光电工程, 2008, 35 (9): 138, 网络出版: 2010-03-01   

基于奇异值分解和混沌映射的脆弱认证水印

Fragile Authentication Watermark Based on Singular Value Decomposition and Chaotic Mapping
作者单位
北京邮电大学 网络与交换技术国家重点实验室信息安全中心,北京 100876
摘要
提出一种基于奇异值分解和混沌映射的图像脆弱认证水印算法,将混沌映射的初值敏感性应用到图像的篡改检测中。对图像子块进行奇异值分解,同时利用Logistic混沌映射产生认证水印;然后利用Logistic混沌映射设计了一个子块与子块之间的映射函数,将认证水印序列嵌入在相应映射块的LSB上。实验结果表明,算法不仅对篡改非常敏感,而且能够有效地抵抗拼贴攻击和区分篡改图像内容与篡改水印。
Abstract
An image fragile authentication watermark algorithm based on singular value decomposition and chaotic mapping was proposed, trying to apply chaotic mapping’s initial value sensitivity to tamper detection. Singular value decomposition was carried out on each image block, and authentication watermark was produced by using Logistic chaotic mapping. Then Logistic chaotic mapping was used to design a mapping function defined on two separate blocks, and authentication watermark sequence was embedded into the corresponding mapping block’s LSB. The experimental results show that the algorithm is not only very sensitive to tamper, but also resists collage attack and distinguishes image content tamper from watermark tamper.

叶天语, 钮心忻, 杨义先. 基于奇异值分解和混沌映射的脆弱认证水印[J]. 光电工程, 2008, 35(9): 138. YE Tian-yu, NIU Xin-xin, YANG Yi-xian. Fragile Authentication Watermark Based on Singular Value Decomposition and Chaotic Mapping[J]. Opto-Electronic Engineering, 2008, 35(9): 138.

本文已被 2 篇论文引用
被引统计数据来源于中国光学期刊网
引用该论文: TXT   |   EndNote

相关论文

加载中...

关于本站 Cookie 的使用提示

中国光学期刊网使用基于 cookie 的技术来更好地为您提供各项服务,点击此处了解我们的隐私策略。 如您需继续使用本网站,请您授权我们使用本地 cookie 来保存部分信息。
全站搜索
您最值得信赖的光电行业旗舰网络服务平台!