计算机科学 ›› 2020, Vol. 47 ›› Issue (10): 332-338.doi: 10.11896/jsjkx.191000060

• 信息安全 • 上一篇    

基于复杂攻击的脆弱水印图像完整性认证算法

郑秋梅, 刘楠, 王风华   

  1. 中国石油大学(华东)计算机科学与技术学院 山东 青岛266580
  • 收稿日期:2019-10-12 修回日期:2020-03-08 出版日期:2020-10-15 发布日期:2020-10-16
  • 通讯作者: 刘楠(liunan0919@126.com)
  • 作者简介:zhengqm@upc.edu.cn
  • 基金资助:
    国家自然科学基金(51274232);山东省自然科学基金(ZR2018MEE004);中央高校基本科研业务费专项资金(19CX02030A)

Complex Attack Based Fragile Watermarking for Image Integrity Authentication Algorithm

ZHENG Qiu-mei, LIU Nan, WANG Feng-hua   

  1. College of Computer Science and Technology,China University of Petroleum Huadong,Qingdao,Shandong 266580,China
  • Received:2019-10-12 Revised:2020-03-08 Online:2020-10-15 Published:2020-10-16
  • About author:ZHENG Qiu-mei,born in 1964,postgraduate,professor,postgraduate supervisor.Her main research interests include digital watermarking and image processing.
    LIU Nan,born in 1996,postgraduate.Her main research interests includeima-ge processing and digital image watermarking.
  • Supported by:
    National Natural Science Foundation of China (51274232),Natural Science Foundation of Shandong Province,China (ZR2018MEE004) and Fundamental Research Funds for the Central Universities of Ministry of Education of China (19CX02030A)

摘要: 将图像用于司法、医学等重要领域时,往往需要对图像进行完整性认证,判断图像是否被恶意篡改。基于脆弱水印的图像完整性认证方法可以用来实现图像的篡改检测和篡改定位。针对脆弱水印在图像篡改检测中定位精度和抗复杂攻击不能同时满足的问题,提出了一种基于复杂攻击的脆弱水印图像完整性认证算法。向彩色图像R,G,B 3个通道中嵌入相同的脆弱水印,目的是检测出图像任意通道的篡改。将图像以2×2大小分块来提高定位精度,采用块验证和组验证的认证方式来检测复杂攻击的图像篡改,使用非等长图像置乱变换提高算法的普适性和抗复杂攻击的能力。仿真结果表明,所提算法具有较好的不可见性,对简单攻击、复杂攻击和混合攻击类型下的图像篡改具有更高的定位精度。

关键词: 篡改检测, 脆弱水印, 定位精度, 复杂攻击, 图像篡改

Abstract: When the image is used in judicial,medical and other importantfields,it is often necessary to authenticate the integrity of the image to determine whether the image have been tampered with maliciously.The authentication method of image integrity based on fragile watermarking can be used to detect and locate the image tampering.In order to solve the problem that the localization accuracy and anti-complex attacks of fragile watermarking in image tamper detection can not be satisfied simultaneously,a complex attack based fragile watermarking for image integrity authentication algorithm is proposed in this paper.The fragile watermarking is embedded into the color image’s R,G and B channels to detect any channel tampering.In order to improve the localization accuracy,2 × 2 image blocks are divided.Block authentication and group authentication are used to detect the image tampering of complex attacks,and non-equilateral image scrambling transformation is used to improve the universality and anti-complex attacks ability of the algorithm.The simulation results show that the proposed algorithm has better invisibility and higher localization accuracy for image tampering under common attacks,complex attacks and multi attacks.

Key words: Complex attack, Fragile watermarking, Imagetampering, Localization accuracy, Tamper detection

中图分类号: 

  • TP309
[1]LIU X L,LIN C C,YUAN S M.Blind dual watermarking for color images’ authentication and copyright protection[J].IEEE Transactions on Circuits and Systems for Video Technology,2018,28(5):1047-1055.
[2]TIWARI A,SHARMA M,TAMRAKAR R K.Watermarkingbased image authentication and tamper detection algorithm using vector quantization approach[J].International Journal of Electronics and Communications(AEU),2017(78):114-123.
[3]ZHAN X,LI Y,LEI Y R,Chen C R.A grayscale images fragile watermark authentication system based on the singular value decomposition[J].Journal of Inner Mongolia University (Natural Science Edition),2015,44(3):385-388.
[4]SHI J P,WU Y Q.Fragile watermarking for fingerprint images based on QR decomposition in NSCT-Domain[J].Journalof Applied Science-Electronics and Information Engineering,2017,35(6):735-744.
[5]JING X Z,JIANG W Z.Fragile watermarking capable of locating tampered blocks in JPEG images[J].ACTA ELECTRONICA SINICA,2010,38(7):1585-1589.
[6]ANSARI I A,PANT M,AHN C W.SVD based fragile watermarking scheme for tamper localization and self-recovery[J].International Journal of Machine Learning and Cybernetics,2016,7(6):1225-1239.
[7]YEUNG M M,MINTZER F.An invisible watermarking tech-nique for image verification[C]//Proceedings of theICIP’97.Santa Barbara,California:IEEE,1997:680-683.
[8]CHEN F,WANG H X.Secure fragile watermarking algorithm with tampered-pixels localization[J].Journal of the China Railway Society,2011,33(1):63-68.
[9]MUNIR R.A chaos-based fragile watermarking method in spatial domain for image authentication[C]//2015 International Seminar on Intelligent Technology and Its Applications (ISITIA).IEEE,2015.
[10]TONG X,LIU Y,ZHANG M,et al.A novel chaos-based fragile watermarking for image tampering detection and self-recovery[J].Signal Processing:Image Communication,2013,28(3):301-308.
[11]KANG Q,KE L,HU C.An SVD-based fragile watermarkingscheme with grouped blocks[C]//2nd International Conference on Information Technology and Electronic Commerce (ICITEC).IEEE,2014.
[12]SHAO L P,QIN Z,GAO H J,et al.2-Dimension non equilateral image scrambling transformation[J].Acta Electronica Sinica,2007,35(7):1290-1294.
[13]LI Y K,FENG Q S,ZHOU F,et al.2-D Arnold transformation and non-equilateral image scrambling transformation[J].Computer Engineering and Design,2009,30(13):3133-3135.
[14]ANSARI I A,PANT M.Multipurpose image watermarking in the domain of DWT based on SVD and ABC[J].Pattern Recognition Letters,2016,16(94):228-236.
[15]SHEHAB A,ELHOSENY M,MUHAMMAD K,et al.Secureand robust fragile watermarking scheme for medical images[J].IEEE Access,2018,6:10269-10278.
[16]ZHOU W,YU L,WANG Z,et al.Binocular visual characteristics based fragile watermarking scheme for tamper detection in stereoscopic images[J].International Journal of Electronics and Communications(AEU),2015,70(1):77-84.
[17]SHI H,LI M C,GUO C,et al.A region-adaptive semi-fragiledual watermarking scheme[J].Multimedia Tools and Applications,2016,75(1):465-495.
[18]TRIVEDY S,PAL A K.A Logistic map-based fragile water-marking scheme of digital images with tamper detection[J].Iranian Journal of Science and Technology,Transactions of Electrical Engineering,2017,41:103-113.
[19]ZHANG H.Research on fragile watermarking schemes for image content authentication and self-recovery[D].Weihai:Shandong University,2018.
[20]XIE G X.Self-recovery fragile watermarking algorithm for image content authentication[D].Chengdu:Southwest Jiaotong University,2017.
[1] 董琳, 黄丽清, 叶锋, 黄添强, 翁彬, 徐超.
人脸伪造检测泛化性方法综述
Survey on Generalization Methods of Face Forgery Detection
计算机科学, 2022, 49(2): 12-30. https://doi.org/10.11896/jsjkx.210900146
[2] 田洋, 毕秀丽, 肖斌, 李伟生, 马建峰.
基于离散切比雪夫变换的图像接缝裁剪篡改检测
Image Seam Carving Tampering Detection by Discrete Tchebichef Transform
计算机科学, 2021, 48(6A): 43-50. https://doi.org/10.11896/jsjkx.200800020
[3] 尚进跃, 毕秀丽, 肖斌, 李伟生.
基于DCT系数哈希的图像篡改检测算法
Image Forgery Detection Based on DCT Coefficients Hashing
计算机科学, 2020, 47(6): 310-315. https://doi.org/10.11896/jsjkx.190600081
[4] 王志锋, 朱琳, 曾春艳, 闵秋莎, 夏丹.
数字图像重压缩检测研究综述
Survey on Recompression Detection for Digital Images
计算机科学, 2018, 45(9): 20-29. https://doi.org/10.11896/j.issn.1002-137X.2018.09.003
[5] 周燕,曾凡智,赵慧民.
基于压缩感知的视频双水印算法研究
Double Video Watermarking Algorithm Based on Compressive Sensing
计算机科学, 2016, 43(5): 132-139. https://doi.org/10.11896/j.issn.1002-137X.2016.05.025
[6] 隋莉莉,汪传建.
基于弱水印的地理数据拓扑完整性检验方法
Checking Topological Integrity of Geographic Data Based on Fragile Watermarking
计算机科学, 2016, 43(2): 183-187. https://doi.org/10.11896/j.issn.1002-137X.2016.02.040
[7] 孟芳慧,曹宝香,杨义先,钮心忻.
多媒体数字产品版权保护模型研究与设计
Research and Design of Multimedia Digital Products Copyright Protection Model
计算机科学, 2013, 40(1): 98-102.
[8] 夏心江,胡钢,王烨华.
基于同心圆定位算法的改进算法研究
Study on Improved Algorithm Based on Concentric Circles Localization
计算机科学, 2012, 39(6): 68-71.
[9] 肖磊.
一种具有高攻击类型判别能力的图像空域半脆弱水印算法
Image Spatial Semi-fragile Watermarking Algorithm with High Classification Capability of Attack Types
计算机科学, 2010, 37(2): 286-289.
[10] .
一种基于整数小波变换的医学图像半脆弱水印算法

计算机科学, 2008, 35(1): 258-260.
[11] 张鸿宾 杨成.
基于公钥和脆弱水印的图像认证算法

计算机科学, 2004, 31(11): 218-221.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!