期刊文献+

一种安全的基于层次结构的图像认证算法 被引量:1

Secure Image Authentication Scheme Based on Hierarchical Structure
下载PDF
导出
摘要 很多图像认证算法或者篡改定位精度较高,但容易受到攻击,或者牺牲定位精度来提高安全性.该算法利用自定义的层次结构,不但可以抵抗矢量量化(VQ)、黑盒(ORACLE)等各种攻击,满足安全性要求,而且具有很高篡改定位精度.如果一个被篡改的像素在第四层没有被检测出来,也会以将近100%的概率在第三、第二和第一层检测出来.理论分析表明该算法对单像素、2×2像素块篡改的漏报率分别低于0.78%、0.19%,对大于等于4×4像素块篡改的漏报率约等于0.实验结果表明,该算法对图像篡改具有高度的敏感性,而且嵌入的水印具有很好的不可感知性. Several image authentication schemes are either vulnerable to attacks or sacrifice localization accuracy to improve security. In this paper, a scheme is proposed that not only thwarts all kinds of attacks such as vector quantization(VQ) and oracle attack in order to satisfy the security but also ensures superior accuracy of tamper localization. If a tampered pixel is not detected in level-4, it will be detected in level 3, level 2 or level 1 with a probability of nearly 1. Theory analysis demonstrates that the method can detect any tampered pixel and the size of 2 × 2 pixel block with a missing rate less than 0.78% and 0. 19% respectively, and the missing rate of more than or equal the size of 4 × 4 pixel block is approximately close to 0. Experimental results demonstrate that the proposed scheme is highly sensitive to intentional tampering and the embedding watermarking is imperceptive.
出处 《小型微型计算机系统》 CSCD 北大核心 2007年第4期701-705,共5页 Journal of Chinese Computer Systems
关键词 图像认证 脆弱数字水印 层次结构 篡改检测 篡改定位 image authentication fragile watermarking hierarchical structure tamper detection tamper localization
  • 相关文献

参考文献2

二级参考文献64

  • 1Honsinger C.W., Jones P., Rabbani M., Stoffel J.C.. Lossless recovery of an original image containing embedded data. U.S. Patent No. 6,278,791, 2001 被引量:1
  • 2Fridrich J., Goljan M., Du R.. Lossless data embedding for all image formats. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 572~583 被引量:1
  • 3Tian J.. Wavelet-based reversible watermarking for authentication. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 679~690 被引量:1
  • 4Holliman M., Memon N.. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000, 9(3): 432~441 被引量:1
  • 5Fridrich J., Goljan M., Memon N.. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262~274 被引量:1
  • 6Wu J., Zhu B., Li S., Lin F.. Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes. In: Proceedings of the IEEE International Conference on Multimedia & Expo (ICME'04), Taiwan, 2004 被引量:1
  • 7Wu J., Zhu B., Li S., Lin F.. New attacks on SARI image authentication system. In:Proceedings of the SPIE,Vol.5306, Security and Watermarking of Multimedia Contents VI, San Jose, California, USA, 2004, 602~609 被引量:1
  • 8Yeung M., Mintzer F.. Invisible watermarking for image verification. Journal of Electronic Imaging, 1998, 7(3): 578~591 被引量:1
  • 9Wu M., Liu B.. Watermarking for image authentication. In: Proceedings of the IEEE International Conference on Image Processing, Chicago, USA, 1998, 2: 437~441 被引量:1
  • 10Memon N., Shende S., Wong P.. On the security of the Yeung-Mintzer authentication watermark. In:Proceedings of the IS&T PICS Symposium, Savannah, Georgia, 1999, 301~306 被引量:1

共引文献77

同被引文献7

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部