期刊文献+

一种基于非对称水印的图像认证改进算法研究

RESEARCH ON AN IMPROVED IMAGE AUTHENTICATION ALGORITHM BASED ON ASYMMETRIC WATERMARK
下载PDF
导出
摘要 提出一种基于非对称水印的图像认证改进算法,算法中将经过BCH编码和混沌序列调制的认证信息作为水印,利用所有者私钥嵌入图像DCT域,嵌入过程根据DCT块的可视噪声阈值(JND)控制,用户可以利用公钥从水印图像中提取认证信息,但无法从公钥中获取任何私钥信息,从而无法破坏或删除水印。实验结果表明:改进算法中水印图像的PSNR值相比原算法增大4.4dB,并且对常见的基于图像处理的攻击,鲁棒性大大提高。 An improved image authentication algorithm based on asymmetric watermark is proposed. The BCH coded authentication data is modulated by chaotic sequence and then embedded into the DCT domain of the image by using the owner's private key. The embedding process is controlled by Just Noticeable Difference (JND) of the DCT block. Users can extract the authentication data with the public key ,while they can't get the private key to destroy or delete the watermark through the public key. The result of the experiment shows that the embedded image's PSNR value of the improved algorithm, is 4.4dB bigger than that of the original algorithm, and the robustness of the improved algorithm against the common image process is increased greatly.
出处 《计算机应用与软件》 CSCD 北大核心 2007年第10期19-21,共3页 Computer Applications and Software
基金 国家高技术研究发展计划(863)重大项目(2005AA145110 2002AA145090)。
关键词 非对称水印 版权认证 人类视觉系统 BCH编码 Asymmetric watermark Copyright authentication Human vision system BCH code
  • 相关文献

参考文献7

  • 1Hartung F,Girod B.Fast public-key watermarking of compressed video.Proceedings of the IEEE International Conference on Image Processing,1997,1:528-531.
  • 2Schyndel RGV,Tirkel AZ,Svalbe ID.Key independent watermark detection.IEEE International Conference on Multimedia Computing and Systems,1999,1:580-585.
  • 3Eggers JJ,Su JK,Girod B.Public key watermarking by eigenvectors of linear transforms.Proceedings of the European Signal Processing Conference 2000.(EUSIPCO 2000).
  • 4Linnartz JPMG,Talstra JC.MPEG PTY-marks:Cheap detection of embedded copyright data in DVD-video.Computer Security-ESORICS 98,5th European Symposium on Research in Computer Security,1998:221-240.
  • 5孙鑫,易开祥,石教英,费敏锐.公开钥数字水印系统研究[J].计算机辅助设计与图形学学报,2003,15(7):875-879. 被引量:10
  • 6钟桦,焦李成,刘芳.一种新颖的水印密钥系统[J].软件学报,2001,12(9):1304-1311. 被引量:3
  • 7曹卫兵,戴冠中,夏煜,慕德俊.一种自适应图像隐藏方法[J].计算机应用研究,2003,20(11):158-160. 被引量:1

二级参考文献18

  • 1钟声.图象压缩技术及其应用[J].电子学报,1995,23(10):117-123. 被引量:13
  • 2Johnson N F, Jajodia S. Exploring Steganography-seeing the Unseen[ J ]. IEEE Computer, 1998,31 (2) : 26-34.
  • 3W Bender, D Gmhl, et al. Techniques for Data Hiding[ J ]. IBM System Journal, 1996,35(3&4) : 313-336.
  • 4Christine I Podilchuk, Wenjun Zeng. Image-Adaptive Watermarking Using Visual Models[J]. IEEE Journal on Selected Areas in Communications, 1998,16(4) : 525-540.
  • 5Hsu Chiouting,IEEE Trans Image Processing,1999年,8卷,1期,58页
  • 6Podilchuk C I,IEEE J Select Areas Commun,1998年,16卷,4期,525页
  • 7Swanson M D,IEEE J Select Areas Commun,1998年,16卷,4期,540页
  • 8Watson A B,IEEE Trans Image Processing,1997年,6卷,8期,1164页
  • 9Yin Kangkang. Research on multimedia digital watermarking system[D]. Hangzhou: Zhejiang University. 2001(in Chinese)(尹康康 . 多媒体数据数字水印技术研究 . [硕士学位论文] . 杭州: 浙江大学, 2001)
  • 10Hartung F, Liu B. Fast public key watermarking of compressed video[A]. In: Proceedings of International Conference of Image Process, Chicago, 1997. 528~531

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部