检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:桑军[1] 向宏[1] 胡海波[1] 傅鹂[1] 蔡斌[1]
机构地区:[1]重庆大学软件学院,重庆400044
出 处:《系统工程与电子技术》2009年第5期1204-1208,共5页Systems Engineering and Electronics
基 金:重庆市科委自然科学基金(2006BB2012);广东省教育部产学研结合项目(2007B090400121)资助课题
摘 要:分析了一种用于图像篡改检测和恢复的脆弱数字水印算法的安全性。该算法将图像划分为互不重叠的分块,通过均值比较及校验,产生各分块的认证水印,并嵌入到各自分块中。同时,在各分块中嵌入另一个分块的恢复信息,使得算法既能抵抗矢量量化攻击,又可以在某些分块被篡改时,予以一定程度的恢复。指出由于该算法生成和嵌入水印的方式过于简单,且其嵌入水印的密钥空间过小,能够通过穷举搜索轻易地发现所使用的密钥。因而能够伪造水印,导致错误认证。通过对于嵌入的水印进行混沌调制和置乱,并扩展密钥空间,有效地改进了算法的安全性。The security of a fragile digital watermarking scheme for image tamper detection and recovery is analyzed. The watermarking scheme divides an image into non-overlapping blocks, generates the authentication watermark for the blocks with comparison and parity check between the average intensities and embeds them into their own blocks. Also, the recovery information of another block is embedded into each block, which makes the scheme can resist an vector quantization (VQ) attack, while recover the image to a certain degree when some blocks are tampered. It is indicated that since the method for watermark generation and embedding is too simple, while the key space for watermark embedding is too small, the watermark embedding key can he obtained easily with exhaustive searches. Therefore, one may counterfeit watermark and lead incorrect authentication. The security of the scheme is effectively improved by using chaotic modulation and permutation to the em bedded watermark and making a expansion for the key space.
关 键 词:脆弱水印 安全性 调制 置乱 密钥空间 篡改检测 篡改恢复
分 类 号:TP391[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.229