Semi-fragile watermarking for image authentication based on compressive sensing

摘要创新点针对目前认证算法对非恶意攻击的脆弱性问题,本文提出了一种基于压缩感知的半脆弱图像认证算法。 与传统的基于压缩感知的方法不同, 本文联合考虑图像认证的三个主要问题: 篡改检测、 定位和恢复。 算法不仅以像素级准确性定位篡改区域, 而且以较高质量地恢复被篡改内容。 本文算法对恶意篡改攻击脆弱, 而对如 JPEG 压缩、 亮度/对比度变化、 噪声添加、 格式变换等非恶意攻击具有较好的鲁棒性。

[1]  Changsheng Xu,et al.  Street-to-shop: Cross-scenario clothing retrieval via parts alignment and auxiliary set , 2012, 2012 IEEE Conference on Computer Vision and Pattern Recognition.

[2]  Stefano Tubaro,et al.  A compressive-sensing based watermarking scheme for sparse image tampering identification , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[3]  Zhenxing Qian,et al.  Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction , 2011, IEEE Transactions on Information Forensics and Security.

[4]  Lintao Lv,et al.  A SEMI-FRAGILE WATERMARKING SCHEME FOR IMAGE TAMPER LOCALIZATION AND RECOVERY , 2012 .

[5]  Yuhang Li,et al.  Semi-fragile watermarking for image tamper localization and self-recovery , 2014, Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC).

[6]  Shih-Fu Chang,et al.  Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.

[7]  Asifullah Khan,et al.  Wavelet Based Image Authentication and Recovery , 2007, Journal of Computer Science and Technology.

[8]  Franco Bartolini,et al.  Self Recovery Authentication Of Images In The Dwt Domain , 2005, Int. J. Image Graph..

[9]  Sam Kwong,et al.  Efficient Motion and Disparity Estimation Optimization for Low Complexity Multiview Video Coding , 2015, IEEE Transactions on Broadcasting.

[10]  Stefano Tubaro,et al.  Hash-Based Identification of Sparse Image Tampering , 2009, IEEE Transactions on Image Processing.

[11]  Guangming Shi,et al.  A high quality image reconstruction method based on nonconvex decoding , 2013, Science China Information Sciences.

[12]  Jian Shen,et al.  Efficient data integrity auditing for storage security in mobile health cloud , 2015, Peer-to-Peer Networking and Applications.

[13]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[14]  Naixue Xiong,et al.  Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.