期刊文献+

基于数字水印的图像认证技术 被引量:1

Image Authentication Based on Digital Watermarking
下载PDF
导出
摘要 提出了一种基于数字水印的图像认证技术。首先对图像进行颜色空间转换,然后对图像的亮度分量进行分块,并对分块离散余弦变换。对亮度分量低频系数进行扫描,提取低频部分系数进行量化,并哈希操作产生水印。将水印按照一定强度嵌入到中频系数中,形成含水印图像。实验结果表明,该方法对图像压缩、格式转换等图像常规操作鲁棒;对拼贴攻击、图像中对象的移位等篡改操作有很强的抵抗能力,定位能力好,安全性好,具有实际应用价值。 提出了一种基于数字水印的图像认证技术。首先对图像进行颜色空间转换,然后对图像的亮度分量进行分块,并对分块离散余弦变换。对亮度分量低频系数进行扫描,提取低频部分系数进行量化,并哈希操作产生水印。将水印按照一定强度嵌入到中频系数中,形成含水印图像。实验结果表明,该方法对图像压缩、格式转换等图像常规操作鲁棒;对拼贴攻击、图像中对象的移位等篡改操作有很强的抵抗能力,定位能力好,安全性好,具有实际应用价值。
作者 李海华
出处 《杭州电子科技大学学报(自然科学版)》 2010年第1期42-45,共4页 Journal of Hangzhou Dianzi University:Natural Sciences
关键词 图像认证 离散余弦变换 半脆弱水印 哈希函数 image authentication DCT semi-fragile watermark Hash function
  • 相关文献

参考文献6

  • 1任娟,王蕴红,谭铁牛.基于感兴趣区域的图像认证与自恢复算法[J].自动化学报,2004,30(6):833-843. 被引量:5
  • 2吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70
  • 3Lin,Chih Hung.Image authentication scheme for resisting JPEG,JPEG2000 compression and scaling. IEICE Transactions onInformation and Systems . 2007
  • 4Lin CY,Chang SF.A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Transactions on Circuits and Systems for Video Technology . 2001
  • 5Matth Holliman,Nasir Memon.Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing . 2000
  • 6Lin,Chih-Hung.Semi-fragile watermarking scheme for authentication of JPEG images. Tamkang Journal of Science and Engineering . 2007

二级参考文献68

  • 1Honsinger C.W., Jones P., Rabbani M., Stoffel J.C.. Lossless recovery of an original image containing embedded data. U.S. Patent No. 6,278,791, 2001
  • 2Fridrich J., Goljan M., Du R.. Lossless data embedding for all image formats. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 572~583
  • 3Tian J.. Wavelet-based reversible watermarking for authentication. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 679~690
  • 4Holliman M., Memon N.. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000, 9(3): 432~441
  • 5Fridrich J., Goljan M., Memon N.. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262~274
  • 6Wu J., Zhu B., Li S., Lin F.. Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes. In: Proceedings of the IEEE International Conference on Multimedia & Expo (ICME'04), Taiwan, 2004
  • 7Wu J., Zhu B., Li S., Lin F.. New attacks on SARI image authentication system. In:Proceedings of the SPIE,Vol.5306, Security and Watermarking of Multimedia Contents VI, San Jose, California, USA, 2004, 602~609
  • 8Yeung M., Mintzer F.. Invisible watermarking for image verification. Journal of Electronic Imaging, 1998, 7(3): 578~591
  • 9Wu M., Liu B.. Watermarking for image authentication. In: Proceedings of the IEEE International Conference on Image Processing, Chicago, USA, 1998, 2: 437~441
  • 10Memon N., Shende S., Wong P.. On the security of the Yeung-Mintzer authentication watermark. In:Proceedings of the IS&T PICS Symposium, Savannah, Georgia, 1999, 301~306

共引文献72

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部