首页 | 本学科首页   官方微博 | 高级检索  
     

基于恢复信息共享机制的最优自嵌入算法
引用本文:王慧丽,秦川,高丽萍,陈庆奎. 基于恢复信息共享机制的最优自嵌入算法[J]. 应用科学学报, 2016, 34(6): 677-690. DOI: 10.3969/j.issn.0255-8297.2016.06.004
作者姓名:王慧丽  秦川  高丽萍  陈庆奎
作者单位:上海理工大学光电信息与计算机工程学院, 上海 200093
基金项目:国家自然科学基金(No.61303203);上海市自然科学基金(No.13ZR1428400);上海市教育委员会科研创新项目基金(No.14YZ087);上海智能家居大规模物联共性技术工程中心项目基金(No.GCZX14014);沪江基金(No.C14001,No.C14002)资助
摘    要:提出一种动态的基于恢复信息共享机制的自嵌入算法,可用于实现图像篡改检测和内容恢复. 图像中每个分块产生的水印包括恢复信息和认证信息,其中恢复信息由原图的若干最高有效位生成,认证信息由生成的恢复信息结合最高有效位数据得到. 水印嵌入分为重叠模式和非重叠模式,选取的最高有效位数据层数和生成恢复信息的比特数是动态变化的. 该算法可根据篡改面积选取最优嵌入方式,有效保证了含水印图像的质量和图像篡改恢复效果.实验结果表明:与已有算法相比,该算法可取得更好的篡改恢复性能.

关 键 词:脆弱水印  自嵌入  恢复信息共享  篡改恢复  
收稿时间:2016-03-16
修稿时间:2016-05-01

Optimal Self-Embedding Scheme Based on Recovery-Data Sharing
WANG Hui-li,QIN Chuan,GAO Li-ping,CHEN Qing-kui. Optimal Self-Embedding Scheme Based on Recovery-Data Sharing[J]. Journal of Applied Sciences, 2016, 34(6): 677-690. DOI: 10.3969/j.issn.0255-8297.2016.06.004
Authors:WANG Hui-li  QIN Chuan  GAO Li-ping  CHEN Qing-kui
Affiliation:School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai 200093, China
Abstract:This paper proposes a self-embedding fragile watermarking scheme for image tampering detection and recovery based on variable recovery-data sharing. The generated watermark bits in each image block are composed of recovery bits derived from the interleaved, and scrambled MSB bits of original image and authentication bits derived from the recovery bits and MSB bits. Different from the reported methods using a fixed embedding mode, the proposed scheme has two types of embedding modes, i.e., overlapping embedding and overlapping-free embedding, and uses variable numbers of MSB layers and recovery bits. One can choose an optimal embedding mode to achieve better quality of watermarked image and better performance of content recovery. Experimental results show flexibility and superiority of the scheme as compared with other reported methods.
Keywords:recovery-data sharing  fragile watermarking  tampering recovery  self-embedding  
本文献已被 CNKI 等数据库收录!
点击此处可从《应用科学学报》浏览原始摘要信息
点击此处可从《应用科学学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号