信号与信息处理

基于恢复信息共享机制的最优自嵌入算法

展开
  • 上海理工大学光电信息与计算机工程学院, 上海 200093

收稿日期: 2016-03-16

  修回日期: 2016-05-01

  网络出版日期: 2016-11-30

基金资助

国家自然科学基金(No.61303203);上海市自然科学基金(No.13ZR1428400);上海市教育委员会科研创新项目基金(No.14YZ087);上海智能家居大规模物联共性技术工程中心项目基金(No.GCZX14014);沪江基金(No.C14001,No.C14002)资助

Optimal Self-Embedding Scheme Based on Recovery-Data Sharing

Expand
  • School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai 200093, China

Received date: 2016-03-16

  Revised date: 2016-05-01

  Online published: 2016-11-30

摘要

提出一种动态的基于恢复信息共享机制的自嵌入算法,可用于实现图像篡改检测和内容恢复. 图像中每个分块产生的水印包括恢复信息和认证信息,其中恢复信息由原图的若干最高有效位生成,认证信息由生成的恢复信息结合最高有效位数据得到. 水印嵌入分为重叠模式和非重叠模式,选取的最高有效位数据层数和生成恢复信息的比特数是动态变化的. 该算法可根据篡改面积选取最优嵌入方式,有效保证了含水印图像的质量和图像篡改恢复效果.实验结果表明:与已有算法相比,该算法可取得更好的篡改恢复性能.

本文引用格式

王慧丽, 秦川, 高丽萍, 陈庆奎 . 基于恢复信息共享机制的最优自嵌入算法[J]. 应用科学学报, 2016 , 34(6) : 677 -690 . DOI: 10.3969/j.issn.0255-8297.2016.06.004

Abstract

This paper proposes a self-embedding fragile watermarking scheme for image tampering detection and recovery based on variable recovery-data sharing. The generated watermark bits in each image block are composed of recovery bits derived from the interleaved, and scrambled MSB bits of original image and authentication bits derived from the recovery bits and MSB bits. Different from the reported methods using a fixed embedding mode, the proposed scheme has two types of embedding modes, i.e., overlapping embedding and overlapping-free embedding, and uses variable numbers of MSB layers and recovery bits. One can choose an optimal embedding mode to achieve better quality of watermarked image and better performance of content recovery. Experimental results show flexibility and superiority of the scheme as compared with other reported methods.

参考文献

[1] Fridrich J, Goljan M. Images with self-correcting capabilities [C]//Proceedings of IEEE International Conference on Image Processing,1999: 792-796.
[2] 付天舒,韩春杰,隋鑫. 基于DCT变换的自适应图像水印实现[J]. 光学仪器,2013, 35(3): 51-57. Fu T S, Han C J, SUI X. Adaptive image watermark realization based on DCT transform [J]. Optical Instruments, 2013, 35(3): 51-57. (in Chinese)
[3] Lin C Y, Chang S F. A robust image authentication method distinguishing JPEG compression from malicious manipulation [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2001, 11(2): 153-168.
[4] Sun Q, Chang S F. A secure and robust signature scheme for JPEG2000 image authentication[J]. IEEE Transactions on Multimedia, 2005, 7(3): 480-494.
[5] Stallings W. Network security essentials: application and standards [M]. Upper Saddle River. NJ: Prentice-Hall, 2000.
[6] Vleeschouwer C D, Delaigle J F, Macq B. Invisibility and application functionalities in perceptual watermarking: an overview [J]. Proceedings of the IEEE, 2002, 90(1): 64-77.
[7] Walton S. Image authentication for a slippery new age [J]. Dr. Dobb's Journal, 1995, 20(4): 18-26.
[8] Zhang X, Wang S. Statistical fragile watermarking capable of locating individual tampered pixels [J]. IEEE Signal Processing Letters, 2007, 14(10): 727-730.
[9] Lin P L, Hsien C K, Huang P W. A hierarchical digital watermarking method for image tamper detection and recovery [J]. Pattern Recognition, 2005, 38(12): 2519-2529.
[10] Lee T Y, Lin S D. Dual watermark for image tamper detection and recovery [J]. Pattern Recognition, 2008, 41(15): 3497-3506.
[11] 黄良永. 一种图像篡改可恢复的认证水印方法[J]. 计算机工程,2011, 37(5): 175-178. Huang L Y. Restorable authentication watermark method for image tampering [J]. Computer Engineering, 2011, 37(5): 175-178. (in Chinese)
[12] Zhang X, Wang S, Qian Z, Feng G. Reference sharing mechanism for watermark selfembedding[J]. IEEE Transactions on Image Processing, 2011,20(2): 485-495.
[13] Yang C, Shen J. Recover the tampered image based on VQ indexing [J]. Signal Processing, 2010, 90(1): 331-343.
[14] Huo Y, He H, Chen F. Alterable-capacity fragile watermarking scheme with restoration capability[J]. Optics Communications, 2012, 285(7): 1759–1766.
[15] Yang S, Qin C, Qian Z, Xu B. Tampering detection and content recovery for digital image using halftone mechanism [C]// Proceedings of the 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing,Kitakyushu,Japan, 2014: 130-133.
[16] 孙刘杰,庄松林. 印刷图像中隐藏水印的涅菲尔变换方法[J]. 上海理工大学学报,2008, 30(5): 475-478. Sun L J, Zhuang S L. Application of Fresnel holography to hiding watermark in printed image [J]. Journal of University of Shanghai for Science and Technology, 2008, 30(5): 475-478. (in Chinese)
[17] Schaefer G, Stich M. Ucid–an uncompressed color image database [C]//Proceedings of SPIE in Storage and Retrieval Methods and Applications for Multimedia,2004,5307(1): 472-480.

文章导航

/