期刊文献+

基于图像特征和公钥密码系统的易损水印算法 被引量:3

Fragile watermarking for image authentication based on image feature and public key cryptography
下载PDF
导出
摘要 提出一种基于图像特征和公钥密码系统的易损水印算法,在图像认证中能够定位图像被篡改的位置。水印算法根据图像特征和私钥信息,将用于完整性验证和局部篡改检测的图标嵌入到图像中。水印提取过程中使用与嵌入过程中私钥相对应的公钥提取水印信息。该算法不仅能解决现有易损水印算法存在的安全问题,而且在不需要交换密钥的情况下允许水印的公共检测,可用于数码相机、互联网图像的真实性认证。最后,通过理论分析和实验论证该算法的有效性。 A new invisible watermarking technique which could localize tampered areas for image authentication was proposed, based on image feature and public key cryptography. According to image feature and secret key a logo was embedded as watermark for the integrity verification and localized tamper detection. The watermark extraction used a public key corresponding to the private key in embedding procedure. The new scheme not only resolves the security problem of most existing scheme to this day, but also permits public detection of the watermark by any person without the exchange of a secret key, which is very important in many applications such as trusted camera and Web image authentication. Theoretical analysis and experiment results demonstrate its outstanding performance.
出处 《计算机应用》 CSCD 北大核心 2006年第1期90-92,共3页 journal of Computer Applications
关键词 易损水印 图像特征 公钥密码体制 fragile watermarking image feature public key cryptography
  • 相关文献

参考文献8

  • 1VAN SCHYNDEL RG, TIRKEL AZ, OSBORNE CF. A digital watermark[A]. Proceedings of ICIP'94[C]. 1994,Ⅱ. 86-90.
  • 2WALTON S. Information Authentication for a Slippery New Age[j].Dr. Dobbs Journal, 1995, 20(4):18-26.
  • 3YEUNG M, MINTER F. An Invisible Watermarking Technique for Image Verification[A]. Proceeding of ICIP'97[C]. Santa Barbara,California, 1997.
  • 4FRIDRICH J, GOLJAN M, MEMON N. Further Attacks on Yeung-Mintzer Watermarking Scheme[A]. Proceeding of SPIE Electronic Imaging 2000[C]. San Jose, 2000.
  • 5MEMON N, SHENDE S, WONG P. On the security of the Yeung-Mintzer Authentication Watermark[A]. Proceeding of the IS & TPICS, Savannah[C]. Georgia, 1999.
  • 6HOLLIMAN M, MEMON N. Counterfeiting attacks for block-wise independent watermarking techniques[J]. IEEE Transactions on Image Processing, 2000, 9(3).
  • 7ZHONG H, LIU F, JIAO L. A New Fragile Watermarking Technique for Image Authentication[A]. Proceeding of Inter. Conf. on Signal Processing[C]. 2002. 792-795.
  • 8FRIDRICH J. Security of Fragile Authentication Watermarks with Localization[A]. SPIE Photonie West[C]. San Jose, CA, 2002.691 -700.

同被引文献19

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部