您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(工学版)》

山东大学学报(工学版) ›› 2014, Vol. 44 ›› Issue (6): 63-69.doi: 10.6040/j.issn.1672-3961.0.2014.098

• 控制科学与工程 • 上一篇    下一篇

基于块特征和混沌序列的图像篡改检测与恢复

张君捧1,2, 张庆范1, 杨红娟2   

  1. 1. 山东大学控制科学与工程学院, 山东 济南 250100;
    2. 山东建筑大学信息与电气工程学院, 山东 济南 250101
  • 收稿日期:2014-04-04 修回日期:2014-06-30 出版日期:2014-12-20 发布日期:2014-04-04
  • 作者简介:张君捧(1978-),女,河北保定人,博士研究生,主要研究方向为图像处理与信息安全.E-mail:zjpeng1234@sdu.edu.cn
  • 基金资助:
    国家自然科学基金资助项目(61303087)

Images tamper detection and recovery based on block features and chaotic sequence

ZHANG Junpeng1,2, ZHANG Qingfan1, YANG Hongjuan2   

  1. 1. School of Control Science and Engineering, Shandong University, Jinan 250100, Shandong, China;
    2. School of Information & Electrical Engineering, Shandong Jianzhu University, Jinan 250101, Shandong, China
  • Received:2014-04-04 Revised:2014-06-30 Online:2014-12-20 Published:2014-04-04

摘要: 为提高图像篡改检测与恢复性能,提出一种基于块特征与混沌序列的图像认证水印方案。对2×2分块离散余弦变换系数编码产生块特征,嵌入到其他图像块像素的低两位,块嵌入的映射关系通过混沌序列产生;结合奇偶检测法对常规的认证方式进行改进,并通过提取有效块的特征信息实现被篡改区域的自恢复。试验表明,该方案嵌入水印信息量少,安全性高,对常规篡改可进行精确定位,并能较好的实现自恢复,还可以有效地检测出仅图像内容的攻击。

关键词: 图像认证, 篡改检测, 数字水印, 自恢复, 混沌

Abstract: To improve the performance of images tamper detection and recovery, an authentication watermarking scheme based on block features and chaotic sequence was presented. For each block of size 2×2 pixels,discrete cosine transform(DCT)coefficients were used to generate watermarking and embedded into the two least significant bits of its mapping block which was determined by chaotic sequence. The conventional authentication methods were improved by combining parity detection and the tampered region could be self-recovered by extracting characteristic information of the valid block. Experimental results demonstrated that the proposed method not only improved the quality and security of watermarked images, but also could detect tampered regions accurately and reconstruct images while keeping the recognition quality. Additionally, the scheme was not vulnerable to the content-only attack.

Key words: image authentication, tamper detection, digital watermarking, self-recovery, chaos

中图分类号: 

  • TP391
[1] Wong P W, Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification[J]. IEEE Transactions on Image Processing, 2001, 10(10):1593-1601.
[2] Ghoshal Nabin,Mandal Jyotsna Kumar. A novel technique for image authentication in frequency domain using discrete Fourier transformation technique[J]. Malaysian Journal of Computer Science, 2008, 21(1):24-32.
[3] Chun-Shien Lu, Hong-yuan Mark Liao.Structural digital signature for image authentication: an incidental distortion resistant scheme[J]. Multimedia Security Workshop 8th ACM International Conference on Multimedia, 2003, 5(2):161-173.
[4] Sun Q, Shih-Fu Chang. A secure and robust digital signature scheme for JPEG 2000 image authentication[J]. IEEE Transactions on Multimedia, 2005, 7(3):480-494.
[5] He Hong-jie, Zhang Jiashu, Chen Fan. Adjacent-block based statistical detection method for self-embedding watermarking techniques[J]. Signal Processing, 2009, 89(8):1557-1566.
[6] Radharani S, Valarmathi M L. A study on watermarking schemes for image authentication[J]. International Journal of Computer Applications, 2010, 2(4):24-30.
[7] Qian Zhenxing, Feng Guorui, Zhang Xinping, et al. Image self-embedding with high-quality restoration capability[J]. Digital Signal Processing, 2011, 21(2):278-286.
[8] 金喜子,姜文哲. 块级篡改定位的JPEG 图像脆弱水印[J]. 电子学报,2010,38(2):1585-1589. JIN Xizi, JIANG Wenzhe. Fragile watermarking capable of locating tampered blocks in JPEG Images[J]. Acta Electronica Sinica, 2010, 38(2):1585-1589.
[9] 叶天语. 自嵌入完全盲检测顽健数字水印算法[J]. 通信学报,2012,33(10):8-15. YE Tianyu. Self-embedding robust digital watermarking algorithm with perfectly blind detection[J]. Journal on Communications, 2012, 33(10):8-15.
[10] Zhang Xinpeng, Wang Shuozhong. Fragile watermarking with error-free restoration capability[J]. IEEE Trans Multimedia, 2008, 10(8):1490-1499.
[11] Tien-You Lee, Shinfeng D Lin. Dual watermark for image tamper detection and recovery[J]. Pattern Recognition, 2008, 41(11):3497-3506.
[12] Chang Chin-chen, Fan Yi-hsuan, Tai Wer-liang. Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery[J]. Pattern Recognition, 2008, 41(2):654-661.
[13] Luo Hao,Yu Fa-Xin. Blind image watermarking based on discrete fractional random transform and subsampling[J]. International Journal for Light and Electron Optics, 2011, 122(4):311-316.
[1] 韦修喜,陶道,黄华娟. 改进果蝇算法优化BP神经网络预测汽油辛烷值[J]. 山东大学学报 (工学版), 2023, 53(5): 20-28.
[2] 贾红艳,陈忠告,石文欣,韩晓光. 一个具有多稳定流的广义Hamiltonian保守混沌系统[J]. 山东大学学报 (工学版), 2022, 52(2): 74-79.
[3] 程春蕊,毛北行. 一类非线性混沌系统的自适应滑模同步[J]. 山东大学学报 (工学版), 2020, 50(5): 1-6.
[4] 孟晓玲,毛北行. 含对数项分数阶T混沌系统的滑模同步[J]. 山东大学学报 (工学版), 2020, 50(5): 7-12.
[5] 程春蕊. 分数阶Brussel系统混沌同步的三种控制方案[J]. 山东大学学报 (工学版), 2020, 50(4): 46-51.
[6] 王春彦,邸金红,毛北行. 基于新型趋近律的参数未知分数阶Rucklidge系统的滑模同步[J]. 山东大学学报 (工学版), 2020, 50(4): 40-45.
[7] 李彩虹,方春,王志强,夏斌,王凤英. 基于超混沌同步控制的移动机器人全覆盖路径规划[J]. 山东大学学报 (工学版), 2019, 49(6): 63-72.
[8] 方波,陈红梅. 一种新的双策略进化果蝇优化算法[J]. 山东大学学报 (工学版), 2019, 49(3): 22-31.
[9] 薛薇,谭东程,张妹,刘世龙. 基于FPGA的四翼超混沌系统同步及其保密视频通信[J]. 山东大学学报 (工学版), 2019, 49(3): 1-7.
[10] 刘洪铭,曾鸿雁,周伟,王涛. 基于改进粒子群算法作业车间调度问题的优化[J]. 山东大学学报 (工学版), 2019, 49(1): 75-82.
[11] 王东晓. 具有纠缠项的分数阶五维混沌系统滑模同步的两种方法[J]. 山东大学学报 (工学版), 2018, 48(5): 85-90.
[12] 毛北行. 纠缠混沌系统的比例积分滑模同步[J]. 山东大学学报(工学版), 2018, 48(4): 50-54.
[13] 孟晓玲,王建军. 一类分数阶冠状动脉系统的混沌同步控制[J]. 山东大学学报(工学版), 2018, 48(4): 55-60.
[14] 毛北行,程春蕊. 分数阶Victor-Carmen混沌系统的自适应滑模控制[J]. 山东大学学报(工学版), 2017, 47(4): 31-36.
[15] 李庆宾,王晓东. 分数阶情绪模型的终端滑模控制混沌同步[J]. 山东大学学报(工学版), 2017, 47(3): 84-88.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 王素玉,艾兴,赵军,李作丽,刘增文 . 高速立铣3Cr2Mo模具钢切削力建模及预测[J]. 山东大学学报(工学版), 2006, 36(1): 1 -5 .
[2] 李 侃 . 嵌入式相贯线焊接控制系统开发与实现[J]. 山东大学学报(工学版), 2008, 38(4): 37 -41 .
[3] 施来顺,万忠义 . 新型甜菜碱型沥青乳化剂的合成与性能测试[J]. 山东大学学报(工学版), 2008, 38(4): 112 -115 .
[4] 孔祥臻,刘延俊,王勇,赵秀华 . 气动比例阀的死区补偿与仿真[J]. 山东大学学报(工学版), 2006, 36(1): 99 -102 .
[5] 陈瑞,李红伟,田靖. 磁极数对径向磁轴承承载力的影响[J]. 山东大学学报(工学版), 2018, 48(2): 81 -85 .
[6] 李可,刘常春,李同磊 . 一种改进的最大互信息医学图像配准算法[J]. 山东大学学报(工学版), 2006, 36(2): 107 -110 .
[7] 季涛,高旭,孙同景,薛永端,徐丙垠 . 铁路10 kV自闭/贯通线路故障行波特征分析[J]. 山东大学学报(工学版), 2006, 36(2): 111 -116 .
[8] 浦剑1 ,张军平1 ,黄华2 . 超分辨率算法研究综述[J]. 山东大学学报(工学版), 2009, 39(1): 27 -32 .
[9] 王丽君,黄奇成,王兆旭 . 敏感性问题中的均方误差与模型比较[J]. 山东大学学报(工学版), 2006, 36(6): 51 -56 .
[10] 孙殿柱,朱昌志,李延瑞 . 散乱点云边界特征快速提取算法[J]. 山东大学学报(工学版), 2009, 39(1): 84 -86 .