一种基于图像或水印篡改识别的恢复图像认证方案

Ke Ke, Tao Zhao, Ou Li
{"title":"一种基于图像或水印篡改识别的恢复图像认证方案","authors":"Ke Ke, Tao Zhao, Ou Li","doi":"10.1109/MUE.2010.5575077","DOIUrl":null,"url":null,"abstract":"Most image authentication schemes in the literature are either vulnerable to vector quantization (VQ) counterfeiting attacks or sacrifice localization accuracy to improve the security. Only a few algorithms exist to take the recovery of the tampered areas into account. This motivates us to develop a novel authentication scheme for the accurate tamper localization and restoration of the tampered areas. In particular, the host image will firstly be divided into blocks, the recovery watermark of each block is embedded into another distant block selected by a key, and the localization watermark of each block is embedded into itself. During generating the localization watermarks, the sliding window is used to put resistance against VQ attack. It is the dual watermarks that can distinguish tampering watermark from that of image. Theoretical analysis and experimental results demonstrate that the watermarked image has higher quality, and what's more the position of tampered areas can be located correctly. Additionally, it can restore the tampered region effectively.","PeriodicalId":338911,"journal":{"name":"2010 4th International Conference on Multimedia and Ubiquitous Engineering","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"A Restorative Image Authentication Scheme with Discrimination of Tampers on Image or Watermark\",\"authors\":\"Ke Ke, Tao Zhao, Ou Li\",\"doi\":\"10.1109/MUE.2010.5575077\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Most image authentication schemes in the literature are either vulnerable to vector quantization (VQ) counterfeiting attacks or sacrifice localization accuracy to improve the security. Only a few algorithms exist to take the recovery of the tampered areas into account. This motivates us to develop a novel authentication scheme for the accurate tamper localization and restoration of the tampered areas. In particular, the host image will firstly be divided into blocks, the recovery watermark of each block is embedded into another distant block selected by a key, and the localization watermark of each block is embedded into itself. During generating the localization watermarks, the sliding window is used to put resistance against VQ attack. It is the dual watermarks that can distinguish tampering watermark from that of image. Theoretical analysis and experimental results demonstrate that the watermarked image has higher quality, and what's more the position of tampered areas can be located correctly. Additionally, it can restore the tampered region effectively.\",\"PeriodicalId\":338911,\"journal\":{\"name\":\"2010 4th International Conference on Multimedia and Ubiquitous Engineering\",\"volume\":\"37 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-09-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 4th International Conference on Multimedia and Ubiquitous Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MUE.2010.5575077\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 4th International Conference on Multimedia and Ubiquitous Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MUE.2010.5575077","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

文献中的大多数图像认证方案要么容易受到矢量量化(VQ)伪造攻击,要么牺牲定位精度以提高安全性。只有少数算法考虑了篡改区域的恢复。这促使我们开发一种新的认证方案,用于准确的篡改定位和篡改区域的恢复。其中,首先将主机图像分割成块,每个块的恢复水印嵌入到另一个由密钥选择的远块中,每个块的定位水印嵌入到自身中。在生成定位水印的过程中,利用滑动窗口来抵抗VQ攻击。双水印是区分篡改水印和图像篡改水印的关键。理论分析和实验结果表明,加水印后的图像具有较高的质量,并且能够准确定位篡改区域的位置。此外,它还能有效地恢复被篡改的区域。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A Restorative Image Authentication Scheme with Discrimination of Tampers on Image or Watermark
Most image authentication schemes in the literature are either vulnerable to vector quantization (VQ) counterfeiting attacks or sacrifice localization accuracy to improve the security. Only a few algorithms exist to take the recovery of the tampered areas into account. This motivates us to develop a novel authentication scheme for the accurate tamper localization and restoration of the tampered areas. In particular, the host image will firstly be divided into blocks, the recovery watermark of each block is embedded into another distant block selected by a key, and the localization watermark of each block is embedded into itself. During generating the localization watermarks, the sliding window is used to put resistance against VQ attack. It is the dual watermarks that can distinguish tampering watermark from that of image. Theoretical analysis and experimental results demonstrate that the watermarked image has higher quality, and what's more the position of tampered areas can be located correctly. Additionally, it can restore the tampered region effectively.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信