计算机科学 ›› 2020, Vol. 47 ›› Issue (10): 332-338.doi: 10.11896/jsjkx.191000060
• 信息安全 • 上一篇
郑秋梅, 刘楠, 王风华
ZHENG Qiu-mei, LIU Nan, WANG Feng-hua
摘要: 将图像用于司法、医学等重要领域时,往往需要对图像进行完整性认证,判断图像是否被恶意篡改。基于脆弱水印的图像完整性认证方法可以用来实现图像的篡改检测和篡改定位。针对脆弱水印在图像篡改检测中定位精度和抗复杂攻击不能同时满足的问题,提出了一种基于复杂攻击的脆弱水印图像完整性认证算法。向彩色图像R,G,B 3个通道中嵌入相同的脆弱水印,目的是检测出图像任意通道的篡改。将图像以2×2大小分块来提高定位精度,采用块验证和组验证的认证方式来检测复杂攻击的图像篡改,使用非等长图像置乱变换提高算法的普适性和抗复杂攻击的能力。仿真结果表明,所提算法具有较好的不可见性,对简单攻击、复杂攻击和混合攻击类型下的图像篡改具有更高的定位精度。
中图分类号:
[1]LIU X L,LIN C C,YUAN S M.Blind dual watermarking for color images’ authentication and copyright protection[J].IEEE Transactions on Circuits and Systems for Video Technology,2018,28(5):1047-1055. [2]TIWARI A,SHARMA M,TAMRAKAR R K.Watermarkingbased image authentication and tamper detection algorithm using vector quantization approach[J].International Journal of Electronics and Communications(AEU),2017(78):114-123. [3]ZHAN X,LI Y,LEI Y R,Chen C R.A grayscale images fragile watermark authentication system based on the singular value decomposition[J].Journal of Inner Mongolia University (Natural Science Edition),2015,44(3):385-388. [4]SHI J P,WU Y Q.Fragile watermarking for fingerprint images based on QR decomposition in NSCT-Domain[J].Journalof Applied Science-Electronics and Information Engineering,2017,35(6):735-744. [5]JING X Z,JIANG W Z.Fragile watermarking capable of locating tampered blocks in JPEG images[J].ACTA ELECTRONICA SINICA,2010,38(7):1585-1589. [6]ANSARI I A,PANT M,AHN C W.SVD based fragile watermarking scheme for tamper localization and self-recovery[J].International Journal of Machine Learning and Cybernetics,2016,7(6):1225-1239. [7]YEUNG M M,MINTZER F.An invisible watermarking tech-nique for image verification[C]//Proceedings of theICIP’97.Santa Barbara,California:IEEE,1997:680-683. [8]CHEN F,WANG H X.Secure fragile watermarking algorithm with tampered-pixels localization[J].Journal of the China Railway Society,2011,33(1):63-68. [9]MUNIR R.A chaos-based fragile watermarking method in spatial domain for image authentication[C]//2015 International Seminar on Intelligent Technology and Its Applications (ISITIA).IEEE,2015. [10]TONG X,LIU Y,ZHANG M,et al.A novel chaos-based fragile watermarking for image tampering detection and self-recovery[J].Signal Processing:Image Communication,2013,28(3):301-308. [11]KANG Q,KE L,HU C.An SVD-based fragile watermarkingscheme with grouped blocks[C]//2nd International Conference on Information Technology and Electronic Commerce (ICITEC).IEEE,2014. [12]SHAO L P,QIN Z,GAO H J,et al.2-Dimension non equilateral image scrambling transformation[J].Acta Electronica Sinica,2007,35(7):1290-1294. [13]LI Y K,FENG Q S,ZHOU F,et al.2-D Arnold transformation and non-equilateral image scrambling transformation[J].Computer Engineering and Design,2009,30(13):3133-3135. [14]ANSARI I A,PANT M.Multipurpose image watermarking in the domain of DWT based on SVD and ABC[J].Pattern Recognition Letters,2016,16(94):228-236. [15]SHEHAB A,ELHOSENY M,MUHAMMAD K,et al.Secureand robust fragile watermarking scheme for medical images[J].IEEE Access,2018,6:10269-10278. [16]ZHOU W,YU L,WANG Z,et al.Binocular visual characteristics based fragile watermarking scheme for tamper detection in stereoscopic images[J].International Journal of Electronics and Communications(AEU),2015,70(1):77-84. [17]SHI H,LI M C,GUO C,et al.A region-adaptive semi-fragiledual watermarking scheme[J].Multimedia Tools and Applications,2016,75(1):465-495. [18]TRIVEDY S,PAL A K.A Logistic map-based fragile water-marking scheme of digital images with tamper detection[J].Iranian Journal of Science and Technology,Transactions of Electrical Engineering,2017,41:103-113. [19]ZHANG H.Research on fragile watermarking schemes for image content authentication and self-recovery[D].Weihai:Shandong University,2018. [20]XIE G X.Self-recovery fragile watermarking algorithm for image content authentication[D].Chengdu:Southwest Jiaotong University,2017. |
[1] | 董琳, 黄丽清, 叶锋, 黄添强, 翁彬, 徐超. 人脸伪造检测泛化性方法综述 Survey on Generalization Methods of Face Forgery Detection 计算机科学, 2022, 49(2): 12-30. https://doi.org/10.11896/jsjkx.210900146 |
[2] | 田洋, 毕秀丽, 肖斌, 李伟生, 马建峰. 基于离散切比雪夫变换的图像接缝裁剪篡改检测 Image Seam Carving Tampering Detection by Discrete Tchebichef Transform 计算机科学, 2021, 48(6A): 43-50. https://doi.org/10.11896/jsjkx.200800020 |
[3] | 尚进跃, 毕秀丽, 肖斌, 李伟生. 基于DCT系数哈希的图像篡改检测算法 Image Forgery Detection Based on DCT Coefficients Hashing 计算机科学, 2020, 47(6): 310-315. https://doi.org/10.11896/jsjkx.190600081 |
[4] | 王志锋, 朱琳, 曾春艳, 闵秋莎, 夏丹. 数字图像重压缩检测研究综述 Survey on Recompression Detection for Digital Images 计算机科学, 2018, 45(9): 20-29. https://doi.org/10.11896/j.issn.1002-137X.2018.09.003 |
[5] | 周燕,曾凡智,赵慧民. 基于压缩感知的视频双水印算法研究 Double Video Watermarking Algorithm Based on Compressive Sensing 计算机科学, 2016, 43(5): 132-139. https://doi.org/10.11896/j.issn.1002-137X.2016.05.025 |
[6] | 隋莉莉,汪传建. 基于弱水印的地理数据拓扑完整性检验方法 Checking Topological Integrity of Geographic Data Based on Fragile Watermarking 计算机科学, 2016, 43(2): 183-187. https://doi.org/10.11896/j.issn.1002-137X.2016.02.040 |
[7] | 孟芳慧,曹宝香,杨义先,钮心忻. 多媒体数字产品版权保护模型研究与设计 Research and Design of Multimedia Digital Products Copyright Protection Model 计算机科学, 2013, 40(1): 98-102. |
[8] | 夏心江,胡钢,王烨华. 基于同心圆定位算法的改进算法研究 Study on Improved Algorithm Based on Concentric Circles Localization 计算机科学, 2012, 39(6): 68-71. |
[9] | 肖磊. 一种具有高攻击类型判别能力的图像空域半脆弱水印算法 Image Spatial Semi-fragile Watermarking Algorithm with High Classification Capability of Attack Types 计算机科学, 2010, 37(2): 286-289. |
[10] | . 一种基于整数小波变换的医学图像半脆弱水印算法 计算机科学, 2008, 35(1): 258-260. |
[11] | 张鸿宾 杨成. 基于公钥和脆弱水印的图像认证算法 计算机科学, 2004, 31(11): 218-221. |
|