计算机应用 ›› 2013, Vol. 33 ›› Issue (05): 1371-1373.DOI: 10.3724/SP.J.1087.2013.01371

• 信息安全 • 上一篇    下一篇

基于混沌和脆弱水印的图像篡改检测算法

刘敏1,2,陈志刚2,邓小鸿3   

  1. 1. 长沙航空职业技术学院 计算机系,长沙 410024
    2. 中南大学 信息科学与工程学院, 长沙 410083
    3. 江西理工大学 应用科学学院, 江西 赣州 341000
  • 收稿日期:2012-11-29 修回日期:2013-01-07 出版日期:2013-05-01 发布日期:2013-05-08
  • 通讯作者: 邓小鸿
  • 作者简介:刘敏(1972-),男,湖北新洲人,副教授,硕士,主要研究方向:网络与信息安全;陈志刚(1964-),男,湖南益阳人,教授,博士,CCF会员,主要研究方向:信息安全;邓小鸿(1982-),男,湖北天门人,讲师,博士研究生,CCF会员,主要研究方向:数字水印。
  • 基金资助:

    国家自然科学基金资助项目(61275185);江西理工大学校级科研项目(jxxj12149)

Image tamper detection scheme based on chaotic system and fragile watermarking

LIU Min1,2,CHEN Zhigang2,DENG Xiaohong3   

  1. 1. Department of Computer, Changsha Aeronautical Vocational and Technical College, Changsha Hunan 410024, China
    2. School of Information Science and Engineering, Central South University, Changsha Hunan 410083, China
    3. Collge of Applied Science, Jiangxi University of Science and Technology, Ganzhou Jiangxi 341000, China
  • Received:2012-11-29 Revised:2013-01-07 Online:2013-05-08 Published:2013-05-01
  • Contact: DENG Xiaohong

摘要: 针对现有基于脆弱水印方法的不足,提出了一种新的结合混沌系统和脆弱水印的图像篡改检测算法。算法首先利用Arnold cat映射对原始图像进行k次置乱,然后选取置乱图像的最低有效位(LSB)平面作为水印嵌入位置,实际嵌入的水印由Logistic混沌映射产生的随机二进制序列与原始水印异或得到,通过LSB替换算法嵌入。最后对LSB替换后图像进行T-k次的Arnold cat映射得到水印图像。实验结果表明,混沌系统的引入大大增强了脆弱水印的安全性;另外,针对不同种类的攻击,算法具有良好的篡改检测和定位精确性。

关键词: 混沌映射, 脆弱水印, 篡改检测, 定位, 安全性

Abstract: In order to solve the shortage of the method based on fragile watermarking, a new chaotic system and fragile watermarking based image tamper detection algorithm was proposed. Firstly, the method used Arnold cat map k times to scramble the original image, and then chose the Least Significant Bit (LSB) plane of the scrambled image as the embedding position. The actual watermark information was formed by using exclusive-or operation between a random binary sequence produced by Logistic map and the original watermark, and the LSB replacement method was utilized to embed watermark. Finally, the watermarked image was obtained by utilizing Arnold cat map T-k times. The experimental results show that, the introduction of chaotic system to a great extend improves the security of the proposed scheme. In addition, the proposed method achieves superior tamper detection and localization accuracy under different common attacks.

Key words: chaotic map, fragile watermarking, tamper detection, localization, security

中图分类号: