期刊文献+

基于公钥和脆弱水印的图像认证算法 被引量:8

An Image Authentication Scheme Based on Public Key and Fragile Watermarking
下载PDF
导出
摘要 本文提出一种基于公钥和小波域脆弱水印的图像完整性认证的算法。该算法不但能够检测和定位窜改,而且能同时验证图像的所有权。该水印方案为盲水印,检测过程不需要原始图像和附加信息。由于该认证算法建立在密码学方法的基础上,因此它是单向、不可逆的,未授权者很难伪造或修改原有的水印。文中分析了针对逐块独立的一类水印算法的"矢量量化攻击",提出了认证链等对抗措施。理论分析和实验结果表明,本文算法具有较好的性质和较高的安全性。 In this paper, we propose an image authentication scheme based on public key and fragile watermarking in wavelet domain for ownership verification and authentication on integrity of image. The scheme is not only able to detect minus modification made to the image and meanwhile indicate the specific location that have been modified, but also can check for the owner of the image according to the user key used in the verification process. The scheme is a blind watermark, and the original image or any other information is not necessary in the process of verification. Since the algorithm is based on the security of the cryptographic function,and requires a user key during both the insertion and the extraction procedures ,it is not possible for an unauthorized user to forge a watermark or alter the existing watermark so that the resulting will pass the test.
作者 张鸿宾 杨成
出处 《计算机科学》 CSCD 北大核心 2004年第11期218-221,共4页 Computer Science
基金 国家自然科学基金 北京市自然科学基金 863计划 北京市教委科技发展计划的资助
关键词 脆弱水印 水印算法 公钥 图像认证 图像完整性 盲水印 攻击 矢量量化 密码学 对抗措施 Multimedia authentication,Digital watermarking,Wavelet transform,Hash function,RSA public key encryption
  • 相关文献

参考文献17

  • 1Lin E T, Delp E J. A review of fragile image watermarks. In: Proc.of the Multimedia and Security Workshop(ACM Multimedia′99),Orlando,1999.25-29
  • 2Walton S. Information authentication for a slippery new age. Dr.Dobbs Journal, 1995,20(4): 18-26
  • 3Yeung M, Mintzer F. Invisible watermarking for image verification. Journal of Electronic Imaging, 1998,7 (3): 578-591
  • 4Wolfgang R B,Delp E J. A watermark for digital images. In:Proc.IEEE Int. Conf. on Image Processing, 1996,3:219-222
  • 5van Schynael R, Tirkel A,Osborce C. A digital watermark. In:Proc. of the IEEE ICIP,Austin,Texas, Nov. 1994,2: 86-90
  • 6Wolfgang R B,Delp E J. Fragile watermarking using the VW2Dwatermark. Proc. SPIE,Security and Watermarking of Multimedia Contents, pp. 204-213, San Jose, California, Jan 25-27,1999
  • 7Wong P W. A watermark for image integrity and ownership verification. In: Proc. IS&T PIC Conf. Porland,OR,May 1998
  • 8Wong P W. A public key watermark for image verification and authentication. In: Proc. ICIP, Chicago, IL,Oct. 1998
  • 9Wong P W,Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans on Image Processing,2001,10(10) :1593-1601
  • 10Wu M, Liu B. Watermarking for image authentication. In: Proc.ICIP, Chicago, IL, Oct. 1998

同被引文献97

引证文献8

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部