用户名: 密码: 验证码:
数字图像安全认证水印算法及其统计检测性能分析
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数字认证水印是信息安全领域的一项新兴技术,用于鉴别数字媒体的真实性和完整性,并通过篡改定位和篡改恢复来提供篡改证据。算法设计与安全性分析是数字认证水印技术发展过程中的两个方面,它们既对立又统一,共同推动数字认证水印技术的发展。
     本论文以数字图像为对象,以协调安全性与定位精度之间的矛盾为目标,以数理统计与概率论为工具,开展新型的安全数字认证水印算法及其统计检测性能的分析研究。具体工作如下:
     一、结合现有数字认证水印算法的研究成果,以图像块为单位,公式化地描述了数字认证水印算法设计的三个共性问题:水印生成、水印嵌入和篡改检测。其次,定义了用于评价数字认证水印算法篡改检测性能和安全性的定量指标。最后,结合本文认证水印算法的设计要求,提出了基于混沌的伪随机整数序列发生器和快速置乱加密方法。
     二、在分析现有Hash分块数字认证水印算法共同特性及弱点的基础上,提出一种基于统计的安全Hash分块认证水印算法。该算法将图像块的水印信息随机隐藏在其它像素的低位,利用水印信息的统计分布和阈值决策判定图像块有效性。分析比较了相同水印嵌入容量下,本文与传统Hash分块认证水印算法的安全性与定位精度之间的关系。研究结果表明,基于统计的Hash分块认证水印算法能有效缓解安全性、定位精度和水印容量之间的矛盾。
     三、为提高定位精度和统计检测性能,提出了一种基于邻域篡改特征的认证水印算法。设计了量化DWT低频系数的水印生成方法和基于邻域篡改特性的统计检测算法,对篡改与非篡改块邻域篡改特征的统计分布、阈值选取和恒量化篡改等理论分析和实验结果表明,基于邻域篡改特征的认证水印算法不仅能抵抗拼贴攻击,而且提高了定位精度和对无害变形的鲁棒性。另一方面,设计了“邻域-统计检测模型”,并以单像素统计脆弱水印算法中的统计检测模型为例,分析比较了“邻域-统计检测模型”和传统统计检测模型在不同篡改比例下的统计检测性能。研究结果表明邻域-统计检测模型能有效提高基于统计的数字认证水印算法的统计检测性能。
     四、从可恢复水印算法与定位型数字水印算法的区别出发,分析指出了可恢复认证水印算法需要解决的四个关键问题:水印生成、块链生成、篡改检测和篡改恢复。重点分析了现有可恢复水印算法中块链生成的安全性,提出一种“同步伪造攻击”。同时,针对多数投票可恢复水印算法提出一种“异或等价攻击”,说明通过“附加认证水印”很难有效解决可恢复认证水印算法的篡改检测问题。
     五、在可恢复认证水印算法四个关键问题和安全性分析的基础上,提出一种基于映射块邻域比较的安全可恢复数字认证水印算法。该算法基于伪随机序列的索引有序序列生成块链,不仅能有效克服线性映射的固有缺陷,而且能满足可恢复水印算法篡改检测、篡改恢复和安全性等要求。认证时,通过比较被测图像块与其映射块邻域的篡改统计特征来检测图像块的有效性,并设计了三个优化策略进一步提高算法的篡改检测性能。分别推导给出了“邻域比较”篡改检测在不同恶意攻击下的虚/漏警概率,讨论分析了优化策略中的阈值选取及其有效性。此外,该算法提出的密钥均值水印与相应的优化策略相结合,能有效提高可恢复认证水印算法抵抗“恒均值”攻击的能力。大量实验统计结果验证了理论分析的正确性和算法的有效性。
     总之,本论文围绕基于统计的安全数字认证水印算法与统计检测性能分析展开研究,提出了三种水印生成方法、两种水印嵌入准则和三种统计检测模型。对算法的安全性、篡改检测性能和篡改恢复质量的定量分析和评估,有助于设计出适用于不同应用范围的数字认证水印算法并最终实现全面商用。
As a branch of information security, digital image authentication watermarking aims to verify the integrality and authenticity of a host image and provide the tamper proofing by tamper localization and tamper recovery. The research achievements on secure digital image authentication watermarking are classified into the following five categories.
     The first is a study on three basic problems in digital image authentication watermarking techniques. (1) three common issues in digital image authentication watermarking are generalized and formally described. (2) the false acceptance probability, the false rejection probability and the security strength are introduced for performance evaluation; and (3) new encryption methods for authentication watermarking are proposed.
     The second is to propose a secure hash block-wise watermarking scheme for image authentication based on statistical distribution. In proposed schemes, the watermark of each block is randomly distributed and hidden into the least significant bit of whole host image based on secret key. The statistical distributions corresponding to tampered and valid blocks and threshold decision can be used to determine the validity of image blocks. Furthermore, we discuss the relationship between the security strength and block size. Theoretical and experimental results demonstrate that the proposed scheme not only satisfactorily resists the Holliman-Memon attack and collage attack, but also improves the localization accuracy without sacrificing security.
     The third category is secure authentication watermarking schemes based block-neighborhood tampering characterization. The main object of this chapter is to improve localization accuracy, robustness against noise and the tamper detection performance. In proposed algorithm, the security watermark data are generated by quantizing and scrambling the low-frequency wavelet coefficients of the original image content. The validity of the test block is detected by taking the blocks in a 3×3 block-neighborhood of it. Moreover, we discuss the block-neighborhood distributions of tampered and original blocks and the choice of predefined threshold. In addition, we design a neighborhood-characteristic (NC) based statistical detection model, and gives analytical analysis of the false acceptance and false rejection probabilities of the proposed and conventional statistical detection model.
     The fourth is a security analysis of existing self-recovery watermarking schemes. First, we generalize four key issues to be resolved in self-recovery watermarking schemes. And then, we analyze the security of the current self-recovery watermarking schemes from the four aspects, and proposed two new counterfeiting attacks: the XOR-equivalent attack and the synchronous counterfeiting attack.
     The last is to propose a secure self-recovery authentication watermarking scheme based on neighborhood-comparison of the test block and its mapping one, and gives analytical analysis of its false acceptance and false rejection probabilities under various maliciously tampering. The proposed scheme embeds the encrypted feature comprising 6-bit recovery data and 2-bit key-based data of the image block into its mapping block, which is randomly generated based on secret key. The legitimacy of a test block is determined by comparing the number of inconsistent blocks in the 3×3 block-neighborhood of the test block with that of its mapping block. Analytical and experimental results demonstrate that the proposed method outperforms conventional self-recovery watermarking algorithms in tamper detection and recovery under various maliciously attacks such as the collage attack and the constant-average attack. In addition, the encrypted feature and the non-linear block-mapping sequence make it difficult to obtain the information of the block-mapping sequence. Thus security of the proposed fragile watermarking scheme is enhanced.
     In summary, the thesis mainly focuses on the research of secure digital watermarking for image authentication and performance analysis of statistical detection. The quantitative evaluation of security, tamper detection performance and tamper recovery quality will be helpful to design the algorithm for different applications and consummate authentication digital watermarking technique.
引文
[1]Wenbo Mao.Mordern Cryptography:Theory and Practice.Poblishing House of Electronics Industry,2004.7
    [2]武金木,张常有等.信息安全基础.武汉大学出版社,2007.7
    [3]J.Dittmann,K.Nahrstedt,P.Wohlmacher.A survey of multimedia security.Multimedia and Security.Workshop at ACM Multimedia'99.Orlando,Florida,October 1999
    [4]Stefan Katzenbeisser,A.Fabien,P.Petitcolas编,吴秋新,钮心忻,杨义先,罗守山,杨晓兵译.信息隐藏技术-隐写术与数字水印.北京人民邮电出版社,2001.
    [5]F.A.P.Peticolas,R.J.Anderson,M.G.Kuhn.Information Hiding:A Survey.Proc.of IEEE special issue on Protection of Multimedia Content,1999,87:1062-1078.
    [6]刘振华,尹萍.信息隐藏技术及其应用.北京科学出版社,2002.
    [7]钮心忻.信息隐藏与数字水印.北京邮电大学出版社,2004.
    [8]P.Moulin,R.Koetter.Data-hiding codes.Proc.of the IEEE,Dec.2005,93(12):2083-2126.
    [9]张新鹏,信息隐藏安全性研究.上海大学博士学位论文,2004.1
    [10]I.J.Cox,M.L.Miller,J.A.Bloom.Digital Watermarking.London Academic Press,1999.
    [11]I.J.Cox,M.L.Miller,J.A.Bloo.Watermarking applications and their properties.Proc.of Information Technology:Coding and Computing,2000:6-10.
    [12]I J.Cox,M L.Miller.Review of watermarking and the importance of perceptual modeling.In:Bernice E R,Thrasyvoulos N P,eds.Human Vision and Electronic Imaging Ⅱ,Vol.3016.Bellingham:SPIE Press,1997:92-99
    [13]C.-Y.Lin.Watermarking and Digital Signature Techniques for Multimedia Authentication and Copyright Protection.the thesis for the Degree of Doctor of Philosophy in the Graduate School of Arts and Science of Columbia University,2000
    [14]F.Hartung,M.Kutter.Multimedia Watermarking Techniques.Proceedings of the IEEE,1999,87(7):1079-1107.
    [15]孙圣和,陆哲明,牛夏牧.数字水印技术及应用.科学出版社,2004
    [16]尹浩,林闯,邱峰,丁嵘.数字水印技术综述.计算机研究与发展,2005,42(7):1093-1099
    [17]Chun-Shien Lu.Audio fingerprinting based on analyzing time-frequency localization of signals.IEEE Workshop on Multimedia Signal Processing,Dec.2002:174-177
    [18]夏晓清.面向图像内容认证的数字水印技术研究.西北工业大学博士学位论文,2005.9.
    [19]吴金海,林福宗.基于数字水印的图像认证技术.计算机学报,2004,27(9):1153-1161
    [20]张先红.数字签名原理与技术.机械工业出版社,2004.1
    [21]庞晓红.图像数字水印理论与技术研究.哈尔滨工程大学博士学位论文,2006.4
    [22]陈丹,王育民.基于水印的图像认证和完整性保护技术.通信技术,2003,139(7):93-95.
    [23]L.Xie,G.R.Arce.A class of Authentication Digital Watermarks for Secure Multimedia Communication.IEEE Trans.On Image Processing.November 2001,10(11):1754-1764
    [24]B.B.Zhu,M.D.Swanson,and A.H.Tewfik When Seeing Isn't Believing.IEEE Signal Processing Magazine,March 2004:40-49
    [25]G.L.Friedman.The Trustworthy Digital Camera:Restoring Credibility to the Photographic Image.IEEE Trans.on Consumer Electronics,Nov.1993,39(4):404-408
    [26]E.T.Lin and E.J.Delp.A Review of fragile image watermarks.Proceedings of the Multimedia and Security Workshop(ACM Multimedia'99) Multimedia Contents.Orlando,FL,October 1999:25-29.
    [27]Christian Rey,Jean-Luc Dugelay.A survey of watermarking algorithms for image authentication.EURASIP Journal on Applied Signal Processing,2002.6:613-621
    [28]胡军全,黄继武,张龙军,黄达人.结合数字签名和数字水印的多媒体认证系统.软件学报,2003,14(6):1157-1163.
    [29]Z.-F.Yang,W.-H.Tsai.Watermarking Approach to embedded Signature-based Authentication by Channel Statistics.Optical Engineering,April 2003,42(4):1157-1165
    [30]M.M.Yeung and F.C.Mintzer.An invisible watermarking technique for image verification,in Proc.International Conference Image Processing,Santa Barbara,Oct.1997,Ⅱ.680-683,.
    [31]M.M.Yeung,F.C.Mintzer.Invisible watermarking for image verification.Journal of Electronic Imaging,July 1998,7(3):578-591.
    [32]N.Memon,S.Shende,and P.W.Wong.On the security of the Yeung-Mintzer authentication watermark.Proc.IS & T PICS Symp.,Savannah,Georgia -March 1999.
    [33]N.Memon,and M.Goljan.Further Attacks on Yeung-Mintzer Fragile Watermarking Scheme.with Proc.SPIE Photonic West,Electronic Imaging 2000,Security and Watermarking of Multimedia Contents,San Jose,California,January,2000:428-437.
    [34]J.Fridrich,M.Goljan and N.Memon.Cryptanalysis of the Yeung-Mintzer Fragile Watermarking Technique Electronic Imaging,April 2002,11(4):262-274
    [35]J.Wu,B.Zhu,S.Li,F.Lin.Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes.In Proceedings of the IEEE International Conference on Multimedia & Expo(ICME'04),Taiwan,2004
    [36]D.Coppersmith,F.Mintzer,C.Tresser,C.W.Wu,and M.Yeung.Fragile imperceptible digital watermark with privacy control.Proc.SPIE 3657,1999:79-84
    [37]J.Fridrich,M.Goljan,and A.C.Baldoza.New fragile authentication watermark for images,in Proc.IEEE Int.Conf.Image Processing,Vancouver,BC,Canada,Sept.2000:10-13
    [38]C.Kailasanathan.Fragile watermark based on Polarity of pixels Points.Proceeding of the 3~(rd) international Symposium on Image and Signal Processing and Analysis,2003:860-865
    [39]张小华,孟红云等.一类有效的脆弱型数字水印技术.电子学报.2004,32(1):114-117
    [40]丁科,何晨,王宏霞.一种定位精确的混沌脆弱数字水印技术.电子学报.2004,32(6):1009-1012
    [41]S.-H.Liu,H.-X.Yao,W.Gao,and Y.-L.Liu.An image fragile watermark scheme based on chaotic image pattern and pixel-pairs.Appl.Math.Comput.Feb.2007,185(2):869-882
    [42] J. Wu , B. Zhu, S. Li, S. Lin. A secure image authentication algorithm with pixel-level tampering localization. In: Proceedings of the IEEE International Conference on Image Processing (ICIP'04), Singapore , 2004
    [43] X. Zhang, and S. Wang. Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal processing Letter, October 2007, 14(10):727-731
    [44] P.W. Wong. A Public Key Watermark for image verification and authentication. In Proc. IEEE Int. Conf. Image Processing, Chicago, IL, Oct. 1998: 425-429
    
    [45] P.W.Wong. A watermark for image integrity and ownership verification. in Proceedings of IS&TPIC Conference (Portland, OR), May 1998.
    [46] M.Holliman, N.Memon. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans on Image Processing, 2000.3(9):432-441
    [47] M.U.Celik, S.Gaurav, et al. Hierarchical watermarking for secure image authentication with localization. IEEE Trans on Image Processing. 2002.11(6):585- 595.
    [48] Barreto, P., Kim, H., Rijmen, V. Toward secure public-key block-wise fragile authentication watermarking. IEE Proceedings-Vision, Image and Signal Processing, 2002.2 (149): 57-62
    [49] C.-T. Li, F.-M. Yang. One-dimensional Neighborhood Forming Strategy for Fragile Watermarking. Journal of Electronic Imaging, April 2003, 12(2):284-291
    [50] F.L. Liu, Y,S. Wang. An Improved Block Dependent Fragile Watermark. ICME 2003,11: 501-504
    [51] Yinyin Yuan, Chang-Tsun Li. Fragile Watermarking Scheme Exploiting Non-deterministic Block-wise Dependency. In proceeding of 17th International Conference on Pattern Recognition (ICPR'04)
    
    [52] Yassin M.Y., Ammar M. Fragile Blockwise Image Authentication Thwarting Vector Quantization Attack. 2004 IEEE: 530-533
    [53] S. Suthaharan. Fragile image watermarking using a gradient image for improved localization and security. Pattern Recognition Letters 2004,25:1893-1903
    [54] P.W.Wong, N.Memon. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans on Image Processing, 2001,10 (10):1593 - 1601
    [55]J.Fridrich.Security of Fragile Authentication Watermarks with Localization,Proc.SPIE,Vol.4675,Security and Watermarking of Multimedia Contents,San Jose,California,January,2002:691-700
    [56]F.Deguillaume,S.Voloshynovskiy,T.Pun.Secure hybrid robust watermarking resistant against tampering and copy attack.Signal Processing,2003(83):2133-2170
    [57]Izquierdo.E,Guerra.V.An ill-posed operator for secure image authentication.IEEE Transactions on Circuits and Systems for Video Technology,Aug.2003,13(8):842-852
    [58]Yongdong Wu and Robert H.Deng.Security of an ill-posed Operator image authentication,IEEE Trans.On Circuits and systems for video Technology,January 2005,15(1):161-163
    [59]D.Kunder and D.Hatzinakos.Towards a telltale watermarking technique for tamper proofing.Proc.IEEE Int.Conf.On image processing,1998,2:409-413
    [60]D.Kundur and D.Hatzinakos.Digital watermarking for telltale tamper proofing and authentication.Proceedings of IEEE,1999,87(7):1167-1180
    [61]J.Fridrich,M.Goljan.Protection of digital images using self embedding.Processings of NJIT Symposium on Content Security and Data Hiding in Digital Media,(Newark,NJ).New Jersty Institute of Technology,May,1999.
    [62]J.Fridrich,M.Goljan.Images with Self-Correcting Capabilities.ICIP'99,Kobe,Japan,October 25-28,1999.
    [63]Y.F.Shao,L.Zhang,G.W.Wu,and X.G.Lin.Reconstruction of missing blocks in image transmission by using self-embedding.Proc.Internat.Symp.Intelligent Multimedia Video and Speech,May 2001:535-538.
    [64]Kostopoulos,S.A.M.Gilani,and A.N.Skodras.Color image authentication based on a self-embedding technique.Proc.14th Internat.Conf.Digital Signal Processing,July 2002:733-736.
    [65]和红杰,张家树.一种安全的自嵌入及篡改检测和恢复算法.哈尔滨工业大学学报,2006.7,38(sup):889-893
    [66]张鸿宾,杨成.图像的自嵌入及篡改的检测和恢复算法.电子学报,2004,32(2):196-199
    [67]何孝富,黄继凤,张培君等.一种具有自我恢复功能的脆弱性水印技术.上海师范大学学报(自然科学版,Mar.2004,33(1):56-62
    [68]朱海峰,赵春晖,唐春明.用于图像局部篡改检测和自恢复的脆弱数字水印算.Proceedings of the 6~(th) World Congress on Intelligent Control and Automation,Dalian,China,June.2006
    [69]和红杰,张家树.基于混沌置乱的分块自嵌入水印算法.通信学报.Jul.2006,27(7):80-87
    [70]王永杰,赵耀,潘正祥.可以自恢复和篡改定位的可逆数字水印.哈尔滨工业大学学报,2006.7,38(sup):791-795
    [71]Phen-Lan Lin,Po-whei Huang,An-wei Peng.A fragile watermarking scheme for authentication with localization and recovery,Proceedings of the IEEE 6th International Symposium on Multimedia Software Engineering(ISMSE'04),2004:399-407.
    [72]P.-L.Lin,C.-K.Hsieh,P.-W.Huang.A hierarchical digital watermarking method for image tamper detection and recovery,Pattern Recognition,2005,38(12):2519-2529.
    [73]刘泉,江雪梅,用于图像篡改定位和恢复的分层半脆弱数字水印算法.通信学报,2007.7,28(7):104-110
    [74]M.S.Wang and W.C.Chen.A majority-voting based watermarking scheme for color image tamper detection and recovery.Computer Standards & Interfaces,2007,29(5):561-570.
    [75]Y.-L.Tang,C.-J.Hung.Recoverable Authentication of Wavelet-Transformed Images.www.icgst.com,GVIP:61-66.
    [76]张家树,和红杰.图像篡改内容可恢复的定位型认证水印的生成与认证方法.中国发明专利申请号:200410081400.6
    [77]郑江滨,冯大淦等.可恢复的脆弱数字图像水印.计算机学报,2004.3,27(3):371-376
    [78]Y.P.Hu and D.Z Han.An SVD-based self-embedding watermarking method for image authentication.Proc.ICCS,Oct.2006:1-5.
    [79]A.Tefas,I.Pitas.Image authentication and tamper proofing using mathematical morphology.European Signal Processing Conference,Tampere,Finland,September 2000:1681-1684.
    [80]C.T.Wang,T.S.Chen,and S.H.He.Detecting and Restoring the Tampered Images Based on Iteration-free Fractal Compression.Journal of Systems and Software,2003,67:131-140.
    [81]K.F.Li,T.S.Chen,and S.C.Wu.Image Tamper Detection and Recovery System Based on Discrete Wavelet Transformation.In Proceedings of the International Conference on Communications,Computers,and Signal Processing,Vol.1,2001.
    [82]Y.Wu,F.Bao,C.Xu.The Security Flaws in some Authentication Watermarking Scheme,ICME 2003
    [83]C.Chang,Y.-H.Fan,and W.-L.Tai,Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery,Pattern Recognition,2008,41(2):654-661.
    [84]H.J.He,J.S.Zhang,and H.X.Wang.Synchronous counterfeiting attacks on self-embedding watermarking schemes,Internat.J.Computer Science and Network Security,2006,6(1):251-257.
    [85]L.Jan,J.Fridrich and M.Goljan.Digital camera identification from sensor pattern noise.IEEE Trans.On information forensics and security,June 2006,1(2):205-214
    [86]和红杰,张家树,陈帆.一种高定位精度的可恢复水印算法.中国科学E辑:信息科学,2008.4,38(4):315-328.
    [87]M.Zain,A.R.Fauzi.Medical Image Watermarking with Tamper Detection and Recovery.Proceedings of the 28~(th) IEEE EMBS Annual International Conference New York City,USA,Aug.2006
    [88]Xunzhan Zhu Anthony T.S.Ho and Pina Marziliano.Image authentication and restoration using irregular sample for traffic enforcement application.Proceedings of the First International Conference on Innovative Computing,Information and Control(ICICIC'06)
    [89]Y.Zhao,P.Campisi,D.Kundur.Dual Domain Watermarking for Authentication and Compression of Cultural Heritage Images.IEEE Trans.On Image Processing,March 2004,13(3):430-448
    [90]H.Y.Kim R.L.Queiroz.Alteration-Locating Authentication Watermarking for Binary Images.IWDW 2004,LNCS 3304:125-136.
    [91]C.W.Honsinger,P.Jones,M.Rabbani and J.C.Stoffel.Lossless recovery of an original image containing embedded data.US Patent application,Docket No:77102-1999
    [92]李忠源,郭全成,任亚萍.图像中的信息隐藏及水印技术.电子学报,2000.4,28(4):61-63
    [93]C.W.Honsinger,P.W.Jones,M.Rabbani,and J.C.Stoffel.Lossless recovery of an original image containing embedded data.U.S.Patent #6 278 791,Aug.2001.
    [94]J.Fridrich,M.Goljan,and R.Du.Invertible authentication.Proc.SPIE,Jan.2001(1):197-208.
    [95]J.Fridrich,M.Goljan,and R.Du.Lossless data embedding-new paradigm in digital watermarking.EURASIP J.Appl.Sig.Process.,Feb.2002,2002(2):185-196,.
    [96]J.Tian.Reversible watermarking by difference expansion.In Proc.Multimedia and Security Workshop at ACM Multimedia,Dec.2002.
    [97]J.Tian.Reversible data embedding using a difference expansion.IEEE Trans.Circuits Syst.Video Technol.,Aug.2003,13(8):890-896.
    [98]Yun Q.Shi,Zhucheng Ni,Dekun Zou,Changyin Liang and Guorong Xuan.Lossless Data Hiding Fundamentals.Algorithms and application,IEEE ISCAS 2004,Ⅱ:33-36
    [99]M.U.Celik,G.Sharma,A.M.Tekalp,and E.Saber.Lossless Generalized-LSB Data Embedding.IEEE Transactions on Image Processing,February 2005,14(2):253-266
    [100]杨程元,宣国荣,郑伊展,施云庆等.基于小波压缩扩展技术的无损图像数据隐藏.计算机工程与应用,2005.5:11-13
    [101]张勇,牛夏牧.一种用于关系数据库的可逆水印技术.电子学报,2006.34(12A):2425-2428.
    [102]X.T.Wang,C.Y.Shao,X.G.Xu,X.M.Niu.Reversible Data-Hiding Scheme for 2-D Vector Maps Based on Difference Expansion.IEEE Trans.On Information Forensics and Security,September 2007,2(3):311:320.
    [103]Swanson M.D.,Zhu B.,Tewfik A.H.Robust data hiding for images.In:Proceedings of the 7th IEEE Digital Signal Processing Workshop,Loen,Norway,1996:37-40
    [104]Zhu B,Swanson M D,Tewfik A H.Transparent robust authentication and distortion measurement technique for images.Proc IEEE Digital Signal Processing Workshop,Loen,Norway,1996:45-48.
    [105] Yu G J, Lu C S, Liao H Y, et al. Mean quantization blind watermarking for image authentication. IEEE International Conference on Image Processing, Vancouver BC, Canada, 2000. 3: 706- 709.
    [106] Q. Sun, S.-F. Chang, M. Kurato, and M. Suto. A quantitative semi-fragile JPEG2000 image authentication system. in Proc. IEEE Int. Conf. Image Processing, Sept. 2002 (2): 22-25.
    [107] J.-P. Boyer, P.Duhamel, and J.Blanc-Talon. Performance analysis of scalar DC-QIM for Zero-bit Watermarking. IEEE Trans. On Information forensics and security, 2007,2(2):283-290
    [108] C. T. Li, D. C. Lou, and T. H. Chen, Image authenticity and integrity verification via content-based watermarks and a public key cryptosystem. Proc. IEEE Int. Conf.Image Process, 3. 2000: 694-697.
    [109] A. T. S. Ho, X. Zhu, and Y. L. Guan. Image content authentication using pinned sine transform. EURASIP Journal on Applied Signal Processing, Special Issue on Multimedia Security and Rights Management, Oct. 2004, 2004( 14):2174-2184.
    [110] J.Fridrich. Image watermarking for tamper detection. In : Proceedings of the IEEE International Conference on Image Processing, Chicago, USA, 1998 , 2: 404-408.
    [111] Bassali H, Chhugani J, Agarwal S, et al. Compression tolerant watermarking for image verification. Proceedings of the IEEE International Conference on Image Processing, Vancouver, Canada, 2000. 1: 430- 433.
    [112] C.-Y. Lin and S.-F. Chang. Semi-fragile watermarking for authenticating JPEG visual content. Proc. SPIE, Security and Watermarking of Multimedia Contents, San Jose, California, January 2000: 140-151,
    [113] C. Y. Lin and S. F. Chang. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circuits Syst. Video Technol., Feb. 2001, 11(2): 153-168.
    [114] Yu Miao, He HongJie, Zhang JiaShu. A digital authentication watermarking scheme for JPEG images with superior localization and security. Sci China Ser F-Info Sci, 2007, 50 (3): 491-509.
    [115] C.W. Wu. On the Design of Content-based Multimedia Authentication Systems. IEEE Trnas. On Multimedia, September 2002, 4(3): 385-393
    [116] Li C-T. Digital fragile watermarking scheme for authentication of JPEG images. IEE Proceedings-Vision, Image, and Signal Processing, Dec, 2004: 460-466
    [117]余淼,和红杰,张家树.一种高定位精度的安全JPEG图像认证水印算法.中国科学E辑:信息科学,2007.2:315-328.
    [118]Paquet H.Ward R K,Pitas I.Wavelet packets-based digital watermarking for image verification and authentication.Signal processing,2003,83(3):2117-2132.
    [119]H.Inoue,A.Miyazaki,and T.Katsura.Wavelet-Based Watermarking for Tamper Proofing of Still Images.In Proceedings of the International Conference on Image Processing,Vol.2,2000.
    [120]张静,张春田.用于JPEG2000图像认证的半脆弱性数字水印算法.电子学报,2004,32(1):157-160.
    [121]Lu C S,Liao H Y M.Multipurpose watermarking for image authentication and protection.IEEE Transactions on Image Processing,2001,10(10):1579-1592.
    [122]K.L.Hung and C.C.Chang.A Robust and Recoverable Tamper Proofing Technique for Image Authentication.Springer Verlag Germany,2003:44-53.
    [123]C.-Y.Lin,S.-F.Chang.SARI:Self-Authentication-and-Recovery Image Watermarking System.ACM Multimedia 2001,Ottawa,Canada,Oct.2001
    [124]H.C.Wu and C.C.Chang.Detection and Restoration of Tampered JPEG Compressed Images.Journal of Systems and Software,2002,64:151-161.
    [125]J.Chen T-S Chen C-Y Cheng.New image tampering and detection and recovery system of JPEG2000 region of interest area.the Imaging Science Journal,2005,53:12-19
    [126]S.Lee,C.D.Yoo,and T.Kalker.Reversible image watermarking based on integer-to-integer wavelet transform.IEEE Trans.Inf.forensics security,2007,2(3):321-330.
    [127]H.He,J.Zhang,H.-M Tai.A Wavelet-based fragile watermarking scheme for secure image authentication,in Proc.5~(th) Int.Workshop Digital Watermarking,2006,vol.4283,Lecture Notes in Computer Science,pp:422-432
    [128]Yuan,H.,Zhang,X.-P.Multiscale fragile watermarking based on the Gaussian mixture model.IEEE Trans.Image process,2006,15(10):3189-3200.
    [129]H.J.He,J.S.Zhang,H.-M.Tai.Block-chain Based Fragile Watermarking Scheme with Superior Localization.Information Hiding International Workshop,2008
    [130]王小敏.非线性动力学滤波器设计及其安全应用研究.博士论文,2007
    [131]Lian S.,Sun J.,Wang J.,and Wang Z.A chaotic stream cipher and the usage in video protection.Chaos,Solitons and Fractals,2007,34:851-859.
    [132]Zhang J.Wang X.and Zhang W.Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter.Physics Letters A,2007,362:439-448
    [133]I.Damgard.A design principle for Hash functions,In:Crypto 89,LNCS 435:416-427,989
    [134]R.L.Rivest.The MD5 message-digest algorithm.Request for comments(RFC)1321,Internet Activities Board,Internet Privacy Task Force,April 1992.
    [135]"Secure Hash Standard",Federal Information Processing Standard(FIPS),Draft,National Institute of Standards and Technologyy(NIST),US Department of Commerce,Washing D.C.,January,1992.
    [136]X.Y.Wang,X.Lai,D.Feng,et al.,in:Proc.Eurocrypt'05,LNCS 3494:1,Springer-Verlag,Berlin,2005.
    [137]C.E.Shannon.Communication Theory of Secret Systems.Bell System Technical Journal.1949,28:656-715
    [138]齐东旭,邹建成.一类新的置乱变换及其在图像信息隐蔽中的应用,中国科学E辑,2000,30(5):440-448.
    [139]J.Fridrich.Symmetric ciphers based on two-dimensional chaotic maps.Int.J.Bifurcation and Chaos,1998,8(6):1259-1284.
    [140]S.G.Lian,J.S.Sun,Z.Q.Wang.A block cipher based on a suitable use of the chaotic standard map.Chaos,Solitons and Fractals,2005,26:117-129
    [141]李国富.基于正交拉丁方阵的数字图像置乱方法.北方工业大学学报,2001,13(1):14-17.
    [142]林雪辉,蔡利栋.基于Hilbert曲线的数字图像置乱方法研究.中国体视学与图像分析,2004,9(4):224-227,
    [143]邹建成,李国富,齐东旭.广义Gray码及其在数字图像置乱中的应用.高校应用数学学报,2002,17(3):363-370.
    [144]H.S.Kwok,Wallace.K.S.Tang.A fast image encryption system based on chaotic maps with finite precision representation.Chaos,Solitons and Fractals,2007,32:1518-1529,
    [145]Xiaomin Wang,Jiashu Zhang.An image scrambling encryption using chaos-controlled Poker shuffle operation.Proceedings of International Symposium on Biometrics and Security Technologies,Karachi Pakistan,Dec 2007
    [146]严蔚敏,吴伟民.数据结构(C语言版),清华大学出版社,2006.9
    [147]刘向东,焉德军等.基于排序变换的混沌图像置乱算法.中国图象图形学报,2005.5,10(5):656-660
    [148]H.S.Kwok,Wallace.K.S.Tang.A fast image encryption system based on chaotic maps with finite precision representation.Chaos,Solitons and Fractals,2007,32:1518-1529,
    [149]马在光,丘水生.基于广义猫映射的一种图像加密系统.通信学报,2003,24(2):51-57.
    [150]郭现峰,张家树.基于混沌动态S-Box的Hash函数.物理学报,2006,55(9):4442-4449.
    [151]R.H.Morelos-Zaragoza.The art of error correcting coding.Wiley,April 2002
    [152]张旭东,卢国栋,冯健.图像编码基础和小波压缩技术--原理、算法和标准.清华大学出版社.2004.3
    [153]Justin K R,Hyeokho Choi,et al.Bayesian Tree-structured image modeling using wavelet-domain hidden markov models.IEEE Transactions on Image Processing,2001,10(7):1056-1068
    [154]张家树,和红杰.能区分图像与水印篡改的定位型脆弱水印生成与认证方法.发明专利申请号:200410040433.6.
    [155]和红杰,张家树,田蕾.能区分图像或水印篡改的脆弱水印方案.电子学报,Sep.2005,33(9):1557-1561.
    [156]T.-Y.Lee,S.D.Lin.Dual watermark for image tamper detection and recovery,Pattern Recognition,2008,doi:10.1016/j.patcog.2008.05.003
    [157]柯召,孙琦.数论讲义.高等教育出版社,2001
    [158]Douglas R.Stinson.Cryptography theory and practice.By CRC Press,1995

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700