Digital image self embedding watermarking technology is one of the main technical means to solve the problem of image tamper detection and recovery. The existing self embedding watermarking technology has the problem of low authentication granularity. In this paper, an image self embedding semi fragile watermarking algorithm based on block truncation coding is proposed. Watermark generation and embedding: the image is divided into two levels at the block level, and the granularity is 4×4 and 2×2 image block; block truncation coding is used for each 4×4 image blocks are compressed and encoded to generate 2×2. Restore the watermark of the image block, and hash the restored watermark for the authentication watermark of the image block. Tamper authentication and recovery: a 4×4. Compare the watermark extracted from the image block with the watermark generated by the block to judge the two of the image block×whether the sub block two passes the authentication; restore the image block according to the authentication result.
The rapid development of science and technology has brought convenience for photographing and sharing images. However, with the rapid increase of image data, security problems such as leakage and tampering also occur frequently. The application of image encryption technology is imminent, especially the encryption of color images is in urgent need of improvement and development. The traditional encryption technology is mainly aimed at data stream encryption, which has low efficiency, large amount of calculation and certain limitations. Based on transform domain encryption, the image is transformed from spatial domain to frequency domain for encryption, and then transformed to spatial domain, which belongs to a kind of lossy encryption. Encryption based on chaos has large key space, simple implementation and fast encryption speed. Generally, multiple chaotic systems need to be used to enhance the security of encryption. Therefore, a simple and secure spatial encryption algorithm for RGB three channels of color image is designed in this paper. Firstly, a safer chaotic sequence is generated by logistic sine cosine mapping, and then four rounds of scrambling and diffusion pixels are designed by chaotic sequence. Finally, In a series of security analysis experiments, the security and effectiveness of color image encryption algorithm based on logistic sine cosine mapping are verified.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.