基于奇异值分解和混沌映射的脆弱认证水印  被引量:7

Fragile Authentication Watermark Based on Singular Value Decomposition and Chaotic Mapping

在线阅读下载全文

作  者:叶天语[1] 钮心忻[1] 杨义先[1] 

机构地区:[1]北京邮电大学网络与交换技术国家重点实验室信息安全中心,北京100876

出  处:《光电工程》2008年第9期138-144,共7页Opto-Electronic Engineering

基  金:国家重点基础研究发展计划973项目(2007CB311203);北京市自然科学基金资助项目(4062025)

摘  要:提出一种基于奇异值分解和混沌映射的图像脆弱认证水印算法,将混沌映射的初值敏感性应用到图像的篡改检测中。对图像子块进行奇异值分解,同时利用Logistic混沌映射产生认证水印;然后利用Logistic混沌映射设计了一个子块与子块之间的映射函数,将认证水印序列嵌入在相应映射块的LSB上。实验结果表明,算法不仅对篡改非常敏感,而且能够有效地抵抗拼贴攻击和区分篡改图像内容与篡改水印。An image fragile authentication watermark algorithm based on singular value decomposition and chaotic mapping was proposed, trying to apply chaotic mapping's initial value sensitivity to tamper detection. Singular value decomposition was carried out on each image block, and authentication watermark was produced by using Logistic chaotic mapping. Then Logistic chaotic mapping was used to design a mapping function defined on two separate blocks, and authentication watermark sequence was embedded into the corresponding mapping block's LSB. The experimental results show that the algorithm is not only very sensitive to tamper, but also resists collage attack and distinguishes image content tamper from watermark tamper.

关 键 词:图像认证 奇异值分解 混沌映射 脆弱水印 篡改检测 篡改定位 

分 类 号:TN911.7[电子电信—通信与信息系统]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象