期刊文献+

基于Hash函数敏感性的医学图像精确认证 被引量:5

Hard Authentication for Medical Image Based on Sensitivity of Hash Function
在线阅读 下载PDF
导出
摘要 为了有效地鉴定医学图像的真实性和完整性,提出了一种基于提升格式的整数小波变换和Hash函数敏感性相结合的易碎水印方法。该方法在不需要原始图像的条件下,就可以检测到图像1bit的篡改,还可以对篡改区域进行定位。与现有基于小波变换的数字水印方法相比,可以在减少计算复杂性的同时,提高嵌入水印图像的质量。而MD5算法构造的Hash函数的运用提高了水印安全性和水印检测的能力。实验结果表明,本文算法对篡改具有极强的敏感性,且整个认证过程还需密钥完成检测,安全性很高,认证过程计算简单且准确性很高。 A fragile watermark is designed using integral wavelet transform combined with hash function in order to verify the integrity of medical images. Even 1 bit of change in the picture can be sensed. Furthermore the region distorted can be easily oriented in this algorithm without an original image. Compared with the traditional digital watermark based on wavelet transform, the integer wavelets not only simplify the calculation but also improve the quality of watermarked image. And the hash function constructed with MD5 algorithm increases the security and ability of tamper localization of watermark. The results of experiment indicates that watermark scheme is highly sensitive to the distortion of the image. Since it requires a key during both the insertion and the extraction procedures, it has high security and the whole process is simple and accurate.
出处 《中国图象图形学报》 CSCD 北大核心 2008年第2期204-208,共5页 Journal of Image and Graphics
基金 国家自然科学基金重点项目(30730036) 国家重点基础研究发展计划973项目(2003CB716104)
关键词 医学图像认证 易碎水印 整数小波变换 小波树 HASH函数 medical image authentication, fragile watermark, integral wavelet transform, quadtrees, Hash function
  • 相关文献

参考文献8

  • 1Walton S. Information authentication for a slippery new age [ J ]. Doctor Dobbs Journal, 1995, 20(4) : 18-26.
  • 2Yeung M, Mintzer F. Invisible watermarking for image verification [J]. Journal of Electronic Imaging, 1998, 7(3) : 578-591.
  • 3Wong P W, Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification [ J ]. IEEE Transactions on Image Processing, 2001, 10(10) : 593-601.
  • 4Wong P W. A public key watermark for image verification and authentication [ A ]. In: Proceedings of the IEEE International Conference on Image Processing[C], Chicago, USA, 1998:455-459.
  • 5Lin E T, Delp E J. A review of fragile image watermarks[ A ]. In: Proceedings of the Multimedia and Security Workshop (ACM Multimeda' 99 ) Multimedia Contents [ C ] , Orlando, FL, USA, 1999: 25-29.
  • 6Coatrieux G, Maitre H, Sankur B, et al. Relevance of watermarking in medical imaging [ A ]. In: IEEE-embs Information Technology Applications in Biomedicine [ C ] , Arlington, USA, 2000:250-255.
  • 7吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004,27(9):1153-1161. 被引量:71
  • 8冯前进,陈凌剑,杨丰.基于整数小波变换的医学图像易碎水印方法[J].中国图象图形学报,2006,11(5):736-741. 被引量:5

二级参考文献60

  • 1Honsinger C.W., Jones P., Rabbani M., Stoffel J.C.. Lossless recovery of an original image containing embedded data. U.S. Patent No. 6,278,791, 2001
  • 2Fridrich J., Goljan M., Du R.. Lossless data embedding for all image formats. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 572~583
  • 3Tian J.. Wavelet-based reversible watermarking for authentication. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 679~690
  • 4Holliman M., Memon N.. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000, 9(3): 432~441
  • 5Fridrich J., Goljan M., Memon N.. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262~274
  • 6Wu J., Zhu B., Li S., Lin F.. Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes. In: Proceedings of the IEEE International Conference on Multimedia & Expo (ICME'04), Taiwan, 2004
  • 7Wu J., Zhu B., Li S., Lin F.. New attacks on SARI image authentication system. In:Proceedings of the SPIE,Vol.5306, Security and Watermarking of Multimedia Contents VI, San Jose, California, USA, 2004, 602~609
  • 8Yeung M., Mintzer F.. Invisible watermarking for image verification. Journal of Electronic Imaging, 1998, 7(3): 578~591
  • 9Wu M., Liu B.. Watermarking for image authentication. In: Proceedings of the IEEE International Conference on Image Processing, Chicago, USA, 1998, 2: 437~441
  • 10Memon N., Shende S., Wong P.. On the security of the Yeung-Mintzer authentication watermark. In:Proceedings of the IS&T PICS Symposium, Savannah, Georgia, 1999, 301~306

共引文献74

同被引文献55

  • 1SCHNEIDER M, CHANG S F. A robust content based digital signature for image authentication [ C ] // Proceedings of the IEEE International Conference on Image Processing. 1996:227-230.
  • 2VENKATESAN R, KOON S M, JAKUBOWSKI M H, et al. Robust image hashing [ C ] // Proceedings of the IEEE International Conference on Image Processing. 2000: 664-666.
  • 3FRIDRICH J, GOLJAN M. Robust hash functions for digital watermarking [ C ] // Proceedings of the IEEE International Conference on Information Technology: Coding and Computing. 2000 : 178-183.
  • 4MIHCAK K, VENKATESAN R. New iterative geometric techniques for robust image hashing, [ C ]// Proceedings of the ACM Workshop on Security and Privacy in Digital Rights Management. 2001:13-21.
  • 5MONGA V, MIHCAK M K. Robust and secure image hashing via non-negative matrix factorizations [ J ]. IEEE Transactions on Information Forensics and Security, 2007, 2(3):376-390.
  • 6LI J. Photography image database [ EB/OL ]. [ 2011-12- O1 ]. http : jjwww, stat. psu. edu/ jiali/index, download. html.
  • 7SWAIN M, BALLARD D. Color indexing [ J ] International Journal of Computer Vision, 1991, 7 ( 1 ) 11-32.
  • 8KOTOULAS L, ANDREADIS I. Color histogram content- based image retrieval and hardware implementation [ J ]. IEEE Transactions on Circuits, Devices and Systems, 2003, 150(5) :387-393.
  • 9BAI X, LIU W J. Research of image retrieval based on color [ C l// International Forum on Computer Science Technology and Applications. 2009:283-286.
  • 10CHEN Q, PETRIU E, YANG X L. A comparative study of Fourier descriptors and Hu' s seven moment invariants for image recognition [ C ] // Canadian Conference on Electrical and Computer Engineering. 2004:103-106.

引证文献5

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部