期刊文献+

用于内容精确认证的脆弱水印方案 被引量:1

Fragile Watermarking Scheme Used in Content Features Complete Authentication
下载PDF
导出
摘要 为验证图像在处理过程中是否被篡改,研究了用于内容精确认证的水印方案。通过对应用要求的分析,构建了一个满足这些要求的水印嵌入过程所遵循的一般性协议。遵循水印协议和脆弱水印算法基本框架实现了一种脆弱水印方案。方案将图像的奇异值作为参与乘积哈希的元素生成认证码,使用了MHC(Midified HuffmanCodeing)编码对图像的低比特平面进行压缩。实验结果表明,该方案完全可以满足应用的要求。 We studied watermark scheme used in content features complete authentication to velidate if the image was juggled in processing.Based on the application requirements analysis,we have built general protocol to be followed during watermark embedding.A fragile watermarking scheme was implemented followed by watermarking protocol and fragile watermarking algorithm.As hash elements,participating product singular value of image,the authentication codes have been generated in the scheme.We compressed low bit flat of image by MHC(Midified Huffman Codeing)coding.According to the experimental results,it can completely meet the application requirements.
出处 《吉林大学学报(信息科学版)》 CAS 2010年第4期419-422,共4页 Journal of Jilin University(Information Science Edition)
关键词 信息安全 脆弱水印 内容认证 奇异值分解 security information fragile watermark content authentication singular valuedecomposition
  • 相关文献

参考文献6

二级参考文献46

  • 1张鸿宾,杨成.基于公钥和脆弱水印的图像认证算法[J].计算机科学,2004,31(11):218-221. 被引量:8
  • 2张静,张春田.用于图象认证的数字水印技术[J].中国图象图形学报(A辑),2003,8(4):367-378. 被引量:29
  • 3CoxIJ MillerML BloomJA.数字水印[M].北京:电子工业出版社,2003..
  • 4Walton S. Information Authentication for a Slippery New Age[J]. Dr Dobbs Journal, 1995, 20(4): 18-26.
  • 5Yeung M, Mintzer F C. An Invisible Watermarking Technique for Image Verification[C]//Proc. of the International Conference on Image Processing. [S. l.]: IEEE Press, 1997: 680-683.
  • 6Holliman M, Memon N. Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes[J]. IEEE Transactions on Image Processing, 2000, 9(3): 432-441.
  • 7Fridrich J, Goljan M, Memon N. Further Attacks on Yeung Mintzer Fragile Watermarking Scheme[C]//Proc. of the International Conference on Security and Watermarking of Multimedia Contents. San Jose, CA: [s. n.], 2000: 428-437.
  • 8Li C T, Yang F M, Lee C S. Oblivious Fragile Watermarking Scheme for Image Authentication[C]//Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing. Orlando, USA [s. n.], 2002: 3445-3448.
  • 9Wong P W. A Public Key Watermark for Image Verification and Authentication[C]//Proc. of the International Conference on Image Processing, Chicago. [S. l.]: IEEE Press, 1998: 425-429.
  • 10Celik M U, Sharma G, Saber E, et al. A Hierarchical Image Authentication Watermark with Improved Localization and Security [C]//Proc. of the International Conference on Image Processing. Greece: [s. n.], 2001: 502-505.

共引文献80

同被引文献14

  • 1张静,郑国勤.基于几何特征的三维网格数字水印算法[J].计算机辅助设计与图形学学报,2005,17(4):740-747. 被引量:28
  • 2任勋益,王汝传,祁正华.基于网格的虚拟战场仿真实现模型研究[J].中国制造业信息化(学术版),2006,35(10):88-91. 被引量:1
  • 3OHBUCHI R,MASUDA H.Managing CAD Data as a MuItimedia Datatype Using Digital Watermarking[C]//Proceedings of the 4th IFIPWG 5.2 Workshop on Knowledge Intensive CAD.Parma,Italy:KIuwer,2000:103-116.
  • 4OHBUCHI R,MASUDA H,AONO N.Watermarking Three-Dimensional Polygonal Models[C]//Proceedings of ACM MuItimedia 97.New York,USA:ACM Press,1997:261-272.
  • 5OHBUCHI R,MASUDA H,AONO N.Embedding Data in 3D Models[C]//Lecture Notes in Computer Science 1309.HeideIberg:Springer-Verlag,1997:1-10.
  • 6YEUNG M,YEO B L.Fragile Watermarking of Three-Dimensional Objects[C]//Proceedings of International Conference on Image Processing.Chicago,Illinois:[s.n.].1998:442-446.
  • 7WAGNER M G.Robust Watermarking of Polygonal Meshes[C]//Proceedings of Geometric Modeling and Processing.Hong Kong:[s.n.].2000:201-208.
  • 8BENEDENS O.Watermarking of 3D Polygon Based Models with Robustness against Mesh Simplification[C]//Proceedings of SPIE:Security and Watermarking of Multimedia Contents.San Jose,California:[s.n.].1999:329-340.
  • 9STAN MEIAX.A Simpie Fast and Effective Polygon Reduction Algorithm[J].Game Developer,1998,11(2):44-49.
  • 10顾耀林,李林国,李淑敬.基于小波变换的三维网格物体盲水印方案[J].计算机应用研究,2008,25(1):263-265. 被引量:5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部