首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
一种新的音频内容认证算法   总被引:1,自引:0,他引:1       下载免费PDF全文
袁一群  李伟  陆佩忠 《计算机工程》2007,33(10):147-149
多媒体数据的可信度经常受到置疑,没有法律效应,原因在于数字产品的可编辑性,需要一个安全的认证系统来确定其内容是否被伪造或特殊处理过。该文提出了一种音频内容认证系统,在原始音频的离散小波域中嵌入认证信息,采用相关检测。该算法在抵抗中等强度的MP3有损压缩、上下行采样等保持内容的音频信号处理的同时,能够检测出恶意篡改等攻击,并精确定位篡改位置,还能对被篡改的音频片段进行近似恢复。  相似文献   

2.
Image authentication is becoming very important for certifying data integrity. A key issue in image authentication is the design of a compact signature that contains sufficient information to detect illegal tampering yet is robust under allowable manipulations. In this paper, we recognize that most permissible operations on images are global distortions like low-pass filtering and JPEG compression, whereas illegal data manipulations tend to be localized distortions. To exploit this observation, we propose an image authentication scheme where the signature is the result of an extremely low-bit-rate content-based compression. The content-based compression is guided by a space-variant weighting function whose values are higher in the more important and sensitive region. This spatially dependent weighting function determines a weighted norm that is particularly sensitive to the localized distortions induced by illegal tampering. It also gives a better compactness compared to the usual compression schemes that treat every spatial region as being equally important. In our implementation, the weighting function is a multifovea weighted function that resembles the biological foveated vision system. The foveae are salient points determined in the scale-space representation of the image. The desirable properties of multifovea weighted function in the wavelet domains fit nicely into our scheme. We have implemented our technique and tested its robustness and sensitivity for several manipulations.  相似文献   

3.
奇异值分解与PKI结合的鲁棒图像认证方法   总被引:2,自引:0,他引:2  
在图像的传输过程中,恶意篡改导致图像内容变化,而压缩等正常处理也会引起图像质量下降。图像认证是通过检测图像中是否有被恶意篡改的部分,来验证图像内容的完整性,同时容忍压缩或噪声对原图像质量造成的影响。本文提出奇异值分解与公共密钥体系(PKI)相结事的图像认证方法。它选用奇异值分解结果作为特征,构成原图像的内容摘要,私钥加密后形成原图像的认证码,并由用户自定义特征匹配的闽值。密钥的交换,依赖于PKI。需要验证图像数据的完整性时,再次分解提取特征,并用公钥解密认证码,然后进行匹配,达到图像认证目的。通过与几种典型图像认证方法做比较,表明本方法具有更好的鲁棒性。  相似文献   

4.
Authentication of image data is a challenging task. Unlike data authentication systems that detect a single bit change in the data, image authentication systems must remain tolerant to changes resulting from acceptable image processing or compression algorithms while detecting malicious tampering with the image. Tolerance to the changes due to lossy compression systems is particularly important because in the majority of cases images are stored and transmitted in compressed form, and so it is important for verification to succeed if the compression is within the allowable range.In this paper we consider an image authentication system that generates an authentication tag that can be appended to an image to allow the verifier to verify the authenticity of the image. We propose a secure, flexible, and efficeint image authentication algorithm that is tolerant to image degradation due to JPEG lossy compression within designed levels. (JPEG is the most widely used image compression system and is the de facto industry standard.) By secure we mean that the cost of the best known attack againt the system is high, by flexible we mean that the level of protection can be adjusted so that higher security can be obtained with increased length of the authentication tag, and by efficient we mean that the computation can be performed largely as part of the JPEG compression, allowing the generation of the authentication tag to be efficiently integrated into the compression system. The authentication tag consists of a number of feature codes that can be computed in parallel, and thus computing the tag is effectively equivalent to computing a single feature code. We prove the soundness of the algorithm and show the security of the system. Finally, we give the results of our experiments.  相似文献   

5.
We analyse a recent image authentication scheme designed by Chang et al. [A watermarking-based image ownership and tampering authentication scheme, Pattern Recognition Lett. 27 (5) (2006) 439-446] whose first step is based on a watermarking scheme of Maniccam and Bourbakis [Lossless compression and information hiding in images, Pattern Recognition 37 (3) (2004) 475-486]. We show how the Chang et al. scheme still allows pixels to be tampered, and furthermore discuss why its ownership cannot be uniquely binding. Our results indicate that the scheme does not achieve its designed objectives of tamper detection and image ownership.  相似文献   

6.
改进一种DWT域图像篡改检测算法。该算法将置乱的有意义的二值水印图像利用量化的方法隐藏在载体图像Haar小波变换系数中。图像认证时,对提取的水印和原水印图像的差值图像进行反混沌置乱,再进行形态学处理,从中可以看出认证图像的篡改区域。此算法与Kunder等人提出的基于Haar小波的半易损水印算法相比,能够有效地区分JPEG压缩和恶意篡改,不需要设置阈值来区分JPEG压缩和恶意篡改,可以从水印差值图像直接看出恶意篡改的区域。  相似文献   

7.
给出了一种从长度为n=2m-1的二进制信息序列中提取m比特摘要的方法和一种新的图像预处理方法。在此基础上,设计了一种新的适用于多区域篡改的图像认证算法。在JPEG质量因子QF340的情况下,该算法不仅可以区分正常的JPEG压缩失真和恶意篡改,还可以实现多区域篡改检测和准确定位,且具有较高的篡改检测概率和较低的虚警概率。理论分析和仿真实验均证明了该算法的正确性和有效性。  相似文献   

8.
文章针对压缩感知理论特点,提出一种新的算法。分块认证可将篡改定位到分块级别,具有较高的篡改定位准确度。算法首先将图像分成若干块,分块大小可以由篡改定位调整,然后对各个分块进行观测得到压缩的观测值。在观测域中将得到的观测值进行LDPC编码生成水印,并将水印嵌入到分块图像中。水印提取时同样对篡改后的图像进行随机投影,对提取的水印进行解码和比较,实现了图像的篡改检测与图像认证。根据实验研究证实,该算法对局部篡改的检测功能较强,算法实现简单且提取过程更加安全。  相似文献   

9.
Over the years, different watermarking techniques have been used for medical image authentication purposes. Some techniques have been presented to detect tampering in the medical image while others can also recover the tampered region after the tamper detection. Many of the previous medical image authentication schemes have successfully achieved their aims; however, the robustness of the authentication scheme against unintentional attacks has not been highlighted sufficiently. This paper presents a new medical image authentication scheme in which the medical image is divided into two regions (i.e., region of interest (ROI) and region of non-interest (RONI)). Then two watermarking methods based on Slantlet transform (SLT) are used to embed data in the ROI and the RONI. The proposed scheme can be used for tamper detection, localization, and recovery in addition to the data hiding. To generate the recovery information of the ROI, a new method has been proposed based on the integer wavelet transform (IWT) coefficients. The experiments that have been conducted to evaluate the proposed authentication scheme proved that it is efficient not only in achieving its main tasks that have been mentioned above but also in having robustness against unintentional attacks (i.e., JPEG compression, additive Gaussian noise (AGN), and salt-and-pepper noise) and that makes it more suitable for the practical applications.  相似文献   

10.
基于数字水印的图像认证技术   总被引:40,自引:1,他引:40  
吴金海  林福宗 《计算机学报》2004,27(9):1153-1161
伴随着数字水印技术的发展,用来解决数字图像的真实性问题的图像认证技术在近年来发展迅速.它主要包括两大部分:篡改检测与篡改定位.有两种技术手段可供它使用:数字签名和数字水印.该文详细讨论了在设计基于数字水印的图像认证算法时常见的若干关键问题,阐述了基于数字水印的精确认证和模糊认证算法各自的发展过程及其国内外现状,并指出了将来继续努力的方向.  相似文献   

11.
本文提出了一种用于图像认证和篡改检测的稳健图像摘要。该算法利用Zernike矩的幅度和修正后的相位旋转不变性生成图像摘要(图像Hash)。图像Hash之间的相似性用汉明距离度量。仿真结果表明该方法对大部分内容不变的图像操作具有鲁棒性。不同图像对Hash之间的汉明距离远大于阈值,因此该方法可用于图像认证。同时该方法还可以检测图像篡改并可以定位图像篡改的位置。  相似文献   

12.
一种用于图像内容鉴别的数字签名方案   总被引:1,自引:0,他引:1  
钟桦  焦李成 《计算机学报》2003,26(6):708-715
提出了一种稳健的数字签名方案用于图像内容鉴别.通过对图像的预处理,从图像行与列中提取出对JPEG压缩稳健的原始信息序列,然后利用Hash函数对原始信息序列进行加密并提取签名比特.产生的数字签名可以有效地鉴别图像内容的真伪并对蓄意的修改进行交叉定位.由于数字签名对于JPEG压缩是稳健的,从而把JPEG压缩操作与对图像的恶意修改区分开来.理论分析结果表明这种数字签名具有较高的修改检测概率.仿真结果充分证明了该方案的正确性和有效性.  相似文献   

13.
王兵  毛倩  苏栋骐 《计算机应用》2015,35(10):2963-2968
针对如何检测数字图像内容是否完整、有无篡改,提高认证图像质量的问题,提出了一种基于二维直方图移位的图像认证算法。首先,在棋盘格结构中利用两种预测差值计算方法构建原始图像的二维直方图,由预先设定的参数选择可嵌入信道,并确定可嵌入信道峰值点的位置,将可嵌入信道移位。然后结合直方图信息嵌入方法将认证信息嵌入到图像分块中。在篡改检测过程中采用分层篡改检测方法,有效提高篡改检测准确度。实验结果显示,该算法不仅可以抵抗噪声攻击,而且当参数设定为2和4时,认证图像的平均峰值信噪比(PSNR)分别为52.37 dB和50.33 dB,进一步提高了图像质量。实结果表明,所提算法安全性高,可实现可逆水印,并准确定位出篡改区域。  相似文献   

14.
JPEG图像篡改引入的双重压缩会导致篡改区域的原始压缩特性发生改变,因此可以利用篡改区域压缩特性的不一致性来检测图像的篡改。利用该原理,提出了一种基于量化噪声的JPEG图像篡改检测算法。算法对待检测图像进行分块,计算每块的量化噪声,求取图像块的量化噪声服从均匀分布和高斯分布的概率,从而检测出篡改过的双重压缩区域。实验结果表明:该算法能有效检测双重压缩的JPEG图像篡改,并能定位出篡改区域。  相似文献   

15.
提出了一种基于Contourlet变换的可区分内容或水印篡改的图像认证算法。在载体图像的Contourlet变换域分别嵌入认证水印和恢复水印,作为区分图像内容被篡改还是水印被篡改的依据。仿真实验表明,该算法不但能准确定位篡改位置,而且能区分篡改类型,在一定条件下还可以恢复被篡改的区域。  相似文献   

16.
图像内容可恢复的半脆弱水印技术研究   总被引:1,自引:0,他引:1       下载免费PDF全文
提出了一种图像内容可恢复的半脆弱水印技术,采用自适应水印对图像进行认证、定位篡改,再利用零水印技术从第三方处提取篡改处的恢复水印,重构被篡改作品。认证方案采用基于非抽样Contourlet域奇异值分解的自适应水印认证方法,该方法具有更高的篡改定位精度,能有效区分有意攻击与无意攻击。恢复水印是通过将原始图像分块、置乱后,分别进行4×4编码,再对码流加密后交给第三方获得的。实验结果表明,本算法能够在容许一定压缩比的情况下检测发生的篡改,并有效地恢复被篡改的区域。  相似文献   

17.
Self-recoverable fragile watermarking is meant for accurate tamper localization as well as image recovery with superior visual quality. However, most of the existing state of art approaches perform authentication and recovery on block basis owing to which the entire block is categorized as tampered in case of alteration of one or more pixels of it. This, results in staircase formation of tamper detected regions, hence lacking in accuracy. Furthermore, the visual quality of the recovered image also deteriorates as an approximate value is assigned to all the block pixels corresponding to the altered region. The proposed watermarking scheme performs both authentication and recovery pixelwise. The authentication of each pixel is done via multi level tamper detection(MLTD) through three authentication bits based on value, location and neighbourhood information. The domain for image recovery is chosen dynamically based on the content of the block, may it be in spatial domain for smooth blocks or frequency domain for the rough ones. This provides high accuracy in recovery. As the embedding of recovery information is done in the frequency domain, the imperceptibility of the watermarked image scheme remains high. Also, embedding of authentication information in the spatial domain maintains its fragile nature. Even for higher tampering ratios, the lost content is rebuilt with high peak signal to noise ratio(PSNR) of the recovered image. The probabilities of false rejection and false acceptance head towards the ideal value for most of the empirical analysis. Comparative study via metric evaluation of probability of false rejection (PFR), probability of false acceptance (PFA) and PSNR of recovered image for different standard test cover images demonstrate the efficacy of the proposed scheme over other existing state of art approaches. Further, the security of the proposed scheme remains high due to usage of multi-layered secret keys and chaos based random mapping handling worst tamper scenarios.  相似文献   

18.
目的物联网(internet of things, IoT)感知层获取数据时存在资源受限的约束,同时数据常常遭受泄露和非法篡改。数据一旦遭到破坏,将对接收者造成很大的影响,甚至可能会比没有收到数据更加严重。针对IoT数据获取面临的能耗和安全问题,提出一种基于半张量积压缩感知的可验证图像加密方法。方法首先采用级联混沌系统生成测量矩阵和验证矩阵,测量矩阵以半张量积压缩感知的方式进行采样得到观测值矩阵。利用Arnold置乱观测值矩阵得到最终密文信号,与此同时由验证矩阵生成消息验证码一同在公共信道传输,将由级联混沌系统生成的测量矩阵、验证矩阵以及Arnold置乱的参数的初始种子作为密钥在安全信道上传输。结果密钥空间分析、密钥敏感性分析、图像熵分析、直方图分析、相关性分析、身份验证分析、压缩率分析的实验结果显示:相比于两种对比方法,本文算法加密后图像的熵值更接近于8,而对应密文图像像素之间的相关系数更接近于0。结论本文的可验证加密算法结合了半张量压缩感知的优点,在有效减少数据采样能耗的同时保证了数据在传输过程中的安全性与完整性。  相似文献   

19.
随着物联网飞速发展,设备数量呈指数级增长,随之而来的IoT安全问题也受到了越来越多的关注.通常IoT设备完整性认证采用软件证明方法实现设备完整性校验,以便及时检测出设备中恶意软件执行所导致的系统完整性篡改.但现有IoT软件证明存在海量设备同步证明性能低、通用IoT通信协议难以扩展等问题.针对这些问题,本文提供一种轻量级的异步完整性监控方案,在通用MQTT协议上扩展软件证明安全认证消息,异步推送设备完整性信息,在保障IoT系统高安全性的同时,提高了设备完整性证明验证效率.我们的方案实现了以下3方面安全功能:以内核模块方式实现设备完整性度量功能,基于MQTT的设备身份和完整性轻量级认证扩展,基于MQTT扩展协议的异步完整性监控.本方案能够抵抗常见的软件证明和MQTT协议攻击,具有轻量级异步软件证明、通用MQTT安全扩展等特点.最后在基于MQTT的IoT认证原型系统的实验结果表明, IoT节点的完整性度量、MQTT协议连接认证、PUBLISH报文消息认证性能较高,都能满足海量IoT设备完整性监控的应用需求.  相似文献   

20.
目的 数字图像自嵌入水印技术是解决图像篡改检测和恢复问题的主要技术手段之一,现有的自嵌入水印技术存在着认证粒度不高、嵌入水印后的图像失真较大,且无法抵抗滤波等操作。为提高图像自嵌入水印的认证粒度以及抵抗滤波等处理操作的能力,提出了一种基于块截断编码的图像自嵌入半脆弱水印算法。方法 水印生成与嵌入:首先,将图像进行块级别的二级划分,分别生成粒度为4×4和2×2的图像块;然后,利用块截断编码对每个4×4图像块进行压缩编码,生成2×2图像块的恢复水印,并对恢复水印进行哈希生成2×2图像块的认证水印;最后,将恢复水印和认证水印级联构成自嵌入水印,嵌入到映射块中。篡改认证与恢复:首先,将某个4×4图像块提取的水印与该块生成的水印比较,判别该图像块的2×2子块是否通过认证;最后,依据认证结果对2×2图像块实施恢复。结果 该算法产生的水印图像的峰值信噪比(peak signal-to-noise ratio,PSNR)均高于44 dB,在50%的篡改率下,恢复后的图像质量可达到32.7 dB。该算法生成水印并在图像上嵌入大约需要3.15 s,恢复图像大约需要3.6 s。结论 算法利用块截断编码,有效缩短了生成的水印长度,保证嵌入水印后图像的质量。此外,通过引入的可容忍修改阈值,使得水印能够对滤波等图像处理操作具有一定的鲁棒性,同时保证对图像的恶意篡改具有敏感性。最后通过与最近典型方法的对比实验,验证了算法在嵌入水印后图像质量、恢复图像质量等方面的优势。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号