[1]武凤翔,岳晓丽,徐江峰..基于分块的小波域图像半脆弱水印认证算法[J].郑州大学学报(工学版),2012,33(02):10-13,18.[doi:10.3969/j.issn.1671-6833.2012.02.003]
 WU Fengxiang,YUE Xiao,XU Jiangfeng.A Semi-fragile Watermarking Authentication Algorithm Basedon Block and Wavelet Domain of Image[J].Journal of Zhengzhou University (Engineering Science),2012,33(02):10-13,18.[doi:10.3969/j.issn.1671-6833.2012.02.003]
点击复制

基于分块的小波域图像半脆弱水印认证算法()
分享到:

《郑州大学学报(工学版)》[ISSN:1671-6833/CN:41-1339/T]

卷:
33卷
期数:
2012年02期
页码:
10-13,18
栏目:
出版日期:
2012-03-10

文章信息/Info

Title:
A Semi-fragile Watermarking Authentication Algorithm Basedon Block and Wavelet Domain of Image
作者:
武凤翔岳晓丽徐江峰.
华北水利水电学院水利职业学院,河南郑州,450002, 郑州大学信息工程学院,河南郑州,450001
Author(s):
WU FengxiangYUE XiaoXU Jiangfeng
1. Water Conservancy Vocalional School, North China Institute of Water Conservancy and Hydroelectric Power, Zhengzhou450002 , China;2. School of Information Engineering,Zhengzhou University,Zhengzhou 450001 ,China
关键词:
半脆弱水印 分块 小波变换 图像认证
Keywords:
semi-fragile watermark block wavelet transform image authentication
分类号:
TN911.73 TP309.7
DOI:
10.3969/j.issn.1671-6833.2012.02.003
摘要:
提出一种图像半脆弱水印认证算法,该算法将图像分成四块,从三级小波分解的低频系数中提取每部分图像的特征作为水印,嵌入到栽体图像的各分块中,水印提取既不需要原始图像,也不需要原始水印信息.理论分析及实验结果表明,该算法可以对任意大小的载体图像进行水印嵌入,具有很好的透明性,不仅能抵御噪声、有损压缩等非恶意攻击,还能有效地检测定位剪切、替换等恶意攻击.
Abstract:
A new semi-fragile watermarking authentication algorithm is proposed, the algorithm first dividethe image into four blocks, then the feature of each block of image is extracted from low frequency coefficienof three level wavelet transform, and then the feature as the watermark is embedded into corresponding blockof image, the four blocks embedded into watermark were combined into a new image. The watermark can beextracted without involving either the host image or the original watermark. Theoretical analysis and experi.mental results show that the algorithm can be carriers of images of any size, and with good transparency, andit can not only resist non-malicious attacks, such as noise and lossy compression, it can also efectively detectand locate the cut,replaced, and other malicious attacks.
更新日期/Last Update: 1900-01-01