Current watermarking algorithms use mostly pseudo random sequences to generate watermarks. These algorithms emphasize the improvement of imperceptibility and robustness of the watermarking but ignores its safety. To improve the watermarking safety
a new secure communication oriented airspace watermarking algorithm with a tamper locating function was proposed based on the true randomness of quantum key. According to the principle of BB84 protocol
the quantum key with real randomness and absolute security generated by quantum key distribution mechanism was used to generate binary image watermarks. Then
in combining with a quantum key matrix model and 8-neighborhood random location idea
the quantum watermarks were embed into a carrier image dynamically and randomly. At the end of the transmission
the receiver could quickly extract watermark information
accurately judge the integrity of the watermark image and the security of the transmission process
and could perform tamper localization. The concealment
robustness and tamper location of the algorithm were tested. The experimental results show that the algorithm is simple
safe
and has higher safety and covert and its tamper locating accuracy is 3 pixel×3 pixel. The algorithm can be widely used in the secure transmission of digital images.
关键词
Keywords
references
WOLFGANG R B, PODILCHUK C I, DELP E J. Perceptual watermarks for digital images and video[J]. Proceedings of the IEEE, 1999, 87(7):1108-1126.
VAN SCHYNDEL R G, TIRKEL A Z, OSBORNE C F. A digital watermark[C]. Proceedings of the 1st International Conference on Image Processing , IEEE , 1994(2):86-90.
COX I J, KILIAN J, LEIGHTON T, et al .. Secure spread spectrum watermarking for images, audio and video[C]. Proceedings of the 3rd IEEE International Conference on Image Processing , IEEE , 1996:243-246.
COX I J, KILIAN J, LEIGHTON F T, et al.. Secure spread spectrum watermarking for multimedia[J]. IEEE Transactions on Image Processing, 1997, 6(12):1673-1687.
RUANAIDH J J K O, DOWLING W J, BOLAND F M. Phase watermarking of digital images[C]. Proceedings of the 3 rd IEEE International Conference on Image Processing , IEEE , 1999, 3:239-242.
KUNDUR D, HATZINAKOS D. A robust digital image watermarking method using wavelet-based fusion[C]. Proceedings of International Conference on Image Processing , IEEE , 1997:544-547.
ZHAO B, QIN G H. High robustness image watermarking algorithm[J]. Journal of Jilin University (Engineering and Technology Edition), 2017, 47(1):249-254. (in Chinese)
ZHENG Q M, JIN X, GU G M, et al.. A digital watermarking algorithm based on Data Matrix[J]. Journal of China University of Petroleum, 2015, 39(1):188-193. (in Chinese)
WANG P, YAO H, LI L. A adaptive digital watermarking algorithm combining spatial and DWT domain[J]. Opt. Precision Eng., 2006, 14(6):1057-1062. (in Chinese)
LOUKHAOUKHA K, NABTI M, ZEBBICHE K. A robust SVD-based image watermarking using a multi-objective particle swarm optimization[J]. Opto-Electronics Review, 2014, 22(1):45-54.
QI X J, XIN X. A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization[J]. Journal of Visual Communication and Image Representation, 2015, 30:312-327.
SUTHAHARAN S. Fragile image watermarking using a gradient image for improved localization and security[J]. Pattern Recognition Letters, 2004, 25(16):1893-1903.
HE H J, ZHANG J SH, TAI H M. A secure fragile watermarking scheme for image authentication[C]. Proceedings of 2006 International Conference on Computational Intelligence and Security , IEEE, 2006:1180-1185.
KUNDUR D, HATZINAKOS D. Digital watermarking for telltale tamper proofing and authentication[J]. Proceedings of the IEEE, 1999, 87(7):1167-1180.
FRIDRICH J, GOLJAN M. Images with self-correcting capabilities[C]. Proceedings of 1999 International Conference on Image Processing , IEEE, 1999:792-796.
LIN P L, HUANG P W, PENG A W. A fragile watermarking scheme for image authentication with localization and recovery[C]. Proceedings of the 6 th International Symposium on Multimedia Software Engineering , IEEE, 2004:146-153.
WANG D CH, TIAN C C, CHEN B J, et al.. Dual watermarking for color images based on 4D quaternion frequency domain[J]. Journal of Jilin University (Engineering and Technology Edition), 2015, 45(4):1336-1346. (in Chinese)
BENNETT C H, BRASSARD G. Quantum cryptography:public key distribution and coin tossing[C]. Proceedings of the IEEE International Conference on Computers , Systems , and Signal Processing , IEEE, 1984.
WANG Y H, ZHU CH Q, SU SH B, et al.. An authentication method based on perceptual hashing and watermarking for remote sensing image[J]. Opt. Precision Eng., 2016, 24(10):640-648. (in Chinese)
SINGH A K, DAVE M, MOHAN A. Hybrid technique for robust and imperceptible image watermarking in DWT-DCT-SVD domain[J]. National Academy Science Letters, 2014, 37(4):351-358.