期刊文献+

基于混沌和数字签名的图像数字水印 被引量:2

A Watermarking System Based on Digital Signature and Chaos Map
在线阅读 下载PDF
导出
摘要 该文提出了一种基于混沌映射和数字签名的数字水印系统。用混沌映射对原始图像进行处理 ,生成一张与原始水印大小一样的图像块 ,计算图像块的每一子块的均值 ,把图像块转换成一个二值图像 ,然后将该二值图像与原始二值水印作运算得到一个新的私有水印 ,水印的还原过程与以上过程相反。结合数字签名技术把原始图像所有者有关信息通过认证中心进行认证签名 ,从而能够保证了水印的安全性。实验结果表明 。 In this paper a watermarking system based on digital signature and chaos map is proposed. Firstly, an original image is processed by chaos map thus generating an image block with the size of watermark. Then calculating the average pixel of each subblock of image block, so to generate a black and white image with the size of watermark. Secondly, this black and white image performs xor on each pixel of watermark , then generates a new black and white image, this image is a security image . Restore watermark is invert to the above-mentioned method. The chaos map and digital Signature technology are introduced to improve the watermarking security. Experimental results show the proposed technique has high robustness in image processing operations.
出处 《计算机仿真》 CSCD 2005年第1期147-149,共3页 Computer Simulation
关键词 混沌映射 混沌序列 数字水印 数字签名 Chaos map Chaos sequence Digital watermarking Digital signature
  • 相关文献

参考文献2

二级参考文献13

  • 1Friedman G. The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Transactions on Consumer Electronics, 1993,39:905-910.
  • 2Lin ET, Delp EJ. A review of fragile image watermarks. In: Proceedings of the Multimedia and Security Workshop at ACM Multimedia'99. Orlando: ACM Press, 1999. 35-39.
  • 3Fridrich J. Methods for tamper detection in digital images. In: Proceedings of the Multimedia and Security Workshop at ACM Multimedia'99. Orlando: ACM Press, 1999.29-33.
  • 4Wong PW. A public key watermark for image verification and authentication. In: Proceedings of the International Conference on Image Processing, Vol 1. Chicago: IEEE Computer Society Press, 1998. 425- 429.
  • 5Katzenbeisser S. On the design of copyright protection protocols for multimedia distribution using symmetric and public-key watermarking. In: Proceedings of the 5th International Query Processing and Multimedia Issues in Distributed Systems Workshop.Munich: IEEE Computer Society Press, 2001.815-819.
  • 6Nahrstedt K, Dittmann J, Wohlmacher P. Approaches to multimedia and security. In: Proceedings of the IEEE International Conference on Multimedia and Expo. New York: IEEE Computer Society Press, 2000. 1275-1278.
  • 7Schneider M, Chang SF. A robust content based digital signature for image authentication, In: Proceedings of the IEEE International Conference on Image Processing, Vol 3. Lausanne: IEEE Computer Society Press, 1996, 227-230.
  • 8Lou DC, Liu JLo Fault resilient and compression tolerant digital signature for image authentication. IEEE Transactions on Consumer Electronics, 2000,46(1):31-39.
  • 9Deng H, Gong L, Lazer A, et al. Practical protocols for certified electronic mail. Journal of Network and System Management,1996.4(3 ):279-297.
  • 10Gray JW, Epsilon KF. Protocols for issuing public-key certificates over the Internet. In: Han YF, ed. Proceedings of the International Conference on Information and Communications Security. Beijing: Springer-Verlag, 1997.424--434.

共引文献35

同被引文献12

  • 1朱国东,宁红宙,刘云.基于证书权威(CA)中心的时间戳服务系统的实现[J].中国安全科学学报,2004,14(12):87-90. 被引量:10
  • 2HUANG Fang-jun, GUAN Zhi-hong. A Hybrid SVD-DCT Watermarking Method Based on LPSNR [ J]. Pattern Recognition Letters, 2004, 25: 1769-1775.
  • 3Ingrid Daubechies. Ten Lectures on Wavelets [ M]. Philadelphia: SIAM, 1992.
  • 4DENG Xiao-hong, CHEN Zhi-gang, DENG Xiao-heng, et al. A novel dual-layer reversible watermarking for medical image authentication and electronic patient record hiding [ J ]. Advanced Science Let- ters ,2011,4( 11 ) : 3678-3684.
  • 5TONG Xiao-jun,LIU Yang,ZttANG Miao,et al. A novel chaos-based fragile watermarking for image tampering detection and self-recovery [ J]. Signal Processing: Image Communication, 2013,28 ( 3 ) : 301-308.
  • 6PHADIKAR A,MAITY S P, MANDAL M. Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images [ J ]. Journal of Visual Communication and Image Repre- sentation, 2012,23 ( 3 ) : 454 - 466.
  • 7RAWAT S, RAMAN B. A chaotic system based fragile watermarking scheme for image tamper detection [ J ]. AEU-Intemational Journal of Electronics and Communications,2011,65(10) :840-847.
  • 8陈帆,王宏霞.定位像素篡改的安全脆弱水印算法[J].铁道学报,2011,33(1):63-68. 被引量:6
  • 9蔡键,叶萍,刘涛.基于小波变换的用于医学图像的半脆弱水印算法[J].计算机应用与软件,2011,28(6):278-281. 被引量:12
  • 10臧鸿雁,范修斌,闵乐泉,韩丹丹.S-盒的Lyapunov指数研究[J].物理学报,2012,61(20):138-144. 被引量:4

引证文献2

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部