首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
可交换加密数字水印(CEW)是一种密码和数字水印相结合的技术,用于多媒体信息安全和版权方面的保护.为了保证载体数据的安全性,提出了基于祖冲之(ZUC)的交换加密水印算法.算法采用ZUC序列密码产生密钥,对载体信息进行模运算加密,水印嵌入操作与数据加密操作的先后顺序,不影响含水印密文数据的产生;在提取水印时,可以实现密码和水印操作的交换.实验表明,密文域提取的水印与明文域提取水印一致,含水印图像的质量高,加解密和水印嵌入提取效率更高,且算法具有一定的鲁棒性.  相似文献   

2.
Joint watermarking and encryption is an upcoming security solution that combines leading but complementary techniques to achieve an enhanced security level. Real time applications using joint watermarking and encryption framework has three requirements: data to be efficiently compressed, watermarking technique to sustain compression, and encryption technique to be developed in a way so as not to disturb the compression efficiency. Finding an optimal solution that combines the three techniques while fulfilling these requirements is a challenging problem. This paper thus, proposes a wavelet domain based joint watermarking and encryption framework that employs singular value decomposition based watermark embedding and sign bit encryption prior to compression. The varying significance of different subbands has been considered to encrypt the data without adversely effecting the compression ratio. Experimental analysis using various evaluation parameters and attack scenarios has revealed the ability of the proposed framework to prove content-ownership, even from the encrypted data. Comparative analysis with the existing techniques reflect its ability to provide better security with less computational resources. This makes it a preferable solution for data security at all stages of data archival, transmission or distribution.  相似文献   

3.
Aiming at the requirement of comprehensive security protection for multimedia information, this paper proposes a new algorithm to realize the combination of encryption and watermarking based on the homomorphism. Under the proposed algorithm scheme, the plaintext watermark embedding operations are mapped to the ciphertext domain by homomorphism to achieve the plaintext watermark embedding in the ciphertext domain; at the same time, the embedded plaintext watermarks are also mapped to the ciphertext domain by homomorphism to achieve the ciphertext watermarking embedding. According to the experimental results, by the proposed algorithm, the order of watermark embedding and data encrypting does not affect the production of the same encrypted-watermarked data, meanwhile, whether the encrypted-watermarked data being decrypted or not does not affect the extraction of embedded watermark. For the operands of encryption and watermarking being the same data, the proposed algorithm has higher security compared with the existing mainstream independent operands based communicative encryption and watermarking.  相似文献   

4.
冀峰  安玲玲  邓成  高新波 《自动化学报》2012,38(11):1824-1830
针对目前基于直方图平移类可逆水印算法存在的安全问题, 提出一种基于多重元胞自动机(Cellular automata, CA)的图像水印加密算法. 该算法综合考虑辅助信息、水印及水印图像三方面的安全性, 利用不同的元胞自动机规则进行逐级加密, 建立多重加密模型生成加密水印图像. 仿真结果表明, 该算法在密钥空间、直方图分布、相关性、信息熵及灰度变化等安全评估标准下均具有较高的安全性, 有效克服了基于直方图平移类可逆水印算法在安全性方面存在的不足.  相似文献   

5.
为了实现数字图像的安全保密,提出了一种数字置乱加密技术和数字水印植入技术.探讨一类特殊的图像矩阵变换--Lebmer提出的线性同余模型,将线性同余模型扩展为数字图像的位置置乱加密算法,根据线性同余的规则提出了一种新颖的数字水印植入技术.实验结果表明,该算法可以在一定程度上满足数字图像加密和隐藏的鲁棒性要求.  相似文献   

6.
This paper presents a new approach for speech signal watermarking using encrypted watermarks. The objective of this approach is to increase the degree of security of speech watermarking. In the proposed framework, watermark embedding is implemented with singular value decomposition due to its robustness to attacks. Moreover, two encryption schemes are tested for watermark image encryption; chaotic encryption due to its permutation nature and data encryption standard (DES) due to its diffusion nature. Overall and block-by-block watermarking scenarios are tested and compared for speech signal watermarking. Different modes of operation of the DES are investigated for watermark image encryption. These modes are the electronic code book, cipher block chaining, cipher feedback, and output feedback (OFB) modes. Simulation results reveal that the DES with OFB mode and the chaotic Baker map encryption make the system less sensitive to attacks with good quality of extracted watermarks.  相似文献   

7.
基于超混沌和DCT理论的数字图像水印算法   总被引:1,自引:0,他引:1  
基于超混沌和离散余弦变换(DCT)理论,结合Arnold置乱方法,提出了新型的数字图像水印算法.采用双重加密策略,利用Arnold方法减弱水印图像像素之问的相关性,并采取srossler系统生成超混沌密钥序列,进行二次加密.大大增强了水印的安全性.同时,根据人类视觉系统(HVS)的特点,对原始图像进行分块处理,将加密后的水印分别以不同的强度嵌入并提取,给出了改进的嵌入提取方案.实验结果表明,提高了水印图像的不可见性和鲁棒性,具有极强的抗攻击性.  相似文献   

8.
针对传统数字图像水印版权保护中存在的鲁棒性差和安全性低的问题,为提升不同图像零水印的可区分性,提出了一种基于多特征和混沌加密的零水印算法.首先根据整体与局部的角度提取图像的5维特征:均值特征、方差特征、偏态特征、峰度特征和HOG特征;然后利用新提出的基于混沌映射的块置乱方法加密水印图像;最后基于提取的多特征与置乱后水印,构造零水印信息.在版权认证过程中,首先提取多特征,再结合零水印信息,得到加密后水印;最后对其进行解密;即可实现版权认证.实验结果表明,所提出的方法效率高、安全性高、抗攻击能力强.基于多特征和混沌加密零水印算法综合了数字图像的多方面性质作为特征,稳定性高,提高了算法鲁棒性;同时采用新提出的基于混沌映射的块置乱方法提高了水印图像安全性,有效地解决了图像水印鲁棒性差和安全性低的问题.  相似文献   

9.
基于混沌加密和误差扩散控制的AVS压缩域视频水印*   总被引:2,自引:1,他引:1  
针对压缩域视频水印安全性与误差积累问题,提出一种基于AVS压缩域的水印新算法。针对误差积累问题,提出两种控制方法,最大限度地降低了误差积累。此外,对嵌入前的水印进行了混沌处理,提高了水印的安全性。仿真实验结果表明,误差积累得到很好的控制,满足盲检性和不可见性。  相似文献   

10.
根据安全威胁分析和利用水印技术和密码技术,研究对象是版权保护系统的安全协议设计。在协议设计上引入认证机制、时间戳机制和可信第三方的公钥跟踪机制以及多播机制,设计了一个安全可靠的版权保护协议,避免了现有协议的缺陷,实验证明本协议满足版权所有者和购买者的应用需求,可以抵抗现有的协议层安全隐患,并对其性能做出分析,说明了其实际可行性。  相似文献   

11.
基于双重加密和Contourlet变换的数字图像盲水印算法   总被引:1,自引:1,他引:0  
提出了一种演化密文与规则的加密方法,以细胞自动机的初态和规则作为演化对象,寻找满足经过迭代后能得到原文的细胞自动机的初态和规则。由于某些原文只在某些特殊规则下才存在满足完全匹配的密文,而且匹配度越高搜索越耗时,所以引入了校验信息,以最大演化代数作为演化计算的终止条件,寻找迭代后与原文最接近的密文,再通过校验获得完整的原文。通过实验得出:此种加密方法具有较大的密钥空间和良好的置乱效果,而且细胞自动机的邻居半径越大,演化计算的表现越稳定。  相似文献   

12.
一种数字电视广播系统中的版权保护方案   总被引:4,自引:1,他引:4  
本文研究了数字电视广播中的版权保护方案,提出从视频接口和节目内容传输两个环节中进行版权的保护。针对视频接口提出一种安全认证加密机制。在接收或录制设备端,提供授权的解密方法,实现加密数据流的播放和录制。针对内容传输提出应用基于频域的主动水印算法进行广播监视,讨论了数字电视网络系统中基于水印的访问控制模型,以及数字水印的嵌入与提取原理。  相似文献   

13.
Commutative Watermarking and Encryption (CWE) provides a solution for interoperation between watermarking and encryption. It realizes the challenging operation that embeds a watermark into the encrypted multimedia data directly, which avoids the decryption–watermarking–encryption triples. Till now, few CWE schemes have been reported. They often obtain the commutative property by partitioning multimedia data into independent parts (i.e., the encryption part and the watermarking part). Since the two parts are isolated, it can not keep secure enough against replacement attacks. To avoid the disadvantage, a novel quasi-commutative watermarking and encryption (QCWE) scheme based on quasi-commutative operations is proposed in this paper. In the proposed scheme, the encryption operation and watermarking operation are applied to the same data part. Since the two operations are homogenous with commutative properties, their orders can be commutated. As an example, the scheme for MPEG2 video encryption and watermarking is presented. In this example, the DCs in intra macroblocks are encrypted or watermarked based on random module addition, while the DCs in other macroblocks and all the ACs’ signs are encrypted with a stream cipher or block cipher. Analysis and experiments show that the scheme obtains high perceptual security and time efficiency, and the watermarking and encryption operations can be commutated. These properties make the scheme a suitable choice for efficient media content distribution. Additionally, the paper shows the availability of constructing the commutative watermarking and encryption scheme with homogenous operations, which is expected to activate the new research topic.
Shiguo LianEmail:
  相似文献   

14.
Watermarking techniques are developed to deal with multimedia distribution, authentication and copyright protection. It is usually the seller who embeds a watermark in multimedia content to identify the buyer. The embedded watermark can then be used to trace the traitors identity if unauthorized copies are found. However, repudiation and framing issues might arise in this approach. To solve these problems, buyer–seller watermarking protocols have been proposed based on watermarking in the encrypted domain. Such watermarks combine encryption, digital watermarking, and fingerprinting to preserve digital rights of both the buyer and the seller. Unfortunately, most existing watermarking techniques do not provide convincing proofs to ensure that they achieve the claimed level of security and informal proofs abound in the literature. In this paper, we propose a buyer–seller watermarking protocol based on proxy signatures and homomorphic encryption. Formal proofs are provided to show that in the proposed protocol, watermarks are generated such that the seller is unable to fabricate piracy, but he can trace copyright violators. The protocol further protects anonymity of the buyer until he is adjudicated to be guilty. Moreover, we solve the conspiracy problem without imposing any unrealistic assumptions about thrust-worthiness of the parties involved.  相似文献   

15.
电子文档易于编辑,存储和传输,在提高办公效率的同时也具有数据安全隐患。为了对文件实施加解密保护,防止加密文件被泄露,提出了一种基于文件过滤驱动和数字水印的文件保护方案。首先研究了Minifilter技术的在内核层的加解密原理并使用这项技术开发出微过滤驱动程序。通过对文件I/O请求进行拦截,添加保护功能,对文件数据实施加密保护。接着,结合高级加密标准(AES)算法和海明码编码技术,使用Minifilter技术对无格式文本中的数据进行水印信息的嵌入。最后,实现了基于文件过滤驱动的文本数字水印系统,通过测试表明这个系统可以加强文件数据的安全性,为文本数据提供了更全面的保护,提出的文本水印算法在保证足够水印容量的前提下具有良好的不可见性和鲁棒性。  相似文献   

16.
针对传统的彩色图像水印算法往往仅是将一个随机信号或二值图像嵌入到彩色载体图像中这一问题,结合混沌系统和Schur分解的优点,提出一种将彩色水印图像嵌入到彩色载体图像中的鲁棒水印算法.首先,对彩色水印图像进行Arnold置乱和混沌加密,提高了待嵌入彩色水印图像的安全性能;其次,将彩色载体图像分离成3个通道,每一通道被划分...  相似文献   

17.
随着遥感技术的不断发展,遥感数据普及应用程度逐步提高,海量遥感数据安全和版权问题面临着巨大的挑战。由于WebService技术的跨平台性和低耦合等优势,其对处于复杂网络环境中的监控系统有着重要的作用,因此,通过WebService技术实现对数字水印加密过程的监控具有一定的研究意义。以Java EE的三层结构为设计思想,文中开发了一套基于B/S架构的数字水印加密监控系统,通过模块化的编程,实现了3种功能:水印实时监控、叛逆者追溯、水印操作情况统计。其主要的服务用WebService接口提供,具有异构程序耦合性及高可靠性和可扩展性,更适合当前网络技术的发展。通过对WebService技术的研究及海量遥感数据流的特点设计出了更为实用、可靠的监控系统,在保证系统稳定的前提下,提高了开发效率及数据监控的实时可靠性。  相似文献   

18.
ABSTRACT

In the proposed technique we have merged two layers of security, namely, the watermarking layer and the secure channel management layer used in the framework of a real time multimedia security system. The joint layer embeds watermark to the host signal and deploys encryption simultaneously to protect multimedia data, thereby reducing the processing delay. The scheme supports G.729 codec bit-stream. Encryption is done using Data Encryption Standard (DES) protocol. The computation time and watermark-embedding rate is evaluated for the proposed algorithm.  相似文献   

19.
为解决单一水印加密算法安全性差,单一变换域的水印嵌入、提取算法在抵抗攻击上各有侧重,难以抵抗所有常见攻击类型的问题,提出基于DWT-DCT联合变换与二次加密技术的文本图像水印算法。利用DWT、DCT对滤波、JPEG压缩等攻击的抵抗优势和特性,将经过二次加密的水印进行差错控制编码,嵌入到DWT-DCT联合变换域的中频区域,加强安全性,抵抗常见攻击,特别是剪切攻击和噪声攻击。实验结果表明,该算法可有效保证水印算法的不可见性,提高水印抵抗JPEG压缩、噪声、滤波、剪切等攻击的鲁棒性和安全性。  相似文献   

20.
目的 现有水印算法大多是基于明文域的,很容易被入侵、窃取。为了保护用户隐私、提高安全性,本文提出了一种用于盗版追踪的基于格雷码加密域的可逆水印方法,该方法支持对密文直接操作。方法 首先提出了基于格雷码的同态加密系统(HESGC),并以此加密载体图像;然后依据整数小波变换(IWT)和人类视觉系统(HVS)特性,将图像分区并合理分类;再依据新提出的算法完成嵌入、可逆恢复及提取工作;最后利用首次提出的水印追踪联合策略(JWT)来进行盗版追踪。结果 为了验证本文方法,选取USC-SIPI图像库中的6幅经典图像作为标准测试图像,与其他可逆水印算法相比,本文方法具有更高的PSNR值,PSNR高达50 dB,而且SSIM值均为1,实现了可逆功能;本文新提出的HESGC将使原始载体图像膨胀为原来的8倍,故容量较大。理论上,本文最大容量为3.75 bit/像素,目前大多可逆水印算法的最大容量不足1 bit/像素;本文方法不仅实现了盗版追踪功能,而且能够抵抗一些常见的攻击,如随机噪声、中值滤波、图像平滑和JPEG编码、LZW编码和卷积模糊等。通过比较原始追踪证明与攻击后图像的追踪证明可知,相似度在1左右的即为盗版,其他非盗版的相似度都远远低于1,大部分在0.6左右。结论 本文提出了一种基于密文域的可逆水印方案,首次提出了HESGC和JWT,实现了密文域可逆水印技术和盗版追踪功能。该方案直接采用灰度图像作为水印图像,解除了以往以二值图像作为水印图像,或者将灰度图像二值化后作为水印图像的限制,而且采用基于级联混沌技术提高了灰度水印图像的安全性。此外,本文成功消除了图像分区分类中纹理/平滑区域中的平滑/纹理孤岛,使分类结果更加准确、合理。实验结果表明,本方案不仅能够抵抗一些常见攻击,而且容量大、安全性高,很好地保护了用户隐私。本文实现了密文域可逆水印技术,适用于隐私保护要求高的医学、军事等领域。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号