期刊文献+

一种脆弱图像水印的安全性分析与改进 被引量:3

Security analysis and improvement on a fragile image watermarking
下载PDF
导出
摘要 分析了一种用于图像篡改检测和恢复的脆弱数字水印算法的安全性。该算法将图像划分为互不重叠的分块,通过均值比较及校验,产生各分块的认证水印,并嵌入到各自分块中。同时,在各分块中嵌入另一个分块的恢复信息,使得算法既能抵抗矢量量化攻击,又可以在某些分块被篡改时,予以一定程度的恢复。指出由于该算法生成和嵌入水印的方式过于简单,且其嵌入水印的密钥空间过小,能够通过穷举搜索轻易地发现所使用的密钥。因而能够伪造水印,导致错误认证。通过对于嵌入的水印进行混沌调制和置乱,并扩展密钥空间,有效地改进了算法的安全性。 The security of a fragile digital watermarking scheme for image tamper detection and recovery is analyzed. The watermarking scheme divides an image into non-overlapping blocks, generates the authentication watermark for the blocks with comparison and parity check between the average intensities and embeds them into their own blocks. Also, the recovery information of another block is embedded into each block, which makes the scheme can resist an vector quantization (VQ) attack, while recover the image to a certain degree when some blocks are tampered. It is indicated that since the method for watermark generation and embedding is too simple, while the key space for watermark embedding is too small, the watermark embedding key can he obtained easily with exhaustive searches. Therefore, one may counterfeit watermark and lead incorrect authentication. The security of the scheme is effectively improved by using chaotic modulation and permutation to the em bedded watermark and making a expansion for the key space.
出处 《系统工程与电子技术》 EI CSCD 北大核心 2009年第5期1204-1208,共5页 Systems Engineering and Electronics
基金 重庆市科委自然科学基金(2006BB2012) 广东省教育部产学研结合项目(2007B090400121)资助课题
关键词 脆弱水印 安全性 调制 置乱 密钥空间 篡改检测 篡改恢复 fragile watermarking security modulation permutation key space tamper detection tamper recovery
  • 相关文献

参考文献19

  • 1Zhu B B, Swanson M D, Tewfik A H. When seeing isn't believing multimedia authentication technologies[J]. IEEE Signal Processing Magazine, 2004, 3: 40-49.
  • 2Wong P W. A public key watermark for image verification and authentication[C]//Proc. of the IEEE International Conference on Image Processing, Chicago, IL, 1998:455 - 459.
  • 3Holliman M, Memon N. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes[J].IEEE Trans. on Image Process, 2000, 9(3): 432-441.
  • 4Fridrich J, Goljan M, Baldoza A C. New fragile authentication watermark for images[C]//Proc, of the IEEE International Conference on Image Processing, Vancouver, BC, Canada, 2000:10-13.
  • 5Celik M U, Sharma G, Saber E, et al. Hierarchical watermark ing for secure image authentication with localization[J].IEEE Trans. on Image Process. , 2002, 11(6):585 - 594.
  • 6Fridrich J, Goljan M. Images with self-correcting capabilities[C]// Proc. of the IEEE International Conference on Image Processing, Kobe, Japan, 1999, 3: 792-796.
  • 7张鸿宾,杨成.图像的自嵌入及窜改的检测和恢复算法[J].电子学报,2004,32(2):196-199. 被引量:49
  • 8和红杰,张家树.基于混沌置乱的分块自嵌入水印算法[J].通信学报,2006,27(7):80-86. 被引量:33
  • 9钱振兴,程义民,王以孝,田源.一种图像自嵌入方法[J].电子学报,2006,34(7):1347-1350. 被引量:12
  • 10Yeh F H, Lee G C. Toral fragile watermarking for localizing and recovering tampered image [C]// Proc. of International Symposium on Intelligent Signal Processing and Communica tion Systems, 2005:321-324.

二级参考文献44

  • 1张家树,田蕾.一种新的基于密钥的混沌数字水印方法[J].通信学报,2004,25(8):96-101. 被引量:15
  • 2程义民,钱振兴,王以孝,田源.基于数位信息的信息隐藏方法[J].电子与信息学报,2005,27(8):1304-1309. 被引量:15
  • 3和红杰,张家树,田蕾.能区分图像或水印篡改的脆弱水印方案[J].电子学报,2005,33(9):1557-1561. 被引量:24
  • 4[1]Lin E T,Delp E J.A review of fragile image watermarks [A].Proc.of the Multimedia and Security Workshop (ACM Multimedia'99) [C].Orlando,1999.25-29.
  • 5[2]Walton S.Information authentication for a slippery new age [J].Dr.Dobbs Journal,1995,20(4):18-26.
  • 6[3]Yeung M,Mintzer F.Invisible watermarking for image verification [J].Journal of Electronic Imaging,1998,7(3):578-591.
  • 7[4]Wolfgang R B,Delp E J.A watermark for digital images [A].Proc.IEEE Int.Conf.on Image Processing [C].ACM Press,NY,1996.3.219-222.
  • 8[5]Schynael R van,Tirkel A,Osborce C.A digital watermark [A].Proc.of the IEEE ICIP [C].Austin,Texas,1994.2.86-90.
  • 9[6]Wolfgang R B,Delp E J.Fragile watermarking using the VW2D watermark [A].Proc.SPIE,Security and Watermarking of Multimedia Contents [C].San Jose,California,1999.204-213.
  • 10[7]Wong P W.A watermark for image integrity and ownership verification [A].Proc.IS&T PIC Conf.[C].Porland,OR,1998.

共引文献78

同被引文献20

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部