检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:钟亦友 黄方军[1,2] ZHONG Yi-You;HUANG Fang-Jun(School of Cyber Science and Technology,Sun Yat-sen University,Shenzhen 518107,China;Guangdong Key Laboratory of Information Security Technology,Guangzhou 510006,China)
机构地区:[1]中山大学网络空间安全学院,广东深圳518107 [2]广东省信息安全技术重点实验室,广东广州510006
出 处:《软件学报》2023年第12期5848-5861,共14页Journal of Software
基 金:国家自然科学基金(62072481,61772572);广州市科技计划(202201011587);河南省网络空间态势感知重点实验室开放课题(HNTS2022014)。
摘 要:图像可逆认证是一项将可逆信息隐藏和脆弱水印相结合的新技术,其既能实现对图像的脆弱认证,还能在提取认证信息的同时无失真地恢复出原始载体,对图像的原始性和完整性认证具有非常重要的意义.针对现有可逆认证方法认证精度低、对具有复杂纹理的图像或图像中部分纹理复杂区域无法实现有效保护的问题,提出一种新的图像可逆认证方法.首先对待认证图像进行分块,根据每个子块可嵌入容量将其分为差分块和平移块,并采用不同的可逆嵌入方法对不同类型的块进行认证码嵌入操作.为了增大嵌入容量以提高对每个子块的认证效果,还采取了分层嵌入的方式.在认证方,可以通过从每个子块中提取认证码实现子块的篡改检测和定位.此外,所提方法还可与形态学中的膨胀和腐蚀操作结合以细化篡改检测标记,进一步提高检测效果.实验结果表明,所提方法能够在同样的认证精度下对纹理平滑和纹理复杂的图像进行保护,同时还能够实现对几乎所有子块的独立认证和恢复,具有广泛的适用性.As a new technology that combines reversible data hiding and fragile watermarking,image reversible authentication(RA)can not only realize the fragile authentication of images but also recover the original carrier image without distortion while extracting the authentication code.Thus,it is of great significance to authenticate the originality and integrity of images.Existing reversible authentication methods have low authentication accuracy and cannot effectively protect images with complex textures or some areas with complex textures in the images.To this end,this study proposes a new reversible authentication method.Firstly,images to be authenticated are divided into blocks,and the obtained sub-blocks are classified as differential blocks(DB)and shifting blocks(SB)according to their embedding capacity.Different reversible embedding methods are employed to embed the authentication codes into different types of blocks.It also adopts a hierarchical embedding strategy to increase embedding capacity and improve the authentication effects of each sub-block.On the authentication side,tamper detection and localization can be realized by the authentication code extracted from each sub-block.In addition,this method can be combined with dilation and corrosion in morphology to refine tamper detection marks and further improve the detection accuracy rate.Experimental results show that the proposed method can protect images with smooth texture and complex texture under the same authentication accuracy,and can also realize independent authentication and restoration of almost all sub-blocks,which has widespread applicability.
分 类 号:TP391[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.200