期刊文献+

一种基于混沌Hash函数的脆弱水印算法

Novel fragile watermarking scheme based on chaotic hash function
下载PDF
导出
摘要 针对现有分块脆弱水印的缺陷,提出了一种基于混沌Hash函数的脆弱水印算法。该方案通过将原始图像分块后做混沌Hash,生成原始图像的摘要,与由混沌映射生成的混沌二值图像异或后生成二值脆弱水印,置乱加密后嵌入原始图像的LSB平面;认证时通过差值图像定位篡改的区域。理论分析和实验仿真表明提出的水印算法不可见性好,能够有效抵抗VQ攻击,并能够区分篡改的类型,安全性高。 Aiming at the bug of current block based fragile watermarking scheme,a novel fragile watermarking scheme based on chaotic hash function is proposed in this paper.Firstly chaotic hash function is implemented on each image block to generate binary image,then XOR the binary image with the chaotic binary image generated by chaotic system to attain binary fragile watermark,after being scrambled,the binary fragile watermark is embedded into LSB plane of original image;difference image is used to realize authentication.Theoretical analysis and experimental results show the proposed scheme has good invisibility,and ability of resisting VQ attack,differentiating the tamper type,even the super security.
作者 杨超 何小海
出处 《计算机工程与应用》 CSCD 北大核心 2008年第17期74-77,共4页 Computer Engineering and Applications
基金 四川省科技公关计划( the Key Technologies R&D Program of Sichuan Province China under Grant No.05GGG021- 026- 03)
关键词 脆弱水印 混沌Hash函数 VQ攻击 混沌 fragile watermarking chaotic hash function VQ attack chaos
  • 相关文献

参考文献2

二级参考文献24

  • 1张家树,田蕾.一种新的基于密钥的混沌数字水印方法[J].通信学报,2004,25(8):96-101. 被引量:15
  • 2R G van Schyndel,A Z Tirkel,C F Osborne.A digital watermark.Proc.of the IEEE Int.Conf.on Image Processing,1994,2:86- 90.
  • 3R B Wolfgang,E J Delp.Fragile watermarking using the VW2D watermark.Proc.SPIE,Security and Watermarking of Multimedia Contents.California:San Jose,1999.204-213.
  • 4S Walton.Information authentication for a slippery new age.Dr.Dobbs Journal,1995,20(4):18-26.
  • 5P Wong.A watermark for image integrity and ownership verification.Proc.IS & T PIC.Portland:Oregon,1998.
  • 6M Yeung,F Mintzer.An invisible watermarking technique for image verification.Proc.ICIP' 97.California:Santa Barbara,1997.
  • 7Jiri Fridrich,M Goljan,N Memon.Further attacks on yeung-mintzer fragile watermarking scheme.Proc.SPIE Photonic West,Electronic Imaging 2000,Security and Watermarking of Multimedia Contents.California:San Jose,2000.
  • 8M Holliman,N Memon.Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes.IEEE Trans.on Image Processing,2001,9(3):432-441.
  • 9Jiri Fridrich,Miroslav Goljan,Arnold C Baldoza.New fragile authentication watermark for images.ICIP' 2000.Canada:Vancouver,2000.
  • 10S C Byun,I L Lee,T H Shin,B HAhn.A public key based watermarking for color image authentication.Proc.of ICASSP.2002.

共引文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部