摘要: 针对目前变换域脆弱水印算法对于篡改恢复能力的不足以及所用变换本身的局限性,提出了一种基于双树小波变换的图像编码自嵌入水印算法。算法的篡改定位和图像恢复分别对应着认证水印和恢复水印。算法以原始载体图像的DDWT域SPIHT编码压缩图像为恢复水印, 将其嵌入到图像的小波分解低频系数上,以增强水印鲁棒性;以嵌入恢复水印的载体图像的低频系数大小特征为认证水印,将其嵌入在图像分块的最低有效位上。实验结果表明,本算法能准确定位非法的篡改操作并具有良好的自我恢复能力。
[1] Chamlawi R,Khan A,Usman I.Authentication and recovery ofimage using multiple watermarks[J].Computers and Electical Engineering,2010,36(3):578-584 [2] Fridrich J,Goljan M.Protection of digital images using self-embedding[A]∥Proceeding of NJIT Symposium on Content Security and Data Hiding in Digital Media[C].New Jersey Institute of Technology,May 1999 (下转第288页)(上接第284页) [3] 张鸿宾,杨成.图像的自嵌入及篡改的检测和恢复算法[J].电子学报,2004,2(2):196-199 [4] 张弘,王颖.基于哈希函数的小波域脆弱水印算法[J].中国科学院研究生院学报,2008,5(1):86-92 [5] 肖磊.一种具有高攻击类型判别能力的图像空域半脆弱水印算法[J].计算机科学,2010,7(2):286-289 [6] Selesnick I,Li K Y.Video denoising using 2D and 3D dual-tree complex wavelet transforms[C]∥Proceedings of the SPIE 5207(Wavelets Applications in Signal and Image Processing X).2003:607-618 [7] Selesnick I W,Baraniuk R G,Kingsbury N G.The dual-treecomplex wavelet transform[J].IEEE Signal Process.Mag., 2005,22:123-151 [8] Sai N S T,Patil R C.Image Retrival using 2D Dual-tree Discrete Wavelet Transform.Internation[J].Journal of Computer Applications,2011,14(6) [9] 基于自适应编码次序的多级树集合分裂算法[J].计算机应用,2012,2(3):732-735 [10] Yang Jing-yu,Wang Yao,Xu Wen-li,et al.Image Coding Using Dual-tree Discrete Wavelet Transform[J].IEEE Transactions on Image Processing,2008,17(9):1555-1569 [11] Kingsbury N G,Reeves T.Redundant representation with complex wavelets:how to achieve sparsity[C]∥International Conference on Image Processing.September 2003:45-48 |
No related articles found! |
|