期刊文献+

基于状态参数的安全数码相机模型 被引量:2

A New Secure Digital Camera Model Based on State Parameter
下载PDF
导出
摘要 现有安全数码相机不能识别二次获取图像且必须直接参与含水印数字照片的认证过程.针对上述问题,本文从含水印数字照片的密钥生成与传递方式入手,提出一种基于状态参数的新型安全数码相机模型.该模型通过设计相机密钥设置函数———级联-混沌映射,隐蔽地生成安全数码相机的相机密钥,然后以相机密钥和照片拍摄时相机的取景模式、焦距、拍摄时间等状态参数为明文数据,利用Hash函数计算出含水印数字照片的密钥,讨论分析了该模型中密钥的保密性和难伪造性,建立了相机与密钥的多对一非线性映射关系.实验结果表明,相机密钥或状态参数改变时,密钥的变化量近似均匀分布. The current secure digital camera (SDC) model can not identify the secondary capture image and have to validate the integrity of watermarked images taken by it. To address these problems, a state parameter based SDC model is proposed by generating and transferring secret key which is used to produce a watermarked image. The cascade chaotic mapping is used to generate the camera key for the proposed SDC model. By the application of the plaintext data including camera key and state parameters in the image creation, such as viewfinder mode, focus, and time, the secret key is produced by Hash function. The confidentiality and anti-counterfeiting of secret key for the proposed SDC model were validated and one to many nonlinear mapping between the camera and the secret key was established. Experimental results demonstrate that the bit number variation of secret key follows approximately uniform distribution when the camera key or scene parameter is changed.
出处 《西南交通大学学报》 EI CSCD 北大核心 2013年第3期460-466,共7页 Journal of Southwest Jiaotong University
基金 国家自然科学基金资助项目(60970122 61170226) 中央高校基本科研业务费专项基金资助项目(SWJTU09CX039 SWJTU10CX09)
关键词 数码相机 数字图像 取证 状态参数 digital camera digital image forensics state parameter
  • 相关文献

参考文献15

  • 1BIANCHI T, PIVA A. Secure watermarking for multimedia content protectionE Jl. IEEE Signal Processing Magazine, 2013, 30(2) : 87-96.
  • 2LUO Weiqi, QU Zhenhua, PAN Feng, et al. A survey of passive technology for digital image forensics I J]. Frontiers of Computer Science in China, 2007, 1 ( 2 ) : 166-179.
  • 3BLYTHE P, FRIDRICH J. Secure digital camera[ C]// Digital Forensic Research Workshop. Baltimore: [ s. n. ], 2004: 11-13.
  • 4KORUS P, DZIECH A. Efficient method for content reconstruction with self-embedding[ J ]. IEEE Transactions on Image Processing, 2013, 22(3) : 1134-1147.
  • 5HE Hongjie, CHEN Fan, TAI H M, et al. Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme [ J ]. IEEE Transactions on Information Forensics and Security, 2012, 7( 1 ) : 185- 196.
  • 6ZHANG Xinpeng, WANG Shuozhong, QIAN Zhenxing, et al. Reference sharing mechanism for watermark self-embedding[ J]. IEEE Transactions on Image Processing, 2011, 20(2) : 485-495.
  • 7陈帆,和红杰,王宏霞.用于图像认证的变容量恢复水印算法[J].计算机学报,2012,35(1):154-162. 被引量:26
  • 8MOHANTY S P. A secure digital camera architecture for integrate real-time digital rights management [J]. Journal of Systems Architecture, 2009, 55 (10/11/12) : 468-480.
  • 9HIEW B Y, TEOH A B, YIN O S. A secure digital camera based fingerprint verification system [ J ]. Journal of Visual Communication and Image Representation, 2010, 21(3): 219-231.
  • 10田新,刘曼,杨祥辉.一种带有水印嵌入功能的数码相机:中国,200510003430[P].2007-07-04.

二级参考文献21

  • 1MAO S Y, WU M. Robust and secure image hashing[ J]. IEEE Transactions on Information Forensics and Security, 2006, 1 (2) : 215-230.
  • 2MONGA V, BANERJEE A, EVANS B L. A clustering based approach to perceptual image hashing[J]. IEEE Transactions on Information Forensics and Security, 2006, 1 ( 1 ) : 65-79.
  • 3COSKUN B, SANKUR B, MEMON N. Spatio-temporal transform based video hashing[J]. IEEE Transactions on Multimedia, 2006, 8(6) : 1190-1208.
  • 4JIN M, YOO C D. Quantum Hashing for multimedia[ J ]. IEEE Transactions on Information Forensics and Security, 2009, 4(4) : 982-994.
  • 5JIAO Yuhua, JI Liping, NIU Xiamu. Robust speech hashing for content authentication[J]. IEEE Signal Processing Letters, 2009, 16(9) : 818-821.
  • 6LEI Yanqiang, WANG Yuangen, HUANG Jiwu. Robustimage hash in radon transform domain for authentication [ J ]. Signal Processing : Image Communication, 2011, 26(6) : 280-288.
  • 7LI Weng, BART P. A novel video Hash algorithm[ C]// 18th ACM International Conference on Multimedia ACM Multimedia 2010-MM'10. New York: Association for Computing Machinery, 2010: 739-742.
  • 8NIE Xiushan, LIU Ju, SUN Jiande, et al. Robust video Hashing based on double-layer embedding[J]. IEEE Signal Processing Letters, 2011, 18(5): 307- 310.
  • 9NIE Xiushan, LIU Ju, SUN Jiande, et al. Key-frame based robust video Hashing using isometric feature mapping[J]. Journal of Computational Information Systems, 2011, 7(6) : 2112-2119.
  • 10SWAMINATHAN A , MAO Yinian, WU Min. Robust and secure image Hashing[J]. IEEE Transactions on Information Forensics and Security, 2006, 1 ( 2 ) : 215-230.

共引文献28

同被引文献19

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部