[1]黄子龙 张政保 文家福 李占德.一种基于Hash函数的脆弱水印算法[J].计算机技术与发展,2011,(02):151-154.
 HUANG Zi-long,ZHANG Zheng-bao,WEN Jia-fu,et al.Fragile Image Watermarking Algorithm Based on Hash Function[J].,2011,(02):151-154.
点击复制

一种基于Hash函数的脆弱水印算法()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2011年02期
页码:
151-154
栏目:
智能、算法、系统工程
出版日期:
1900-01-01

文章信息/Info

Title:
Fragile Image Watermarking Algorithm Based on Hash Function
文章编号:
1673-629X(2011)02-0151-04
作者:
黄子龙 张政保 文家福 李占德
军械工程学院计算机工程系
Author(s):
HUANG Zi-longZHANG Zheng-baoWEN Jia-fuLI Zhan-de
Department of Computer Engineering,Ordnance Engineering College
关键词:
脆弱水印Hash函数混沌映射完整性认证篡改定位
Keywords:
fragile watermarking Hash function chaotic map integrity authentication tamper localization
分类号:
TP301.6
文献标志码:
A
摘要:
当前空域脆弱水印算法存在安全性不高及不能有效抵抗矢量量化攻击的缺陷。针对该缺陷,提出一种用于数字图像完整性认证及内容篡改证明的脆弱水印算法。算法首先对图像进行8×8分块,利用Logistic混沌映射对图像分块进行置乱编号;再采用Hash函数生成基于图像分块内容和位置信息的水印信号;最后将水印信号嵌入到图像分块像素值的低两位平面。实验结果及理论分析表明,提出的脆弱水印算法在保证安全性的同时,有效地抵抗了矢量量化攻击
Abstract:
At present,the flaws of the airspace fragile image watermarking algorithm are the low security and lack of effective resistance to the vector attacks.To solve the problem,a fragile watermarking scheme is presented for tamper-proof digital authentication and content tamper testification.Firstly,dividing the image into blocks of 8×8,using the Logistic chaotic map generates the block watermark;Then create the fragile image watermarking based on image-blocking by Hash function;Finally,embedding the watermarking signals into the 2 bit LSB of the blocks of image.Experimental results indicate that the fragile image watermarking algorithm based on Hash function can not only ensure the security in system,but also efficiently resist the vector quantization attacks

相似文献/References:

[1]杨智 王运琼 冯乔生 罗可 冉婕 章秀君.一种有关DWT与SVD相结合的多功能水印新方案[J].计算机技术与发展,2010,(07):140.
 YANG Zhi,WANG Yun-qiong,FENG Qiao-sheng,et al.New Multi-function Watermark Scheme Based on DWT and SVD[J].,2010,(02):140.
[2]李占德 张政保 刘会英 文家福.一种改进的基于循环块相关的脆弱水印认证算法[J].计算机技术与发展,2010,(09):161.
 LI Zhan-de,ZHANG Zheng-bao,LIU Hui-ying,et al.An Improved Fragile Watermarking Authentication Algorithm Based on Circular-Block Dependence[J].,2010,(02):161.
[3]吴杨 矫文成 赵新杰 王韬 吴克辉.引入Hash函数的抗差分故障分析模型研究[J].计算机技术与发展,2011,(05):166.
 WU Yang,JIAO Wen-cheng,ZHAO Xin-jie,et al.Research in Anti-DFA Model with Hash Function[J].,2011,(02):166.
[4]王淦,张文英. S HA-3轮函数中ρ、π及χ变换的逆变换[J].计算机技术与发展,2014,24(12):151.
 WANG Gan,ZHANG Wen-ying. Inverse Mappings ofρ、πand χMappings in SHA-3 Permutation[J].,2014,24(02):151.
[5]董峰,金俭. 一种基于混沌脆弱水印的可逆双层图像认证方案[J].计算机技术与发展,2016,26(06):92.
 DONG Feng,JIN Jian. A Two-level Reversible Image Authentication Scheme Based on Chaotic Fragile Watermark[J].,2016,26(02):92.

备注/Memo

备注/Memo:
河北省科技计划基金项目(05213579)黄子龙(1986-),男,硕士研究生,研究方向为信息安全、图像认证;张政保,教授,硕士生导师,研究方向为信息安全、多媒体信息处理
更新日期/Last Update: 1900-01-01