期刊文献+

一种像素级的图像篡改认证算法 被引量:8

Pixel-level image modification authentication algorithm
在线阅读 下载PDF
导出
摘要 提出了一种用于图像内容像素级篡改认证的脆弱水印算法,能准确识别图像中被篡改的像素点,并且能容忍图像传输过程中出现的个别认证信息位的传输错误。这种算法以向左右和上下各扩展若干个像素点来产生认证信息,结合周围像素来确定嵌入的水印比特而引入基于图像的不确定性的某些算法,常常会出现被篡改的单个像素点不能被准确定位的问题,本算法可有效解决这一问题,认证信息进行加密后再进行嵌入,解决了多数像素级认证算法所出现的安全漏洞问题。 A fragile watermarking algorithm used to authenticate the pixel-level modification to the image content was proposed, which can distinguish pixel points modified in image and tolerate transmission errors of individual authentication information bit in the process of image transmission. In this algorithm, authentication information was produced by extending more and more pixel points toward both left-right and up-down, which ensured the accurate location of individual juggled pixels resulting from some algorithms based on image uncertainty by combining surrounding pixels to determine the embedded watermarking bits. Authentication information was embedded after encryption to avoid most problems of security bugs caused by most pixel-based authentication algorithms.
出处 《计算机应用》 CSCD 北大核心 2007年第6期1337-1338,1342,共3页 journal of Computer Applications
基金 国家自然科学基金资助项目(60574030) 湖南省教育科学"十一五"规划课题(XJK06CXJ012)
关键词 脆弱水印 图像认证 篡改检测 fragile watermarking image authentication modification detection
  • 相关文献

参考文献7

  • 1吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:70
  • 2YEUNG M,MINTZER F.An invisible watermarking technique for image verification[A].Proc.IEEE International Conference on Image Processing[C].Santa Barbara,USA,1997,2:680-683.
  • 3WONG P,MEMON N.Secret and public key image watermarking schemes for image authentication and ownership verification[J].IEEE Transactions on Image Processing,2001,10(10):1593 -1601.
  • 4HOLLIMAN M,MEMON N.Counterfeiting attacks for block-wise independent watermarking techniques[J].IEEE Trans.on Image Processing,2000,9(3):432-441.
  • 5FRIDRICH J,GOLJAN M,MEMON N.Further attacks on YeungMintzer fragile watermarking scheme[A].In:Proc.SPIE Photonic West,Electronic Imaging 2000,Security and Watermarking of Multimedia Contents[C].San Jose,California,January 24-26,2000.428-437.
  • 6ALBANESI MG,FERRETTI M,GUERRINI F.A taxonomy for image authentication techniques and its application to the current state of the art[A].In:Proceedings of the 11th International Conference of Image Analysis[C].Palermo,Italy,2001.535-540.
  • 7FRIDRICH J,GOLJAN M,BALDOZA AC.New fragile authentication watermark for images[A].In:Proc ICIP[C].Vancouver,Canada,September 10-13,2000.446-449.

二级参考文献55

  • 1Honsinger C.W., Jones P., Rabbani M., Stoffel J.C.. Lossless recovery of an original image containing embedded data. U.S. Patent No. 6,278,791, 2001
  • 2Fridrich J., Goljan M., Du R.. Lossless data embedding for all image formats. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 572~583
  • 3Tian J.. Wavelet-based reversible watermarking for authentication. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 679~690
  • 4Holliman M., Memon N.. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000, 9(3): 432~441
  • 5Fridrich J., Goljan M., Memon N.. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262~274
  • 6Wu J., Zhu B., Li S., Lin F.. Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes. In: Proceedings of the IEEE International Conference on Multimedia & Expo (ICME'04), Taiwan, 2004
  • 7Wu J., Zhu B., Li S., Lin F.. New attacks on SARI image authentication system. In:Proceedings of the SPIE,Vol.5306, Security and Watermarking of Multimedia Contents VI, San Jose, California, USA, 2004, 602~609
  • 8Yeung M., Mintzer F.. Invisible watermarking for image verification. Journal of Electronic Imaging, 1998, 7(3): 578~591
  • 9Wu M., Liu B.. Watermarking for image authentication. In: Proceedings of the IEEE International Conference on Image Processing, Chicago, USA, 1998, 2: 437~441
  • 10Memon N., Shende S., Wong P.. On the security of the Yeung-Mintzer authentication watermark. In:Proceedings of the IS&T PICS Symposium, Savannah, Georgia, 1999, 301~306

共引文献69

同被引文献56

引证文献8

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部