用户名: 密码: 验证码:
基于数字水印的图像真实性主动取证关键技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数字图像取证(Digital Image Forensic)是通过对数字图像的篡改、伪造和隐写进行分析、鉴别和认证,判断数字图像的来源、原始性、完整性和真实性,分为主动取证和被动取证两类。本论文研究内容是基于数字水印的数字图像真实性主动取证技术,保证数字图像一定视觉质量的前提下,将认证信息嵌入数字图像自身以记录图像所经历的变化,通过篡改检测鉴别数字图像的真实性,并利用篡改恢复提供篡改证据。
     本论文以数字图像为研究对象,以提高篡改检测性能与恢复质量为目标,从恢复数据编码、篡改检测和“同步篡改”三个关键问题,展开基于数字水印的数字图像真实性主动取证技术研究。具体工作如下。
     一、分析和研究了现有数字图像主动技术,综述了基于数字水印的数字图像真实性主动取证技术的研究现状和常用评价指标,分析指出各种伪造攻击(如拼贴攻击、恒特征攻击等)是数字图像真实性主动取证技术最大安全威胁,恢复数据编码、篡改检测和同步篡改是提高图像恢复质量要解决的关键问题。
     二、针对现有单像素主动取证算法漏警率高、嵌入容量大的问题,提出一种基于邻域阈值比较单像素主动取证算法。将基于像素生成的认证数据置乱加密后嵌入图像的最低有效位,设计“邻域阈值比较”的篡改检测策略来判定每个像素的真实性。推导给出了阈值动态选取,分析了邻域大小不同时算法虚/漏警率与篡改比例的关系。理论分析和实验结果表明,在不增加水印嵌入容量情况下,“邻域阈值比较”有效提高了不同篡改条件下单像素主动取证算法的篡改检测性能。同时,实验验证了“邻域阈值比较”在一维信号上的可行性。
     三、在分析研究现有基于DCT的自嵌入主动取证算法的基础上,提出一种“基于多链阈值”DCT变容量主动取证算法。将图像块变长恢复数据分段嵌入在不同图像块以建立多个图像块间的相关性,设计一种适用于多相关嵌入的多链阈值检测方法。讨论了变长恢复数据的分段原则,推导给出多链阈值检测的篡改检测性能和阈值动态选取。变容量嵌入策略有效缓解了恢复数据编码质量与嵌入容量之间的矛盾,“多链阈值检测”不仅提高了算法抵抗拼贴、恒特征等伪造攻击的能力,还能通过阈值选取有效降低算法漏警率,为提高篡改图像恢复质量奠定了基础。
     四、为提高大图像比例篡改下的恢复质量,提出一种结合基编码和同步修复的数字图像主动取证算法。为解决数字图像主动取证中“同步篡改”问题,该算法依次采用两个策略:(1)同时嵌入基编码和变长编码,在嵌入容量不显著增加条件下降低同步篡改率;(2)分别采用邻域修复和图像修复两种方法恢复同步篡改块。实验结果表明,该算法在不显著增加水印容量前提下,不仅能抵抗已知的伪造攻击,而且有效提高大比例篡改图像的恢复质量。
     五、兼顾算法嵌入容量、定位精度、篡改恢复质量和安全性,提出一种基于变长均值编码和邻域预测的图像真实性主动取证算法。该算法将2×2图像块进行变长均值编码,生成不等长恢复数据——平滑块6比特,纹理块12比特。设计邻域预测修复方法来兼顾恢复图像的真实性和质量。变长恢复数据用较少比特保存丰富的图像块信息,仅被嵌入一次且同时用于篡改检测与恢复,在降低嵌入容量同时,可有效提高算法定位精度和抵抗恒均值、拼贴等已知伪造攻击能力,同时,通过邻域预测修复策略有效提高了算法的篡改恢复质量。
Digital image forensics is a technology for detecting the source, originality, authenticity and integrity of digital image. It can be divided into two types:active-forensics and passive-forensics. This thesis is concentrating on the active-forensics technology for digital image authentication based on digital watermarking. The active-forensics technology for digital image authentication aims to verify the validity and authenticity of a host image by the pre-embedded authentication information, and provides the tamper proofing by tamper localization and recovery.
     The research aim of this thesis is to improve the quality of recovered image especially for a larger tamper ratio by improving the performance of tamper detection and the code efficiency of recovery-data. The research achievements on image active-forensics based on digital watermarking are classified into the following five categories.
     Firstly, a review of active-forensics techniques based on digital watermarking for image authentication is given after studying and analyzing the existing methods. Some evaluation indexes are list to evaluate the performance of the image authentication active-forensics schemes. Based on the analysis, the forged attacks, including the collage attack and the constant feature attack, are considered as the greatest security threat. The recovery data encoding, tamper detection and tampering coincidence are key problems to be resolved for improving the quality of t recovered images.
     Secondly, a single-pixel active-forensics scheme based on neighborhood-threshold is proposed to address the problems such as high probability of false acceptance (PFA) or large payload in the existing methods. In the proposed scheme, the chaos system is used to generate the binary authentication data according to the content of each pixel in the original image. The improved security binary data by scramble encryption is embedded into the least significant bit of the host image, and the validity of each pixel is determined by the neighborhood-threshold comparison. The dynamic threshold selection and the relationship between the tamper ratio with the PFA and probability of false rejection (PFR) are discussed. Theoretical analysis and simulation results show that the proposed method has a superior performance of tamper detection in the different attacks without adding the embedding payload. At the same time, the neighborhood-threshold detection can be used for one dimensional audio signal by experiments.
     Thirdly, the existing DCT active-forensics schemes based on digital watermarking are discussed. On that basis, a DCT active-forensics scheme with variable payload based on multi-chain threshold is proposed. For each block, the recovery data with variable length are divided into three parts and embedded in the different blocks based on the secret key. This makes multi-blocks in the image dependent. Based on the adjacent-block statistical detection, the multi-chain threshold method is designed to detect the validity of each block. Analytical expressions of the PFA and PFR for the multi-chains threshold method and the threshold selection have been derived and analyzed. The variable embedding payload preserves the adequate information of image block to as few bits as possible. The multi-chains threshold method not only resists the collage and constant-feature attacks, but also makes the PFA as low as possible by selecting the threshold.
     Fourthly, an image active-forensic scheme combined basic-code with synchronous-recovery is proposed to improve the quality of recovered images especially for a larger tamper ratio. Two strategies are adopted to resolve the tampering coincidence problem.(1) both total-code and basic-code of each block are embedded to decrease the tampering coincidence ratio without significantly increasing embedding payload;(2) the tamper-coincidence blocks are recovered by its valid neighboring blocks and the image inpainting method, respectively. Simulation results demonstrate that the proposed scheme not only provides security against the known counterfeiting attacks, but also allows image recovery with an acceptable visual quality (PSNR>25dB) up to50%tampering for texture image and about70%tampering for smooth one.
     At last, an active-forensics scheme combined variable-length average-code with neighborhood prediction is proposed to take into account embedding payload, tamper localization accuracy, recovery quality and security. For each block of size2×2pixels, the average-code is extracted to generate the recovery data with different length----6bits for a plaint block and12bits for a texture block. To improve the recovery quality, the recovery method based on neighborhood prediction is designed to reconstruct the invalid blocks whose recovery watermark embedded in the other block is also destroyed. The variable-capacity recovery data contains the adequate information of image block to as few bits as possible. The recovery data is inserted in the original image only once, and used to both tamper detection and tamper recovery in the proposed scheme. These strategies make the embedding payload as low as possible and the ability against the known forged attacks to be improved. Meanwhile, the proposed scheme has the better quality of recovered images due to the neighborhood prediction recovery.
引文
[1]关于印发《关于严防虚假新闻报道的若干规定》的通知.新出政发[2011]14号(http://www.gapp.gov.cn/cms/html/21/508/201111/727111.html).
    [2]周琳娜,王东明.数字图像取证技术.北京邮电大学出版社,北京,2008年11月.
    [3]H. Farid.Creating and Detecting Doctored and Virtual Images:Implications to theChild Pornography Prevention Act [EB/OL].http://www.ists.dartmouth.edu/librarv/100.pdf.
    [4]魏为民,胡胜斌,赵琰.数字图像取证技术的发展[J],上海电力学院学报,2012,28(4):369-374.
    [5]H. Farid. Seeing is notbelieving[J]. IEEE Spect rum.2009,46(8):44-51.
    [6]王朔中,吴酋珉.真伪之辨--字图像的防伪认证.自然杂志.2010,32(5):1-288.
    [7]吴琼,李国辉,涂丹,等.面向真实性鉴别的数字图像盲取证技术综述[J].自动化学报,2008,34(12):1458-1466.
    [8]J. Fridrich, D. Soukal, J. Lukas. Detection of copy-move forgery in digital images[C]. in Proc. Int. Conf. Digital Forensic Research Workshop, Cleveland, OH, USA,2003.
    [9]V. Christlein, C. Riess; J. Jordan, C. Riess, E. Angelopoulou. An Evaluation of Popular Copy-Move Forgery Detection Approaches[J]. IEEE Trans. Inf. Forensics Security,2012,7(6): 1841-1854.
    [10]骆伟祺,黄继武,丘国平.鲁棒的区域复制图像篡改检测技术[J].计算机学报,2007,30(11):1998-2007.
    [11]Christlein, V., Riess, C., Angelopoulou, E.. On rotation invariance in copy-move forgery detection[C]. in Proc. Int. Conf. Information Forensics and Security (WIFS2010). DOI: 10.1109/WIFS.2010.5711472.2010, Page(s):1-6.
    [12]J. Fridrich, GoljanM, R. Du. Steganalysis based on JPEG compatibility. In:Proceedings ofSPIE Multimedia Systems and Applications [C]. Washington D.C.,USA:SPIE,2001:275-280.
    [13]Weiqi Luo, Jiwu Huang, Guoping Qiu. JPEG Error Analysis and Its Applications to Digital Image Forensics [J]. IEEE Trans. Inf. Forensics Security,2010,5(3):480-491.
    [14]G. Valenzise, M.Tagliasacchi; S. Tubaro. Revealing the traces of JPEG compression anti-forensics [J]. IEEE Trans. Inf. Forensics Security. DOI:10.1109/TIFS.2012.2234117.2012, Page(s):1-30.
    [15]Shu-Ping Li, Zhi Han, Yi-zhen Chen, Bo Fu, Chunhui Lu, Xiaohui Yao. Resampling forgery detection in JPEG-compressed images[C]. Image and Signal Processing (CISP),2010 3rd International Congress on:1166-117.
    [16]戴蒙,林家骏,毛家发.JPEG二次压缩的分析与检测[J].中国图象图形学报,2006,11(11):1619-1622.
    [17]D.D.Fu, Y.Q. Shi, W. Su. A generalized Benford's law for JPEG coefficients and its applications in image forensics [C]. In:Proceedings ofSPIE Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents. Washington D.C.,USA:SPIE,2007:65051-11.
    [18]H. Farid. Exposing digital forgeries from JPEG ghosts[J]. IEEE Trans. Inf. Forensics Security,2009,4(1):154-160.
    [19]T. T. Ng, S. F.Chang. A data set of authentic and spliced image blocks. ADVENT Technical Report,203-2004-3,Columbia University,2004.
    [20]Yu-Feng Hsu, Shih-Fu Chang.Camera Response Functions for Image Forensics:An Automatic Algorithm for Splicing Detection [J]. IEEE Trans. Inf. Forensics Security,2010,5(4):816-825.
    [21]S.D. Lin, Tszan Wu. An integrated technique for splicing and copy-move forgery image detection[C].2011 4th International Congress on Image and Signal Processing (CISP),DOI: 10.1109/CISP.2011.6100366.2011, Page(s):1086-1090.
    [22]K. Sullivan, U. Madhow; S. Chandrasekaran, et al. Steganalysis for markov cover data with applications to images [J]. IEEE Trans. Inf. Forensics Security,2006,1(2):275-287.
    [23]J.F. Lalonde, A.A. Efros. Using color compatibility for assessing image realism [C]. IEEE International Conference on Computer Vision(ICCV07),Rio de Janeiro,Brazil,2007,1-8.
    [24]Yu-Feng Hsu; Shih-Fu Chang. Image splicing detection using camera response function consistency and automatic segmentation [C]. in Proc. Int. Conf. Multimedia and po(ICME07),Beijing,China,2007,28-31.
    [25]J. H.Elder, S. W. Zucker. Local scale control for edge detection and blur estimation [J]. IEEE Trans. Pattern Analysis and Machine Intelligence,1998,20(7):699-716.
    [26]Dun-Yu Hsiao, Soo-Chang Pei. Detecting digital tampering by blur estimation [C]. in Proc. Int. Conf 1st International Workshop on Systematic Approaches to Digital Forensic Engineering. Washington D.C., USA:IEEE,2005:264-278.
    [27]工波,孙璐璐,孔祥维,尤新刚.图像伪造中模糊操作的异常色调率取证技术[J].电子学报,2006,34(B12):2451-2454.
    [28]Y. Sutcu, B. Coskun, H.T. Sencar, N. Memon. Tamper detection based on regularity of wavelet transform coefficients [C]. in Proc. Int. Conf. Image Processing. Washington D.C.,USA:IEEE,2007:397-400.
    [29]H. Farid. Detecting hidden messages using higher-order statistical models[C]. Proceedings of the IEEE International Conference on Image Processing, Rochester,NewYork,USA,2002,2:905~ 908.
    [30]I. Avcibas, N. Memon, B. Sankur. Steganalysis using image quality metries [J]. IEEE Trans. Image Processing,2003,12(2):221-229.
    [31]Hong Cao, A.C. Kot. Manipulation Detection on Image Patches Using FusionBoost [J]. IEEE Trans. Inf. Forensics Security,2012,7(3):992-1002.
    [32]T.-T. Ng, S. F. Chang. A model for image Splicing [C]. in Proc. Int. Conf. Image Processing(ICIP04), Singapore,2004,2:1169~1172.
    [33]I. Avcibas, S. Bayram, N. Memon et.al. A classifier design for detecting image manipulation [C]. Proceedings of IEEE International Conference on Image Processing (ICIP04), Singapore, 2004,4:2645~2648.
    [34]S. Bayram, I. Avcibas, Sankur B., N. Memon. Image manipulation detection with binary similarity measures[C]. In:Proceedings of 13th European Signal Processing Conference. 2005:752-755.
    [35]S. Lyu, H. Farid. How realistic is photorealistic [J]. IEEE Trans. Signal Processing,2005,53(2): 845-850.
    [36]S. Bayram, I. Avcibas, B. Sankur, N. Memon. Image manipulation detection[J] Journal of Electronic Imaging.2006,15(4):1-17.
    [37]Hongmei Gou, A. Swaminathan, Min Wu. Noise features for image tampering detection and steganalysis [C]. in Proc. Int. Conf. Image Processing.Washington D.C.,USA:IEEE,2007:97-100.
    [38]H. Farid, S. Lyu. Higher-order wavelet statistics and their application to digital forensics[C]. Madison, WI,USA:IEEE Workshop on Statistical Analysis in Computer Vision,2003.Page:1-8.
    [39]A.C. Popescu, H. Farid. Exposing digital forgeries in color filter array interpolated images[J]. IEEE Trans. Signal Processing,2005,53(10):3948-3959.
    [40]Xiangui Kang, Yinxiang Li, Zhenhua Qu, Jiwu Huang. Enhancing Source Camera Identification Performance with a Camera Reference Phase Sensor Pattern Noise [J]. IEEE Trans. Inf. Forensics Security,2012, Page(s):393-402.
    [41]O. Celiktutan, I. Avcibas. Bulent Sankur. Blind Identification of Source Cell-Phone Model [J]. IEEE Trans. Inf. Forensics Security,2008,3(3):553-566.
    [42]Hongmei Gou, A. Swaminathan, MinWu. Robust scanner identification based on noise features [C]. San Jose, CA, USA:SPIE,2007.
    [43]M. Chen, J. Fridrich, M. Goljan, J. Lukas. Determining image origin and integrity using sensor noise [J]. IEEE Trans. Inf. Forensics Security,,2008,3(1):74-90.
    [44]Caldelli, R.; Amerini, I.; Novi, A.. An analysis on attacker actions in fingerprint-copy attack in source camera identification [C],2011 IEEE International Workshop on Information Forensics and Security (WIFS),2011:1-6.
    [45]S. Dehnie,T. Sencar, N. Memon. Digital image forensics for identifying computer generated and digital camera images [C],2006 IEEE Int. Conf. on Image Processing, Atlanta, USA,2006: 2313-2316.
    [46]M. Kharrazi, H.T. Sencar,N. Memon. Blind source camera identification [C],2004 IEEE Int. Conf. onlmage Processing, Singapore,2004:709-712.
    [47]Min-Jen Tsai; Guan-Hui Wu. Using image features to identify camerasources [C],2006 I EEE Int. Conf. Acoustics, Speech and Signal Processing, Toulouse, France,2006:297-300.
    [48]J. Lukas, J. Fridrich,M. Goljan. Digital camera identification from sensor pattern noise [J]. IEEE Trans. Inf. Forensics Security,2006,1(2):205-214.
    [49]A.E. Dirik, H.T. Sencar, N. Memon. Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust [J]. IEEE Trans. Inf. Forensics Security,2008,3(3):539-552.
    [50]Xinpeng Zhang. Separable Reversible Data Hiding in Encrypted Image [J].IEEE Trans. Inf. Forensics Security,2012,7(2):826-8322005.
    [51]王朔中,张新鹏,张卫明.以数字图像为载体的隐写分析研究进展[J],计算机学报,2009. 32(7):1247-1262.
    [52]黄炜,赵险峰,冯登国,盛任农.基于主成分分析进行特征融合的JPEG隐写分析[J],软件学按,2012,23(7):1869-1879.
    [53]Shan-Chun Liu; Wen-Hsiang Tsai. Line-Based Cubism-Like Image—A New Type of Art Image and its Application to Lossless Data Hiding[J], IEEE Trans. Inf. Forensics Security,2012,7(5):1448-1458.
    [54]C. H. Yang, C. Y. Weng, H. K. Tso, et al. A data hiding scheme using the varieties of pixel-value differencing in multimedia images[J], Journal of Systems and Software,84(4),2011, pp.669-678.
    [55]和红杰,陈帆.基于状态参数的含水印数字照片生成方法[P].中国发明专利,申请号:200910059421.6.
    [56]B.B.Zhu, M.D. Swanson, A.H. Tewfik. When Seeing Isn't Believing[J]. IEEE Signal Processing Magazine, March 2004:40-49.
    [57]Shui-Hua Han, Chao-Hsien Chu. Content-based image authentication:current status, issues, and challenges [J]. Int. J. Inf. Secur.2010,9:19-32.
    [58]AdilHaouzia, Rita Noumeir. Methods for image authentication:a survey[J]. Multimed Tools Appl..2008,39:1-46.
    [59]吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161.
    [60]G. L. Friedman. The Trustworthy Digital Camera:Restoring Credibility to the Photographic Image [J]. IEEE Trans. Consumer Electronics.1993,39(4):905-910.
    [61]P. Blythe, J. Fridrich. Secure Digital Camera[C], Digital Forensic Research Workshop, Baltimore, August 11-13,2004.
    [62]田新,刘曼,杨祥辉.一种带有水印嵌入功能的数码相机[P],中国发明专利,申请号2005100034309.X,公开日 2007.7.
    [63]和红杰.数字图像安全认证水印算法及其统计检测性能分析[D].成都:西南交通大学,2009.
    [64]M. M. Yeung, F. C. Mintzer. Invisible watermarking forimage verification[J]. Journal of Electronic Imaging, July 1998,7(3):578-591.
    [65]N. Memon, and M. Goljan. Further Attacks on Yeung-Mintzer Fragile Watermarking Scheme[C]. with Proc. SPIE Photonic West, Electronic Imaging 2000, Security and Watermarking of Multimedia Contents, San Jose, California, January,2000:428-437.
    [66]J.Fridrich, M. Goljan and N. Memon. Cryptanalysis of the Yeung-Mintzer Fragile Watermarking Technique [J], Electronic Imaging, April 2002,11(4):262-274.
    [67]Jinhai Wu, Zhu, B.B., Shipeng Li, Fuzong Lin. Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes[C]. IEEE International Conference on Multimedia and Expo,2004. ICME'04.2004.DOI:10.1109/ICME.2004.1394354.2004, Page(s):931-934.
    [68]丁科,何晨,工宏霞.一种定位精确的混沌脆弱数字水印技术[J].电子学报.2004,32(6):1009-1012.
    [69]S.H. Liu, H.X. Yao, W. Gao, and Y.L. Liu. An image fragile watermark scheme based on chaotic image pattern and pixel-pairs[J]. Applied Mathematics and Computation.2007,185(2):869-882.
    [70]J. Wu, B. Zhu, S. Li, S. Lin. A secure image authentication algorithm with pixel-level tampering localization[C]. In:Proceedings of the IEEE International Conference on Image Processing (ICIP'04), Singapore,2004.
    [71]Xinpeng Zhang, Shuozhong Wang. Statistical fragile watermarking capable of locating individual tampered pixels [J]. IEEE Signal Processing Letters,2007,14(10):727-731.
    [72]H. He, J. Zhang, H-M Tai. A neighborhood-characteristic-based detection model for statistical fragile watermarking with localization [J]. Multimed Tools Appl.,2011,52:307-324.
    [73]P.W. Wong. A Public Key Watermark for image verification and authentication. Image Processing[C]. International Conference on ICIP98.1998, vol.1,Page(s):455-459.
    [74]M.Holliman, N.Memon. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes[J]. IEEE Trans on Image Procesing,2000.3(9):432-441.
    [75]P. W. Wong, N. Memon. Secret and public key image watermarking schemes for image authentication and ownership verification [J], IEEE Trans. Image Processing,2001,10 (10):1593-1601.
    [76]Wei-Che Chen; Ming-Shi Wang. A fuzzy c-means clustering-based fragile watermarking scheme for image authentication [J]. Expert Systems with Applications,2009,36:1300-1307.
    [77]Lamiaa M. El Bakrawy, Neveen I. Ghali, AboulellaHassanien, Tai-hoon Kim. A Rough K-means Fragile Watermarking Approach for Image Authentication[C]. Proceedings of the Federated Conference on Computer Science and Information Systems,2011:19-23.
    [78]L. Tian, N. Zheng, J. Xueet al. An integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection [J]. Signal Processing:Image Communication,2011,26:427-437.
    [79]张宪海,杨永田.基于脆弱水印的图像认证算法研究[J].电子学报,2007,35(1):34-39.
    [80]H. He, J. Zhang, F. Chen. Block-wise Fragile Watermarking Scheme Based on Scramble Encryption[C], International Conference on BIC-TA, Zhengzhou China, September,2007:524-527.
    [81]H. Wang, C. Liao. JPEG Images Authentication with Discrimination of Tampers on the Image Content or Watermark[J]. IETE Technical Rebiew,2010,27(3):244-251.
    [82]Sanjay Rawat, Balasubramanian Raman. A chaotic system based fragile watermarking scheme for image tamper detection[J]. Int. J. Electron. Commun. (AEU),2011,65:840-847.
    [83]E. Izquierdo, V. Guerra. An ill-posed operator for secure image authentication[J]. IEEE Trans. Circuits and Systems for Video Technology,2003,13(8):842-852.
    [84]Y. Wu, R. H. Deng. Security of an ill-posed operator for image authentication[J], IEEE Trans. Circuits and Systems for Video Technology,2005,15(1):161-163.
    [85]H. He, J. Zhang, H-M Tai. Block-chain Based Fragile Watermarking Scheme with Superior Localization[C]. Information Hiding Workshop 2008, Santa Barbara, California, USA, LNCS 5284:147-160.
    [86]Kundur, D.; Hatzinakos, D.. Towards a telltale watermarking technique for tamper proofing[C], ICIP 98. Proceedings.1998, Page(s):409-413, vol.2.
    [87]D. Kundur, D. Hatzinakos. Digital watermarking for telltale tamper proofing and authentication [J]. Proceedings of IEEE,1999,87(7):1167-1180.
    [88]J. Fridrich, M. Goljan. Images with Self-Correcting Capabilities[C]. ICIP 99. Proceedings.1999 International Conference on.1999, Page(s):792-796 vol.3.
    [89]J.Fridrich, M.Goljan. Protection of digital images using selfembedding[C]. Processings of NJIT Symposium on Content Security and Data Hiding in Digital Media, (Newark,NJ). New Jersty Institute of Technology, May,1999.
    [90]A.M. Hassan, Y. Hasan, A. Al-Hamadi, M. Wahab, B.s. Michaelis. A novel public key self-embedding fragile watermarking technique for image authentication[C]. Image Processing, 2009,16th IEEE International Conference on.2009, Page(s):1261-1264.
    [91]P. Lin, C. Hsieh, P. Huang. A hierarchical digital watermarking method for image tamper detection and recovery [J]. Pattern Recognition,2005,38 (12):2519-2529.
    [92]刘泉,江雪梅,用于图像篡改定位和恢复的分层半脆弱数字水印算法[J].通信学报,2007.7,28(7):104-110.
    [93]M.S. Wang and W.C. Chen. A majority-voting based watermarking scheme for color image tamper detection and recovery[J]. Computer Standards & Interfaces,2007,29 (5):561-570.
    [94]H.He, J. Zhang, H-M Tai.Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization[C].11th International Workshop on Information Hiding, 2009,pp:132-145.
    [95]Tien-You Lee, Shinfeng D. Lin. Dual watermark for image tamper detection and recovery[J]. Pattern Recognition,2008,41:3497-3506.
    [96]Ching-Sheng Hsu, Shu-Fen Tu. Image tamper detection and recovery using differential embedding strategy[C]. Communications, Computers and Signal Processing (PacRim),2011 IEEE Pacific Rim Conference on,2011:399-402.
    [97]Sergio Bravo-Solorio, AsokeK.Nandi. Secure fragile watermarking method for image authentication with improved tampering localization and self-recovery capabilities[J]. Signal Processing,2011,91:728-739.
    [98]Z. Qian; G. Feng, Y.Li. Fragile Watermarking for Color Image RecoveryBased on Color Filter Array Interpolation[C].11th International Conference on Web-Age Information Management (WAIM2010),Jiuzhaigou, China,15-17 July 2010,PP:6184:537-543.
    [99]Yeh-Shun Chen, Ran-Zan Wang. Reversible authentication and cross-recovery of imagesusing (t, n)-threshold andmodified-RCM watermarking[J]. Optics Communications,2011,284:2711-2719.
    [100]Xinpeng Zhang; Shuozhong Wang; Zhenxing Qian; Guorui Feng. Reference Sharing Mechanism for Watermark Self-Embedding. IEEE Trans. Image Processing,2011,20(2):485-495.
    [101]H. He, F. Chen, H.-M. Tai, T. Kalker, J. Zhang. Performance analysis of a block-neighborhood based self-recovery fragile watermarking scheme [J], IEEE Trans. Inf. Forensics Security, 2012,7(1):185-196.
    [102]张鸿宾,杨成.图像的自嵌入及篡改的检测和恢复算法[J].电子学报,2004,32(2):196-199.
    [103]王永杰,赵耀,潘正祥.可以自恢复和篡改定位的可逆数字水印[J].哈尔滨工业大学学报,2006.7,38(sup):791-795.
    [104]H. He, J. Zhang, F. Chen. Adjacent-block based statistical detection method for self-embedding watermarking techniques[J]. Signal Processing,2009,89(8):1557-1566.
    [105]C. Li, Y. Wang, B. Ma, Z. Zhang. A novel self-recovery fragile watermarking scheme basedon dual-redundant-ring structure[J]. Computers and Electrical Engineering,2011,37:927-940.
    [106]X. Zhang, Z.Qian, Y.Ren, G.Feng. Watermarking With Flexible Self-RecoveryQuality Based on Compressive Sensingand Compositive Reconstruction[J]. IEEE Trans. Inf. Forensics Security, 2011,6(4); 1223-1232.
    [107]Chun-Wei Yang, Jau-JiShen. Recover the tampered image based on VQ indexing[J]. Signal Processing,2010,90:331-343.
    [108]Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Changb, Meng-Cheng Tsai. A Hierarchical Fragile Watermarking with VQIndex Recovery[J]. Journal of Multimedia,2011,6(3):277-284.
    [109]Y.L. Tang, C.J. Hung. Recoverable Authentication of Wavelet-Transformed Images[OL]. www.icgst.com, GVIP:61-66.
    [110]张家树,和红杰.图像篡改内容可恢复的定位型认证水印的生成与认证方法[P].中国发明专利,中请号:200410081400.6.
    [111]C. Chang, Y.-H. Fan, and W.-L. Tai, Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery[J], Pattern Recognition,2008,41 (2):654-661.
    [112]H. He, J. Zhang. Cryptanalysis on majority-voting based self-recovery watermarking scheme[J], Telecommunication Systems,2012,49(2):231-238.
    [113]Z. Qian, G. Feng, X. Zhang, and S. Wang. Image self-embedding with high-quality restoration capability [J]. Digital Signal Processing,2011,21:278-286.
    [114]C. Qin, C.-C. Chang, P.-Y. Chen. Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism[J], Signal Processing,2012(92):1137-1150.
    [115]Z.Qian,G.Feng Inpainting Assisted Self Recovery With Decreased Embedding Data. IEEE Signal Processing Letters,2010,17(1):929-932.
    [116]陈帆,和红杰,王宏霞.用于图像认证的变容量恢复水印算法[J],计算机学报,2012,35(1)154-162.
    [117]F. Chen, H. He, Y. Huo, H. Wang. Self-Recovery Fragile Watermarking Scheme with Variable Watermark Payload[C],10th Inter. Workshop on Digital-forensics and Watermarking (IWDW2011), Atlantic City, New Jersey, USA, Octorber,2012:142-55.
    [118]Y. Huo, H. He, F. Chen. Alterable-capacity fragile watermarking scheme with restoration capability [J], Optics Communications,2012,285(7), pp 1759-1766.
    [119]V. Aslantas, S. Ozer, S. Ozturk. Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms[J], Optics Communications,2009,282:2806-2817.
    [120]H. Luo, F. Yu, Z. Huang, Z. Lu. Blind image watermarking based on discrete fractional random transform and subsampling[J], Optik,2011,122:311-316.
    [121]P. Lin, J. Lee, C. Chang. Protecting the Content Integrity of Digital Imagery with Fidelity Preservation[J]. ACM Transactions on Multimedia Computing, Communications and Applications, 2011,7(3):1-20.
    [122]Chuhong Fei; Kwong, R.H.; Kundur, D. A Hypothesis Testing Approach to Semi-fragile Watermark-Based Authentication [J]. IEEE Trans. Inf. Forensics Security,2009,4(2):179-192.
    [123]K.R. Chetan. A Multi-Purpose Semi-Fragile Watermarking Scheme for Digital Images [J]. Int. J. Advanced Networking and Applications,2010,2(3):656-665.
    [124]Xiaojun Qi, Xing Xin. A quantization-based semi-fragile watermarking scheme for image content authentication[J]. J. Vis. Commun. Image R.,2011,22:187-200.
    [125]Ishihara, Nozomi; Abe, Koki. A Semi-Fragile Watermarking Scheme Using Weighted Vote with Sieve and Emphasis for Image Authentication[J]. IE1CE TRANS. FUNDAMENTALS,2007, E90-A(5):1045-1054.
    [126]Shang-Lin Hsieh, I-Ju Tsai, Chung-Ping Yeh. An image authentication scheme based on digital watermarking and image secret sharing[J]. Multimed Tools Appl.,2011,52:597-619.
    [127]Zhenni Peng, Wenbo Liu. Color image authentication based on spatiotemporal chaos and SVD. Chaos [J], Solitons and Fractals,2008,36:946-952.
    [128]Jinwei Wang, Shiguo Lian, Guangjie Liu, Yuewei Dai, Zhongxuan Liu, Zhen Ren. Secure multimedia watermarking authentication in wavelet domain[J]. Journal of Electronic Imaging, 2008,17(3),033010-1-12.
    [129]李赵红,侯建军,宋伟.基于视觉特性的半脆弱水印算法[J].通信学报,2008,28(10):134-140.
    [130]Min-Jen Tsai, Chih-Cheng Chien. Authentication and recovery for wavelet-based semi-fragile watermarking[J]. Optical Engineering,2008,47(6),067005-1-10.
    [131]Rafiullah Chamlawi, Asifullah Khan, Imran Usman. Authentication and recovery of images using multiple watermarks[J]. Computers and Electrical Engineering,2010,36:578-584.
    [132]赵峰,李剑,李生红.基于沃尔什-哈达玛变换和卷积编码的平脆弱水印算法[J].通信学报,2009,30(10):89-95.
    [133]Sian-Jheng Lin, Ja-Chen Lin. Authentication and recovery of an image by sharing and lattice-embedding[J]. Journal of Electronic Imaging,2010,19(4),043008:1-14.
    [134]Hengfu Yang, Xingming Sun, Guang Sun. A semi-fragile watermarking algorithm using adaptive least significant bit substitution. Information Technology Journal,2010,9(1):20-26.
    [135]Zhang Wenyin, Frank Y. Shih. Semi-fragile spatial watermarking based on local binary pattern operators[J]. Optics Communications,2011,284:3904-3912.
    [136]肖磊.一种基于混沌的彩色图像空域半脆弱水印算法[J].历防科技大学学报,2008,30(4):59-63.
    [137]Rafiullah Chamlawi, Asifullah Khan. Digital image authentication and recovery:Employing integer transform based information embedding and extraction[J]. Information Sciences,2010, 180:4909-4928.
    [138]H. Yuan, X. Zhang. Multi scale fragile watermarking based on the Gaussian mixture model[J]. IEEE Trans. Image Processing,2006,15(10):3189-3200.
    [139]H.J. He, J.S. Zhang, and H.X. Wang. Synchronous counterfeiting attacks on self-embedding watermarking schemes[J], Internat. J. Computer Science and Network Security,2006,6 (1): 251-257.
    [140]Yongdong Wu; Feng Bao; Changsheng Xu. The Security Flaws in some Authentication Watermarking Scheme [C], Multimedia and Expo, Proceedings.2003 International Conference on. 2003, Page(s):Ⅱ-493-6 vol.2.
    [141]F. Deguillaume, S.V oloshynovskiy, T. Pun. Secure hybrid robust watermarking resistant against tampering and copy attack[J]. Signal Processing,2003 (83):2133-2170
    [142]Barreto, P.S.L.M.; Hae Yong Kim; Rijmen, V., Rijmen, V. Toward a secure public-key blockwise fragile authentication watermarking[C].2001 International Conference on Image Processing, Page(s):494-497 vol.2.
    [143]和红杰,张家树,田蕾.能区分图像或水印篡改的脆弱水印方案[J].电子学报,2005,33(9):1557-1561.
    [144]A.Papoulis, S. U. Pillai, Probability, Random Variables and Stochastic Processes [M],4th ed., McGraw-Hill, Boston,2002.
    [145]王宏霞,基于内容的自适应音频水印研究综述[J],西南交通大学学报,2009,44(3):430-436.
    [146]M.T anha, S.D.S. Torshizi, M.T. Abdullah, F. Hashim..An overview of attacks against digital watermarking and their respective countermeasures[C].2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec),.2012, Page(s):265-270.
    [147]王向阳,祁薇.用于版权保护与内容认证的半脆弱音频水印算法[J].自动化学报.2007,33(9):936-940.
    [148]M. Lei Y. Yang S. Luo. Semi-Fragile Audio Watermarking Algorithm in DWT Domain[J]. China Communication.2010(10):71-75.
    [149]Ning Chen; Jie Zhu. A multipurpose audio watermarking scheme for copyright protection and content authentication [C], IEEE International Conference on Multimedia and Expo,2008, Page(s):221-224.
    [150]仝笑梅,张鸿宾.用于篡改检测及认证的脆弱音频水印算法[J],电子与信息学报,2005,27:1187-1192.
    [151]H. Wang,M. Fan. Centroid-based Semi-fragile Audio Watermarking in Hybird Domain[J]. Sci China Inf Sci,2010,53:619-633.
    [152]O. Chen, C.Liu. Content-Dependent Watermarking Scheme in Compressed Speech With Identifying Manner and Location of Attacks[J]. IEEE Trans. Audio, Speech, and Language Processing,2007,15(5):1605-1616.
    [153]范明泉,王宏霞.基于音频内容的混合域脆弱水印算法[J].铁道学报, 2010,32(1):118-122.
    [154]F. Chen, H. He, H.Wang. A Fragile Watermarking Scheme for Audio Detection and Recovery [C]. Image and Signal Processing,2008 Congress on,2008,5:135-138.
    [155]J.Zhang, X. Wang, W. Zhang. Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter [J], Physics Letters,2007,362(5-6):439-448.
    [156]Bertalmio, M.,Sapiro, G., andCaselles, V.et al. Image inpainting[C]. Proceedings of SIGGRAPH 2000. New Orleans, USA, July 2000:417-424.
    [157]秦绪佳,桑贤生,程时伟,徐晓刚.改进的规范化卷积图像修复算法[J].计算机辅助设计与图形学笋报,2011,23(2):371-376.
    [158]F.Bornemann and T. Marz. Fast image inpainting based on coherence transport[J]. Math. Imag. Vis.,2007,28(3):259-278.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700