[1]董峰,金俭. 一种基于混沌脆弱水印的可逆双层图像认证方案[J].计算机技术与发展,2016,26(06):92-96.
 DONG Feng,JIN Jian. A Two-level Reversible Image Authentication Scheme Based on Chaotic Fragile Watermark[J].,2016,26(06):92-96.
点击复制

 一种基于混沌脆弱水印的可逆双层图像认证方案()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
26
期数:
2016年06期
页码:
92-96
栏目:
安全与防范
出版日期:
2016-06-10

文章信息/Info

Title:
 A Two-level Reversible Image Authentication Scheme Based on Chaotic Fragile Watermark
文章编号:
1673-629X(2016)06-0092-05
作者:
 董峰金俭
 黄河科技学院
Author(s):
 DONG FengJIN Jian
关键词:
 图像安全脆弱水印混沌迭代无损恢复图像认证篡改检测定位
Keywords:
 image securityfragile watermarkchaos iterationlossless recoveryimage authenticationtamper detection and location
分类号:
TP391
文献标志码:
A
摘要:
 针对多媒体数字图像易遭攻击的安全性问题,文中提出了一种基于混沌脆弱水印的可逆双层图像认证方案。在发送端,首先通过像素关联技术产生像素级的定位水印,并将其嵌入到自身的LSB位。然后把图像分成大小相同的块,先后计算每块的关系水印和检测水印,并分别用可逆的方法嵌入到偏移块的左上角和自身块的右下角。在接收端,首先对图像进行分块;然后通过比较提取和重新计算的水印来确定是否有篡改发生,并可以区分是内容篡改还是水印篡改。当内容被篡改时,可通过定位水印将篡改进一步定位到具体的像素,否则可以通过认证。大量的理论分析和实验仿真结果表明,该算法具有可行性和高效性,在同时需要认证和完整恢复原始图像的多媒体应用中表现得尤为明显。
Abstract:
 A two-level novel reversible image authentication scheme based on chaotic fragile watermark is proposed to locate tampered pixel accurately and ensure security of image. In the embedding process,at the pixel level,by utilizing the pixel correlation technology,the location watermark of each pixel is generated and embedded to the LSB of the pixel itself. At the image block level,the image is then par-titioned into blocks,then the relation and detection watermark of each block is computed and embedded into the top-left sub-block of its corresponding excursion block and the down-right sub-block of the block itself in a reversible way respectively. In the extracting process,the watermarked image is partitioned into blocks,the embedded detection and relation watermark of each block is extracted and the block is recovered,then computing the new relation watermark and detection watermarks of each recovered block and performing comparison with the extracted ones. In the proposed scheme,the tampered watermark can pass the authentication because it does not re-duce the value of image to some extent. But if the image content is tampered,the further step is taken at the pixel level to locate tamper to specific pixel by comparing the re-computed location watermark with the extracted location watermark. Theoretical analysis and com-puter simulation also indicates that the algorithm is feasible and efficient,especially in multimedia application requiring both integrity and confidentiality of the original image.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(06):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(06):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(06):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(06):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(06):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(06):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(06):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(06):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(06):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(06):47.

更新日期/Last Update: 2016-09-20