一种脆弱图像水印的安全性分析与改进  被引量:3

Security analysis and improvement on a fragile image watermarking

在线阅读下载全文

作  者:桑军[1] 向宏[1] 胡海波[1] 傅鹂[1] 蔡斌[1] 

机构地区:[1]重庆大学软件学院,重庆400044

出  处:《系统工程与电子技术》2009年第5期1204-1208,共5页Systems Engineering and Electronics

基  金:重庆市科委自然科学基金(2006BB2012);广东省教育部产学研结合项目(2007B090400121)资助课题

摘  要:分析了一种用于图像篡改检测和恢复的脆弱数字水印算法的安全性。该算法将图像划分为互不重叠的分块,通过均值比较及校验,产生各分块的认证水印,并嵌入到各自分块中。同时,在各分块中嵌入另一个分块的恢复信息,使得算法既能抵抗矢量量化攻击,又可以在某些分块被篡改时,予以一定程度的恢复。指出由于该算法生成和嵌入水印的方式过于简单,且其嵌入水印的密钥空间过小,能够通过穷举搜索轻易地发现所使用的密钥。因而能够伪造水印,导致错误认证。通过对于嵌入的水印进行混沌调制和置乱,并扩展密钥空间,有效地改进了算法的安全性。The security of a fragile digital watermarking scheme for image tamper detection and recovery is analyzed. The watermarking scheme divides an image into non-overlapping blocks, generates the authentication watermark for the blocks with comparison and parity check between the average intensities and embeds them into their own blocks. Also, the recovery information of another block is embedded into each block, which makes the scheme can resist an vector quantization (VQ) attack, while recover the image to a certain degree when some blocks are tampered. It is indicated that since the method for watermark generation and embedding is too simple, while the key space for watermark embedding is too small, the watermark embedding key can he obtained easily with exhaustive searches. Therefore, one may counterfeit watermark and lead incorrect authentication. The security of the scheme is effectively improved by using chaotic modulation and permutation to the em bedded watermark and making a expansion for the key space.

关 键 词:脆弱水印 安全性 调制 置乱 密钥空间 篡改检测 篡改恢复 

分 类 号:TP391[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象