• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于块映射和双矩阵的图像认证自恢复水印技术。

Block mapping and dual-matrix-based watermarking for image authentication with self-recovery capability.

机构信息

Computer and soft Engineer Department, Anhui Institute of Information Technology, Wuhu, Anhui, China.

Shanghai DataSeed Information Technology, Shanghai, China.

出版信息

PLoS One. 2024 Feb 2;19(2):e0297632. doi: 10.1371/journal.pone.0297632. eCollection 2024.

DOI:10.1371/journal.pone.0297632
PMID:38306338
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10836676/
Abstract

Numerous image authentication techniques have been devised to address the potential security issue of malicious tampering with image content since digital images can be easily duplicated, modified, transformed and diffused via the Internet transmission. However, the existing works still remain many shortcomings in terms of the recovery incapability and detection accuracy with extensive tampering. To improve the performance of tamper detection and image recovery, we present a block mapping and dual-matrix-based watermarking scheme for image authentication with self-recovery capability in this paper. The to-be-embedded watermark information is composed of the authentication data and recovery data. The Authentication Feature Composition Calculation algorithm is proposed to generate the authentication data for image tamper detection and localization. Furthermore, the recovery data for tampered region recovery is comprised of self-recovery bits and mapped-recovery bits. The Set Partition in Hierarchical Trees encoding algorithm is applied to obtain the self-recovery bits, whereas the Rehashing Model-based Block Mapping algorithm is proposed to obtain the mapped-recovery bits for retrieving the damaged codes caused by tampering. Subsequently, the watermark information is embedded into the original image as digital watermarking with the guidance of a dual-matrix. The experimental results demonstrate that comparing with other state-of-the-art works, our proposed scheme not only improves the performance in recovery, but also extends the limitation of tampering rate up to 90%. Furthermore, it obtains a desirable image quality above 40 dB, large watermark payload up to 3.169 bpp, and the effective resistance to malicious attack, such as copy-move and collage attacks.

摘要

已经设计了许多图像认证技术来解决数字图像可以通过互联网传输轻松复制、修改、转换和传播的潜在安全问题。然而,现有的工作在广泛篡改的恢复能力和检测精度方面仍然存在许多缺点。为了提高篡改检测和图像恢复的性能,我们在本文中提出了一种具有自恢复能力的基于块映射和双矩阵的图像认证水印方案。待嵌入的水印信息由认证数据和恢复数据组成。提出了认证特征合成计算算法来生成用于图像篡改检测和定位的认证数据。此外,用于篡改区域恢复的恢复数据由自恢复位和映射恢复位组成。应用分层树集合划分编码算法获取自恢复位,提出基于再散列模型的块映射算法获取映射恢复位,以恢复篡改引起的损坏代码。随后,在双矩阵的指导下,将水印信息嵌入原始图像作为数字水印。实验结果表明,与其他最先进的工作相比,我们提出的方案不仅提高了恢复性能,而且将篡改率的限制扩展到 90%。此外,它获得了超过 40dB 的理想图像质量、高达 3.169 bpp 的大水印负载,以及对恶意攻击(如复制粘贴和拼贴攻击)的有效抵抗。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/269a0a559740/pone.0297632.g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/c9e18ba4a8f1/pone.0297632.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/3b0f333f6839/pone.0297632.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/a02a54763c74/pone.0297632.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/112c1fc7e674/pone.0297632.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/c7c942c8a0bf/pone.0297632.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/8399aa358987/pone.0297632.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/28436b9024a2/pone.0297632.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/6dd9ab18e0b0/pone.0297632.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/f185ae3921f2/pone.0297632.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/af85d2245080/pone.0297632.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/684174c7337c/pone.0297632.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/19ebf0377aa0/pone.0297632.g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/2497464edc28/pone.0297632.g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/6bb9a600f5bc/pone.0297632.g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/2e8e5d758460/pone.0297632.g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/a2f5111c370d/pone.0297632.g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/269a0a559740/pone.0297632.g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/c9e18ba4a8f1/pone.0297632.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/3b0f333f6839/pone.0297632.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/a02a54763c74/pone.0297632.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/112c1fc7e674/pone.0297632.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/c7c942c8a0bf/pone.0297632.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/8399aa358987/pone.0297632.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/28436b9024a2/pone.0297632.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/6dd9ab18e0b0/pone.0297632.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/f185ae3921f2/pone.0297632.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/af85d2245080/pone.0297632.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/684174c7337c/pone.0297632.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/19ebf0377aa0/pone.0297632.g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/2497464edc28/pone.0297632.g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/6bb9a600f5bc/pone.0297632.g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/2e8e5d758460/pone.0297632.g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/a2f5111c370d/pone.0297632.g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/de71/10836676/269a0a559740/pone.0297632.g017.jpg

相似文献

1
Block mapping and dual-matrix-based watermarking for image authentication with self-recovery capability.基于块映射和双矩阵的图像认证自恢复水印技术。
PLoS One. 2024 Feb 2;19(2):e0297632. doi: 10.1371/journal.pone.0297632. eCollection 2024.
2
A robust semi-fragile watermarking system using Pseudo-Zernike moments and dual tree complex wavelet transform for social media content authentication.一种使用伪泽尼克矩和双树复数小波变换的用于社交媒体内容认证的稳健半脆弱水印系统。
Multimed Tools Appl. 2023 Apr 13:1-53. doi: 10.1007/s11042-023-15177-4.
3
Self-recovery reversible image watermarking algorithm.自恢复可逆图像水印算法。
PLoS One. 2018 Jun 19;13(6):e0199143. doi: 10.1371/journal.pone.0199143. eCollection 2018.
4
A Fragile Image Watermarking Scheme in DWT Domain Using Chaotic Sequences and Error-Correcting Codes.一种基于混沌序列和纠错码的离散小波变换域脆弱图像水印方案。
Entropy (Basel). 2023 Mar 16;25(3):508. doi: 10.3390/e25030508.
5
High Capacity and Reversible Fragile Watermarking Method for Medical Image Authentication and Patient Data Hiding.大容量且可恢复的脆弱水印算法在医学图像认证和患者数据隐藏中的应用
J Med Syst. 2024 Oct 19;48(1):98. doi: 10.1007/s10916-024-02110-x.
6
A source-channel coding approach to digital image protection and self-recovery.一种用于数字图像保护和自恢复的信源信道编码方法。
IEEE Trans Image Process. 2015 Jul;24(7):2266-77. doi: 10.1109/TIP.2015.2414878.
7
ROI-based medical image watermarking for accurate tamper detection, localisation and recovery.基于 ROI 的医学图像水印技术,用于准确的篡改检测、定位和恢复。
Med Biol Eng Comput. 2021 Jun;59(6):1355-1372. doi: 10.1007/s11517-021-02374-2. Epub 2021 May 14.
8
Robust authentication for paper-based text documents based on text watermarking technology.基于文本水印技术的纸质文本文档的稳健认证。
Math Biosci Eng. 2019 Mar 15;16(4):2233-2249. doi: 10.3934/mbe.2019110.
9
A novel tamper detection-recovery and watermarking system for medical image authentication and EPR hiding.一种用于医学图像认证和电子病历隐藏的新型篡改检测恢复与水印系统。
Annu Int Conf IEEE Eng Med Biol Soc. 2014;2014:5554-7. doi: 10.1109/EMBC.2014.6944885.
10
Authentication and recovery of medical diagnostic image using dual reversible digital watermarking.使用双可逆数字水印技术对医学诊断图像进行认证与恢复
J Nanosci Nanotechnol. 2013 Mar;13(3):2099-107. doi: 10.1166/jnn.2013.6872.

本文引用的文献

1
Reversible Data Hiding Based on Dual Pairwise Prediction-Error Expansion.基于双成对预测误差扩展的可逆数据隐藏
IEEE Trans Image Process. 2021;30:5045-5055. doi: 10.1109/TIP.2021.3078088. Epub 2021 May 19.
2
Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries.用于检测图像伪造的混合长短期记忆网络和编码器-解码器架构
IEEE Trans Image Process. 2019 Jul;28(7):3286-3300. doi: 10.1109/TIP.2019.2895466. Epub 2019 Jan 25.
3
Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images.
多尺度融合提高数字图像恶意篡改定位的准确性。
IEEE Trans Image Process. 2016 Mar;25(3):1312-26. doi: 10.1109/TIP.2016.2518870.
4
A source-channel coding approach to digital image protection and self-recovery.一种用于数字图像保护和自恢复的信源信道编码方法。
IEEE Trans Image Process. 2015 Jul;24(7):2266-77. doi: 10.1109/TIP.2015.2414878.
5
Hash-based identification of sparse image tampering.基于哈希的稀疏图像篡改识别。
IEEE Trans Image Process. 2009 Nov;18(11):2491-504. doi: 10.1109/TIP.2009.2028251. Epub 2009 Jul 24.