期刊文献+

一种高容量盲检测图像指纹算法 被引量:2

A high capacity image fingerprinting scheme with blind detection
原文传递
导出
摘要 针对共谋攻击,提出了一种高容量的空域盲检测图像指纹算法。用抗共谋攻击码(ACC)调制正交基向量生成二值指纹,根据指纹状态对图像灰度值量化嵌入指纹。追踪共谋者时,首先根据待检图像像素灰度所属区间提取指纹,然后计算其与正交基向量的内积得到一新向量,对其用软阈值方式进行处理,最后追踪共谋者。指纹嵌入提取采用量化方式,是一种盲检测算法。实验结果表明,该算法不但提高了指纹容量,而且比现有的盲检测方法更有效。 In order to resist the collusion attack,a high-capacity and blind-detection fingerprinting scheme for image is proposed in spatial domain.The orthogonal basic vectors are modulated with anti-collusion codes to generate binary fingerprints,and all pixels of the original image are quantized according to fingerprint states for fingerprint embedding.During colluder tracing,the fingerprints are extracted by judging pixels′ gray levels of the tested image at first,and then a new vector is derived from the inner product between the extracted fingerprints and the orthogonal basic vectors,which is processed with soft threshold.The colluders are traced at last.The quantization is employed in fingerprint embedding and extracting,which is a blind detection.Experimental results show that the scheme not only improves the capacity seriously,but also is more efficient than existing blind detection algorithms.
出处 《光电子.激光》 EI CAS CSCD 北大核心 2011年第3期446-450,共5页 Journal of Optoelectronics·Laser
基金 国家自然科学基金资助项目(60802077)
关键词 数字指纹 高容量 共谋攻击 盲检测 fingerprinting high capacity collusion attack blind detection
  • 相关文献

参考文献11

  • 1周亚训,盖娜,金炜.基于离散运算的鲁棒数字图像双水印算法研究[J].光电子.激光,2009,20(11):1493-1497. 被引量:5
  • 2于平平,姚素英,于俊庭,徐江涛.用于CMOS图像传感器芯片的多功能盲水印算法[J].光电子.激光,2010,21(8):1247-1251. 被引量:1
  • 3Boneh D,Shaw J Collusion-secure fingerprinting for digital da- ta[J]. IEEE Transactions on Information Theory, 1998,44(5) : 1897-1905.
  • 4Trappe W, Wu M, Liu K J R Anti-collusion fingerprinting for multimedia[J] IEEE Transactions on Signal Processing,2003, 51:1069-1086.
  • 5Wu M, Trappe W, Wang Z J,et al. Collusion-resistant finger- printing for multimedia[J]. IEEE Signal Processing Magazine, 2004,15-27.
  • 6Wang Z J, Wu M, Zhao H V, et al. Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation[J]. IEEE Transactions on Image Processing, 2005,14 : 804-821.
  • 7Zhao H V,Wu M,Wang Z J,et al. Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting[J]. IEEE Trans- actions on Image Processing, 2005,14.: 646-661.
  • 8Varna A L,He S,Wu M. Finerprinting compressed multimedia signals[J]. IEEE Transactions on Information Forensics and Se- curity, 2009,4:330-345.
  • 9Swaminathan A, He S,Wu M. Exploring QIM-based anti-collu- sion fingerprinting for multimedia [A]. SPIE [ C]. 2006,6872 : 698-709.
  • 10李旭东.基于小波变换和相对量化的图像数字水印算法[J].光电子.激光,2010,21(9):1378-1382. 被引量:9

二级参考文献37

  • 1盖琦,孙云峰,王晓雷,王明伟,翟宏琛.基于离散四元数余弦变换的彩色图像数字水印技术[J].光电子.激光,2009,20(9):1193-1197. 被引量:6
  • 2李宗志,桑军,吴中福,王蔚韬.基于图像小波变换的数字水印[J].计算机工程,2004,30(21):109-110. 被引量:7
  • 3李旭东,张振跃.利用矩阵范数实现的公开水印技术[J].计算机辅助设计与图形学学报,2005,17(8):1857-1861. 被引量:17
  • 4He, A. T. S., Xunzhan Zhu, Jun Shen. Fragile watermarking based on encoding of the zeroes of the z-transform[J]. IEEE Trans on Information Forensics and Security, 2008,3 ( 3 ) : 567- 569.
  • 5Lin, S,C. Chin. A Robust DCT-base watermarking for copyright protection[J]. IEEE Trans Consumer Electronics, 2000,46 (3) :415-421.
  • 6Li, C.-T. Digital fragile watermarking scheme for authentication of JPEG images[J]. IEEE Proceedings,Vision, Image and Signal Processing, 2004,6( 151) : 460-466.
  • 7Fred MJntzer, Gordon W Braudaway. If One Watermark Is Good,Are More Better? [C]. IEEE International Conference on Acoustics, Speech, and Signal Processing, 1999, March 15 -19.
  • 8Chun-Shien Lu, Hong-Yuan Mark Liao. Multipurpose watermarking for image authentication and protection [J]. IEEE Transactions on IEEE Image Processing, 10 ( 10), 2001, 10: 1579-1592.
  • 9Deepa Kundur, Dimitrios Hatzinakos. Digital Watermarking for Telltale Tamper- Proofing and Authentication[J]. Proceedings of the IEEE Special Issue on Identification and Protection of Multimedia Information, 1999,87(7) : 1167-1180.
  • 10FAN Ming-quan,WANG Hong-xia. A Novel Multipurpose Watermarking Scheme for Copyright Protection and Content Authentication[C]. Second Workshop on Digital Media and its Application in Museum & Heritages, 2007 : 19-24.

共引文献12

同被引文献36

  • 1于鑫泉,李佳豪,孟祥博,王青阳,杜安楠.基于DCT的数字指纹抗共谋攻击研究[J].信息通信,2019,0(11):37-38. 被引量:3
  • 2朱岩,韩心慧,叶志远,杨永田.扩频卷积指纹及其安全性分析[J].计算机学报,2006,29(6):960-968. 被引量:5
  • 3朱岩,杨永田,冯登国.合谋安全的卷积指纹信息码[J].软件学报,2006,17(7):1617-1626. 被引量:7
  • 4王琦,李弼程,王炳锡,陈琦.基于恒定统计特征的数字音频水印技术[J].信息工程大学学报,2006,7(3):280-282. 被引量:1
  • 5陈晓苏,朱大立.一种基于随机序列的数字指纹编码和跟踪算法[J].小型微型计算机系统,2007,28(5):823-825. 被引量:7
  • 6I. J. Cox,J. Kilian,F. T. Leighton, and T. Shamoon."Securespread spectrum watermarking for multimedia,"IEEE Trans. Image Process. vol. 6, no. 12,pp. 1673-1687,Dec. 1997.
  • 7Z. J. Wang,M. Wu,H. V. Zhao,andK. J. R. Liu. "Anti- collusion fbrensics of multimedia fingerprinting using orthogonal mudula- tion,"IEEE Trans. Image Process. ,vol. 14,no. 6,pp. 804-821,Jun. 2005.
  • 8H. V. Zhao,M. Wu,Z. J. Wang,andK. J. R. Liu."Fo- rensic analysis of nonlinear collusion attacks for multimedia fingerpinting, " IEEETrans. lmage Process. ,vol. 14,no. 5,pp. 646-661,May2005.
  • 9Z. Li and W. Trappe. "Collusion-resistant fingerprints from WBE sequence sets,"in Proc. IEEE Int. Conf Communications,Seoul, Korea,May 2005,pp. 1336 - 1340.
  • 10S. He and M, Wu. "Collusion-resistant video fingerprinting, for large usergroup,"IEEETrans, lnE Forensics Security,vol. 2,no. 4,pp. 697-709, 2007.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部