网络与信息安全学报 ›› 2017, Vol. 3 ›› Issue (5): 26-31.doi: 10.11959/j.issn.2096-109x.2017.00153

• 学术论文 • 上一篇    下一篇

基于SVD分解和Hadamard变换的图像半脆弱水印技术

王志红,黄惠芬,常玉红   

  1. 山东英才学院信息工程学院,山东 济南 250014
  • 修回日期:2017-01-18 出版日期:2017-05-01 发布日期:2017-05-13
  • 作者简介:王志红(1978-),女,山东泰安人,硕士,山东英才学院副教授,主要研究方向为信息隐藏。|黄惠芬(1980-),女,山东威海人,博士,山东英才学院教授,主要研究方向为信息隐藏。|常玉红(1977-),女,山东聊城人,硕士,山东英才学院副教授,主要研究方向为信息隐藏。
  • 基金资助:
    国家自然科学基金资助项目(61402271);山东省重点研发展计划资助项目(2015GGX101012);山东省重点研发展计划资助项目(2016GGX101037);山东省自然科学基金资助项目(ZR2015JL023);山东省自然科学基金资助项目(ZR2015FL025);山东省自然科学基金资助项目(ZR2016FM34);山东省自然科学基金资助项目(ZR2016FQ23);山东省社科规划基金资助项目(15CXWJ08);山东省高等学校科研计划基金资助项目(J15LN54);山东省高等学校科研计划基金资助项目(J16LN55)

Semi-fragile watermarking technology based on SVD decomposition and Hadamard transform

Zhi-hong WANG,Hui-fen HUANG,Yu-hong CHANG   

  1. School of Information Engineering,Shandong Yingcai University,Jinan 250014,China
  • Revised:2017-01-18 Online:2017-05-01 Published:2017-05-13
  • Supported by:
    The National Natural Science Foundation of China(61402271);The Key R &D Technology Development Foundation of Shandong Province(2015GGX101012);The Key R &D Technology Development Foundation of Shandong Province(2016GGX101037);The Natural Science Foundation of Shandong Province(ZR2015JL023);The Natural Science Foundation of Shandong Province(ZR2015FL025);The Natural Science Foundation of Shandong Province(ZR2016FM34);The Natural Science Foundation of Shandong Province(ZR2016FQ23);The Sacral Science Planning Project of Shandong Province(15CXWJ08);Higher Education Research Project of Shandong Province(J15LN54);Higher Education Research Project of Shandong Province(J16LN55)

摘要:

针对半脆弱水印能区别正常的图像处理操作和恶意篡改的特点,提出一种基于Hadamard变换和SVD分解相结合的半脆弱水印算法。该算法首先对载体图像进行SVD分解,对所有的图像子块进行Hadamard变换,利用量化的方法将水印嵌入。算法针对恶意篡改操作时反应敏感且识别篡改位置能力好,同时对 JPEG压缩具有较强的抵抗能力。

关键词: 半脆弱水印, 篡改, SVD分解, Hadamard变换

Abstract:

The semi-fragile watermarking algorithm based on Hadamard transform and SVD decomposition was proposed to distinguish normal image processing operations from malicious tampering.Firstly,the carrier image was SVD decomposed,and Hadamard transform was performed on all image subblocks.The watermark was embedded by quantization method.The algorithm was sensitive to tampering and had good ability to recognize tampering position,and had strong resistance to JPEG compression.

Key words: semi-fragile watermarking, tamper, SVD decomposition, Hadamard transform

中图分类号: 

No Suggested Reading articles found!