Description: 彩色图像的篡改检测及自恢复算法赵春晖,孙建军,朱海峰(哈尔滨工程大学信息与通信工程学院,黑龙江哈尔滨150001)摘要:数字水印是图像认证的有效手段之一.利用小波变换提出一种计算简单的彩色图像水印算法,将一个图像的主要内容嵌入该图像自身之中,用均值量化的方法在亮度信号中嵌入水印,实现篡改检测和定位篡改区域;用多余的色度空间嵌入亮度信号和色度信号,用于恢复被篡改的图像内容.该算法可以获取较高的峰值信噪比,具有很好的鲁棒性.实验结果表明,该算法对删除、替换等恶意图像篡改具有良好的检测、定位和自修复能力.-color image tamper detection and self-recovery algorithm Zhao Chunhui, Sun Jianjun, Zhu Haifeng (Harbin Engineering University, Information and Communication Engineering Institute, Harbin, Heilongjiang 150001) Abstract : digital watermark image authentication is one of the effective means. Using wavelet transform A simple calculation of the color image watermarking algorithm, an image of the main elements embedded in the image itself, and use of quantitative methods mean the luminance signal embedded watermark, achieve tamper detection and localization tampering with the region; use of surplus space embedded color luminance signals and chrominance signals, for the restoration of tampering with the image content. The algorithm can generate a higher signal-to-noise ratio of the peak value, h Platform: |
Size: 238214 |
Author:ghostsx |
Hits:
Description: 彩色图像的篡改检测及自恢复算法赵春晖,孙建军,朱海峰(哈尔滨工程大学信息与通信工程学院,黑龙江哈尔滨150001)摘要:数字水印是图像认证的有效手段之一.利用小波变换提出一种计算简单的彩色图像水印算法,将一个图像的主要内容嵌入该图像自身之中,用均值量化的方法在亮度信号中嵌入水印,实现篡改检测和定位篡改区域;用多余的色度空间嵌入亮度信号和色度信号,用于恢复被篡改的图像内容.该算法可以获取较高的峰值信噪比,具有很好的鲁棒性.实验结果表明,该算法对删除、替换等恶意图像篡改具有良好的检测、定位和自修复能力.-color image tamper detection and self-recovery algorithm Zhao Chunhui, Sun Jianjun, Zhu Haifeng (Harbin Engineering University, Information and Communication Engineering Institute, Harbin, Heilongjiang 150001) Abstract : digital watermark image authentication is one of the effective means. Using wavelet transform A simple calculation of the color image watermarking algorithm, an image of the main elements embedded in the image itself, and use of quantitative methods mean the luminance signal embedded watermark, achieve tamper detection and localization tampering with the region; use of surplus space embedded color luminance signals and chrominance signals, for the restoration of tampering with the image content. The algorithm can generate a higher signal-to-noise ratio of the peak value, h Platform: |
Size: 237568 |
Author:ghostsx |
Hits:
Description: 针对现有的图像复制遮盖篡改检测算法需要某些先验信息、对后处理操作失效且计算量大等问题,
借鉴图像匹配技术中的SIFT(scale invariant feature transform)特征匹配算法,首次提出将其用于检测复制
遮盖的篡改操作。
-Cover the existing image copy for tamper detection algorithm needs some prior information on the calculation of post-processing and the failure of large issues, draw the image matching technology in the SIFT (scale invariant feature transform) features matching algorithm, first proposed The cover copy for the detection of the tampering operation. Platform: |
Size: 466944 |
Author:LIDAN |
Hits:
Description: a self- embedding block wise fragile watermarking scheme with tamper detection and content recovery capability. The proposed scheme embeds the shuffled extensive ten bit Recovery
data and two bit Authentication data of the image block into the least
significant bits (LSB) of its corresponding mapping block.The integrity
of a test block is decided by comparing 2×2 non overlapping block
of the test block with its corresponding mapping block. Experimental
results show that the suggested scheme outperforms conventional self recovery fragile watermarking algorithms in alteration detection as well
as in tamper recovery of the image. Platform: |
Size: 273408 |
Author:durgesh singh |
Hits:
Description: 本论文包含5个源程序,分别为LSBCut、LSBCollage、DCTCut、DCTCollage和PSNR,其中LSBCut实现了LSB水印算法的剪切篡改的检测、LSBCollage实现了LSB水印算法的拼贴篡改的检测、DCTCut实现了DCT水印算法的剪切篡改的检测、DCTCollage实现了DCT水印算法的拼贴篡改的检测、PSNR功能是计算嵌入水印嵌入的峰值信噪比,以此来说明嵌入水印后图像载体的失真大小。LSBCut、LSBCollage、DCTCut、DCTCollage是独立的程序,每个程序独立完成一种篡改检测的功能且都有一个输出参数,没有输入参数,输出的参数是漏警概率。PSNR需要LSBCut、LSBCollage、DCTCut、DCTCollage产生的嵌入水印后的图像和原始图像作为输入参数,作为LSBCut、LSBCollage、DCTCut和DCTCollage的内函数使用。-This thesis contains five source program, LSBCut, LSBCollage respectively, DCTCut, DCTCollage and PSNR, including LSBCut implements the LSB watermarking algorithm of shear tampering detection, LSB watermarking algorithm was realized LSBCollage collage tampering detection, DCTCut implements the DCT watermarking algorithm of shear tampering detection, DCTCollage implements the DCT watermarking algorithm of collage of tampering detection, PSNR function is to embed watermark embedding peak signal-to-noise ratio, in order to show that embedded watermark image carrier after distortion.LSBCut, LSBCollage, DCTCut, DCTCollage is independent of the programs, each program independently a tamper detection function and has an output parameter, no input parameters, output parameters are leakage alarm probability.PSNR need LSBCut, LSBCollage, DCTCut, DCTCollage of embedded watermark image and the original image as the input parameters, as LSBCut, LSBCollage, DCTCut and DCTCollage function in use. Platform: |
Size: 20418560 |
Author:王成优 |
Hits:
Description: implementation this paper in matlab
Dual watermark for image tamper detection and recovery
http://www.sciencedirect.com/science/article/pii/S003132030800174X Platform: |
Size: 174080 |
Author:bbh |
Hits: