好地解决了水印的不可见性和鲁棒性之间的矛盾。实验结果表明,该算法对JPEG有损压缩和高斯低通滤波等攻击具有一定的容忍性
Abstract:
Along with the rapid development of digital technology and internet,image data safety protection is getting more and more serious and digital watermarking technology has become an effective way to protect the safety of the data.It proposes a blind semi-fragile watermarking algorithm based on Hamming code,which is used in image copyright protection.First of all,it transforms binary watermark signal to Hamming code and modulates it,then embeds the modulated watermarking into the original image.This process uses adaptive partition algorithm.At last,it adopts the correcting algorithm of Hamming code to extract the watermark,which solves the contradiction between watermark invisibility and robustness felicitously.Experimental results show that this algorithm has a bit of toleration to attacks,such as JPEG lossy compression and Gaussian low-pass filter

相似文献/References:

[1]吴柯.图像版权保护与认证的双水印算法[J].计算机技术与发展,2009,(09):136.
 WU Ke.Dual Watermarking Algorithm of Image Copyright Protection and Authentication[J].,2009,(04):136.
[2]陆鹏 汤进 罗斌.基于Windows Mobile平台图像认证系统设计实现[J].计算机技术与发展,2010,(11):87.
 LU Peng,TANG Jin,LUO Bin.Image Authentication System Design and Implementation Based on Windows Mobile[J].,2010,(04):87.
[3]董峰,金俭. 一种基于混沌脆弱水印的可逆双层图像认证方案[J].计算机技术与发展,2016,26(06):92.
 DONG Feng,JIN Jian. A Two-level Reversible Image Authentication Scheme Based on Chaotic Fragile Watermark[J].,2016,26(04):92.
[4]李东勤 林克正.基于混沌映射的半脆弱图像水印算法[J].计算机技术与发展,2008,(11):156.
 LI Dong-qin,LIN Ke-zheng.Semi - fragile Image Watermarking Algorithm Based on Chaotic Map[J].,2008,(04):156.
[5]赵娟 杨钒.一种用于图像内容认证的半脆弱数字水印[J].计算机技术与发展,2011,(01):151.
 ZHAO Juan,YANG Fan.A Semi-fragile Digital Watermark for Image Content Authentication[J].,2011,(04):151.

备注/Memo

备注/Memo:
山西省自然科学基金项目(2009011018-4)陈惠明(1968-),男,山西忻州人,硕士,讲师,研究方向为图像识别
更新日期/Last Update: 1900-01-01