• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种基于混沌序列和纠错码的离散小波变换域脆弱图像水印方案。

A Fragile Image Watermarking Scheme in DWT Domain Using Chaotic Sequences and Error-Correcting Codes.

作者信息

Ramos Andy M, Artiles José A P, Chaves Daniel P B, Pimentel Cecilio

机构信息

Department of Electronics and Systems, Federal University of Pernambuco, Recife 50740-550, Brazil.

出版信息

Entropy (Basel). 2023 Mar 16;25(3):508. doi: 10.3390/e25030508.

DOI:10.3390/e25030508
PMID:36981397
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10048114/
Abstract

With the rapid development of digital signal processing tools, image contents can be easily manipulated or maliciously tampered with. Fragile watermarking has been largely used for content authentication purposes. This article presents a new proposal for image fragile watermarking algorithms for tamper detection and image recovery. The watermarked bits are obtained from the parity bits of an error-correcting code whose message is formed from a binary chaotic sequence (generated from a secret key known to all legitimate users) and from bits of the original image. Part of the codeword (the chaotic bits) is perfectly known to these users during the extraction phase, adding security and robustness to the watermarking method. The watermarked bits are inserted at specific sub-bands of the discrete wavelet transform of the original image and are used as authentication bits for the tamper detection process. The imperceptibility, detection, and recovery of this algorithm are tested for various common attacks over digital images. The proposed algorithm is analyzed for both grayscale and colored images. Comparison results reveal that the proposed technique performs better than some existing methods.

摘要

随着数字信号处理工具的快速发展,图像内容可以很容易地被操纵或恶意篡改。脆弱水印已大量用于内容认证目的。本文提出了一种用于图像脆弱水印算法的新方案,用于篡改检测和图像恢复。水印位从纠错码的奇偶校验位获得,其消息由二进制混沌序列(由所有合法用户都知道的秘密密钥生成)和原始图像的位组成。在提取阶段,这些用户完全知道部分码字(混沌位),从而为水印方法增加了安全性和鲁棒性。水印位被插入到原始图像离散小波变换的特定子带中,并用作篡改检测过程的认证位。针对数字图像的各种常见攻击,测试了该算法的不可感知性、检测和恢复能力。对所提出的算法进行了灰度图像和彩色图像的分析。比较结果表明,所提出的技术比一些现有方法表现更好。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/54b10b0cc32f/entropy-25-00508-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/0743601c0104/entropy-25-00508-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/8ee0a690e498/entropy-25-00508-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/409b121049eb/entropy-25-00508-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/f42bd2d5b555/entropy-25-00508-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/4366d932777b/entropy-25-00508-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/2c43374c9af1/entropy-25-00508-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/b127e2a765a7/entropy-25-00508-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/3544c2ba8b2d/entropy-25-00508-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/aabbce645a02/entropy-25-00508-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/8090d3c54e1d/entropy-25-00508-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/76bc6c64cd6c/entropy-25-00508-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/f8efd0298dac/entropy-25-00508-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/29cd8320335f/entropy-25-00508-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/54b10b0cc32f/entropy-25-00508-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/0743601c0104/entropy-25-00508-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/8ee0a690e498/entropy-25-00508-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/409b121049eb/entropy-25-00508-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/f42bd2d5b555/entropy-25-00508-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/4366d932777b/entropy-25-00508-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/2c43374c9af1/entropy-25-00508-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/b127e2a765a7/entropy-25-00508-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/3544c2ba8b2d/entropy-25-00508-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/aabbce645a02/entropy-25-00508-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/8090d3c54e1d/entropy-25-00508-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/76bc6c64cd6c/entropy-25-00508-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/f8efd0298dac/entropy-25-00508-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/29cd8320335f/entropy-25-00508-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/fea2/10048114/54b10b0cc32f/entropy-25-00508-g014.jpg

相似文献

1
A Fragile Image Watermarking Scheme in DWT Domain Using Chaotic Sequences and Error-Correcting Codes.一种基于混沌序列和纠错码的离散小波变换域脆弱图像水印方案。
Entropy (Basel). 2023 Mar 16;25(3):508. doi: 10.3390/e25030508.
2
A robust semi-fragile watermarking system using Pseudo-Zernike moments and dual tree complex wavelet transform for social media content authentication.一种使用伪泽尼克矩和双树复数小波变换的用于社交媒体内容认证的稳健半脆弱水印系统。
Multimed Tools Appl. 2023 Apr 13:1-53. doi: 10.1007/s11042-023-15177-4.
3
A sophisticated and provably grayscale image watermarking system using DWT-SVD domain.一种使用离散小波变换-奇异值分解(DWT-SVD)域的复杂且可验证的灰度图像水印系统。
Vis Comput. 2022 Jul 1:1-21. doi: 10.1007/s00371-022-02587-y.
4
Two-layer fragile watermarking method secured with chaotic map for authentication of digital Holy Quran.基于混沌映射的双层脆弱水印方法用于数字《古兰经》的认证
ScientificWorldJournal. 2014;2014:803983. doi: 10.1155/2014/803983. Epub 2014 May 29.
5
Medical image watermarking with tamper detection and recovery.具有篡改检测与恢复功能的医学图像水印技术
Conf Proc IEEE Eng Med Biol Soc. 2006;2006:3270-3. doi: 10.1109/IEMBS.2006.260767.
6
Fingerprint-based robust medical image watermarking in hybrid transform.混合变换中基于指纹的鲁棒医学图像水印技术
Vis Comput. 2023;39(6):2245-2260. doi: 10.1007/s00371-022-02406-4. Epub 2022 Jan 29.
7
A DWT-SVD based robust digital watermarking for medical image security.基于 DWT-SVD 的医学图像安全鲁棒数字水印
Forensic Sci Int. 2021 Mar;320:110691. doi: 10.1016/j.forsciint.2021.110691. Epub 2021 Jan 13.
8
Block mapping and dual-matrix-based watermarking for image authentication with self-recovery capability.基于块映射和双矩阵的图像认证自恢复水印技术。
PLoS One. 2024 Feb 2;19(2):e0297632. doi: 10.1371/journal.pone.0297632. eCollection 2024.
9
Multipurpose medical image watermarking for effective security solutions.用于有效安全解决方案的多功能医学图像水印技术。
Multimed Tools Appl. 2022;81(10):14045-14063. doi: 10.1007/s11042-022-12082-0. Epub 2022 Feb 25.
10
High Capacity and Reversible Fragile Watermarking Method for Medical Image Authentication and Patient Data Hiding.大容量且可恢复的脆弱水印算法在医学图像认证和患者数据隐藏中的应用
J Med Syst. 2024 Oct 19;48(1):98. doi: 10.1007/s10916-024-02110-x.

本文引用的文献

1
Self-Embedding Authentication Watermarking with Effective Tampered Location Detection and High-Quality Image Recovery.具有有效篡改位置检测和高质量图像恢复的自嵌入认证水印
Sensors (Basel). 2019 May 16;19(10):2267. doi: 10.3390/s19102267.
2
Cascade Chaotic System With Applications.级联混沌系统及其应用。
IEEE Trans Cybern. 2015 Sep;45(9):2001-12. doi: 10.1109/TCYB.2014.2363168. Epub 2014 Oct 30.