用于图像篡改定位和自恢复的半脆弱水印

Yuhang Li, Ling Du
{"title":"用于图像篡改定位和自恢复的半脆弱水印","authors":"Yuhang Li, Ling Du","doi":"10.1109/SPAC.2014.6982711","DOIUrl":null,"url":null,"abstract":"This paper proposes a semi-fragile digital watermarking scheme for image tamper localization and self-recovery. Firstly, the authentication watermark is generated for tampered area localization. After that, for content recovery, the recovery watermark is calculated from high frequency band with redundancy free. Then, for the two type of watermarks, the DWT-based watermark embedding method makes our proposed scheme tolerable against friendly manipulations. Even some parts of the watermarked image are tampered and the corresponding embedded information are missing, we can still recover the image from the untouched area based on the localization results and compressive sensing. Moreover, the encryption algorithm based on chaotic function guarantees the safety of our two type of watermarks. Extensive experiments demonstrate the effectiveness of the proposed scheme, which is sensitive against malicious tamper and robust to some incidental manipulations (e.g. JPEG compression, slight noise addition, brightness/contract adjustment and format conversion).","PeriodicalId":326246,"journal":{"name":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2014-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Semi-fragile watermarking for image tamper localization and self-recovery\",\"authors\":\"Yuhang Li, Ling Du\",\"doi\":\"10.1109/SPAC.2014.6982711\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper proposes a semi-fragile digital watermarking scheme for image tamper localization and self-recovery. Firstly, the authentication watermark is generated for tampered area localization. After that, for content recovery, the recovery watermark is calculated from high frequency band with redundancy free. Then, for the two type of watermarks, the DWT-based watermark embedding method makes our proposed scheme tolerable against friendly manipulations. Even some parts of the watermarked image are tampered and the corresponding embedded information are missing, we can still recover the image from the untouched area based on the localization results and compressive sensing. Moreover, the encryption algorithm based on chaotic function guarantees the safety of our two type of watermarks. Extensive experiments demonstrate the effectiveness of the proposed scheme, which is sensitive against malicious tamper and robust to some incidental manipulations (e.g. JPEG compression, slight noise addition, brightness/contract adjustment and format conversion).\",\"PeriodicalId\":326246,\"journal\":{\"name\":\"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SPAC.2014.6982711\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SPAC.2014.6982711","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

摘要

提出了一种用于图像篡改定位和自恢复的半脆弱数字水印方案。首先,生成篡改区域定位的认证水印;然后,从无冗余的高频段计算恢复水印进行内容恢复。然后,对于两种类型的水印,基于小波变换的水印嵌入方法使我们提出的方案能够抵抗友好的操纵。即使水印图像的某些部分被篡改,相应的嵌入信息丢失,我们仍然可以根据定位结果和压缩感知从未触及的区域恢复图像。此外,基于混沌函数的加密算法保证了这两类水印的安全性。大量的实验证明了该方案的有效性,该方案对恶意篡改敏感,对一些偶然操作(如JPEG压缩、轻微噪声添加、亮度/收缩调整和格式转换)具有鲁棒性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Semi-fragile watermarking for image tamper localization and self-recovery
This paper proposes a semi-fragile digital watermarking scheme for image tamper localization and self-recovery. Firstly, the authentication watermark is generated for tampered area localization. After that, for content recovery, the recovery watermark is calculated from high frequency band with redundancy free. Then, for the two type of watermarks, the DWT-based watermark embedding method makes our proposed scheme tolerable against friendly manipulations. Even some parts of the watermarked image are tampered and the corresponding embedded information are missing, we can still recover the image from the untouched area based on the localization results and compressive sensing. Moreover, the encryption algorithm based on chaotic function guarantees the safety of our two type of watermarks. Extensive experiments demonstrate the effectiveness of the proposed scheme, which is sensitive against malicious tamper and robust to some incidental manipulations (e.g. JPEG compression, slight noise addition, brightness/contract adjustment and format conversion).
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信