期刊文献+
共找到479篇文章
< 1 2 24 >
每页显示 20 50 100
Comparative Evaluation of Semi Fragile Watermarking Algorithms for Image Authentication 被引量:2
1
作者 Archana Tiwari Manisha Sharma 《Journal of Information Security》 2012年第3期189-195,共7页
Technology has no limits today;we have lots of software available in the market by which we can alter any image. People usually copies image from the internet and after some changes they claim that these are their own... Technology has no limits today;we have lots of software available in the market by which we can alter any image. People usually copies image from the internet and after some changes they claim that these are their own properties. Insuring digital image integrity has therefore become a major issue. Over the past few years, watermarking has emerged as the leading candidate to solve problems of ownership and content authentications for digital multimedia documents. To protect authenticity of images semi fragile watermarking is very concerned by researchers because of its important function in multimedia content authentication. The aim of this paper is to present a survey and a comparison of emerging techniques for image authentication using semifragile watermarking. In present paper comprehensive overview of insertion and extraction methods used in different semi fragile water marking algorithm are studied using image parameters, potential application, different algorithms are described and focus is on their comparison according to the properties cited above and future directions for developing a better image authentication algorithm are suggested. 展开更多
关键词 Image authentication Selective authentication Content Recovery ROBUSTNESS Semifragile watermarkING TAMPER Detection PSNR
下载PDF
An H.264/AVC Video Watermarking Scheme in VLC Domain for Content Authentication 被引量:1
2
作者 Sun Tanfeng Jiang Xinghao +3 位作者 Lin Zhigao Zhou Yue Lu Huan Wang Shilin 《China Communications》 SCIE CSCD 2010年第6期30-36,共7页
A semi-fragile content authentication algorithm is proposed for low bit-rate H.264/AVC video in VLC domain. Utilizing the intra prediction mode and coded block pattern in VLC domain, the proposed algorithm chooses tho... A semi-fragile content authentication algorithm is proposed for low bit-rate H.264/AVC video in VLC domain. Utilizing the intra prediction mode and coded block pattern in VLC domain, the proposed algorithm chooses those macro-blocks from which the signature is extracted and constructs content signature at macro-block level according to the relationship among the energies of quantized low-frequency coefficients of sub-macroblocks. The signature is embedded by modifying the trailing coefficients. The experimental results show that the proposed algorithm performs well in visual quality impact and keep the bit-rate basically unchanged. In addition, the algorithm can embed signatures into I, P, B slices simultaneously and remarkably enhances the watermark capacity. By verifying the extracted signature, the algorithm can detect and locate video tampering efficiently. 展开更多
关键词 H.264/AVC video watermarking content authentication VLC domain semi-fragile watermarking
下载PDF
A new semi-fragile watermarking algorithm for image authentication 被引量:1
3
作者 韩德志 《Journal of Chongqing University》 CAS 2005年第1期41-46,共6页
This paper presents a new semi-fragile watermarking algorithm for image authentication which extracts image features from the low frequency domain to generate two watermarks: one for classifying of the intentional con... This paper presents a new semi-fragile watermarking algorithm for image authentication which extracts image features from the low frequency domain to generate two watermarks: one for classifying of the intentional content modification and the other for indicating the modified location. The algorithm provides an effective mechanism for image authentication. The watermark generation and watermark embedment are disposed in the image itself, and the received image authentication needs no information about the original image or watermark. The algorithm increases watermark security and prevents forged watermark. Experimental results show that the algorithm can identify intentional content modification and incidental tampering, and also indicate the location where a modification takes place. 展开更多
关键词 authentication semi-fragile watermarking FRAGILITY wavelet transform
下载PDF
Digital Text Document Watermarking Based Tampering Attack Detection via Internet
4
作者 Manal Abdullah Alohali Muna Elsadig +3 位作者 Fahd N.Al-Wesabi Mesfer Al Duhayyim Anwer Mustafa Hilal Abdelwahed Motwakel 《Computer Systems Science & Engineering》 2024年第3期759-771,共13页
Owing to the rapid increase in the interchange of text information through internet networks,the reliability and security of digital content are becoming a major research problem.Tampering detection,Content authentica... Owing to the rapid increase in the interchange of text information through internet networks,the reliability and security of digital content are becoming a major research problem.Tampering detection,Content authentication,and integrity verification of digital content interchanged through the Internet were utilized to solve a major concern in information and communication technologies.The authors’difficulties were tampering detection,authentication,and integrity verification of the digital contents.This study develops an Automated Data Mining based Digital Text Document Watermarking for Tampering Attack Detection(ADMDTW-TAD)via the Internet.The DM concept is exploited in the presented ADMDTW-TAD technique to identify the document’s appropriate characteristics to embed larger watermark information.The presented secure watermarking scheme intends to transmit digital text documents over the Internet securely.Once the watermark is embedded with no damage to the original document,it is then shared with the destination.The watermark extraction process is performed to get the original document securely.The experimental validation of the ADMDTW-TAD technique is carried out under varying levels of attack volumes,and the outcomes were inspected in terms of different measures.The simulation values indicated that the ADMDTW-TAD technique improved performance over other models. 展开更多
关键词 Content authentication tampering attacks detection model SECURITY digital watermarking
下载PDF
Semi-Fragile Watermarking for Copyright Protection and Image Authentication
5
作者 HUANGJi-feng 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期284-288,共5页
In this paper, we propose a semi-fragile wattr-marking technology forcopyright protection and image authentication We transform the image into wavelet domain and groupthe four adjacent wavelet coefficients Utilizing t... In this paper, we propose a semi-fragile wattr-marking technology forcopyright protection and image authentication We transform the image into wavelet domain and groupthe four adjacent wavelet coefficients Utilizing the characteristics of the humanvisual system, weembed a digital signal into the average of the four adjacent wavelet coefficients since the mean hasbetter stability than single wavelet coefficient. This method neednt original image when extractsthe watermark. Experimental results show the effectiveness of this method which is robust to commonimage process and fragile to malicious attack. 展开更多
关键词 semi-fiagile watermark image authentication copyright protection wavelettransform
下载PDF
A Novel Video Data-Source Authentication Model Based on Digital Watermarking and MAC in Multicast
6
作者 ZHAO Anjun LU Xiangli GUO Lei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1257-1261,共5页
A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper, The digital watermarking which composes of the MAC o... A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper, The digital watermarking which composes of the MAC of the significant vid eo content, the key and instant authentication data is embedded into the insignificant video component by the MLUT (modified look-up table) video watermarking technology. We explain a method that does not require storage of each data packet for a time, thus making receiver not vulnerable to DOS (denial of service) attack. So the video packets can be authenticated instantly without large volume buffer in the receivers. TESLA (timed efficient stream loss tolerant authentication) does not explain how to select the suitable value for d, which is an important parameter in multicast source authentication. So we give a method to calculate the key disclosure delay (number of intervals). Simulation results show that the proposed algorithms improve the performance of data source authentication in multicast. 展开更多
关键词 video data authentication MULTICAST MAC(message authentication code) digital watermarking MLUT(modifled look-up table)
下载PDF
New Semi-Fragile Authentication Watermarking
7
作者 孙鑫 易开祥 费敏锐 《Journal of Shanghai University(English Edition)》 CAS 2002年第2期158-162,共5页
In this paper we propose a semi fragile watermarking scheme, which can be used for image authentication. Let the original image be performed by l level discrete wavelet transformation. An approximate wavelet coeffi... In this paper we propose a semi fragile watermarking scheme, which can be used for image authentication. Let the original image be performed by l level discrete wavelet transformation. An approximate wavelet coefficient matrix of the original image and real value chaotic sequences are than used to generate the content based and secure watermark. The watermark is embedded into original image by using HVS. The tamper detection can identify the tampered region of the received watermarked image. Experimental results are given. 展开更多
关键词 fragile watermark authentication chaotic sequences human visual system (HVS) DWT.
下载PDF
Novel Chaotic Fragile Watermarking Algorithm for Image Authentication
8
作者 刘培培 朱中梁 《Journal of Southwest Jiaotong University(English Edition)》 2009年第2期123-128,共6页
Taking full advantage of the randomicity of chaotic system and its extreme sensitivity to the initial value, a new chaotic fragile watermarking algorithm is proposed. In the algorithm, the location key is looked as a ... Taking full advantage of the randomicity of chaotic system and its extreme sensitivity to the initial value, a new chaotic fragile watermarking algorithm is proposed. In the algorithm, the location key is looked as a logistic chaotic initial value for iteration to create a location matrix. According to this location matrix, a mapping image is generated and the embedding location of watermarking in image blocks is identified. Then, the watermarking sequence, which is related with the mapping image blocks and generated by H6non chaotic map, is embedded into the least significant bit ( LSB ) of the corresponding location in each block. Since the image content and watermarking are staggered, the algorithm has a higher security. Simulation results showed that the algorithm can detect and locate the tamper in watermarked images with an accuracy of 2 × 2 block pixels. At the same time, the watermarking images has good invisibility, and the original image is not required when extracting watermarking. 展开更多
关键词 Fragile watermarking authentication Chaotic map Block-wise independent
下载PDF
A multiple watermarks algorithm for image content authentication
9
作者 蔡立军 李睿 易叶青 《Journal of Central South University》 SCIE EI CAS 2012年第10期2866-2874,共9页
A novel multiple watermarks cooperative authentication algorithm was presented for image contents authentication.This algorithm is able to extract multiple features from the image wavelet domain,which is based on that... A novel multiple watermarks cooperative authentication algorithm was presented for image contents authentication.This algorithm is able to extract multiple features from the image wavelet domain,which is based on that the t watermarks are generated.Moreover,a new watermark embedding method,using the space geometric model,was proposed,in order to effectively tackle with the mutual influences problem among t watermarks.Specifically,the incidental tampering location,the classification of intentional content tampering and the incidental modification can be achieved via mutual cooperation of the t watermarks.Both the theoretical analysis and simulations results validate the feasibility and efficacy of the proposed algorithm. 展开更多
关键词 multiple watermarks cooperation authentication wavelet transform image wavelet domain intentional contenttampering incidental modification
下载PDF
WATERMARKING AUTHENTICATION:USING THE FRAGILE MODE OR THE ROBUST MODE?
10
作者 Chen Dan Wu Qianhong Wang Yumin 《Journal of Electronics(China)》 2006年第4期549-553,共5页
Due to the lack of a unified authentication model certain mistakes occurred in the use of the wa-termarking authentication methods. To clarify the confusion, authentication models of robust and fragile wa-termarking a... Due to the lack of a unified authentication model certain mistakes occurred in the use of the wa-termarking authentication methods. To clarify the confusion, authentication models of robust and fragile wa-termarking are developed respectively in the paper. Concrete algorithms are proposed to prove the models that different Discrete Wavelet Transform (DWT) domains are utilized to embed the watermarks and quanti-zation method is presented with Just Notice Differences (JNDs) threshold as the quantization size. After the key technologies about the two methods are discussed, we detail the comparison of the two modes and rec-ommend their respective application scenarios as applicable results. 展开更多
关键词 watermarking authentication Robust watermarking Fragile watermarking
下载PDF
Novel Scheme for Compressed Image Authentication Using LSB Watermarking and EMRC6 Encryption
11
作者 S. J. Jereesha Mary C. Seldev Christopher S. Sebastin Antony Joe 《Circuits and Systems》 2016年第8期1722-1733,共12页
In the current era, transmission and storing of medical data in the digital form is of great concern and thus the requirement for content authentication has aroused. As a solution to these, digital watermarking techni... In the current era, transmission and storing of medical data in the digital form is of great concern and thus the requirement for content authentication has aroused. As a solution to these, digital watermarking techniques and encryption schemes have been used to secure medical data like medical images. In this paper a combination of two algorithms to provide image authentication for medical images in the compressed format is proposed. In the proposed method, the watermark image is encrypted using the Enhanced modified RC6 block cipher (EMRC6) algorithm and the encrypted watermark image is watermarked using the simple Least significant Bit (LSB) watermarking technique. The watermarked output image shows no visual imparity and the watermark which has been extracted has no visual difference. The test results show that the watermarked image has high quality and the watermark is very secure. Also the PSNR value of proposed method is 44.966 on an average and 43.0633 for the existing system where LSB technique is integrated with MRC6 for security of watermark. Hence the work is aimed to increase the embedding volume and make the watermark more secure which is the basic requirement of medical image security. 展开更多
关键词 watermark EMRC6 LSB Content authentication ENCRYPTION
下载PDF
Content Authentication Based on JPEG-to-JPEG Watermarking
12
作者 Hong-Xia Wang Jie Hou Ke Ding 《Journal of Electronic Science and Technology of China》 2009年第2期125-128,共4页
A content authentication technique based on JPEG-to-JPEG watermarking is proposed in this paper. In this technique, each 8x8 block in a JPEG compressed image is first processed by entropy decoding, and then the quanti... A content authentication technique based on JPEG-to-JPEG watermarking is proposed in this paper. In this technique, each 8x8 block in a JPEG compressed image is first processed by entropy decoding, and then the quantized discrete cosine transform (DCT) is applied to generate DCT coefficients: one DC coefficient and 63 AC coefficients in frequency coefficients. The DCT AC coefficients are used to form zero planes in which the watermark is embedded by a chaotic map. In this way, the watermark information is embedded into JPEG compressed domain, and the output watermarked image is still a JPEG format. The proposed method is especially applicable to content authentication of JPEG image since the quantized coefficients are modified for embedding the watermark and the chaotic system possesses an important property with the high sensitivity on initial values. Experimental results show that the tamper regions are localized accurately when the watermarked JPEG image is maliciously tampered. 展开更多
关键词 Index Terms-Chaotic map compressed domain content authentication digital watermarking.
下载PDF
Smart-Fragile Authentication Scheme for Robust Detecting of Tampering Attacks on English Text 被引量:1
13
作者 Mohammad Alamgeer Fahd N.Al-Wesabi +5 位作者 Huda G.Iskandar Imran Khan Nadhem Nemri Mohammad Medani Mohammed Abdullah Al-Hagery Ali Mohammed Al-Sharafi 《Computers, Materials & Continua》 SCIE EI 2022年第5期2497-2513,共17页
Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication technology.In this paper,a... Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication technology.In this paper,a text zero-watermarking approach known as Smart-Fragile Approach based on Soft Computing and Digital Watermarking(SFASCDW)is proposed for content authentication and tampering detection of English text.A first-level order of alphanumeric mechanism,based on hidden Markov model,is integrated with digital zero-watermarking techniques to improve the watermark robustness of the proposed approach.The researcher uses the first-level order and alphanumeric mechanism of Markov model as a soft computing technique to analyze English text.Moreover,he extracts the features of the interrelationship among the contexts of the text,utilizes the extracted features as watermark information,and validates it later with the studied English text to detect any tampering.SFASCDW has been implemented using PHP with VS code IDE.The robustness,effectiveness,and applicability of SFASCDW are proved with experiments involving four datasets of various lengths in random locations using the three common attacks,namely insertion,reorder,and deletion.The SFASCDW was found to be effective and could be applicable in detecting any possible tampering. 展开更多
关键词 watermarkING soft computing text analysis hidden Markov model content authentication
下载PDF
Data Hiding in DNA for Authentication of Plant Variety Rights
14
作者 Wei-Liang Tai Charles C.N.Wang +1 位作者 Phillip C.Y.Sheu Jeffrey J.P.Tsai 《Journal of Electronic Science and Technology》 CAS 2013年第1期38-43,共6页
Hiding data in acid (DNA) can facilitate annotation of important plant the deoxyribose nucleic the authentication and variety rights. A grant of plant variety rights for a new plant variety gives you the exclusive r... Hiding data in acid (DNA) can facilitate annotation of important plant the deoxyribose nucleic the authentication and variety rights. A grant of plant variety rights for a new plant variety gives you the exclusive right to produce for sale and sell propagating material of the variety. Digital watermarking techniques have been proposed for a wide range of applications, including ownership protection, copy control, annotation, and authentication. However, existing data hiding methods for DNA change the functionalities of DNA sequences, which induce morphological changes in biological patterns. This paper proposes a high capacity data hiding scheme for DNA without changing the functionalities of DNA sequences. This scheme adaptively varies the embedding process according to the amount of hidden data. Experimental results show that the proposed scheme gives a significantly improved hiding performance than previous schemes. And the robustness and security issues are also analyzed. 展开更多
关键词 authentication data hiding deoxyribose nucleic acid watermarking.
下载PDF
A Secure Public-key Image Authentication Plan
15
作者 YANGQing CHENKe-fei 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期289-292,共4页
Digital watermark can be used for image ownership verification orauthentication. In this paper, we propose a new image authentication plan concentrating on itssecurity performance. Digital watermark is first turbo cod... Digital watermark can be used for image ownership verification orauthentication. In this paper, we propose a new image authentication plan concentrating on itssecurity performance. Digital watermark is first turbo coded, sealed and then processed. In waveletdomain. To enhance security level, public key cryptosystem is utilized to replace traditionalwatermark key. Simulation results are finally given by experiment. 展开更多
关键词 turbo code: image authentication public key cryptosystcm digital watermark
下载PDF
An Authentication Technique Based on Classification
16
作者 李钢 杨杰 《Journal of Donghua University(English Edition)》 EI CAS 2004年第3期103-106,共4页
We present a novel watermarking approach based on classification for authentication, in which a watermark is embedded into the host image. When the marked image is modified, the extracted watermark is also different t... We present a novel watermarking approach based on classification for authentication, in which a watermark is embedded into the host image. When the marked image is modified, the extracted watermark is also different to the original watermark, and different kinds of modification lead to different extracted watermarks. In this paper, different kinds of modification are considered as classes, and we used classification algorithm to recognize the modifications with high probability. Simulation results show that the proposed method is potential and effective. 展开更多
关键词 authentication data hiding fragile watermark CLASSIFICATION
下载PDF
数字图像多功能水印综述 被引量:1
17
作者 赵蕾 桂小林 +1 位作者 邵屹杨 戴慧珺 《计算机辅助设计与图形学学报》 EI CSCD 北大核心 2024年第2期195-222,共28页
数字图像多功能水印技术通过将多种类型的水印嵌入到同一图像,以实现2种及以上的图像保护功能(版权保护、内容认证、篡改恢复等).当前,数字图像多功能水印算法仍面临着性能和应用场景等方面的挑战.为促进图像多功能水印的进一步发展,首... 数字图像多功能水印技术通过将多种类型的水印嵌入到同一图像,以实现2种及以上的图像保护功能(版权保护、内容认证、篡改恢复等).当前,数字图像多功能水印算法仍面临着性能和应用场景等方面的挑战.为促进图像多功能水印的进一步发展,首先系统地梳理了数字图像水印技术,包括其系统特性、常见分类、关键技术与成果,以及其可实现的功能与应用场景;在此基础上,对近10年来不同类别的多功能水印嵌入模型(融合水印嵌入、零水印嵌入、水印串行嵌入、水印并行嵌入)的相关工作进行归纳与分析;最后,总结了当前数字图像多功能水印技术的不足,展望了后续研究与发展趋势.综合分析发现,多水印的嵌入难免对水印综合性能造成损失,且多功能水印在真实应用场景中的效果仍待改善.人工智能等新技术在数字图像多功能水印中的应用有望提升算法性能. 展开更多
关键词 数字图像水印 多功能水印 版权保护 内容认证 篡改恢复
下载PDF
基于IPVO的高效图像可逆认证方法
18
作者 张汉华 黄方军 《中山大学学报(自然科学版)(中英文)》 CAS CSCD 北大核心 2024年第5期106-114,共9页
提出了一种基于小波域预测误差直方图平移的图像可逆认证方法。首先,对待认证图像进行一次哈尔小波变换;其次,将变换得到的低频子带和高频子带分别分块,并根据块内的系数值和块的位置生成认证码;然后,使用改进的像素值排序(IPVO)方法将... 提出了一种基于小波域预测误差直方图平移的图像可逆认证方法。首先,对待认证图像进行一次哈尔小波变换;其次,将变换得到的低频子带和高频子带分别分块,并根据块内的系数值和块的位置生成认证码;然后,使用改进的像素值排序(IPVO)方法将认证码嵌入到分块中,通过哈尔小波逆变换得到包含认证信息的图像;在认证阶段,通过对比分块提取认证码和生成认证码来实现篡改检测功能,并可无损地恢复原始图像。实验结果表明,该方法提供了更准确的检测结果,并确保了一定水平的图像质量。 展开更多
关键词 图像 可逆认证 脆弱水印 篡改检测
下载PDF
基于Arnold-DWT-QR的脆弱性图像水印算法
19
作者 黄喜阳 杜庆治 +3 位作者 马迪南 龙华 邵玉斌 刘尧 《陕西理工大学学报(自然科学版)》 2024年第1期65-72,共8页
在人物新闻图像中,人眼视觉更关注于人脸高频细节部分,为实现含水印的人物新闻图像受到任何微弱攻击情况下均不能完整提取出水印信息,且具有较好的不可感知性,提出了一种Arnold置乱结合离散小波变换(DWT)、正交三角分解法(QR)的脆弱性... 在人物新闻图像中,人眼视觉更关注于人脸高频细节部分,为实现含水印的人物新闻图像受到任何微弱攻击情况下均不能完整提取出水印信息,且具有较好的不可感知性,提出了一种Arnold置乱结合离散小波变换(DWT)、正交三角分解法(QR)的脆弱性图像水印算法。首先将水印图像进行Arnold置乱加密,再提取载体图像B通道中人眼不敏感的低频细节部分进行QR分解,最后将Arnold置乱加密后的水印图像QR分解后嵌入在载体图像矩阵R中每一个元素,使较少的水印信息均嵌入在载体图像的每一个像素中。实验结果表明,该算法在未受攻击情况下平均峰值信噪比(PSNR)为51 dB,归一化相关系数(NC)为1.0,在任何强度的攻击下均无法提取完整水印图像,具有较好的人物新闻图像认证能力。 展开更多
关键词 脆弱性图像水印 ARNOLD置乱 离散小波变换 QR分解 图像认证
下载PDF
数据流通场景下的遥感影像隐形水印技术研究进展
20
作者 陆君言 《农业大数据学报》 2024年第2期220-229,共10页
随着遥感技术的发展及信息传递手段的丰富,遥感影像在各种关键领域得到广泛应用。遥感影像在多端流通的过程中容易遇到来源、版权信息缺失及可靠度不明的问题,因此需要通过专门的技术手段实现数据流通过程中的确权和验证。目前,隐形图... 随着遥感技术的发展及信息传递手段的丰富,遥感影像在各种关键领域得到广泛应用。遥感影像在多端流通的过程中容易遇到来源、版权信息缺失及可靠度不明的问题,因此需要通过专门的技术手段实现数据流通过程中的确权和验证。目前,隐形图像水印是实际应用中最有效的手段之一,受到了各方研究团队的关注,其技术也不断深入完善和发展。其中,由于栅格类型影像数据的应用较多,所以相关的研究也更丰富。本文针对在数据流通场景下应用于栅格格式遥感影像的隐形图像水印技术,简要分析了其研究背景和需求,整理了研究中常用的技术指标,介绍了代表性的技术方法,并根据目前的研究和需求趋势,展望了该技术可能的发展方向。 展开更多
关键词 隐形水印 遥感 数据流通 数据安全 数据确权
下载PDF
上一页 1 2 24 下一页 到第
使用帮助 返回顶部