期刊文献+

基于超混沌加密的脆弱数字水印技术 被引量:4

A Fragile Digital Watermark Techniques Based on Encryption of Hyperchaos
在线阅读 下载PDF
导出
摘要 为了避免过多的水印信息嵌入导致原图像质量下降以及一般加密方法的安全性不高的问题,利用离散余弦变换中空域任何一点的变化都会对频域造成影响的特性来对微小篡改进行监督。因此以参考文献[2]中的DCT域系数嵌入关系为基础,提出了相应的基于超混沌序列加密的随机嵌入脆弱水印算法。本算法在检测水印时不需要原图像。而且本算法具有良好的不可见性、保密性及对修改具有很强的敏感性。 In order to prevent the quality of the image decrease from too much watermark information embedding and resolve that low security of the general encryption method, use the characteristic that any change in spatial domain will influence frequency domain during transforming to supervise the small distortion. So based on the relationship of DCT embedding on the paper[ 2 ], a fragile watermark based on chaos array and random embedding method is propose. In the process of extracting watermark, this arithmetic can achieve blind watermark technology. The water mark is invisible and the system is very secure and sensitive to the small distortion.
出处 《计算机技术与发展》 2006年第10期145-148,共4页 Computer Technology and Development
关键词 数字水印技术 超混沌序列 随机间隔法 双密钥加密 DCT域 watermark technology hyperchaos array random instant double key encryption DCT domain
  • 相关文献

参考文献6

二级参考文献27

  • 1李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):15-20. 被引量:1340
  • 2苏中民,林行良.图视秘密的任意分存[J].计算机学报,1996,19(4):293-299. 被引量:26
  • 3XUCS WU J K SUN Q B.Digital audio watermarking and its application in multimedia database[A]..ISSPA′99[C].Brisbane,Australia,1999..
  • 4王秋生.[D].哈尔滨:哈尔滨工业大学,2001.
  • 5[1]I J Cox,J Kilian,T Leighton,T Shamoon.Secure spread spectrum watermarking for multimedia[J].IEEE Trans,1997,IP-6(12):1673-1687.
  • 6[2]M Yeung,F Mintzer.An invisible watermarking technique for image verification[A].Proc.Int.Conf.Image Processing[C].Barbara California,1997.680-683.
  • 7[3]Wong P W.A public key watermark for image verification and authentication[A].Proc.IEEE ICIP[C].Chicago,USA,1998.425-429.
  • 8[4]J Zhao,E Koch.Embedding robust labels into images for copyright protection,Intellectual Property Rights New Technologies[A].Proc.KnowRight'95 Conf[C].California,1995.242-251.
  • 9[5]Matth Holliman,Nasir Memon,Counterfeiting attacks on oblivious block-wise independent invisible watermark schemes[J].IEEE Trans,2000,IP-19(3):432-441.
  • 10[6]Fridrich J,Goljan M,Memon N.Further attacks on Yeung-Mintzer watermarking scheme[A].Proc.SPIE Security and Watermarking of Multimedia Contents[C].San Jose,California,2000.428-437.

共引文献411

同被引文献33

  • 1侯振华,陈生潭.脆弱性数字水印研究[J].计算机应用,2003,23(z2):106-108. 被引量:17
  • 2张静,张春田.用于图象认证的数字水印技术[J].中国图象图形学报(A辑),2003,8(4):367-378. 被引量:29
  • 3杨德刚,陈永红,杨华千,韦鹏程.在数字图像中嵌入多水印的算法研究[J].计算机工程与应用,2005,41(21):41-44. 被引量:3
  • 4王向阳,陈利科.一种新的自适应半脆弱水印算法[J].自动化学报,2007,33(4):361-366. 被引量:17
  • 5李赵红,侯建军,宋伟.混沌映射的半脆弱图像数字水印算法[J].北京交通大学学报,2007,31(2):52-56. 被引量:3
  • 6Cox I J, Kilian J, Leichton F T, et al. Secure spread spectrum watermarking for multimedia [ J ]. IEEE Trans on Image Processing, 1997,6(12) : 1673-1687.
  • 7MAENO K,SUN Q,CHANG SF.New Semi-Fragile Image Authentication Watermarking Techniques Using Random Bias and Nonuniform Quantization.IEEE Transactions on Multimediam,2006,8(1):32-45.
  • 8Dittmann.J.Content-fragile Watermarking for Image Authentication.Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents Ⅲ[C].San Jose,CA,Vol.4314,2001:175-184.
  • 9Lin.E T,Podilchuk.C I,Delp.E J,Detection of Image Alterations Using Semi-fragile Watermarks.Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents Ⅱ[C].San Jose,CA,USA,Jan.2000,3971:152-163.
  • 10Lin C Y,Chang S F.Semi-fragile Watermarking for Authentication JPEG Visual Content.Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents Ⅱ[C].San Jose,CA,USA,2000,3971:140-151.

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部