首页 | 本学科首页   官方微博 | 高级检索  
     

一种基于Hash函数的脆弱水印算法
引用本文:黄子龙,张政保,文家福,李占德.一种基于Hash函数的脆弱水印算法[J].微机发展,2011(2):151-154.
作者姓名:黄子龙  张政保  文家福  李占德
作者单位:军械工程学院计算机工程系;
基金项目:河北省科技计划基金项目(05213579)
摘    要:当前空域脆弱水印算法存在安全性不高及不能有效抵抗矢量量化攻击的缺陷。针对该缺陷,提出一种用于数字图像完整性认证及内容篡改证明的脆弱水印算法。算法首先对图像进行8×8分块,利用Logistic混沌映射对图像分块进行置乱编号;再采用Hash函数生成基于图像分块内容和位置信息的水印信号;最后将水印信号嵌入到图像分块像素值的低两位平面。实验结果及理论分析表明,提出的脆弱水印算法在保证安全性的同时,有效地抵抗了矢量量化攻击。

关 键 词:脆弱水印  Hash函数  混沌映射  完整性认证  篡改定位

Fragile Image Watermarking Algorithm Based on Hash Function
HUANG Zi-long,ZHANG Zheng-bao,WEN Jia-fu,LI Zhan-de.Fragile Image Watermarking Algorithm Based on Hash Function[J].Microcomputer Development,2011(2):151-154.
Authors:HUANG Zi-long  ZHANG Zheng-bao  WEN Jia-fu  LI Zhan-de
Affiliation:HUANG Zi-long,ZHANG Zheng-bao,WEN Jia-fu,LI Zhan-de(Department of Computer Engineering,Ordnance Engineering College,Shijiazhuang 050003,China)
Abstract:At present,the flaws of the airspace fragile image watermarking algorithm are the low security and lack of effective resistance to the vector attacks.To solve the problem,a fragile watermarking scheme is presented for tamper-proof digital authentication and content tamper testification.Firstly,dividing the image into blocks of 8×8,using the Logistic chaotic map generates the block watermark;Then create the fragile image watermarking based on image-blocking by Hash function;Finally,embedding the watermarking signals into the 2 bit LSB of the blocks of image.Experimental results indicate that the fragile image watermarking algorithm based on Hash function can not only ensure the security in system,but also efficiently resist the vector quantization attacks.
Keywords:fragile watermarking  Hash function  chaotic map  integrity authentication  tamper localization  
本文献已被 CNKI 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号