节点文献

基于单向hash函数的脆弱数字水印研究

【作者】 杨群亭

【导师】 高铁杠;

【作者基本信息】 南开大学 , 计算机应用技术, 2009, 硕士

【摘要】 随着计算机网络技术与多媒体技术的迅速发展,多媒体数字产品的传播变得异常快捷和方便,客观上导致了更多的作品侵权、信息篡改等问题。作为传统加密方法的有效补充手段,数字水印技术已经成为一种新的有效的数字产品版权保护技术。将水印嵌入到数字媒体中,然后通过对水印的检测和提取来对数字产品的使用情况进行跟踪,可以实现隐藏传输、秘密存储、版权保护等功能。论文首先对数字水印的模型、评价指标、分类、攻击、应用等方面进行了系统介绍。接着对混沌理论的起源与发展、混沌的定义、混沌的本质特征进行了介绍和分析。提出了混沌系统模型,根据该模型形成了基于混沌的单向hash函数算法。对使用本算法生成的hash函数的性能进行了详细的分析,在实验基础说明了本算法满足hash函数的置乱和抗攻击的良好性能。同时对本算法产生的可变长度单向hash函数,在不同hash长度的情况下,对其进行了实验仿真,统计结果说明该方法在各种情况下都具有同样优越的性能。提出了基于hash函数的脆弱图像水印算法。根据本文提出的hash函数构造算法,提出了在空域内基于单向hash函数的脆弱水印方法。对原始图像像素LSB位置零,然后提取像素每行和每列的像素值,组成单向hash函数的输入,生成结果是128位的hash编码。对每个hash编码取其权重,得到的结果可以用8bit二进制数据表示,把每行和列的权重嵌入LSB平面。提取时使原始权重和新提取的权重对比,变换的行和列的交汇处就是篡改发生处。提出了DCT域内基于hash函数的半脆弱水印算法。对图像进行边缘剪切,然后对剪切后的图像进行分块进行JPEG量化,量化后的分块进行DCT变换,以分块DCT的低频部分为明文,进行hash,然后把hash编码和水印信息按照嵌入算法存入分块的中频域。实验证明该方法对一定程度的JPEG压缩具有很好的鲁棒性,并且具有良好的基于分块的篡改定位能力。

【Abstract】 With the rapid development of computer network and multimedia technology, it is more convenient to the dissemination of digital products. However this will lead to more issues of piracy and information tamper for some interests objectively. As one of the important applications of information hiding technology in computer field, digital watermarking provides a new method to protect the copyright of multimedia information. It embeds watermarks into digital multimedia, and carries out the functions such as infonnation hiding, secret storing, and copyright protection by detecting the watermarks that can track the use of digital multimedia.Digital watermarking system was introduced at first. It includes the digital watermarking model, evaluation standard, classification, attacks, applications, and so on. Then the chaos theory was introduced and analyzed. The main contents include the origin and development, definition, the essential feature of chaos.A hash function construction method based on cell neural network with hyper-chaos characteristics is proposed. The detailed analysis is performed, which presents the one-way hash function based on proposed algorithm possesses good performances of anti-attack and diffusion. Meanwhile, alterable length one-way hash function could be generated by proposed algorithm and simulation for the process shows its effectiveness and validity of our algorithm in various conditions.The fragile image watermarking algorithm based on one-way hash function is represented in this paper. The fragile image watermarking algorithm is spatial domain based. The LSB panel is set to 0 first. The remaining value of pixels in every row and column are regard as plaintexts of one-way hash function, and then get series of 128 bits hash code. Get the weight of every 128 bits hash code, and the every weight value can be present by 8 bits. The series bits can be embedded in the LSB panel. The tamper part could be decided by intersections of every changed row and column, which are determined by the comparison of weight values embedded and weight values extracted.The semi-fragile watermark algorithm based on DCT domain is represented in this paper. The edge of original image is cut, and the remaining is divided into 8*8block. Every8*8block was treated by Discrete Cosine Transform (DCT). The low coefficients and the coefficients location inner every block are chosen as plaintext to fulfill hash operation. The hash result and scrambled watermark sequence are embedded in the middle DCT coefficients by embedding algorithm. The watermark algorithm was robust to JPEG compression and maintains the ability oftampered positioning at block precision.

  • 【网络出版投稿人】 南开大学
  • 【网络出版年期】2010年 07期
节点文献中: 

本文链接的文献网络图示:

本文的引文网络