基于感興趣區(qū)域的圖像認(rèn)證技術(shù)
Effective Image Authentication Technique Based on the Interested Region
-
摘要: 信息認(rèn)證是網(wǎng)絡(luò)安全的一個重要方面,其目的在于判斷信息的完整性和可信性。該文在對以往的圖像認(rèn)證技術(shù)分析的基礎(chǔ)之上,給出了一種基于感興趣區(qū)域的圖像認(rèn)證算法。首先將要認(rèn)證的圖像分割成一定大小的基本圖像塊,然后根據(jù)用戶給出的感興趣區(qū)域,后續(xù)分割每一個基本圖像塊,并提取相應(yīng)各子塊的簽名信息并保存分割附加碼,最后將簽名信息隱藏于圖像子塊的中頻系數(shù)中。實驗結(jié)果證明算法不僅對偶然攻擊具有較強(qiáng)的魯棒性,而且對惡意攻擊具有較高的檢測、定位能力,同時具有較強(qiáng)的自適應(yīng)能力。
-
關(guān)鍵詞:
- 圖像認(rèn)證; 數(shù)字水印技術(shù); 感興趣區(qū)域; 圖像分割
Abstract: Information authentication technique is an important inspects of network security, and its motive lies in authentication of the integrity and creditability of information. Based on the analysis of the previous image authentication techniques, a new effective image authentication technique is proposed based on the interested region. Firstly, the original image is divided into a certain size preliminary image blocks. Then on the basis of the interested region given by users, the preliminary image block is divided into smaller blocks, at the same time the signature of each image block is extracted. Finally the signature of image blocks is embedded into intermediate frequency coefficient of image blocks. Experimental results are provided to demonstrate the effectiveness, self-adaptability, and validity of the method. -
ISO/IEC JTC 1/SC 29/WG 1 ISO/IEC FCD 15444-1: Coding of Still Pictures. Mar, 2000, http:∥www.jpeg.org/FCD15444-1 .htm.[2]Lin Ching-Yung, Chang Shih-Fu. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. on Circuits and Systems of Video Technology, 2001, 1(2): 153- 168.[3]Bhattacharjee S, Kutter M. Compression tolerant image authentication, Proc. IEEE Int. Conf. Image Processing, Chicago,1998, vol. l: 435 - 439.[4]Queluz M P. Content-based integrity protection of digital images,SPIE Conf. Security and Watermarking of Multimedia, San Jose,1999, Vol.3657:85 - 93.[5]Costa M H M. Writing on dirty paper[J].IEEE Trans. on Information Theory.1983, 29(3):439-[6]Chen B,Wornell G. Preprocessed and post processed quantization index modulation methods for digital watermarking, Proc. of SPIE, San Jose, 2000, Vol.3971:48 - 59. -
計量
- 文章訪問數(shù): 2226
- HTML全文瀏覽量: 99
- PDF下載量: 691
- 被引次數(shù): 0