期刊文献+

基于最大意义位(MSB)的图像篡改认证算法

AN MSB-BASED IMAGE JUGGLING AUTHENTICATION ALGORITHM
下载PDF
导出
摘要 提出一种用于图像认证的半脆弱水印算法,该算法能够区分出恶意攻击和一般的图像处理。实验表明该算法能准确确定篡改的具体位置,同时对JPEG压缩等常规的图像操作具有较好的鲁棒性。这种算法以16×16个像素点为分块单位对图像进行分块认证,通过小波变换并采用SHA-256产生认证信息,再通过颜色量化的方法,把认证水印信息嵌入到图像的最大意义位,在水印的嵌入过程中,以块为单位对认证信息进行置乱后再进行嵌入,保证了认证的可靠性和水印的鲁棒性,有一定的抗攻击能力。 A semi-fragile watermarking image authentication algorithm is proposed, which is capable of distinguishing hostile attacks and normal image processing. Experiment shows that this algorithm is able to locate accurately the particular position where data is juggled, It also ensures a sound robustness for processing images compressed in common formats such as JPEG. In this algorithm, a block of 16 ×16 pixels is defined as an authentication unit, and authentication information is produced by wavelet transformation and SHA-256. Watermarking informa- tion is embedded into the MSB of an image by color quantization. During the course of embedment, authentication block units are shuffled so as to enhance the reliability of authentication,the robustness of watermarking,and the ability to resist attacking,
出处 《计算机应用与软件》 CSCD 北大核心 2008年第8期45-47,共3页 Computer Applications and Software
基金 国家自然科学基金(60574030) 湖南省教育科学“十一五”规划课题(XJK06CXJ012)
关键词 图像认证 半脆弱水印 篡改检测 颜色量化 小波变换 Image authentication Semi-fragile watermarking Tamper detection Color quantization Wavelet transform
  • 相关文献

参考文献10

  • 1吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70
  • 2Yeung M, Mintzer F. An invisible watermarking technique for image verification[ C ]. Proc. IEEE International Conference on Image Processing, Santa Barbara, USA, 1997,2:680 - 683.
  • 3Wong P, Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification [ J ]. IEEE Transactions on Image Processing,2001,10(10) :1593 -1601.
  • 4Honsinger C W,Jones P, Rabbani M, Stoffel J C. Lossless recovery of an original image containing embedded data[ C]. U. S. Patent,2001 (6) : 278,791.
  • 5Fridrich J, Goljan M, Du R. Lossless data embedding for all image formats[ C ]. Proc. SPIE Photonics West, Vol. 4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California,2002:572 - 583.
  • 6任智斌,隋永新,杨英慧,杨怀江.以图像为载体的最大意义位(MSB)信息隐藏技术的研究[J].光学精密工程,2002,10(2):182-187. 被引量:24
  • 7FIPS 180-2 Secure Hash Standard(SHA),2002.
  • 8陈生潭,侯振华,王虹现.双重认证的变换域图像半脆弱数字水印算法[J].计算机辅助设计与图形学学报,2005,17(5):1114-1119. 被引量:10
  • 9孙圣和,陆哲吸,牛夏牧.数字水印技术及其应用[M].北京:科学出版社,2005.
  • 10Fridrich J, Goljan M, Memon N. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique [ J ]. Journal of Electronic Imaging, 2002,11 (2) :262 - 274.

二级参考文献74

  • 1Honsinger C.W., Jones P., Rabbani M., Stoffel J.C.. Lossless recovery of an original image containing embedded data. U.S. Patent No. 6,278,791, 2001
  • 2Fridrich J., Goljan M., Du R.. Lossless data embedding for all image formats. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 572~583
  • 3Tian J.. Wavelet-based reversible watermarking for authentication. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 679~690
  • 4Holliman M., Memon N.. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000, 9(3): 432~441
  • 5Fridrich J., Goljan M., Memon N.. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262~274
  • 6Wu J., Zhu B., Li S., Lin F.. Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes. In: Proceedings of the IEEE International Conference on Multimedia & Expo (ICME'04), Taiwan, 2004
  • 7Wu J., Zhu B., Li S., Lin F.. New attacks on SARI image authentication system. In:Proceedings of the SPIE,Vol.5306, Security and Watermarking of Multimedia Contents VI, San Jose, California, USA, 2004, 602~609
  • 8Yeung M., Mintzer F.. Invisible watermarking for image verification. Journal of Electronic Imaging, 1998, 7(3): 578~591
  • 9Wu M., Liu B.. Watermarking for image authentication. In: Proceedings of the IEEE International Conference on Image Processing, Chicago, USA, 1998, 2: 437~441
  • 10Memon N., Shende S., Wong P.. On the security of the Yeung-Mintzer authentication watermark. In:Proceedings of the IS&T PICS Symposium, Savannah, Georgia, 1999, 301~306

共引文献97

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部