期刊文献+

基于Huffman编码的双重脆弱水印算法

Double Fragile Watermarking Algorithm Based on Huffman Encoding
下载PDF
导出
摘要 提出一种基于Huffman编码的双重脆弱水印算法。该算法用Huffman编码来压缩分块图像的第一重脆弱水印,在剩余的位中嵌入另一重脆弱水印。实验结果表明,该算法可以检测出任意像素值的改动、图像大小的改变,并且可以检测出拼贴攻击和基于Hash碰撞的替换攻击。该方法简单、有效、实用、而且更安全。 This paper presents a double fragile watermarking algorithm based on Huffman encoding. In this algorithm, the first watermarking of blocked image is compared with Huffman encoding and another fragile watermarking is embedded in the left bit. It is showed by experiments results that the proposed algorithm can detect any change made to an image, including the change in pixel values and image size, and can detect the 'collage-attack' and the 'substitution-attack' based on Hash collision. The algorithm is simple, effective, utilizable, and more secure.
作者 孔祥增
出处 《计算机与数字工程》 2007年第9期125-127,共3页 Computer & Digital Engineering
基金 福建省自然科学基金项目(编号A0510006)资助
关键词 双重脆弱水印 HUFFMAN编码 拼贴攻击 Hash碰撞 double fragile watermarking,Huffman encoding,collage-attack,Hash collision
  • 相关文献

参考文献8

  • 1P.W.Wong.A public key watermark for image verification and authentication.IEEE Conf.on Image Processing,Chicago,1998,425-429
  • 2M.Yeuag and F.Mintzer.An invisible watermarking technique for image verification.IEEE Conf.on Image Processing,Santa Barbara,CA,1997,680-683
  • 3J.Fridrich.Security of fragile authentication watermarks with localization.SPIE Photonic West,San Jose,CA,2002,691-700
  • 4M.Holliman and N.Memon.Counterfiting attacks on oblivious block-wise independent invisible watermarking schemes.IEEE Trans.On Image Processing,2002,5(9),432-441
  • 5Jessica Fridrich,Miroslav Goljan,Nasir Memon.Cryptanalysis of the Yeung-Minter Fragile Watermarking.Journal of Electronic Imaging,May 2000
  • 6陈生潭,侯振华,王虹现.双重认证的变换域图像半脆弱数字水印算法[J].计算机辅助设计与图形学学报,2005,17(5):1114-1119. 被引量:10
  • 7张秋余,晏燕,余冬梅,柳旭东,伊华伟.DCT域双重图像数字水印算法[J].兰州理工大学学报,2006,32(3):93-96. 被引量:3
  • 8刘建军,武兵.唯一确定Huffman编码的新方法[J].德州学院学报,2006,22(2):77-78. 被引量:3

二级参考文献15

  • 1严蔚敏.数据结构[M].清华大学出版社,2001..
  • 2王育民,梁传甲.信息与编码理论[M].西安:西安电子科技大学出版社,1985.
  • 3Lin C Y, Chang S F. Semi-fragile watermarking for authentication JPEG visual content [A]. In: Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents Ⅱ, San Jose, CA, 2000. 3971:140~151
  • 4Lu Zheming, Liu Chunhe, Xu Dianguo, et al. Semi-fragile image watermarking method based on index constrained vectorquantization [ J ]. IEE Electronics Letters, 2003, 39 (1): 35 ~36
  • 5Lu C S, Liao H Y M. Multipurpose watermarking for image authentication and protection [J ]. IEEE Transactions on Image Processing, 2001, 10(10): 1579~ 1592
  • 6Alexandre H Paquet, Rabab K Ward. Wavelet-based digital watermarking for image authentication [A] . In: IEEE Canadian Conference on Electrical and Computer Engineering, Winnipeg,Manitoba, 2002. 2:879~884
  • 7Yi Kaixiang, Shi Jiaoying. An adaptive 2-Dimension digital watermarking system [A] . In: Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents, San Jose, CA, 2001. 4314:560~566
  • 8Pennebaker W, Mitchell J L. JPEG Still Image Data Compression Standard [M]. van Nostrand Reinhold, Tomson Publishing Inc. 1993
  • 9KATZENBEISSER S,PETITCOLAS F A P.信息隐藏技术:隐写术与数字水印[M].吴秋新等译.北京:人民邮电出版社,2001.
  • 10SPIE.Human Vision,Visual Processing,and Digital Display Ⅳ Meeting[C].CA:San Jose,1993:202-216.

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部