您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(工学版)》

山东大学学报(工学版) ›› 2014, Vol. 44 ›› Issue (6): 63-69.doi: 10.6040/j.issn.1672-3961.0.2014.098

• 控制科学与工程 • 上一篇    下一篇

基于块特征和混沌序列的图像篡改检测与恢复

张君捧1,2, 张庆范1, 杨红娟2   

  1. 1. 山东大学控制科学与工程学院, 山东 济南 250100;
    2. 山东建筑大学信息与电气工程学院, 山东 济南 250101
  • 收稿日期:2014-04-04 修回日期:2014-06-30 出版日期:2014-12-20 发布日期:2014-04-04
  • 作者简介:张君捧(1978-),女,河北保定人,博士研究生,主要研究方向为图像处理与信息安全.E-mail:zjpeng1234@sdu.edu.cn
  • 基金资助:
    国家自然科学基金资助项目(61303087)

Images tamper detection and recovery based on block features and chaotic sequence

ZHANG Junpeng1,2, ZHANG Qingfan1, YANG Hongjuan2   

  1. 1. School of Control Science and Engineering, Shandong University, Jinan 250100, Shandong, China;
    2. School of Information & Electrical Engineering, Shandong Jianzhu University, Jinan 250101, Shandong, China
  • Received:2014-04-04 Revised:2014-06-30 Online:2014-12-20 Published:2014-04-04

摘要: 为提高图像篡改检测与恢复性能,提出一种基于块特征与混沌序列的图像认证水印方案。对2×2分块离散余弦变换系数编码产生块特征,嵌入到其他图像块像素的低两位,块嵌入的映射关系通过混沌序列产生;结合奇偶检测法对常规的认证方式进行改进,并通过提取有效块的特征信息实现被篡改区域的自恢复。试验表明,该方案嵌入水印信息量少,安全性高,对常规篡改可进行精确定位,并能较好的实现自恢复,还可以有效地检测出仅图像内容的攻击。

关键词: 图像认证, 篡改检测, 数字水印, 自恢复, 混沌

Abstract: To improve the performance of images tamper detection and recovery, an authentication watermarking scheme based on block features and chaotic sequence was presented. For each block of size 2×2 pixels,discrete cosine transform(DCT)coefficients were used to generate watermarking and embedded into the two least significant bits of its mapping block which was determined by chaotic sequence. The conventional authentication methods were improved by combining parity detection and the tampered region could be self-recovered by extracting characteristic information of the valid block. Experimental results demonstrated that the proposed method not only improved the quality and security of watermarked images, but also could detect tampered regions accurately and reconstruct images while keeping the recognition quality. Additionally, the scheme was not vulnerable to the content-only attack.

Key words: image authentication, tamper detection, digital watermarking, self-recovery, chaos

中图分类号: 

  • TP391
[1] Wong P W, Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification[J]. IEEE Transactions on Image Processing, 2001, 10(10):1593-1601.
[2] Ghoshal Nabin,Mandal Jyotsna Kumar. A novel technique for image authentication in frequency domain using discrete Fourier transformation technique[J]. Malaysian Journal of Computer Science, 2008, 21(1):24-32.
[3] Chun-Shien Lu, Hong-yuan Mark Liao.Structural digital signature for image authentication: an incidental distortion resistant scheme[J]. Multimedia Security Workshop 8th ACM International Conference on Multimedia, 2003, 5(2):161-173.
[4] Sun Q, Shih-Fu Chang. A secure and robust digital signature scheme for JPEG 2000 image authentication[J]. IEEE Transactions on Multimedia, 2005, 7(3):480-494.
[5] He Hong-jie, Zhang Jiashu, Chen Fan. Adjacent-block based statistical detection method for self-embedding watermarking techniques[J]. Signal Processing, 2009, 89(8):1557-1566.
[6] Radharani S, Valarmathi M L. A study on watermarking schemes for image authentication[J]. International Journal of Computer Applications, 2010, 2(4):24-30.
[7] Qian Zhenxing, Feng Guorui, Zhang Xinping, et al. Image self-embedding with high-quality restoration capability[J]. Digital Signal Processing, 2011, 21(2):278-286.
[8] 金喜子,姜文哲. 块级篡改定位的JPEG 图像脆弱水印[J]. 电子学报,2010,38(2):1585-1589. JIN Xizi, JIANG Wenzhe. Fragile watermarking capable of locating tampered blocks in JPEG Images[J]. Acta Electronica Sinica, 2010, 38(2):1585-1589.
[9] 叶天语. 自嵌入完全盲检测顽健数字水印算法[J]. 通信学报,2012,33(10):8-15. YE Tianyu. Self-embedding robust digital watermarking algorithm with perfectly blind detection[J]. Journal on Communications, 2012, 33(10):8-15.
[10] Zhang Xinpeng, Wang Shuozhong. Fragile watermarking with error-free restoration capability[J]. IEEE Trans Multimedia, 2008, 10(8):1490-1499.
[11] Tien-You Lee, Shinfeng D Lin. Dual watermark for image tamper detection and recovery[J]. Pattern Recognition, 2008, 41(11):3497-3506.
[12] Chang Chin-chen, Fan Yi-hsuan, Tai Wer-liang. Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery[J]. Pattern Recognition, 2008, 41(2):654-661.
[13] Luo Hao,Yu Fa-Xin. Blind image watermarking based on discrete fractional random transform and subsampling[J]. International Journal for Light and Electron Optics, 2011, 122(4):311-316.
[1] 王东晓. 具有纠缠项的分数阶五维混沌系统滑模同步的两种方法[J]. 山东大学学报(工学版), 2018, 48(5): 85-90.
[2] 毛北行. 纠缠混沌系统的比例积分滑模同步[J]. 山东大学学报(工学版), 2018, 48(4): 50-54.
[3] 孟晓玲,王建军. 一类分数阶冠状动脉系统的混沌同步控制[J]. 山东大学学报(工学版), 2018, 48(4): 55-60.
[4] 毛北行,程春蕊. 分数阶Victor-Carmen混沌系统的自适应滑模控制[J]. 山东大学学报(工学版), 2017, 47(4): 31-36.
[5] 李庆宾,王晓东. 分数阶情绪模型的终端滑模控制混沌同步[J]. 山东大学学报(工学版), 2017, 47(3): 84-88.
[6] 毛北行,王东晓. 分数阶多涡卷系统滑模控制混沌同步[J]. 山东大学学报(工学版), 2017, 47(3): 79-83.
[7] 王常顺,肖海荣. 基于自抗扰控制的水面无人艇路径跟踪控制器[J]. 山东大学学报(工学版), 2016, 46(4): 54-59.
[8] 刘志军. 基于复合混沌与仿射变换的彩色图像加密算法[J]. 山东大学学报(工学版), 2016, 46(4): 1-8.
[9] 孙美美, 胡云安, 韦建明. 多涡卷超混沌系统自适应滑模同步控制[J]. 山东大学学报(工学版), 2015, 45(6): 45-51.
[10] 花景新, 薄煜明, 陈志敏. 基于改进粒子群优化神经网络的房地产市场预测[J]. 山东大学学报(工学版), 2014, 44(4): 22-30.
[11] 杨健梅1,黄添强1,2*,江伟坚1. 基于人脸色温的拼接图像篡改检测[J]. 山东大学学报(工学版), 2013, 43(5): 24-30.
[12] 张飞,耿红琴. 基于混沌粒子群算法的车间作业调度优化[J]. 山东大学学报(工学版), 2013, 43(3): 19-22.
[13] 张潇丹,赵力,邹采荣*. 一种改进的混合蛙跳算法求解有约束优化问题[J]. 山东大学学报(工学版), 2013, 43(1): 1-8.
[14] 刘志军, 刘春立. 基于复合加密的自适应DCT域盲检彩色水印算法[J]. 山东大学学报(工学版), 2012, 42(3): 13-17.
[15] 李永胜,曲良东,李熹. 自适应信息素更新蚁群算法求解QoS组播路由[J]. 山东大学学报(工学版), 2011, 41(4): 38-43.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!