J4 ›› 2010, Vol. 28 ›› Issue (04): 419-.

• 论文 • 上一篇    下一篇

用于内容精确认证的脆弱水印方案

刘 静a|朱晓冬b|李大伟c
  

  1. 吉林大学 |a数学学院;b计算机科学与技术学院;c公共计算机教学与研究中心| 长春 130012
  • 出版日期:2010-07-27 发布日期:2010-08-31
  • 通讯作者: 李大伟 (1966— ),男,长春人,吉林大学讲师,主要从事数据库研究,(Tel)86-13500822447 E-mail:ldw@jlu.edu.cn。
  • 作者简介:刘静(1964— )|女|长春人|吉林大学副教授|硕士|主要从事图像处理与模式识别研究|(Tel)86-13009010612(Email)j_liu@jlu.edu.cn;通讯作者:李大伟 (1966— )|男|长春人|吉林大学讲师|主要从事数据库研究|(Tel)86-13500822447(E-mail)ldw@jlu.edu.cn。

Fragile Watermarking Scheme Used in Content Features Complete Authentication

LIU Jinga|ZHU Xiao-dongb|LI Da-weic   

  1. aCollege of Mathematics;bCollege of Computer Science and Technology;cCenter for Computer Fundamental Education|Jilin University|Changchun |130012,China
  • Online:2010-07-27 Published:2010-08-31

摘要:

为验证图像在处理过程中是否被篡改,研究了用于内容精确认证的水印方案。通过对应用要求的分析,构建了一个满足这些要求的水印嵌入过程所遵循的一般性协议。遵循水印协议和脆弱水印算法基本框架实现了一种脆弱水印方案。方案将图像的奇异值作为参与乘积哈希的元素生成认证码,使用了MHC(Midified Huffman Codeing)编码对图像的低比特平面进行压缩。实验结果表明,该方案完全可以满足应用的要求。

关键词: 信息安全, 脆弱水印, 内容认证, 奇异值分解

Abstract:

We studied watermark scheme used in content features complete authentication to velidate if the image was juggled in processing. Based on the application requirements analysis, we have built general protocol to be followed during watermark embedding. A fragile watermarking scheme was implemented followed by watermarking protocol and fragile watermarking algorithm. As hash elements, participating product singular value of image, the authentication codes have been generated in the scheme. We compressed low bit flat of image by MHC(Midified Huffman Codeing) coding. According to the experimental results, it can completely meet the application requirements.

Key words: security information, fragile watermark, content authentication, singular valuedecomposition

中图分类号: 

  • TP393