期刊文献+

一种新的基于CRC的文本内容认证方法

A new text content authentication technique based on CRC
下载PDF
导出
摘要 提出了一种基于CRC的文本脆弱水印算法.利用CRC差错检测方法,该算法将要保护的文本按m个文字一个级联分成若干个级联,将每个级联与密钥合成后的位串除以设定的生成多项式,再把6位的余式位串分成三组,作为水印信息嵌入到级联的最后一个文字的RGB的三个分量.提取水印时,将该级联的余式位串求出.如果与提取的水印相同,则认为此级联没有纂改,否则有纂改.该方法检测到纂改的概率为1-1/26m,并且至少能将纂改定位于级联内. A new CRC-based algorithm of fragile text watermarking is proposed. Taking the CRC error detection method, the method divide the protected text into a number of m words cascade strings. Each cascade string and secret key consist a bit string ,which is divided by a set generator polynomial. The residue bit string is divided into 3 groups(6 bits) assigning for RGB 3 components of the last character of the cascade string. The residue bits of the cascade string is also calculated at watermark detection. If residue bits of the character string is the same as the LSBs of the end characters RGB value within the cascade string, there is no tampering. Otherwise, there must be something tampering taken place. Our method can judge whether these cascade strings is falsified or not and locates the falsify in the cascades. Detection probability of the algorithm is 1 - 1/2^6m.
出处 《哈尔滨商业大学学报(自然科学版)》 CAS 2006年第4期84-87,共4页 Journal of Harbin University of Commerce:Natural Sciences Edition
基金 湖南省自然科学基金资助项目(05JJ40101)
关键词 CRC 文本脆弱水印 级联 余式位串 CRC fragile text watermarking cascade string residue bit string
  • 相关文献

参考文献5

二级参考文献104

  • 1Honsinger C.W., Jones P., Rabbani M., Stoffel J.C.. Lossless recovery of an original image containing embedded data. U.S. Patent No. 6,278,791, 2001
  • 2Fridrich J., Goljan M., Du R.. Lossless data embedding for all image formats. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 572~583
  • 3Tian J.. Wavelet-based reversible watermarking for authentication. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 679~690
  • 4Holliman M., Memon N.. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000, 9(3): 432~441
  • 5Fridrich J., Goljan M., Memon N.. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262~274
  • 6Wu J., Zhu B., Li S., Lin F.. Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes. In: Proceedings of the IEEE International Conference on Multimedia & Expo (ICME'04), Taiwan, 2004
  • 7Wu J., Zhu B., Li S., Lin F.. New attacks on SARI image authentication system. In:Proceedings of the SPIE,Vol.5306, Security and Watermarking of Multimedia Contents VI, San Jose, California, USA, 2004, 602~609
  • 8Yeung M., Mintzer F.. Invisible watermarking for image verification. Journal of Electronic Imaging, 1998, 7(3): 578~591
  • 9Wu M., Liu B.. Watermarking for image authentication. In: Proceedings of the IEEE International Conference on Image Processing, Chicago, USA, 1998, 2: 437~441
  • 10Memon N., Shende S., Wong P.. On the security of the Yeung-Mintzer authentication watermark. In:Proceedings of the IS&T PICS Symposium, Savannah, Georgia, 1999, 301~306

共引文献471

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部