期刊文献+

一种基于小波系数和混沌序列的图像认证方法 被引量:1

A Method for Image Authentication Based on Wavelet Coefficients and Chaotic Sequences
下载PDF
导出
摘要 提出了一个新的基于小波系数和混沌序列的图像认证方法.首先对图像进行小波变换,利用混沌序列对低频系数进行编码,然后对编码后的系数进行小波逆变换得到处理后的图像.进而把加密后版权信息插入到图像的LSB,从而保证数字图像的完整性和真实性.实验表明,该算法是一个有效的、实用的图像认证算法. A novel image authentication algorithm was proposed, which was based on wavelet coefficients and chaotic sequences. A wavelet transform was performed on the image, and its low-pass coefficients were coded with chaotic sequences. Then, an inverse transform of the coded coefficients would produce the revised image which could ensure the integrality and authenticity of the image. The experiment proves that this authentication method is very effective and useful.
出处 《河南师范大学学报(自然科学版)》 CAS CSCD 北大核心 2006年第3期33-36,共4页 Journal of Henan Normal University(Natural Science Edition)
基金 福建省教育厅科研基金(JA00423)
关键词 图像认证 混沌序列 小波 image authentication chaotic sequences wavelet
  • 相关文献

参考文献4

  • 1Wong P W,Memon N.A public key watermark for image verification and authentication[C].Proceedings of the IEEE International Conference on Image Processing,Chicago,1998.
  • 2Memon N,Vora P,Yeo B L,et al.Distortion bounded authentication techniques[A].In:Proceedings of the SPIE,Security and Watermarking of Multimedia Contents II[C].USA:San Jose,2000:164-174.
  • 3沃焱,韩国强,张波.一种新的基于特征的图像内容认证方法[J].计算机学报,2005,28(1):105-112. 被引量:32
  • 4孙鑫,易开祥,孙优贤.基于混沌系统的图像加密算法[J].计算机辅助设计与图形学学报,2002,14(2):136-139. 被引量:116

二级参考文献14

  • 1李宇寰.组合数学[M].北京:北京师范学院出版社,1998..
  • 2Wong P.W.,Memon N..A public key watermark for imag everification and authentication.In:Proceedings of the IEEE International Conference on Image Processing,Chicago,1998,1: 455-459.
  • 3Memon N.,Vora P.,Yeo B.L.,Yeung M..Distortion bounded authentication techniques.In:Proceedings of the SPIE,Security and Watermarking of Multimedia Contents II,San Jose,USA,2000,397l:164-174.
  • 4Quelue M.P..Towards robust,content based techniques forimage authentication. In: Proceedings of the IEEE 2nd Workshop on Multimedia Signal Processing,Redondo Beach,1998,297-302.
  • 5Rey C.'Dugelay J.L..Blind detection of malicious alterations on still image using robust watermarks.In:IEE Seminar on Secure Images and Image Authentication.London,2000,7/1-7/6.
  • 6Xie Lie-Hua, Arce G.R.. A class of authentication digital Watermarks for secure multimedia communication.IEEEtransactions on Image Processing,2001,10(11):1754-1764.
  • 7Mallat S..Zhong S.Charactedzation of signals from multiscale edges.IEEE Transactions on Pattern Analysis and Machine Intelligence,1992,14(7):710-732.
  • 8Mallat S..A Wavelet Tour of Signal Processing.Second Edition.Beijing;China Machine Press'2002.
  • 9Zhang Lei,Bao Paul.Edge detection by scale multiplication in wavelet domain.Pattern Recognition Letters,2002,23(12):1771-1784.
  • 10Rivest R.L..The MD5 message digest algorithm.MIT Laboratory for Computer Science and RSA Data Security,Internet Engineering Task Force(IETF),RFC 1321,1992,37.

共引文献143

同被引文献9

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部