首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
刘会平  国伟 《计算机应用》2014,34(9):2645-2649
针对现代网络环境通信的隐秘性和信息容量问题,提出了一种基于数字加网的信息隐藏算法,通过该算法将秘密信息嵌入文本载体中实现隐秘通信。该算法首先将隐秘信息隐藏在由网点组成的背景底纹图案中,接着与随机生成的半色调调频网点图像相融合,最后将嵌入水印后的背景底纹图案作为常规元素叠加到文本文档的版面中。分析与实验结果表明,该方法可以隐藏的隐秘信息容量大,在A4幅面的文档页面中嵌入72000个汉字的信息量,而且视觉效果美观自然,隐蔽性好,安全性高,文件体积小,可以广泛应用于现代网络安全通信领域。  相似文献   

2.
用于图像认证的可恢复半脆弱数字水印   总被引:3,自引:0,他引:3       下载免费PDF全文
为了提高图像认证的可靠性,提出了一种用于图像内容认证的可恢复半脆弱数字水印方案,该方案不仅能鉴别数字图像内容的真实性,还可近似恢复图像中被篡改的区域。该方案基于半色调处理技术,首先将图像半色调处理后生成的二值水印图像经JBIG2压缩后作为嵌入水印,然后经量化索引调制嵌入小波域。用该方案嵌入水印后的图像,在检测时,不但可以定位图像中被篡改的区域,还可以对提取的恢复水印进行解压,并可通过逆半色调处理来重建原图像,用它的对应部分替换被篡改区域来实现对被篡改图像的篡改恢复。此外,由于该算法采用密钥来控制水印的嵌入位置,从而保证了水印的安全性;仿真实验是采用一般性操作和篡改操作相结合的方法,实验结果表明,该算法在保护数字图像内容真实性方面是可行的。  相似文献   

3.
基于混沌映射的鲁棒性公开水印   总被引:39,自引:0,他引:39  
王宏霞  何晨  丁科 《软件学报》2004,15(8):1245-1251
提出了一种新的DCT(discrete cosine transform)域鲁棒性公开水印算法.该算法利用混沌随机性好和容易再生的特性,首先用散列处理后的混沌序列置乱水印,而后基于混沌序列在宿主图像DCT域的中频带随机选择少量参考点,并在其邻域内用奇偶量化法批量嵌入乱序水印比特.多级混沌密钥的使用与频域系数修改的隐蔽性,加强了水印信息的保密性,在保证隐藏较大容量的有意义二值水印图像的同时,实现了水印信息的盲提取,并在水印的不可见性与鲁棒性之间达到了合理的折衷.  相似文献   

4.
随着信息化社会的不断发展,文档的电子化成为大势所趋.电子文档在给我们提供便利的同时,也带来了诸多安全隐患.涉密电子文档面临的安全威胁有非授权访问、知密范围难控和泄密主体难追踪等,而目前关于涉密电子文档的解决方案仅满足了身份认证、访问控制等安全需求,未能实现对用户身份的实时认证和涉密文档的有效控制.针对以上安全威胁及用户需求,通过对面部认证、单向传输和眼球追踪等技术的研究,文章设计了一款基于面部认证的涉密文档阅读器.使用OpenCV实现的面部认证技术用于完成对用户的身份认证和阅读权限的实时认证,可有效防止非授权访问、偷窥等行为,实现可靠的访问控制.专用接口提供对USB移动存储数据的安全处理,提供单向数据传输功能,通过专用接口向涉密文档阅读器单向传输涉密文档,可有效解决阅读器丢失、拷贝复制等造成的安全隐患.文中设计的阅读器在提高数据安全性和可靠性的同时,为用户提供一个安全便携的涉密文档阅读平台.系统采用技术手段弥补制度上的漏洞,实现涉密电子文档管控的安全性和实用性的平衡.  相似文献   

5.
电子政务,电子商务系统要求对统计数据“既要保证安全又要进行交换”,保护文档中的统计数据成为一个亟待解决的问题。本文提出一种基于关系数据库数字水印技术的统计数据保护模型,通过在统计数据文档的数据中嵌入数字水印,然后在内外网之间网络节点处提取水印,根据水印提供的信息决定是否外传文档和确定统计数据的版权,从而有效地控制内网中统计数据非法传播.保护统计数据的版权。  相似文献   

6.
分析基于数字签名认证系统的认证机制、基本结构及存在的安全缺陷,提出一个基于双钥密码体制和多重水印技术的移动通信认证系统。通过在系统中嵌入一个鲁棒水印和半脆弱水印,实现发信人身份认证和数据完整性认证的功能。可对修改、伪造传输信息等非法操作进行认证。分析表明,该系统具有结构简单、安全性强、可信度高、认证精度高等特点。  相似文献   

7.
Watermarking of Electronic Text Documents   总被引:3,自引:0,他引:3  
With the tremendous development of the Internet, it has become desirable to distribute text documents electronically. However, commercial publishers may be reluctant to offer valuable digital documents online for the fear that they will be re-transmitted or copied illegally. To address this problem, we propose a robust watermarking technique, whereby electronic text documents are fingerprinted with one or more semantics-preserving modifications to the document text. The text modifications may be selected so that multiple copies of the same master document will all have the same meaning. By examining text modifications in an unauthorized copy, one can identify the authorized source and the recepient. In this paper, we present a new method that is accurate, robust against attacks (e.g., the cyber pirate may post only a section or a paragraph of a registered text online), scalable (e.g., a few pages of text to hundreds of pages) and secure (e.g., remove or modify embedded watermark with or without knowledge of watermarking method). This approach could therefore facilitate e-commerce of newspapers, journals, magazines, and in general any electronic text document possessing commercial value.  相似文献   

8.
针对PDF文档的结构特点,研究并提出一种新的文本数字水印算法。在不改变PDF文档原有任何可见属性的前提下,利用PDF二进制文件自身的语法和结构特征嵌入水印信息。实验结果表明,该数字水印嵌入方法具有很好的不可感知性,能有效地实现文档版权和内容完整性保护。  相似文献   

9.
The advent of electronic documents and the consequent creation of digital libraries—vast repositories of electronic information—has a profound impact on how we produce, organize, store, retrieve and consume information. All of these activities have been dictated to the present by the technologies used to share information. A change in the underlying technology, namely, the move from paper to electronic documents, offers a unique opportunity to revolutionize how information is archived and disseminated. This paper will focus on a specific aspect of the opportunities opened up by electronic publishing on the NII—the ability to present information in multiple modalities and thereby free it from any single presentation medium.Traditional printed communication relies on a passive intermediary, paper, for the exchange of information between the author and reader. Ideas put down on paper come back to life only when perused by the reader.Electronic publishing is mediated by a computer, an agent capable of processing the information. As a consequence, the ideas expressed by an author need no longer be bound to any single display form; nor does it require human intervention to translate the information from one displayed form to another. Electronic information can be processed and displayed in a manner best suited to each individual's needs. Thus, the advent of electronic documents makes information available in more than its visual form—electronic information can now be display-independent.Traditionally, an electronic document has been viewed simply as digitally representing (or the means towards producing) the printed page. Instead, we view the electronic document as the basic entity that represents information; we allow the information to be rendered in different ways—on paper, spoken, processed in different ways by a computer, etc. This change of viewpoint has allowed us to develop ASTER (Audio System For Technical Readings) a computing system that audio formats electronic documents to produce audio documents. ASTER can speak both literary texts and highly technical documents that contain complex mathematics. Moreover, the listener can ask to have parts of a document repeated in different ways: a document has many different spoken views.The adequacy of the audio rendering depends on how well the electronic document captures the essential internal structure of the information. In this paper, we discuss capturing structure and give guidelines for authors to follow to ensure that their documents exhibit structure adequately.In the context of the NII, the digital libraries of the future can be viewed as large information servers that allow multiple clients to access and display information in a format chosen by the user. By obviating the need to move physical media, e.g., printed paper or recorded tapes, the NII enables the ready dissemination of multimodal renderings of information.  相似文献   

10.
提出一种主动式数字图像内容鉴别方法.该方法嵌入鉴别水印和恢复水印,鉴别水印由伪随机数产生器生成,嵌入的鉴别水印与图像篡改位置存在本质联系,实现了对图像的篡改定位.同时利用图像小波变换的近似子带的DCT量化系数作为图像内容特征生成恢复水印信息,并隐藏在DWT系数之中,实现了对图像的篡改恢复.鉴别时引入对角扩展和去除孤立点技术来辅助篡改定位和恢复.实验证明,使用基于小波与DCT双重域的水印算法能较好地将对图像内容的恶意篡改和偶然失真区分开来,可以给出内容篡改的位置,并近似恢复出图像原始内容.  相似文献   

11.
传统零水印算法构造的水印通常是没有实际意义的二值序列,致使版权辨别不够直观快捷。借鉴视觉密码原理,结合平衡多小波、奇异值分解等技术,提出平衡多小波视觉密码零水印算法。将客户水印作为零水印嵌入到版权图像中,对版权图像进行平衡多小波变换得到实际载体;根据实际载体图像进行块奇异值分解并计算平衡因子得到差值矩阵,由差值矩阵生成过渡矩阵;将过渡矩阵结合2×2视觉秘密图份算法生成图像特征信息;结合图像特征信息和客户水印信息产生零水印。实验结果表明,该算法具有良好的安全性和鲁棒性,是一种可靠的图像版权认证零水印算法。  相似文献   

12.
针对现有分块脆弱水印的缺陷,提出了一种基于混沌Hash函数的脆弱水印算法。该方案通过将原始图像分块后做混沌Hash,生成原始图像的摘要,与由混沌映射生成的混沌二值图像异或后生成二值脆弱水印,置乱加密后嵌入原始图像的LSB平面;认证时通过差值图像定位篡改的区域。理论分析和实验仿真表明提出的水印算法不可见性好,能够有效抵抗VQ攻击,并能够区分篡改的类型,安全性高。  相似文献   

13.
We present in this paper a novel electronic document watermarking method, render sequence encoding (RSE), and then further develop a RSE authentication method for electronic documents. RSE watermarks an electronic document by modulating the display sequences of words or characters. It features large information-carrying capacity and robustness over document format transcoding. The RSE authentication method is based on the NP-complete exact traveling salesman problem, which provides a rigorous foundation for security. The RSE authentication method is secure in the sense it is extremely difficult to forge the authentication process. RSE authentication process is also easy to operate, especially in comparison to digital signatures which requires public key infrastructure for its operation  相似文献   

14.
Supporting safe and resilient authentication and integrity of digital images is of critical importance in a time of enormous creation and sharing of these contents. This paper presents an improved digital image watermarking model based on a coefficient quantization technique that intelligently encodes the owner’s information for each color channel to improve imperceptibility and robustness of the hidden information. Concretely, a novel color channel selection mechanism automatically selects the optimal HL4 and LH4 wavelet coefficient blocks for embedding binary bits by adjusting block differences, calculated between LH and HL coefficients of the host image. The channel selection aims to minimize the visual difference between the original image and the embedded image. On the other hand, the strength of the watermark is controlled by a factor to achieve an acceptable tradeoff between robustness and imperceptibility. The arrangement of the watermark pixels before shuffling and the channel into which each pixel is embedded is ciphered in an associated key. This key is utterly required to recover the original watermark, which is extracted through an adaptive clustering thresholding mechanism based on the Otsu’s algorithm. Benchmark results prove the model to support imperceptible watermarking as well as high robustness against common attacks in image processing, including geometric, non-geometric transformations, and lossy JPEG compression. The proposed method enhances more than 4 dB in the watermarked image quality and significantly reduces Bit Error Rate in the comparison of state-of-the-art approaches.  相似文献   

15.
一种基于PDF文档的数字水印算法   总被引:6,自引:0,他引:6  
针对网络环境中对多媒体文本文档的篡改、盗版严重的问题,通过分析PDF文档的页面操作符以及具体参数的详细分析,提出并实现了一种基于PDF文档的数字水印算法.将水印信息添加到PDF(Portable Document Format)文档中文本字符码的特征信息中,通过检测从PDF文档中提取的水印信息与字符码的一致性来辨别该文档的真实性.试验结果表明,该算法具有很好的视觉透明性,而且便于出错信息的定位,是一种切实可行的数字水印算法.  相似文献   

16.
17.
在安全生产形势仍然严峻的大背景下,社会对矿山安全日益重视,检测检验机构为矿用产品安全认证提供的检验数据,为矿用产品提供了准入依据。不少企业为了公示其产品合格的依据,将纸质文件以数字图像的方式存储送入互联网,在促进了信息传播的同时,也给非法分子带来了复制、篡改检测数据的机会。文中针对检验报告图像文件的安全保护提出了一种嵌入水印算法。经理论分析和计算机仿真实验,表明该算法计算复杂度高、密钥多、具有高度的顽健性,所隐藏的水印信息具有很好的不可见性,实用性较强。  相似文献   

18.
针对彩色数字图像局部区域内容保护和认证,研究了彩色数字图像的脆弱数字水印.为了保证水印的安全性,利用三维二值混沌序列对原始二值水印图像进行加密,对提取的加密二值水印图像进行解密.嵌入载体图像的水印和从嵌入水印的图像中提取的水印均是加密水印.将彩色数字图像中被保护区域的三个分量的小波变换域分别嵌入加密水印,以保护其内容的完整性和不可篡改性.采用模运算实现水印的嵌入和盲提取.理论分析和实验结果表明,该脆弱水印算法对彩色数字图像保护区域内的任何篡改,都能够正确地检测和定位.  相似文献   

19.
郑毅 《信息安全与技术》2012,3(10):56-58,62
当用户通过合法或非法途径获取了企业信息系统中数字文档的访问权限,即可以不受限地通过下载、拷贝、网络等方式传播他人,而导致带有企业机密的泄密,使得共享与保密之间存在突出的问题,集成基于DRM技术构建的文档安全管理系统,对于已联网的企业存储信息的机密性和完整性是一个快速有效的解决方法。在本文中,对企业非结构化数字文档信息安全现状与存在问题进行了分析,研究了使用DRM对数字文档在线与离线应用信息防泄密进行保护的技术原理,提出了一种在企业现有信息系统体系下,通过二次开发集成基于DRM技术专业机密文档保护产品的嵌入式架构设计。  相似文献   

20.
通过研究自然图像色彩分量之间的相关性,提出一种在彩色图像中嵌入可擦除水印的新方法。该方法在图像分块的基础上,利用色彩分量之间的相关性在每一图像块中嵌入两位水印,水印信号是用有意义的水印图像经混沌序列调制生成的二值序列,嵌入位置由绿色分量的平均值和密钥决定,具有非常好的安全性和易碎性,水印的提取和擦除不需要原始图像。实验表明,该方法嵌入的水印不可见性好,擦除水印的图像与原始图像完全一致,适合于图像的精确认证。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号