期刊文献+

一种篡改检测与篡改定位分离的图像认证方案 被引量:13

An Image Authentication Scheme Separating Tamper Detection from Tamper Location
下载PDF
导出
摘要 针对脆弱水印认证算法的篡改定位精度及安全性问题,提出了一种将篡改检测和定位分离的图像认证方案:对图像进行单像素置乱并将其低两位置零,采用像素关联技术生成各个像素的篡改定位水印,并将其嵌入到自身的次低位;将图像逆置乱后并进行分块,生成各个分块的篡改检测水印,将篡改检测水印嵌入到各像素的最低位,进而生成含水印图像.理论分析和实验结果表明:该方案可以抵抗目前针对单像素认证算法的Oracle攻击及针对分块算法的量化攻击,在保证系统安全性的同时可将篡改定位到单个像素. An image authentication scheme is proposed to locate tampered area on the watermarked image and improve the security of existing watermarking algorithms. In this scheme, the original image is permuted in pixel-level and the Hypo-LSB and LSB of each pixel are set to zero, the location watermark is embedded into the Hypo-LSB of each pixel, then, the image is inversely permuted and divided into blocks, afterwards, the detection watermark of each block is embedded into its LSB. Theoretical analysis and simulation results show that the proposed algorithm can not only resists all kinds of attacks including Oracle and VQ attack, but also locate tampered area in pixel-level accurately as well as ensure the security.
出处 《计算机学报》 EI CSCD 北大核心 2007年第10期1880-1888,共9页 Chinese Journal of Computers
基金 国家"八六三"高技术研究发展计划项目基金(2006AA01Z409) 河南省科技攻关项目基金(0623021500)等资助.~~
关键词 脆弱水印 篡改检测 篡改定位 Oracle攻击 量化攻击 fragile watermarking tamper detection tamper location Oracle attack vector quantization attack
  • 相关文献

参考文献15

  • 1Zhu B B,Swanson M D,Tewfik A H.When seeing isn't believing.IEEE Signal Processing Magazine,2004,21(2):40-49.
  • 2Walton S.Image authentication for a slippery new age.Dr.Dobb's Journal,1995,20(4):18-26.
  • 3Yeung M,Mintzer F.An invisible watermarking technique for image verification//Proceedings of the IEEE International Conference on Image Processing.Santa Barbara,USA,1997,2:680-683.
  • 4Fridrich J.Security of fragile authentication watermarks with localization//Proceedings of the SPIE:Security and Watermarking of Multimedia Contents Ⅳ.San Jose,California,2002,4675:691-700.
  • 5Wong P W.A public key watermark for image verification and authentication//Proceedings of the IEEE International Conference on Image Processing.Chicago,USA,1998,1:455-459.
  • 6Holliman M,Memon N.Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes.IEEE Transactions on Image Processing,2000,9 (3):432-441.
  • 7Wong P W,Memon N.Secret and public key image watermarking schemes for image authentication and ownership verification.IEEE Transactions on Image Processing,2001,10(10):1593-1601.
  • 8Celik M U,Sharma G.Hierarchical watermarking for secure image authentication with localization.IEEE Transactions on Image Processing,2002,11(6):585-595.
  • 9Ouda A H,El-Sakka M R.Localization and security enhancement of block-hased image authentication//Proceedings of the IEEE International Conference on Image Processing (ICIP'2005).Genova,Italy,2005,1:673-676.
  • 10张宪海,杨永田.基于脆弱水印的图像认证算法研究[J].电子学报,2007,35(1):34-39. 被引量:35

二级参考文献78

  • 1吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70
  • 2刘镔,张永强,刘粉林.一种新的数字化混沌扰动方案[J].计算机科学,2005,32(4):71-74. 被引量:14
  • 3周红,凌燮亭.有限精度混沌系统的m序列扰动实现[J].电子学报,1997,25(7):95-97. 被引量:99
  • 4Honsinger C.W., Jones P., Rabbani M., Stoffel J.C.. Lossless recovery of an original image containing embedded data. U.S. Patent No. 6,278,791, 2001
  • 5Fridrich J., Goljan M., Du R.. Lossless data embedding for all image formats. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 572~583
  • 6Tian J.. Wavelet-based reversible watermarking for authentication. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 679~690
  • 7Holliman M., Memon N.. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000, 9(3): 432~441
  • 8Fridrich J., Goljan M., Memon N.. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262~274
  • 9Wu J., Zhu B., Li S., Lin F.. Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes. In: Proceedings of the IEEE International Conference on Multimedia & Expo (ICME'04), Taiwan, 2004
  • 10Wu J., Zhu B., Li S., Lin F.. New attacks on SARI image authentication system. In:Proceedings of the SPIE,Vol.5306, Security and Watermarking of Multimedia Contents VI, San Jose, California, USA, 2004, 602~609

共引文献118

同被引文献102

引证文献13

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部