计算机应用 ›› 2005, Vol. 25 ›› Issue (09): 2151-2154.DOI: 10.3724/SP.J.1087.2005.02151

• 图形图像处理 • 上一篇    下一篇

基于混沌和图像内容的脆弱水印方案

陈帆1,朱大勇2,许毅2   

  1. 1.西南交通大学计算机与通信工程学院; 2.电子科技大学计算机科学与工程学院
  • 出版日期:2005-09-01 发布日期:2011-04-11

Novel fragile watermark technique based on chaos and image content

CHEN Fan1,ZHU Da-yong2,XU Yi2   

  1. 1.School of Computer & Communication Engineering,Southwest Jiaotong University,Chengdu Sichuan 610031,China;2.School of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu Sichuan 610054,China
  • Online:2005-09-01 Published:2011-04-11

摘要: 针对脆弱水印方案的“伪认证攻击”问题,提出了基于混沌和图像内容的脆弱水印方案。该方案基于矩阵奇异值的特性,选取与图像内容密切相关的图像矩阵奇异值作为水印,并用混沌系统对其加密增强水印的安全性。认证时通过水印差别图和奇异值差值双重比较来抵抗简单脆弱水印嵌入方法的“伪认证攻击”。理论分析和仿真实验表明:该算法能有效地抵抗“伪认证攻击”,具有更好的安全性能。

关键词: 图像认证, 混沌, 奇异值分解, 脆弱水印

Abstract: To overcome well-connected attack in fragile watermarking,a novel fragile watermarking method based on chaotic system and image content was proposed.Based on the character of matrix singular values,singular values of image matrix were converted into a binary sequence as the watermark to be embedded.To improve watermark security,a chaotic system was applied to encrypt the watermark sequence.Then with the general fragile watermarking method,the tampered area of the watermarked image could be reflected in the watermarking difference map and singular values difference to improve the resistance to well-connected attack.Theoretic analysis and simulation results show that the proposed algorithm is effectively resistance to well-connected attack and more secure.

Key words: image authentication, chaos, singular value decomposition, fragile watermark

中图分类号: