检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]北京邮电大学网络与交换技术国家重点实验室信息安全中心,北京100876
出 处:《光电工程》2008年第9期138-144,共7页Opto-Electronic Engineering
基 金:国家重点基础研究发展计划973项目(2007CB311203);北京市自然科学基金资助项目(4062025)
摘 要:提出一种基于奇异值分解和混沌映射的图像脆弱认证水印算法,将混沌映射的初值敏感性应用到图像的篡改检测中。对图像子块进行奇异值分解,同时利用Logistic混沌映射产生认证水印;然后利用Logistic混沌映射设计了一个子块与子块之间的映射函数,将认证水印序列嵌入在相应映射块的LSB上。实验结果表明,算法不仅对篡改非常敏感,而且能够有效地抵抗拼贴攻击和区分篡改图像内容与篡改水印。An image fragile authentication watermark algorithm based on singular value decomposition and chaotic mapping was proposed, trying to apply chaotic mapping's initial value sensitivity to tamper detection. Singular value decomposition was carried out on each image block, and authentication watermark was produced by using Logistic chaotic mapping. Then Logistic chaotic mapping was used to design a mapping function defined on two separate blocks, and authentication watermark sequence was embedded into the corresponding mapping block's LSB. The experimental results show that the algorithm is not only very sensitive to tamper, but also resists collage attack and distinguishes image content tamper from watermark tamper.
关 键 词:图像认证 奇异值分解 混沌映射 脆弱水印 篡改检测 篡改定位
分 类 号:TN911.7[电子电信—通信与信息系统]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.137.41.2