网络与信息安全学报 ›› 2017, Vol. 3 ›› Issue (7): 47-52.doi: 10.11959/j.issn.2096-109x.2017.00168

• 学术论文 • 上一篇    下一篇

检测图像篡改的脆弱水印技术

常玉红,黄惠芬,王志红   

  1. 山东英才学院,山东 济南 250014
  • 修回日期:2017-03-22 出版日期:2017-07-01 发布日期:2017-08-01
  • 作者简介:常玉红(1977-),女,山东聊城人,山东英才学院副教授,主要研究方向为信息隐藏。|黄惠芬(1980-),女,山东威海人,博士,山东英才学院教授,主要研究方向为信息隐藏。|王志红(1978-),女,山东泰安人,山东英才学院副教授,主要研究方向为信息隐藏。
  • 基金资助:
    国家自然科学基金资助项目(61402271);山东省重点研发科技发展计划基金资助项目(2015GGX101012);山东省重点研发科技发展计划基金资助项目(2016GGX101037);山东省自然科学基金资助项目(ZR2015JL023);山东省自然科学基金资助项目(ZR2015FL025);山东省自然科学基金资助项目(ZR2016FM34);山东省自然科学基金资助项目(ZR2016FQ23);山东省社科规划基金资助项目(15CXWJ08);山东省高等学校科研计划基金资助项目(J15LN54);山东省高等学校科研计划基金资助项目(J16LN55)

Fragile watermarking technique for detecting image

Yu-hong CHANG,Hui-fen HUANG,Zhi-hong WANG   

  1. Shandong Yingcai University,Jinan 250014,China
  • Revised:2017-03-22 Online:2017-07-01 Published:2017-08-01
  • Supported by:
    The Key R &D Technology Development Foundation of Shandong Province(61402271);The National Natural Science Foundation of China(2015GGX101012);The National Natural Science Foundation of China(2016GGX101037);The Natural Science Foundation of Shandong Province(ZR2015JL023);The Natural Science Foundation of Shandong Province(ZR2015FL025);The Natural Science Foundation of Shandong Province(ZR2016FM34);The Natural Science Foundation of Shandong Province(ZR2016FQ23);The Social Science Planning Project of Shandong Province(15CXWJ08);High Education Research Project of Shandong Province(J15LN54);High Education Research Project of Shandong Province(J16LN55)

摘要:

针对图像篡改取证定位问题,提出利用混沌序列和图像QR分解相结合的脆弱水印算法判定图像篡改情况。该算法选取QR分解实现图像分解,图像分解后嵌入水印,同时利用混沌系统对其加密以增强水印的安全性。实验结果发现,所提算法不仅提高了定位型水印算法的安全性,而且还可以估计被篡改区域的篡改强度。

关键词: 脆弱水印, 混沌, QR分解, 篡改

Abstract:

Aiming at the problem of image tampering and forensic localization,a fragile watermarking algorithm based on chaos sequence and image QR decomposition was proposed to determine the image tampering.The algorithm chooses QR decomposition to decompose the image,embeds the watermark after the image is decomposed,and encrypts the watermark by chaotic system to enhance the security of the watermark.Experimental results show that the algorithm not only improves the security of the location watermarking algorithm,but also can estimate the tampering strength of the tampered area.

Key words: fragile watermarking, chaos, QR decomposition, tamper

中图分类号: 

No Suggested Reading articles found!