期刊文献+

一种基于数字水印的图像完整性与身份验证方法 被引量:3

Image Integrity Verification and Sender's Authentication Technology Based on Watermark
下载PDF
导出
摘要 图像在许多的实际应用领域,比如:新闻报道、法庭举证、医学鉴定、记实照相机要求保证图像不被未授权者随意篡改。在某些场合,不仅要求保证图像的完整性,还需要验证图像发送者的身份。该方法综合了数字水印、报文摘要、公钥匙加密等技术,具有以下特性:图像数据与验证数据浑然一体;不但能检测出图像是否被篡改、缩放、剪切,还能定位被篡改象素块的位置;能检测并定位出图像内子块与子块之间的偷换、图像与图像之间的子块偷换、嫁接等。 Image Integrity is very important for many imaging applications, for example, ne ws report, court probe, medical archiving of images, trusted camera and others. In addition, senders authentication is needed on some occasions. The new metho d based on watermark, message digest and public key cryptography technology is p roposed to verify image integrity and senders authentication: any changes of p ixel values and changes in image size due to scaling or cropping as well as bloc k swapping in images or corresponding block swapping between images can be detec ted and located.
出处 《计算机应用》 CSCD 北大核心 2003年第5期98-100,共3页 journal of Computer Applications
关键词 数字水印 报文摘要 公钥匙加密 图像完整性 身份验证 watermark message digest public key cryptography image integrity authenticat ion
  • 相关文献

参考文献6

  • 1Friedman. The trustworthy digital camera: restoring credibility to the photographic image[ J]. IEEE Transactions on Consumer Electronics. 1993. 39:905-9101.
  • 2Yeung M, Mintzer F. An invisible watermarking technique for image verification[ A]. Proceedings of IEEE ICIP'97 [ C]. Santa Barbara CA, October 1997.
  • 3Wong PW. A watermark for image integrity and ownership verification[A]. Proceedings of IS&TPIC Conference [C]. Portland OR,May 1998.
  • 4Wong PW. A public key watermark for image verification and authentication[ A]. IEEE International Conference on Image Processing[C1, 1998,11. 155-159.
  • 5Chotikakamthom N, Sangiamkun W. Digital Watermarking Technique for Image Authentication by Neighbouring Block Similarity Measure[ A]. IEEE Region 10 International Conference on Electrical and Electronic Technology ( TENCON 2001) [ C], 2001. 743 -747.
  • 6Holliman M, Memon N. Counterfeiting attacks on obIivious blockwise independent invisible watermarking schemes[ J]. IEEE-Transactions - on - Image - Processing, 2000, 9(3) : 432 -41.

同被引文献20

  • 1[1]T Lin,E J Delp.A review of fragile image watermarks.Multimedia and Security Workshop at ACM Multimedia 99,Orlando,FL,USA,1999
  • 2[3]F A P Petitcolas,R J Anderson,M G Kuhn.Information hiding-A survey.Proc of the IEEE,Special Issue on Protection of Multimedia Content,1999,87(7):1062-1078
  • 3[5]R V Schyndel,A Tirkel,C Osborne.A digital datermark.The IEEE Int'l Conf on Image Processing (ICIP'94),Austin,Texas,1994
  • 4[6]M Wu,B Liu.Watermarking for image authentication.The IEEE Int'l Conf on Image Processing (ICIP'98),Chicago,Illinois,1998
  • 5[7]D Kundur,D Hatzinakos.Towards a telltale watermarking technique for tamper-proofing.The IEEE Int'l Conf on Image Processing (ICIP'98),Chicago,Illinois,1998
  • 6[8]L Xie,G Arce.Joint wavelet compression and authentication watermarking.The IEEE Int'l Conf on Image Processing (ICIP'98),Chicago,Illinois,1998
  • 7张静 张春田.用于图像认证的数字水印技术【EB/OL】.http://www.paper.edu.cn,2005—03.
  • 8YUAN Q, YAO H, GAO W, et al. Blind Watermarking Method Based on DWT Middle Frequency Pair[A]. International Conferenee on Multimedia and Exposition[ C], 2002, 2. 473 -476.
  • 9TANG YL, CHEN CT. Image Authentication Using Relation Measures of Wavelet Coefficients[ A]. Proceedings of the 2004 IEEE International conference on e-Technology, e-Commerce and e-Serveee[ C], 2004. 541 - 545.
  • 10ZHAO Y, CAMPISI P, KUNDUR D. Dual Domain Watermarking for Authentication and Compression of Cultural Heritage Images[ J].IEEE Transactions on Image Processing, 2004, 13 (3) : 430 - 448.

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部