期刊文献+

多重加密的数字水印生成方法 被引量:6

Multiple encrypted digital watermark generation method
下载PDF
导出
摘要 为了使用户提供的数字签名生成安全性较高的数字水印,对数字水印的生成方法进行研究,结合3种加密算法提出一种数字水印生成方案。数字签名先经过MD5算法得到Hash文本信息,经RSA加密后作为RC4算法输入的种子,输出随机性较高的数字水印。该方案通过C语言实现对数字水印进行了嵌入和检测实验,得到了很好的验证。实验结果表明,不同数字签名生成数字水印之间的汉明距离较大,约占数字水印的57.8%,具有较强的抗攻击能力。 To provide a more secure watermark from the signature of user, the methods of watermark generation is stu-died and combined with three kinds of encryption algorithm, a watermarking generation scheme is presented. Digital signature is first en- crypted by the MD5 Hash algorithm to get a hash message, then by the RSA encryption a seed is gotten as an input of RC4 algo- rithm, finally digital watermark is output with high randomness. C language is used to implement the method and verify it. The experimental results show that the hamming distance is large enough, accounts for about 57.8~//oo of the digital watermark. It in- dicates that the method is strongly resistant against the attack.
出处 《计算机工程与设计》 CSCD 北大核心 2013年第9期3054-3057,3098,共5页 Computer Engineering and Design
基金 教育部留学回国人员科研启动基金项目(教外私留[0101174]) 山东省自然科学基金项目(ZR2009GL007) 山东省高等学校科技计划基金项目(J09LG10)
关键词 数字水印 多重加密 信息隐藏 信息安全 攻击 digital watermarking multiple encryption information hiding information security attack
  • 相关文献

参考文献16

二级参考文献167

共引文献339

同被引文献39

  • 1穆国吉.数字水印及其在印刷行业中的应用[J].印刷质量与标准化,2014(3):17-20. 被引量:3
  • 2刘岩,伍祥生,郑东,赵继英,姚建平.数字水印技术及其在电力系统中的应用[J].电力信息化,2005,3(6):91-92. 被引量:5
  • 3Murabayashi N,Yoshida K.Copied video detection with MPEG-7 video signature and multiple direct-mapped cache[C]//Hybrid Intelligent Systems(HIS),2011 11th International Conference on.IEEE,2011:190-195.
  • 4Liu N,Zhao Y,Zhu Z.Commercial recognition in TV streams using coarse-to-fine matching strategy[M]//Advances in Multimedia Information Processing-PCM 2010.Springer Berlin Heidelberg,2010:296-307.
  • 5Schoeffmann K,Boeszoermenyi L.Video sequence identification in TV broadcasts[M]//Advances in Multimedia Modeling.Springer Berlin Heidelberg,2011:129-139.
  • 6Weiss Y,Torralba A,Fergus R.Spectral hashing[C]//Advances in neural information processing systems.2009:1753-1760.
  • 7Wang J,Kumar S,Chang S F.Semi-supervised hashing for scalable image retrieval[C]//Computer Vision and Pattern Recognition(CVPR),2010 IEEE Conference on.IEEE,2010:3424-3431.
  • 8He J,Radhakrishnan R,Chang S F,et al.Compact hashing with joint optimization of search accuracy and time[C]//Computer Vision and Pattern Recognition(CVPR),2011 IEEE Conference on.IEEE,2011:753-760.
  • 9Gong Y,Lazebnik S.Iterative quantization:A procrustean approach to learning binary codes[C]//Computer Vision and Pattern Recognition(CVPR),2011 IEEE Conference on.IEEE,2011:817-824.
  • 10Lowe D G.Distinctive image features from scale-invariant keypoints[J].International Journal of Computer Vision,2004,60(2):91-110.

引证文献6

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部