{"title":"一种改进的块相关脆弱图像水印","authors":"Liu Feilong, Wang Yangsheng","doi":"10.1109/ICME.2003.1221663","DOIUrl":null,"url":null,"abstract":"Surrounding neighbor blocks dependent fragile watermark scheme has its disadvantages, which couldn't successfully distinguish where the image has been tampered. In this paper, we propose a random block dependant fragile image watermark scheme. Two series, one is generated by this block and its prior block, the other is generated by this block itself, are embedded into the LSBs of this image block to keep itself secure and dependent on its prior block, which make VQ attack impossible. Decision strategy is implemented to detect whether the image blocks are authentic in tamper detection. Analysis and experimental results demonstrate that our algorithm can detect even one bit image alteration with graceful localization, and successfully resist vector quantization attack simultaneously without the need of any unique keys or image indexes.","PeriodicalId":118560,"journal":{"name":"2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698)","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An improved block dependent fragile image watermark\",\"authors\":\"Liu Feilong, Wang Yangsheng\",\"doi\":\"10.1109/ICME.2003.1221663\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Surrounding neighbor blocks dependent fragile watermark scheme has its disadvantages, which couldn't successfully distinguish where the image has been tampered. In this paper, we propose a random block dependant fragile image watermark scheme. Two series, one is generated by this block and its prior block, the other is generated by this block itself, are embedded into the LSBs of this image block to keep itself secure and dependent on its prior block, which make VQ attack impossible. Decision strategy is implemented to detect whether the image blocks are authentic in tamper detection. Analysis and experimental results demonstrate that our algorithm can detect even one bit image alteration with graceful localization, and successfully resist vector quantization attack simultaneously without the need of any unique keys or image indexes.\",\"PeriodicalId\":118560,\"journal\":{\"name\":\"2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698)\",\"volume\":\"2016 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2003-07-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICME.2003.1221663\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICME.2003.1221663","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An improved block dependent fragile image watermark
Surrounding neighbor blocks dependent fragile watermark scheme has its disadvantages, which couldn't successfully distinguish where the image has been tampered. In this paper, we propose a random block dependant fragile image watermark scheme. Two series, one is generated by this block and its prior block, the other is generated by this block itself, are embedded into the LSBs of this image block to keep itself secure and dependent on its prior block, which make VQ attack impossible. Decision strategy is implemented to detect whether the image blocks are authentic in tamper detection. Analysis and experimental results demonstrate that our algorithm can detect even one bit image alteration with graceful localization, and successfully resist vector quantization attack simultaneously without the need of any unique keys or image indexes.