[1]武凤翔,岳晓丽,徐江峰..基于分块的小波域图像半脆弱水印认证算法[J].郑州大学学报(工学版),2012,33(02):10-13,18.[doi:10.3969/j.issn.1671-6833.2012.02.003]
WU Fengxiang,YUE Xiao,XU Jiangfeng.A Semi-fragile Watermarking Authentication Algorithm Basedon Block and Wavelet Domain of Image[J].Journal of Zhengzhou University (Engineering Science),2012,33(02):10-13,18.[doi:10.3969/j.issn.1671-6833.2012.02.003]
点击复制
基于分块的小波域图像半脆弱水印认证算法(
)
《郑州大学学报(工学版)》[ISSN:1671-6833/CN:41-1339/T]
- 卷:
-
33
- 期数:
-
2012年02期
- 页码:
-
10-13,18
- 栏目:
-
- 出版日期:
-
2012-03-10
文章信息/Info
- Title:
-
A Semi-fragile Watermarking Authentication Algorithm Basedon Block and Wavelet Domain of Image
- 作者:
-
武凤翔; 岳晓丽; 徐江峰.
-
华北水利水电学院水利职业学院,河南郑州,450002, 郑州大学信息工程学院,河南郑州,450001
- Author(s):
-
WU Fengxiang; YUE Xiao; XU Jiangfeng
-
1. Water Conservancy Vocalional School, North China Institute of Water Conservancy and Hydroelectric Power, Zhengzhou450002 , China;2. School of Information Engineering,Zhengzhou University,Zhengzhou 450001 ,China
-
- 关键词:
-
半脆弱水印; 分块; 小波变换; 图像认证
- Keywords:
-
semi-fragile watermark; block; wavelet transform ; image authentication
- 分类号:
-
TN911.73 TP309.7
- DOI:
-
10.3969/j.issn.1671-6833.2012.02.003
- 摘要:
-
提出一种图像半脆弱水印认证算法,该算法将图像分成四块,从三级小波分解的低频系数中提取每部分图像的特征作为水印,嵌入到栽体图像的各分块中,水印提取既不需要原始图像,也不需要原始水印信息.理论分析及实验结果表明,该算法可以对任意大小的载体图像进行水印嵌入,具有很好的透明性,不仅能抵御噪声、有损压缩等非恶意攻击,还能有效地检测定位剪切、替换等恶意攻击.
- Abstract:
-
A new semi-fragile watermarking authentication algorithm is proposed, the algorithm first dividethe image into four blocks, then the feature of each block of image is extracted from low frequency coefficienof three level wavelet transform, and then the feature as the watermark is embedded into corresponding blockof image, the four blocks embedded into watermark were combined into a new image. The watermark can beextracted without involving either the host image or the original watermark. Theoretical analysis and experi.mental results show that the algorithm can be carriers of images of any size, and with good transparency, andit can not only resist non-malicious attacks, such as noise and lossy compression, it can also efectively detectand locate the cut,replaced, and other malicious attacks.
更新日期/Last Update:
1900-01-01