首页> 外文会议>International Conference on Web Research >Fragile Watermarking for Image Authentication Using QR factorization and Fourier Transform
【24h】

Fragile Watermarking for Image Authentication Using QR factorization and Fourier Transform

机译:使用QR分解和傅立叶变换的图像认证脆弱水印。

获取原文

摘要

Image authentication technique is one of the important methods for a large number of multimedia applications. When a digital image is passed over non-secure channels such as the Internet, it may be changed and manipulated. For some important images such as military and medical images, these manipulations are very harmful and such images should be protected against them. There are several ways such as fragile and semi-fragile watermarking to authenticate images from malicious attacks. This paper presents a fragile watermarking algorithm for image authentication by using QR factorization and Fourier Transform (FT). By applying Fourier transform to host image, frequency domain which causes visual quality in watermarking is achieved. After applying FT, it is factorized by QR decomposition. QR factorization is also applied to watermark image. After factorizing both images, a coefficient of the upper triangular matrix R from watermark image is embedded to the upper triangular matrix R from host image. So a sign of the watermark image is hidden in the host image. This method is a fragile watermarking and it is sensitive to a little attack. So if an image is attacked over the Internet, the watermark image can not be extracted and it means that it has been attacked and it helps us to recognize if an image is changed after being transmitted over the Internet. The experimental results show that this method is sensitive to every weak attack and extraction part can not extract watermark image if it has been attacked.
机译:图像认证技术是用于大量多媒体应用的重要方法之一。当数字图像通过非安全通道(例如Internet)传递时,它可能会被更改和操纵。对于某些重要的图像,例如军事和医学图像,这些操作非常有害,因此应防止此类图像受到侵害。有几种方法,例如脆弱和半脆弱的水印,可以对来自恶意攻击的图像进行身份验证。提出了一种基于QR分解和傅立叶变换(FT)的图像认证脆弱的水印算法。通过对主机图像进行傅里叶变换,可以实现在水印中引起视觉质量的频域。应用FT后,通过QR分解将其分解。 QR分解也适用于水印图像。在对两个图像进行因子分解之后,将来自水印图像的上三角矩阵R的系数嵌入到来自宿主图像的上三角矩阵R。因此,水印图像的标志被隐藏在主机图像中。此方法是易碎的水印,并且对轻微攻击很敏感。因此,如果图像在Internet上受到攻击,则无法提取水印图像,这意味着它已受到攻击,它可以帮助我们识别图像在Internet上传输后是否已更改。实验结果表明,该方法对每个弱攻击都敏感,如果受到攻击,提取部分无法提取水印图像。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号