期刊文献+

双重身份认证方法的设计与实现 被引量:2

Design and Realization of Dual Authentication
下载PDF
导出
摘要 数字水印作为一种新型的信息隐藏技术而成为目前业界研究的热点。该文从数字水印、指纹识别等技术相结合的角度,利用数字水印的隐藏性和指纹识别的唯一性,提出了一种网络身份认证的新模型,实现了用户身份的双重认证,使得网上商业行为、资源访问等活动有了安全保障。依据此模型,详细描述了基于奇异值分解的数字水印算法,并介绍了指纹识别的过程。实验表明,该文所提出的数字水印算法在抵抗各种常规数据处理和攻击(如嵌入强度、高斯噪声、JPEG压缩、滤波、裁剪等)方面具有良好的性能。 As a new type of information - concealing technology, digital watermarking has become a focus of research in the industry. In light of the combination of the technologies of watermarking and fingerprint identification, and taking advantage of the invisibility of watermarking and the uniqueness of fingerprint identification, this thesis puts forward a new model of network authentication, thus realizing the dual authentication of users' identification. In this way, online commercial practices and resources visiting are secured. According to this model, this thesis describes in detail watermarking algorithm based on singular value decomposition and the process of fingerprint identification. Experimental results show that watermarking algorithm works well in dealing with various kinds of regular data processing and attack (such as embed intensity, Gaussian noise, JPEG - compression, filtering, cropping).
作者 谢勍 李丽娟
出处 《计算机仿真》 CSCD 2005年第6期102-104,167,共4页 Computer Simulation
关键词 身份认证 数字水印 奇异值分解 Authentication Watermarking Singular value decomposition
  • 相关文献

参考文献3

二级参考文献20

  • 1[1]Arnold M.. Audio watermarking: features, applications and algorithms. In: Proceedings of IEEE International Conference on Multimedia & Expo, New York, USA, 2000, 2:1013~1016
  • 2[2]Swanson M.D., Bin Zhu, Tewfik A.H.. Current state of the art, challenges and future directions for audio watermarking. In:Proceedings of IEEE International Conference on Multimedia Computing and Systems, Florence, Italy,1999, 1:19~24
  • 3[4]Gerzon M.A., Graven P.G.. A high-rate buried-data channel for audio CD. Journal of the Audio Engineering Society, 1995, 43(1~2):3~22
  • 4[5]Gruhl D., Lu A., Bender W.. Echo hiding. In:Anderson R.J. ed.. Proceedings of the 1st Information Hiding Workshop. LNCS 1174, Berlin: Germany Springer-Verlag, 1996, 295~315
  • 5[6]Bender W., Gruhl D., Morimoto N.. Techniques for data hiding. IBM Systems Journal, 1996, 35(3~4):313~336
  • 6[7]Yeo Kwon, Kim H.J.. Modified patchwork algorithm: A novel audio watermarking scheme. IEEE Transactions on Speech and Audio Processing, 11(6):381~386
  • 7[8]Huang Ji-Wu, Wang Yong, Shi Y.Q.. A blind audio watermarking algorithm with self-synchronization. In:Proceedings of IEEE International Symposium on Circuits and Systems, Arizona, USA,2002, 3:627~630
  • 8[9]Lee Sang-Kwang, Ho Yo-Sung.. Digital audio watermarking in the cepstrum domain. IEEE Transactions on Consumer Electronics, 2000, 46(3):744~750
  • 9[10]Bassia P., Pitas I., Nikolaidis N.. Robust audio watermarking in the time domain. IEEE Transactions on Multimedia, 2001, 3(2):232~241
  • 10[11]Ko Byeong-Seob, Nishimura R., Suzuki Y.. Time-spread echo method for digital audio watermarking using pn sequences. In:Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, Florida,USA,2002, 2: 2001~2004

共引文献281

同被引文献23

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部