###
DOI:
Journal of Software:2009.20(2):437-450

对水印信息篡改鲁棒的自嵌入水印算法
和红杰,张家树
(西南交通大学 信号与信息处理四川省重点实验室,四川 成都 610031)
Self-Embedding Watermarking Algorithm with Robustness against Watermark Information Alterations
HE Hong-Jie,ZHANG Jia-Shu
()
Abstract
Chart / table
Reference
Similar Articles
Article :Browse 3242   Download 4495
Received:April 02, 2007    Revised:September 19, 2007
> 中文摘要: 为提高自嵌入水印算法在任意篡改条件下的篡改恢复质量,提出一种对水印信息篡改鲁棒性的空域自嵌入水印算法,分析了算法中阈值选取的合理性和检测篡改的可靠性.该算法首先基于密钥将原始图像的最低位和1/4次低位置零,通过对图像内容的小波低频系数实施均匀标量量化生成低频特征图像,将低频特征图像置乱加密后生成的二值编码嵌入原始图像的置零位;认证时通过设定的阈值识别图像内容被恶意篡改的图像块,从而提高自嵌入水印算法对水印信息篡改和信道噪声的鲁棒性.理论分析和仿真结果表明,无论水印信息被随机篡改还是区域篡改,算法均能根据阈值区分不同篡改并选用不同的方法对其进行篡改恢复,有效地提高了自嵌入算法在部分水印信息篡改时的恢复质量.
Abstract:To improve the quality of the reconstructed image in any tamper condition, this work proposes a self-embedding watermarking scheme with robustness against watermark alterations, and discusses the reasonability of the predefined threshold and the reliability of tamper detection. The proposed scheme firstly sets the least significant bit (LSB) of three-quarter pixels and two LSBs of the residual pixels in the original image to zero. And then the low-frequency feature image is obtained by quantizing the low-frequency wavelet coefficients of the original image content. The improved security watermark, which is the binary code of the scramble version of the low-frequency feature image, is embedded into the LSBs which were set to zero. While the image authentication, the proposed method is able to discriminate the malicious modifications from the mild distortions according to the predefined threshold to enhance the robustness against innocuous alterations such as watermark changes and channel noise. Theoretical analysis and simulation results show that the proposed scheme can discriminate the different modifications according to the predefined threshold no matter the embedded watermark in the host image is randomly or regionally tampered. The quality of the recovery image can be effectively improved due to the fact that the different reconstructed methods are adopted for the different tamper blocks.
文章编号:     中图分类号:    文献标志码:
基金项目:Supported by the Program for New Century Excellent Talents in University of China under Grant No.NCET-05-0794 (新世纪优秀人才支持计划); the Application Basic Foundation of Sichuan Province of China under Grant No.2006 J13-10 (四川省应用基础研究项目); the Doctors Innovation Funds of Southwest Jiaotong University of China under Grant No.2007 (西南交通大学博士生创新基金) Supported by the Program for New Century Excellent Talents in University of China under Grant No.NCET-05-0794 (新世纪优秀人才支持计划); the Application Basic Foundation of Sichuan Province of China under Grant No.2006 J13-10 (四川省应用基础研究项目); the Doctors Innovation Funds of Southwest Jiaotong University of China under Grant No.2007 (西南交通大学博士生创新基金)
Foundation items:
Reference text:

和红杰,张家树.对水印信息篡改鲁棒的自嵌入水印算法.软件学报,2009,20(2):437-450

HE Hong-Jie,ZHANG Jia-Shu.Self-Embedding Watermarking Algorithm with Robustness against Watermark Information Alterations.Journal of Software,2009,20(2):437-450