期刊文献+

面向资源受限环境的联合指纹与加密方法研究

Joint Fingerprinting and Encryption Scheme in Resource-constrained Environment
下载PDF
导出
摘要 针对目前多媒体分享所面临的日益突出的安全问题以及资源受限环境的高要求,以数字图像为对象展开研究,直接在小波域系数的位面上对图像进行联合指纹嵌入与加密处理.实验结果表明,仅针对近似分量进行加密,加密图像的直方图趋于一致,选择加密的应用使得该方法可以直接应用于资源受限环境下的多媒体安全分享. In order to solve multimedia sharing security issues and meet the demand in resource-con-strained environment, the application of joint fingerprinting and encryption technology for digital images was discussed, and the algorithm was proposed mainly based on bit level of wavelet coefficients. The ex-perimental results showed that the encrypted images had uniform histograms although only the approxima-tions of the origin images were encrypted. The proposed scheme could be applied on multimedia secure sharing in the resource-constrained environment.
作者 叶从欢 熊曾刚 张学敏 徐方 刘振 YE Conghuan;XIONG Zenggang;ZHANG Xuemin;XU Fang;LIU Zhen(School of Computer and Information Science, Hubei Engineering University, Xiaogan 432000 , Chin)
出处 《郑州大学学报(理学版)》 CAS 北大核心 2017年第4期46-50,共5页 Journal of Zhengzhou University:Natural Science Edition
基金 国家自然科学基金项目(61502154 61370092) 湖北省高校中青年团队项目(T201410)
关键词 社交多媒体分享 安全与隐私 数字指纹 多媒体加密 social multimedia sharing security and privacy digital fingerprinting multimedia encryp-tion
  • 相关文献

参考文献2

二级参考文献19

  • 1Gentry C. Fully homomorphic encryption using ideal lattices[C]. Proceedings of the 2009 ACM Symposium on Theory of Computing, STOC'09, NY, USA, 2009: 169-178.
  • 2Dijk M V, Gentry C, Halevi S, et al.. Fully homomorphic encryption using ideal lattices[C]. Proceedings of in Advances in Cryptology - EUROCRYPT, Riviera, French, 2010, LNCS 6110: 24-43.
  • 3Cancellaro M, Battisti F, Carli M, et al.. A commutative digital image watermarking and encryption method in the tree structured haar transform domain[J]. Signal Processing: Image Communication, 2011, 26(1): 1-12.
  • 4Kundur D and Karthik K. Video fingerprinting and encryption principles for digital rights management[J]. 1EEE Multimedia, 2004, 92(6): 918-932.
  • 5Memon N and Wong P W. A buyer-seller watermarking protocol[J]. IEEE Transations on Image Processing, 2001, 10(4): 643-649.
  • 6Zhang X. Reversible data hiding in encrypted image[J]. IEEESignal Processing Letters, 2011, 18(4): 255-258.
  • 7Sun Y and Zhang Xing. A kind of covert channel analysis method based on trusted pipeline[C]. 2011 International Conference on Electrical and Control Engineering (ICECE), Yichang, China, 2011: 5660-5663.
  • 8Zhang X, Zhang W, and Wang S. Efficient double-layered steganographic embedding[J]. IET Electronics Letters, 2007, 43(8): 482-483.
  • 9Filler T, Judas J, and Pridrich J. Minimizing embedding impact in steganography using trellis-coded quantization[C]. Proceedings of SPIE, Electronic Imaging, Media Forensics and Security XII, San Jose, CA, USA, 2009, (5): 1-14.
  • 10Fridrich J, Goljan M, and Soukal D. Efficient wet paper codes[C]. Proceedings of 7th International Workshop on Information Hiding, Barcelona, Spain, 2005, LNCS 3727: 204-218.

共引文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部