期刊文献+

一种基于可逆数字水印的图像认证方案 被引量:3

AN IMAGE AUTHENTICATION SCHEME BASED ON REVERSIBLE WATERMARKING
下载PDF
导出
摘要 针对医疗图像、遥感图像等敏感数字图像在认证水印的嵌入过程中不能引入失真的特点,提出一种基于可逆数字水印的图像完整性认证方案:首先提取图像特征,将其作为hash函数的输入;再用图像发送者的私钥对hash值进行数字签名;最后将数字签名作为水印数据,利用图像相邻像素点差值直方图的特征,轻微改变图像像素点的灰度值来可逆嵌入水印数据。方案实现简单,水印嵌入后图像失真小,认证通过后还可以完全恢复原始图像。理论和实验证明水印嵌入后,PSNR值能达到51.14dB以上。 Aiming at the characteristic that some sensitive digital images(such as medical images and remote sensing images,etc.) can not bring in distortion in the process of authenticating watermark embedding,this paper proposes a new image integrity authentication scheme based on reversible digital watermarking.First,the image features are extracted and used as the input of hash function,then the hash value is signed in digital form using the private key of image sender to form crypto signature,finally,the digital signature is employed as the watermark data,and the feature of difference histogram of image's adjacent pixel points is utilised to slightly alter the grey degree value of the image pixel points to reversibly embed watermark data.The proposed scheme is quite simple and the execution time is short.Moreover,the distortion of image is quite small when the watermark is embedded and the original image can be completely restored after the authentication.It is proved theoretically and experimentally that the lower bound of PSNR(peak-signal-to-noise-ratio) of watermarked images can achieve 51.14dB after the watermark has been embedded.
出处 《计算机应用与软件》 CSCD 2010年第4期120-121,179,共3页 Computer Applications and Software
基金 河北省科技厅基金项目(05213579)
关键词 图像认证 可逆数字水印 完整性认证 Image authentication Reversible watermarking Integrity verification
  • 相关文献

参考文献8

  • 1Zhu B B,Swanson M D,Tewfik A H.When seeing isn't believing[J].IEEE Signal Processing Magazine,2004,21(2):40-49.
  • 2Barton J M.Method and Apparatus for Embedding Authentication Information Within Digital Data:US,5646997[P].1997.
  • 3Fridrich J,Goljan M,Du R.Invertible authentication watermark for JPEG images[C]//Proc.of Information Technology:Coding and Computing.Washington,DC:IEEE Computer Society Press,2001,223-227.
  • 4Tian J.Reversible data embedding using a difference expansion[J].IEEE Transactions on Circuits and Systems for Video Technology,2003,12(8):890-896.
  • 5吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70
  • 6Celik M U,Sharma G,Tekalp A M,et al.Lossless generalized-LSB data embedding[J].IEEE Transactions on Image Processing,2005,14(2):253-266.
  • 7Ni Z,Shi Y Q,Ansari N,et al.Reversible data hiding[J].IEEE Transactions on Circuits and Systems for Video Technology,2006,16(3):354-362.
  • 8贾松浩,杨彩,张海玉,刘晓霞.基于图像哈希签名的数字水印[J].计算机应用与软件,2009,26(1):78-79. 被引量:2

二级参考文献61

  • 1Honsinger C.W., Jones P., Rabbani M., Stoffel J.C.. Lossless recovery of an original image containing embedded data. U.S. Patent No. 6,278,791, 2001
  • 2Fridrich J., Goljan M., Du R.. Lossless data embedding for all image formats. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 572~583
  • 3Tian J.. Wavelet-based reversible watermarking for authentication. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 679~690
  • 4Holliman M., Memon N.. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000, 9(3): 432~441
  • 5Fridrich J., Goljan M., Memon N.. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262~274
  • 6Wu J., Zhu B., Li S., Lin F.. Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes. In: Proceedings of the IEEE International Conference on Multimedia & Expo (ICME'04), Taiwan, 2004
  • 7Wu J., Zhu B., Li S., Lin F.. New attacks on SARI image authentication system. In:Proceedings of the SPIE,Vol.5306, Security and Watermarking of Multimedia Contents VI, San Jose, California, USA, 2004, 602~609
  • 8Yeung M., Mintzer F.. Invisible watermarking for image verification. Journal of Electronic Imaging, 1998, 7(3): 578~591
  • 9Wu M., Liu B.. Watermarking for image authentication. In: Proceedings of the IEEE International Conference on Image Processing, Chicago, USA, 1998, 2: 437~441
  • 10Memon N., Shende S., Wong P.. On the security of the Yeung-Mintzer authentication watermark. In:Proceedings of the IS&T PICS Symposium, Savannah, Georgia, 1999, 301~306

共引文献70

同被引文献28

  • 1Celik M U, Sharma G, Tekalp A M, et al. Lossless Generalized-LSB Data Embedding[ J]. IEEE Transactions on Image Processing, 2005,14 ( 2 ) : 253-266.
  • 2Tian J. Reversible Data Embedding Using a Difference Expansion [ J ]. IEEE Transaction on Circuits and Systems for Video Technology ,2003,13 ( 8 ) : 890-896.
  • 3Alattar A M. Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform [ J ]. IEEE Transactions on Image Processing, 2004, 13 ( 8 ) : 1147-1156.
  • 4Thodi D M, Rodriguez J J. Expansion Embedding Techniques for Reversible Watermarking [ J]. IEEE Transactions on Image Processing ,2007,16( 3 ) :721-730.
  • 5Ni Z, Shi Y Q, Ansari N, et al. Reversible Data Hiding [J]. IEEE Transaction on Circuits and Systems for Video Technolozv, 2006,16 ( 3 ) : 354-362.
  • 6Tai W L, Yeh C M, Chang C C. Reversible Data Hiding Based on Histogram Modification of Pixel Differences [ J ]. IEEE Transactions on Circuits and Systems for Video Technology ,2009,19(6) :906-910.
  • 7Luo L, Chen Z, Chen M, et al. Reversible Image Watermarking Using Interpolation Technique [ J ]. IEEE Transactions on Information Forensics and Security, 2010,5(1) :187-193.
  • 8Li Xiaolong, Li Bin, Yang Bin, et al. General Framework to Histogram-shifting-based Reversible Data Hiding[ J]. IEEE Transactions on Image Processing, 2013,22 ( 6 ) : 2181-2191.
  • 9任洪娥,常春武,张健.基于相邻两像素差值的无损数据隐藏算法[J].计算机工程与设计,2009,30(16):3897-3899. 被引量:7
  • 10蔡少杰,林亚平,易叶青,叶松涛.无线传感器网络基于分组协商的数字水印算法[J].计算机应用,2010,30(3):688-691. 被引量:3

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部