首页 | 官方网站   微博 | 高级检索  
     

一种基于脆弱水印技术的图像认证方法
引用本文:陈经会,张雪萍.一种基于脆弱水印技术的图像认证方法[J].现代电子技术,2008,31(13).
作者姓名:陈经会  张雪萍
作者单位:河南工业大学信息科学与工程学院,河南郑州,450001
基金项目:河南省郑州市科技攻关计划 , 河南工业大学校科研和教改项目 , 河南省高校科技创新人才支持计划
摘    要:基于计算全息图编码的水印技术是一种脆弱水印技术,由于其极容易被破坏的特性,非常适合用于图像内容的认证,在图像的认证鉴定的时候,通过比较提取的水印和初始水印的相关性鉴定图像内容的完整性,可以有效防止篡改和对修改图像的欺骗性应用。同时,图像的内容被篡改时,水印信息应该提供图像被伪造的证据。利用计算全息图作为水印,嵌入的水印可能被使用傅里叶变换恢复,进而,宿主图像也能被利用同样的全息模式进行篡改和嵌入水印,为了避免这种弊端,还需要引入加密方法。

关 键 词:图像认证  脆弱水印  计算全息图  高级加密标准

A Method for Image Authentication Based on Fragile Watermarking
CHEN Jinghui,ZHANG Xueping.A Method for Image Authentication Based on Fragile Watermarking[J].Modern Electronic Technique,2008,31(13).
Authors:CHEN Jinghui  ZHANG Xueping
Abstract:In this paper a content fragile watermarking based on computer generated hologram coding technique is presented.This technology is fit for image authentication exactly because the CGH watermark is prone to be destroyed.Content fra-gile watermarking techniques aim to prevent tampering and fraudulent use of modified images.Therefore,if parts of the image are replaced,the watermark information should indicate evidence of forgery.Using computer generated hologram watermarking,the embedded mark could be recovered by means of a Fourier transform.Due to this fact the host image can be tampered and watermarked with the same holographic pattern.So,an encryption method must be included to avoid this possibility.It could be applied to color images and grey-scale ones.The integrity of the image would be verified by the correlation between the original mark and the extracted one.
Keywords:image authentication  fragile watermarking  computer generated hologram  AES
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号