期刊文献+

基于有向图构造的卫星遥感图像认证算法 被引量:3

An Authentication Method for Satellite Remote Sensing Image Via Constructing Directed Graph
下载PDF
导出
摘要 针对空间链路低带宽和高误码率下的数据安全问题,提出了一种基于有向图构造的卫星遥感图像认证算法。该算法利用率失真理论建立认证优化模型,通过构造有向图获得认证代价和丢包鲁棒性之间的优化权衡。首先,通过分析遥感图像数据压缩码流的结构和位平面编码特点,设计了一种保持码流语法结构的分层分包策略。然后在此基础上,分析了不同层数据包的质量权重和编解码依赖关系,进而采用散列链和散列树相结合的方式来构造最优的认证图,从而实现对图像数据的非平等认证保护。最后,对认证算法的代价、丢包鲁棒性进行了比较分析及仿真实验,并进行了安全性分析。实验结果表明,在不同码率下该算法较其它算法具有更高的峰值信噪比(Peak Signal-to-Noise Ratio,PSNR),即在相同代价情况下该算法较其它算法具有更强的丢包鲁棒性。 An authentication method for satellite remote sensing image based on constructing directed graph is proposed in this paper for the low data transmission rate and high hit-error rate on space link. The rate-distortion theory is used to establish an authentication optimization model, our method can obtain the optimal trade-off between the authentication overhead and the packet-loss robustness via constructing the directed graph. Firstly, based on the structure of remote sensing image data compression codestream and the characteristics of the bit-plane coding, a hierarchical packetization strategy is designed to maintain the syntactic structure of original codestream. Secondly, the quality weight of packets and the codec dependencies are analyzed, and hash chain and hash tree are employed to construct the optimal authentication graph for unequal authentication protection. Finally, in terms of computation cost, communication cost, robustness to packet loss, the proposed algorithm is analyzed theoretically and compared with existing algorithms and the security of the proposed algorithm is also analyzed. Experimental results show that the algorithm has higher peak signal-to-noise ratio (PSNR) than other schemes at any bit-rate. Therefore, the proposed scheme has stronger robustness to packet loss.
出处 《宇航学报》 EI CAS CSCD 北大核心 2014年第5期581-589,共9页 Journal of Astronautics
基金 中国科学院创新基金(CXJJ-10-M20 CXJJ-11-S101) 科技部863计划(2012AA011206)
关键词 图像认证 CCSDS图像数据压缩 码流特征 认证图 丢包鲁棒 Image authentication CCSDS image data compression Codestream characteristics Authentication graph Robustness to packet loss
  • 相关文献

参考文献15

  • 1Jiang L, Zhu H, Angeles M, et al. Secure sateUlte commumcanon systems design with individual secrecy rate constraints [ J ]. IEEE Trans. Information Forensics and Security, 2011,6(3) : 661 -671.
  • 2CCSDS 122.0-B-1, Recommendation for space data system standards: image data compression[ S]. Washington, D.C. : CCSDS, 2008.
  • 3CCSDS 120, 1-G-1, Report concerning space data system standards image data compression[S]. Washington, D.C. : CCSDS, 2007.
  • 4CCSDS 350. 3-G-1, Report concerning space data system standards authentication/integrity algorithm issues survey[ S]. Washington, DC: CCSDS, 2008.
  • 5Sun Q, Apostolopoulos J, Chen C W, et al. Quality-optimized and secure end-to-end authentication for media delivery [ J ]. IEEE Proc. , 2008, 96 ( 1 ) : 97 - 111.
  • 6Hefeeda M, Mokhtarian K. Authentication schemes for multimedia streams: quantitative analysis and comparison [ J ]. ACM Trans. Multimedia Computing, Comm. and Application, 2010, 6(1) : 1 -24.
  • 7Perrig A, Canetti R, Tygar J, et al. Efficient authentication and signing of multicast streams over lossy channels [ C ]. The IEEE Symp. Security and Privacy, Berkeley, USA, May 14- 17, 2000.
  • 8Miller D. A hash-chain based method for full or partial authentication of communication in a real-time wireless environment[ D]. Ontario: University of Waterloo, 2010.
  • 9Zhang Z, Sun Q, Apostolopoulos J, et al. Generalized butterfly graph and its application to video stream authentication [ J ]. IEEE Trans. Circuits and Systems for Video Technology, 2009, 19(7) : 965 -977.
  • 10Yu H H. Scalable streaming media authentication [ C ]. The IEEE Int. Conf. on Communications, Paris, France, June 20 - 14, 2004.

二级参考文献24

  • 1陈宇,宋俊,李平,张仁和.基于FPGA和Handel-C的声纳信号处理算法实现[J].声学技术,2003,22(z2):82-84. 被引量:1
  • 2兰旭光,郑南宁,梅魁志,刘跃虎.JPEG2000并行阵列式小波滤波器的VLSI结构设计[J].电子学报,2004,32(11):1806-1809. 被引量:4
  • 3The Consultative Committee for Space Data Systems. CCSDS 122.0 - G- 1 Image data Compression, 2007.
  • 4Ismailogu N, Benderli O, et al. A real time image processing subsystem: GEZGIN[C]//Proceedings of the 16th Annual/USU Conference on small satellites, Logan, Utah 2002.
  • 5Manduehi R, Dolinar S, et al. Onboard science processing and buffer management for intelligent deep space communications [ C ]//Proceeding of IEEE Aerospace Conference, BigSky, MT, USA, 2000.
  • 6Shapiro J M. Embedded image coding using zerotrees of wavelet coefficients[J]. IEEE Transactions on Signal Processing. 1993, 41 ( 11 ) : 3445- 3462.
  • 7Taubman D. High performance scalable image compression with EBCOT[ J ]. IEEE Transactions on Image Processing, 2000, 9 ( 5 ) : 1158- 1170.
  • 8Said A, Pearlman W A. A new, fast, and efficient image codec based on set partitioning in hierarchical trees[J]. IEEE Transactions on Circuits and Systems for Video Technology, 1996, 6(6): 243 - 250.
  • 9Pasqual Corsonello, Stefania Perri, et al. Low bit-rate hnage compression core for onboard space applications[ J]. IEEE transaction on circuits and systems for video technology, 2006, 16(1 ): 114- 128.
  • 10Chakrabarti C M, Vishwanath M, et al. Architectures for wavelet transforms: a survey[J]. Journal of VLSI Signal Processing. 1996, 14:171 - 192.

共引文献1

同被引文献18

  • 1崔鹏,杨军,施进明,王素娟.加解密技术在我国新一代气象卫星数据传输中的应用[J].气象科技,2006,34(2):233-236. 被引量:3
  • 2李喆,刘军.卫星网络安全路由研究[J].通信学报,2006,27(8):113-118. 被引量:20
  • 3COX G S,DE JAGER G.A survey of point pattern matching techniques and a new approach to point pattern recognition[A].Proc.of South African Symposium on Communications and Signal Processing[C].1993.243-248.
  • 4ZHENG L,YOU F.A Fragile digital watermark used to verify the integrity of vector map[A].E-Business and Information System Security,EBISS′09[C].International Conference on.IEEE,2009.1-4.
  • 5QIN Q,WANG W,CHEN S,et al.Research of digital semifragile watermarking of remote sensing image based on wavelet analysis[A].IGARSS′04.2004IEEE International Conference on Geoscience and Remote Sensing Symposium[C].2004,4:2542-2545.
  • 6CALDELLI R,MACALUSO G,BARNI M,et al.Joint nearlossless watermarking and compression for the authentication of remote sensing images[A].IGARSS′04.2004IEEE International Conference on Geoscience and Remote Sensing Symposium[C].2004,1:297-300.
  • 7HO A T S,ZHU X,WOON W M.A semi-fragile pinned sine transform watermarking system for content authentication of satellite images[A].IGARSS′05.2005IEEE International Conference on Geoscience and Remote Sensing Symposium[C].2005,2:737-740.
  • 8郑良斌,贾玉禄,王群.用于矢量地图完整性验证的脆弱数字水印算法[J].计算机工程与应用,2010,46(26):99-101. 被引量:10
  • 9罗剑高,韩国强,沃焱,李向阳.基于自适应图像块组合的无损图像认证算法[J].通信学报,2012,33(6):64-72. 被引量:7
  • 10王奇胜,朱长青,符浩军.利用数据点定位的矢量地理数据数字水印算法[J].测绘学报,2013,42(2):310-316. 被引量:11

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部