首页> 外文期刊>Multimedia Tools and Applications >A secure reversible color image watermarking scheme based on LBP, lagrange interpolation polynomial and weighted matrix
【24h】

A secure reversible color image watermarking scheme based on LBP, lagrange interpolation polynomial and weighted matrix

机译:基于LBP,拉格朗日插值多项式和加权矩阵的安全可逆彩色图像水印方案

获取原文
获取原文并翻译 | 示例
           

摘要

Secure reversible watermarking schemes are essential for image authentication and tamper detection in medical, military and government applications. In this paper, a secure reversible color image watermarking scheme has been proposed considering the merits of three individual tools namely Local Binary Pattern (LBP), Lagrange Interpolation Polynomial (LIP) and Weighted Matrix (WM). The proposed reversible scheme has been designed to address the issues related to image authentication and tamper detection. Here, LBP operator is employed to generate Tamper Detection Code (TDC), LIP and WM are used to embed watermark within the sub-sampled images. Authentication is accomplished by utilizing an Authentication Code (AC), which is generated from binary string of watermark logo using a Secure Hash Algorithm (SHA-512). Repeated entry-wise-multiplication operations have been performed with each sub-sampled image block to increase the payload without affecting visual quality of the watermarked image significantly. Some standard NIST recommended steganalysis and attacks are conducted to evaluate its robustness and imperceptibility. It is observed that the developed scheme is secure and robust against several attacks as well as can detect tampered regions. Experimental results are compared with the state-of-the-art schemes to present the merits of our scheme.
机译:安全可逆水印方案对于医学,军事和政府应用中的图像认证和篡改检测至关重要。在本文中,提出了一种考虑到三个单独工具的优点,即局部二进制模式(LBP),拉格朗日插值多项式(LIP)和加权矩阵(WM)的优点,提出了一种安全的可逆彩色图像水印方案。建议的可逆方案旨在解决与图像认证和篡改检测相关的问题。这里,使用LBP运算符来生成篡改检测码(TDC),唇部和WM用于嵌入子采样图像内的水印。通过使用安全散列算法(SHA-512)从水印徽标的二进制串生成的认证码(AC)来实现认证。已经使用每个子采样图像块执行重复的进入方向乘法操作,以增加有效载荷,而不会显着影响水印图像的视觉质量。有一些标准的NIST推荐的隐析和攻击以评估其鲁棒性和难以察觉。据观察,开发方案对若干攻击以及可以检测篡改区域是安全和稳健的。将实验结果与最先进的计划进行比较,以呈现我们计划的优点。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号