期刊文献+

基于数字水印和数字签名的图像篡改认证算法 被引量:1

An Image Authentication Algorithm Based on Digital Watermarking and Digital Signature
下载PDF
导出
摘要 提出了一种用于图像认证的半脆弱水印算法, 能够区分出恶意攻击和一般的图像处理.实验表明,该算法能准确确定篡改的具体位置,同时对JPEG压缩等常规的图像操作具有较好的鲁棒性.这种算法以16×16个像素点为分块单位对图像进行分块认证,通过小波变换并采用SHA-256产生认证信息,再通过颜色量化的方法,把认证水印信息嵌入到图像的最大意义位.在水印的嵌入过程中,以块为单位对认证信息进行置乱后再进行嵌入,保证了认证的可靠性和水印的鲁棒性,有较强的抗攻击能力.
出处 《计算机研究与发展》 EI CSCD 北大核心 2007年第z1期268-272,共5页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60574030) 湖南省教育科学"十一五"规划课题基金项目(XJK06CXJ012)
  • 相关文献

参考文献10

  • 1吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70
  • 2[2]M Yeung,F Mintzer.An invisible watermarking technique for image verification.IEEE Int'l Conf on Image Processing,Santa Barbara,1997
  • 3[3]P Wong,N Memon.Secret and public key image watermarking schemes for image authentication and ownership verification.IEEE Trans on Image Processing,2001,10(10):1593-1601
  • 4[4]C W Honsinger,P Jones,M Rabbani,et al.Lossless recovery of an original image containing embedded data.U S Patent No.6278791,2001
  • 5[5]J Fridrich,M Goljan,R Du.Lossless data embedding for all image formats.In:SPIE 4675,Security and Watermarking of Multimedia Contents IV.San Diego:SPIE Press,2002.572-583
  • 6任智斌,隋永新,杨英慧,杨怀江.以图像为载体的最大意义位(MSB)信息隐藏技术的研究[J].光学精密工程,2002,10(2):182-187. 被引量:24
  • 7[7]FIPS 180-2 Secure Hash Standard(SHA).http://csrc.nist.gov/publications/fips/index.html,2002
  • 8陈生潭,侯振华,王虹现.双重认证的变换域图像半脆弱数字水印算法[J].计算机辅助设计与图形学学报,2005,17(5):1114-1119. 被引量:10
  • 9[9]孙圣和,陆哲吸,牛夏牧.数字水印技术及其应用.北京:科学出版社,2005
  • 10[10]J Fridrich,M Goljan,N Memon.Cryptanalysis of the Yeung-Mintzer fragile watermarking technique.Journal of Electronic Imaging,2002,11(2):262-274

二级参考文献74

  • 1Honsinger C.W., Jones P., Rabbani M., Stoffel J.C.. Lossless recovery of an original image containing embedded data. U.S. Patent No. 6,278,791, 2001
  • 2Fridrich J., Goljan M., Du R.. Lossless data embedding for all image formats. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 572~583
  • 3Tian J.. Wavelet-based reversible watermarking for authentication. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 679~690
  • 4Holliman M., Memon N.. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000, 9(3): 432~441
  • 5Fridrich J., Goljan M., Memon N.. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262~274
  • 6Wu J., Zhu B., Li S., Lin F.. Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes. In: Proceedings of the IEEE International Conference on Multimedia & Expo (ICME'04), Taiwan, 2004
  • 7Wu J., Zhu B., Li S., Lin F.. New attacks on SARI image authentication system. In:Proceedings of the SPIE,Vol.5306, Security and Watermarking of Multimedia Contents VI, San Jose, California, USA, 2004, 602~609
  • 8Yeung M., Mintzer F.. Invisible watermarking for image verification. Journal of Electronic Imaging, 1998, 7(3): 578~591
  • 9Wu M., Liu B.. Watermarking for image authentication. In: Proceedings of the IEEE International Conference on Image Processing, Chicago, USA, 1998, 2: 437~441
  • 10Memon N., Shende S., Wong P.. On the security of the Yeung-Mintzer authentication watermark. In:Proceedings of the IS&T PICS Symposium, Savannah, Georgia, 1999, 301~306

共引文献97

同被引文献15

  • 1张勇东,唐胜,李锦涛.Secure and Incidental Distortion Tolerant Digital Signature for Image Authentication[J].Journal of Computer Science & Technology,2007,22(4):618-625. 被引量:1
  • 2王婕 孙星明 杨恒伏等.基于RS码的二值图像认证及篡改定位算法.计算机研究与发展,2009,46(1):1-6.
  • 3Kailasanathan C, Naini R S. Image authentication surviving acceptable modifications using statistical measures and K- mean segmentation [C] //Proc of IEEE-EURASIP Workshop on Nonlinear Signal and Image Processing. Los Alamitos, CA: IEEE Computer Society, 2001:1-13.
  • 4Queluz M P. Authentication of digital images and video: Generic models and a new contrihution [J]. Signal Processing: Image Communication, 2001, 16(5): 461-475.
  • 5Lu C S, Liao H Y M. Structural digital signature for image authentication: An incidental distortion resistant scheme [J]. IEEE Trans on Multimedia, 2003, 5(2): 161-173.
  • 6Sun Q, Ye Shuiming, Lin Chingyung, et al. A crypto signature scheme for image authentication over wireless channel [J]. International Journal of Image and Graphics, 2005, 5(1): 135-148.
  • 7Xie L, Arce G R, Graveman R F. Approximate image message authentication codes [J]. IEEE Trans on Multimedia, 2001, 3(2): 242-252.
  • 8Wicker S B, Bhargava V K. Reed-Solomon Codes and Their Applications [M]. New York: John Wiley & Sons, 1999.
  • 9Lin Chuang. Pan Jengshyang.Double-domains-bascd covert communication scheme for a RS-code based multiple description image coding system [C] //Proc of Intelligent Information Hiding and Muhimedia Signal Processing. Los Alamitos, CA: IEEE Computer Society, 2008:687-690.
  • 10He Junfeng, Lin Zhouchen, Wang Lifeng, et al. Delecting Doctored JPEG Images via DCT Coefficient Analysis [M]. Berlin: Spinger, 2006:423-435.

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部