期刊文献+

基于JPEG压缩不变量和半脆弱水印的图像认证 被引量:7

Image Authentication Scheme Based on JPEG Invariant and Semi-fragile Watermarking
下载PDF
导出
摘要 为了检测和定位对图像的恶意窜改,同时验证图像的所有权,提出了一种基于JPEG压缩不变量和半脆弱水印的JPEG压缩域认证水印算法.该算法利用了JPEG压缩前后DCT系数的不变性嵌人和图像内容有关的水印.该认证算法建立在密码学方法的基础上,因此它是单向的、不可逆的. The authors propose an authentication scheme for JPEG images based on digital signature and semi-fragile watermarking to detect and locate the malicious manipulations made to an image and verify the ownership of the image. The algorithm uses the invariant of DCT coefficients before and after JPEG compression to embed the watermark related with the image in content. Since the authentication scheme is based on the security of the cryptographic hash function and public key algorithm, it is monodirectional and irreversible. The theoretical analysis and experimental results show that the proposed scheme has the desired property and good performance for image authentication.
作者 张鸿宾 杨成
出处 《北京工业大学学报》 CAS CSCD 北大核心 2004年第2期214-218,共5页 Journal of Beijing University of Technology
基金 国家自然科学基金资助项目(60075002) 国家"八六三"计划资助项目(2003AA144080).
关键词 图像认证 数字水印 JPEG压缩 数字签名 image authentication digital watermarking JPEG compression digital signature
  • 相关文献

参考文献12

  • 1WALTON S. Information authentication for a slippery new age[J]. Dr Dobbs Journal, 1995, 20(4): 18-26.
  • 2van SCHYNDEL R, TIRKEL A , OSBORCE C. A digital watermark[J]. Proc ICIP, 1994, 2(11): 86-90.
  • 3WOLFGANG R B , DELP E J. Fragile watermarking using the VW2D watermark[Z]. Proc SPIE, Security and Watermarking of Multimedia Contents, San Jose, 1999.
  • 4YEUNG M, MINTZER F. Invisible watermarking for image verification[J]. Journal of Electronic Imaging, 1998,7(3): 578-591.
  • 5WONG P W. A public key watermark for image verification and authentication[J]. Proc ICIP, 1998, 2(10):455-459.
  • 6WONG P W, MEMON N. Secret and public key image watermarking schemes for image authentication and ownership verification[J]. IEEE Trans on Image Processing, 2001, 10(10): 1593-1601.
  • 7WU M, LIU B. Watermarking for image authentication[J]. Proc ICIP, 1998, 2(10): 437-441.
  • 8KUNDUR D, HATZINAKOS D. Towards a telltale watermarking technique for tamper-proofing[J]. Proc ICIP,1998, 2(10): 409-413.
  • 9XIE L, ARCE G. Joint wavelet compression and authentication watermarking[J]. Proc ICIP, 1998, 2(10):427-431.
  • 10LIN Ching-yung. Watermarking and digital signature techniques for multimedia authentication and copyright protection[D]: [dissertation]. New York: Columbia University, 2000.

同被引文献48

  • 1王让定,陈金儿,朱斌.基于MCLT变换的音频数字水印技术[J].计算机研究与发展,2004,41(8):1398-1403. 被引量:2
  • 2熊常芳,林克正,马强,周洪玉.基于图像内容的半脆弱水印方法[J].哈尔滨理工大学学报,2004,9(6):27-30. 被引量:4
  • 3张静,张春田.用于图象认证的数字水印技术[J].中国图象图形学报(A辑),2003,8(4):367-378. 被引量:29
  • 4秦川,单承赣.一种基于半脆弱水印的图像内容认证算法[J].信息安全与通信保密,2005,27(6):66-69. 被引量:2
  • 5熊志勇,蒋天发.一种DCT域数字图像半脆弱水印方法[J].武汉大学学报(工学版),2005,38(4):97-99. 被引量:6
  • 6LU CS, LIAO HYM. Multipurpose watermarking for image authentication and protection [ J ]. IEEE Transactions on Image Processing, 2001,10 ( 10 ) : 1579 - 1592.
  • 7LINE T, PLD ILCHUK C I, DELP E J. Detection of image alterations using semi-fragile watermarks[C]//Proceedings of SP IE Conference on Security and Watermarking of Multi-media Contents II. San Jose, California, USA ,2000 :152 -163.
  • 8DITTMANN J. Contentfragile watermarking for image authentication [ C ]//Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents III ,2001:175 -184.
  • 9MANSOUR M F, TEWFIK A H. Robust High Capacity Data Embedding[ C]. ICASSP 2001 ,Utab,2001.
  • 10LIN C Y, CHANG S F. Semi-fragile watermarking for authenticating JPEG visual content [ C ]//Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents II, San Jose, USA,2000:140-151.

引证文献7

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部