PDF HTML阅读 XML下载 导出引用 引用提醒 基于邻域比较的JPEG 脆弱水印算法及性能分析 DOI: 10.3724/SP.J.1001.2012.04169 作者: 作者单位: 作者简介: 通讯作者: 中图分类号: 基金项目: 国家自然科学基金(60970122, 61170226); 国家教育部博士点基金(20090184120021); 中央高校基本科研业务专项基金(SWJTU09CX039, SWJTU10CX09); 北京市“现代信息科学与网络技术”重点实验室基金; 铁道部“铁路信息科学与工程”开放实验室基金(XDXX1007) Fragile Watermarking Algorithm for JPEG Images Based on Neighborhood Comparison and its Performance Analysis Author: Affiliation: Fund Project: 摘要 | 图/表 | 访问统计 | 参考文献 | 相似文献 | 引证文献 | 资源附件 | 文章评论 摘要:为提高篡改检测性能和协调安全性与不可见性之间的矛盾,提出一种利用邻域比较判定图像块真实性的JPEG 脆弱水印算法.该算法将原始图像分成8×8 的图像块,基于图像块保护DCT 系数生成的4 比特水印基于密钥随机嵌入到其他4 个图像块量化步长较小的DCT 系数最低位.通过比较该图像块与相应4 个水印嵌入块8 邻域中不一致图像块个数来判定该图像块的真实性,推导给出一般篡改和拼贴攻击下算法的虚/漏警率,并利用统计实验对理论分析结果进行验证.理论分析和实验统计结果表明,通过比较图像块与其相应水印嵌入块8邻域中不一致图像块个数能够提高篡改检测性能,在量化步长较小DCT 系数的最低位嵌入水印,解决了保护DCT 系数个数与不可见性之间的矛盾. Abstract:To improve the tamper detection performance and harmonize the conflict between security and invisibility, this paper proposes a fragile watermarking algorithm for JPEG images, in which the authenticity of image blocks is determined by neighborhood comparison. This scheme divides the original image into 8×8 image blocks. For each block, four bits watermarks are generated based on the DCT coefficients to be protected. Next, the watermarks are randomly embedded in the least significant bit (LSB) of DCT coefficients with smaller quantization step in other four blocks. The authenticity of each block is determined by comparison between the number of inconsistent image blocks in the eight-neighborhood of each block and its four corresponding mapping blocks. Then, this paper derives the probability of false acceptance and false rejection under general tampering and collage attack and validates the theoretical analysis results by statistical experiments. Theoretical analysis and statistical experiments show that comparing the number of inconsistent image blocks in the eight-neighborhood of each block with its four corresponding mapping blocks improves the tamper detection performance. Embedding watermarks in the LSB of DCT coefficients with less quantization step efficiently solves the conflict between the number of DCT coefficients to be protected and invisibility. 参考文献 相似文献 引证文献