[1]樊洁,李建军. 一种半脆弱数字水印算法[J].计算机技术与发展,2017,27(02):69-71.
 FAN Jie,LI Jian-jun. A Semi-fragile Digital Watermarking Algorithm[J].,2017,27(02):69-71.
点击复制

 一种半脆弱数字水印算法()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
27
期数:
2017年02期
页码:
69-71
栏目:
安全与防范
出版日期:
2017-02-10

文章信息/Info

Title:
 A Semi-fragile Digital Watermarking Algorithm
文章编号:
1673-629X(2017)02-0069-03
作者:
 樊洁李建军
 内蒙古科技大学信息工程学院
Author(s):
 FAN JieLI Jian-jun
关键词:
 半脆弱数字水印整数小波矩阵范数量化奇异值分解混沌置乱
Keywords:
 semi-fragile digital watermarkinginteger waveletmatrix norm quantizationSVDchaotic scrambling
分类号:
TP391
文献标志码:
A
摘要:
 随着移动设备的广泛使用,利用微信、QQ、邮箱等APP平台传播多媒体数据越来越便捷.为了保护多媒体数据的完整性,并对多媒体数据的完整性进行认证,数字水印技术应运而生.针对完整性认证和篡改定位,提出了一种半脆弱数字水印算法.通过将原始图像进行整数小波变换,以避免浮点数的舍入误差;将图像进行二级整数小波变换,利用矩阵范数量化方法,将水印嵌入到整数小波域的中、高频细节子带中;采用Logistic混沌序列对水印信息进行加密,以达到提高水印安全性的目的.再利用整数小波逆变换,得到含水印图像.通过涂改、剪切、压缩、加噪等常用攻击方法,实验结果表明,算法兼具鲁棒性、脆弱敏感性,能够准确定位篡改区域,是一种有效的半脆弱数字水印方案.
Abstract:
 With the widespread use of mobile devices,WeChat,QQ,mail and other APP platform to spread multimedia data is more convenient.In order to protect and authenticate the integrity of the multimedia data,the digital watermarking technology is emerged.Aiming at its integrity authentication and tamper location,a semi-fragile digital watermarking algorithm is proposed.Integer wavelet transform is made for the original image to avoid rounding error of floating-point numbers,and that of second level is conducted for image to embed watermarks to intermediate and high frequency progeny details of integer wavelet domain with matrix norm quantization.In order to guarantee the security of watermark,the watermark information is encrypted by the Logistic chaotic sequence.Then the inverse integrated wavelet transform is applied to obtain the watermarking image.By altering,sheafing,compression,noise adding and other common attack methods,the experiments show the algorithm has both robustness and sensitivity,and also exactly locates distorted parts,which is an effective semi-fragile digital watermarking method.

相似文献/References:

[1]李国良 谭月辉 齐京礼 陈建泗 李志勇.一种基于多小波变换和SPIHT编码的可恢复半脆弱数字水印算法[J].计算机技术与发展,2011,(05):147.
 LI Guo-liang,TAN Yue-hui,QI Jing-li,et al.A Recoverable Semi-Fragile Based on Multiwavelet Watermarking Algorithm and SPIHT Coding[J].,2011,(02):147.
[2]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(02):1.
[3]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(02):5.
[4]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(02):13.
[5]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(02):21.
[6]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(02):25.
[7]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(02):29.
[8]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(02):34.
[9]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(02):38.
[10]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(02):43.

更新日期/Last Update: 2017-05-11