基于通道编码的数字图像恢复算法
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Digital Image Restoration Algorithm Based on Channel Coding
  • 作者:谷玉莹
  • 英文作者:GU Yu-ying;College of Computer Science & Engineering,Shandong University of Science & Technology;
  • 关键词:易碎水印 ; 图像篡改保护 ; SPIHT编码 ; RS编码
  • 英文关键词:fragile watermarking;;image tampering protection;;SPIHT coding;;RS coding
  • 中文刊名:RJDK
  • 英文刊名:Software Guide
  • 机构:山东科技大学计算机科学与工程学院;
  • 出版日期:2018-11-02 07:22
  • 出版单位:软件导刊
  • 年:2019
  • 期:v.18;No.195
  • 语种:中文;
  • 页:RJDK201901047
  • 页数:4
  • CN:01
  • ISSN:42-1671/TP
  • 分类号:203-206
摘要
信息损失不可避免。为达到图像的篡改容忍度与恢复质量之间的平衡,基于纠错编码方法,对原始图像采用SPIHT编码进行整体压缩,再用RS纠错编码对SPIHT源码流进行保护,将编码后的RS码流作为水印嵌入宿主图像。实验结果表明,该算法的图像质量和篡改容忍度均有所提高。基于纠错编码的图像恢复技术能够保证在篡改容忍度以内恢复所有的压缩码流,大大降低接收端解压的计算复杂度,提高图像恢复效率。
        In order to achieve a balance between tolerance of tampering and restoration quality of image against endless information loss,this paper uses the method of error correction coding to compress the original image by SPIHT and protect the SPIHT out-stream by RS technology,and the RS stream is embedded into host image as watermark.Experimental results show that the quality of the restored image and the tolerance of tampering are improved.The image restoration technology based on error correction coding can guarantee the recovery of all compressed code streams within the tamper tolerance,and it can greatly reduce the computational complexity of the receiver decompression and improve the efficiency of image recovery.
引文
[1]杨义先,钮心忻.数字水印理论与技术[M].北京:高等教育出版社,2006.
    [2]詹青龙,卢爱芹.数字图像处理技术[M].北京:清华大学出版社,2010.
    [3]赵丽丽,钱振兴,韩喜玉.基于显著性分类的数字图像自嵌入方法[J].应用科学学报,2014(2):178-184.
    [4]彭玉忠,王金才,郝荣霞.一种图像自嵌入及自恢复算法[J].计算机应用与软件,2011,28(1):263-266.
    [5]李曦焱.基于数字水印技术的图像完整性认证研究[D].兰州:西北师范大学,2006.
    [6]ZHU X,HO A T S,MARZILIANO P.Image Authentication and restoration using irregular sampling for traffic enforcement applications[C].International Conference on Innovative Computing,Information and Control,2006:62-65.
    [7]王子驰,张媛,张新鹏.多比特嵌入的加密图像中可逆信息隐藏方法[J].小型微型计算机系统,2014,35(10):2331-2335.
    [8]ZHANG X,QIAN Z,REN Y,et al.Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction[J].IEEE Transactions on Information Forensics&Security,2011,6(4):1223-1232.
    [9]ZHANG X,WANG S,QIAN Z,et al.Reference sharing mechanism for watermark self-embedding[J].IEEE Transactions on Image Processing,2011,20(2):485-495.
    [10]ZHANG L,CHEN F,GAO H.Chaos-based secure dual self-recovery watermark algorithm for image authentication:chaos-based secure dual self-recovery watermark algorithm for image authentication[J].Journal of Computer Applications,2010,30(1):203-206.
    [11]LEE T Y,LIN S D.Dual watermark for image tamper detection and recovery[J].Pattern Recognition,2008,41(11):3497-3506.
    [12]黄伟琦,陈志刚,梁涤青,等.基于多混沌系统的医学图像加密算法[J].计算机科学,2012,39(12):261-263.
    [13]邓小鸿,陈志刚,梁涤青,等.分区域的医学图像高容量无损信息隐藏方法[J].通信学报,2015,36(1):189-198.
    [14]黄斌,史亮,邓小鸿,等.自适应高容量医学图像可逆数据隐藏算法[J].计算机应用,2012,32(10):2779-2782.
    [15]齐东旭,邹建成,韩效宥.一类新的置乱变换及其在图像信息隐蔽中的应用[J].中国科学:技术科学,2000,30(5):235-440.
    [16]SAID A,PEARLMAN W A.A new fast and efficient image codec based on set partitioning in hierarchical trees[J].IEEE Transactions on Circuits&Systems for Video Technology,1996,6(3):243-250.
    [17]贾志科,崔慧娟,唐昆.改进的SPIHT静止图像压缩编码算法[J].清华大学学报:自然科学版,2001,41(7):25-28.
    [18]WICKER S B,BHARGAVA V K.Reed-solomon codes and their applications[M].Hoboken:John Wiley&Sons,Inc,1999.
    [19]林福宗.多媒体技术基础[M].第2版.北京:清华大学出版社,2002.
    [20]KORUS P,DZIECH A.Efficient method for content reconstruction with self-embedding.[J].IEEE Transactions on Image Processing,2013,22(3):1134-1135.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700