首页 | 本学科首页   官方微博 | 高级检索  
     检索      

定位像素篡改的安全脆弱水印算法
引用本文:陈帆,王宏霞.定位像素篡改的安全脆弱水印算法[J].铁道学报,2011,33(1):63-68.
作者姓名:陈帆  王宏霞
作者单位:西南交通大学,信息安全与国家计算网格实验室,四川,成都,102401
基金项目:国家自然科学基金,中央高校基本科研业务专项基金,教育部高等学校博士学科点专项科研基金
摘    要:脆弱水印用于鉴定数字媒体的真实性和完整性,篡改检测性能和安全性是脆弱水印算法的两个重要指标。本文提出一种基于密钥生成和嵌入像素水印信息的安全脆弱水印算法,在不增加水印嵌入容量的前提下,采用邻域像素比较的篡改检测方法有效提高算法的篡改检测性能。本文首先利用混沌迭代生成水印信息,然后将生成的水印信息置乱加密后嵌入在原始图像的最低位。认证时,通过比较像素邻域中不一致像素数目与设定阈值的关系判定像素的有效性,并推导给出阈值的动态选取方法和篡改比例与虚、漏警概率关系。理论分析和实验结果表明该算法不仅能抵抗拼贴攻击(Collage Attack),而且提高精确定位水印算法的篡改检测性能。

关 键 词:图像认证  脆弱水印  拼贴攻击  漏警概率

Secure Fragile Watermarking Algorithm with Tampered-pixels Localization
CHEN Fan,WANG Hong-xia.Secure Fragile Watermarking Algorithm with Tampered-pixels Localization[J].Journal of the China railway Society,2011,33(1):63-68.
Authors:CHEN Fan  WANG Hong-xia
Institution:(Information Security and National Computing Grid Laboratory,Southwest Jiaotong University,Chengdu 610031,China)
Abstract:Fragile watermarking is used to detect the authentication and integrity of digital media.The tamper detection performance and the security of a fragile watermarking scheme are two important evaluation measures.This paper proposes a secure pixel-based fragile watermarking scheme,in which the watermark data of each pixel is generated and embedded based on the secret key.Using the pixel-neighborhood comparison,the tamper detection performance is improved without increasing the watermark payload.In the proposed scheme,the chaos system is used to generate the binary watermark data according to the content of each pixel in the original image.The improved security binary watermark by scramble encryption was embedded into the least significant bit of the image data.In tamper detection process,the validity of the test pixel is determined by comparing the number of the inconsistent pixels in a pixel-neighborhood of it with the predefined threshold.The method of the dynamic threshold selection and the relationship between the tamper ratio and the probabilities of false acceptance and false rejection are discussed.Theoretical analysis and simulation results show that the proposed method can distinguish the modifications on the content from the watermark and resist the collage attack,and detect the tampered pixels with a probability of nearly 1.
Keywords:image authentication  fragile watermarking  collage attack  probability of false acceptance
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号