期刊文献+

基于帧编码的抗CTP攻击盲指纹机制

Frame code based blind fingerprint scheme of anti-CTP attack
下载PDF
导出
摘要 提出了一种基于帧编码的抗剪切(Cropping)、平移(Translation)、拷贝粘贴(Pasting)攻击(CTP攻击)的盲数字指纹方案。方案通过指纹置乱、帧编码等技术处理指纹信息,增加了信息的安全性,使得同步信息与指纹绑定在一起。给出了DCT域基于图像分片的多版本嵌入及基于图像有效分片定位的提取策略。该方案不仅对CTP攻击具有很高的鲁棒性,指纹信息提取时不需要任何辅助信息,且能够有效地抵抗常规图像处理操作。 CTP attack involves the cropping, translation and pasting attack. This paper provides a frame code based blind fingerprint scheme of anti-CTP attack. This scheme deals with the fingerprint information by fingerprint scrambling and frame coding techniques, which improve the information security and make the synchronization information bind with fingerprint. Additionally, the scheme of image slicing based multi-version embedment and im- age based effective slicing position extraction is presented. This scheme is robust against the CTP attack. The extrac- tion of fingerprint information does not need any auxiliary information and can resist the normal image operation effectively.
出处 《计算机工程与应用》 CSCD 2012年第19期69-76,共8页 Computer Engineering and Applications
基金 国家自然科学基金(No.60573040) 陕西省自然科学基金(No.SJ08F10)
关键词 帧编码 CTP攻击 盲数字指纹 frame code CTP attack blind fingerprint
  • 相关文献

参考文献5

二级参考文献27

  • 1易开祥.数字图像加密与数字水印技术研究[博士学位论文].杭州:浙江大学,2001 20-25.
  • 2[1]HISASHI INOUE,AKIO MIYAZAKI,AKIHIRO YAMAMOTO,et al. A digital watermark technique based on the wavelet transform and its robustness on image compression and transformation[J]. IEICE Trans Fundamentals, 1999, E82-A (1): 90-98.
  • 3[2]LIN CHING-YUNG. Public watermarking surviving general scaling and cropping: an application for print-and-scan process[A]. In: Multimedia and Security Workshop at ACM Multimedia 99[C]. Orlando, FL, USA, 1999.
  • 4[3]LIN CHING-YUNG, CHANG SHIH-FU. Distortion modeling and invariant extraction for digital image print-and-scan process[A]. International symposium on multimedia information processing (ISMIP 99)[C]. Taipei, 1999.
  • 5[4]BENDER W, GRUHL D, MORIMOTO N. Techniques for data hiding[R]. Cambridge: Massachusetts Institutes of Technology Media Lab, 1994.
  • 6[5]JOSEPH J K, RUANAIDH O, PUN T. Rotation, scale and translation invariant digital image watermarking[J]. Signal Processing, 1998, 66(3): 303-317.
  • 7[6]PEREIRA S, JOSEPH J K, RUANAIDH O, et al. Template based recovery of Fourier-based watermarks using log-polar and log-log maps[A]. In: IEEE Int Conf on Multimedia Computing and Systems (ICMCS99)[C]. Florence, 1999.
  • 8[7]PEREIRA S, PUN T. Fast robust template matching for affine resistant image watermarks[A]. In: International Workshop on Information Hiding[C]. Dresden: Springer Verlag.
  • 9[8]LIN CHING-YUNG, WU MIN, BLOOM A,et al.Rotation, scale, and translation resilient public watermarking for images[A]. In: Security and watermarking of multimedia contents II. Proceedings of SPIE, 2000, 3971: 90-98.
  • 10Swanson M D,Kobayashi M,Tewfik A H. Multimedia data-embedding and watermarking technologies [J]. Proc. of the IEEE,1998,86(6): 1064~1087

共引文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部