
浏览全部资源
扫码关注微信
1.吉林大学 通信工程学院, 吉林 长春 130022
2.长春大学 计算机科学技术学院, 吉林 长春 130021
3.吉林大学 计算机科学与技术学院, 吉林 长春 130022
[ "吴佳楠(1980-), 男, 吉林长春人, 博士, 副教授, 2007年、2013年于吉林大学分别获得硕士、博士学位, 主要从事量子通信、数据挖掘等方面的研究。E-mail:jiananwu@126.com" ]
王世刚(1962-), 男, 吉林吉林市人, 博士, 教授, 博士生导师, 1983年于东北大学获得学士学位, 1997年于吉林工业大学获得硕士学位, 2001年于吉林大学获得博士学位, 主要从事真三维立体影像显示、视频分析与行为监测和视频通信等方面的研究。E-mail:wangshigang@vip.sina.com WANG Shi-gang, E-mail:wangshigang@vip.sina.com
收稿日期:2017-05-23,
录用日期:2017-7-15,
纸质出版日期:2017-11-25
移动端阅览
吴佳楠, 王世刚, 张迪, 等. 融合量子密钥真随机性的二值图像水印[J]. 光学 精密工程, 2017,25(11):2968-2974.
Jia-nan WU, Shi-gang WANG, Di ZHANG, et al. Binary image watermark fusionbased on quantum key true randomness[J]. Optics and precision engineering, 2017, 25(11): 2968-2974.
吴佳楠, 王世刚, 张迪, 等. 融合量子密钥真随机性的二值图像水印[J]. 光学 精密工程, 2017,25(11):2968-2974. DOI: 10.3788/OPE.20172511.2968.
Jia-nan WU, Shi-gang WANG, Di ZHANG, et al. Binary image watermark fusionbased on quantum key true randomness[J]. Optics and precision engineering, 2017, 25(11): 2968-2974. DOI: 10.3788/OPE.20172511.2968.
目前多数水印算法将伪随机数列作为水印,算法设计时多偏重于提高水印隐蔽性和鲁棒性,但忽略了水印自身的安全。本文提出了一种基于量子密钥真随机性的,可进行篡改定位的、面向安全通信的空域水印算法来提高水印的安全性。该算法使用基于BB84协议原理、通过量子密钥分发机制生成的具有真随机性和绝对安全性的量子密钥制备二值图像水印,并结合首次提出的量子密钥矩阵模型与8-邻域随机定位理念,将量子水印动态随机地嵌入到载体图像中。传输完成后,接收方可以快速提取水印信息,精确判断水印图像完整性及传输过程安全性,并能够对篡改进行定位。对算法进行了隐蔽性、鲁棒性以及篡改定位测试,结果表明:提出的算法简单,具有高安全性和隐蔽性,同时兼顾鲁棒性,篡改定位精度达3 pixel×3 pixel,可以广泛应用于数字图像的安全传输中。
Current watermarking algorithms use mostly pseudo random sequences to generate watermarks. These algorithms emphasize the improvement of imperceptibility and robustness of the watermarking but ignores its safety. To improve the watermarking safety
a new secure communication oriented airspace watermarking algorithm with a tamper locating function was proposed based on the true randomness of quantum key. According to the principle of BB84 protocol
the quantum key with real randomness and absolute security generated by quantum key distribution mechanism was used to generate binary image watermarks. Then
in combining with a quantum key matrix model and 8-neighborhood random location idea
the quantum watermarks were embed into a carrier image dynamically and randomly. At the end of the transmission
the receiver could quickly extract watermark information
accurately judge the integrity of the watermark image and the security of the transmission process
and could perform tamper localization. The concealment
robustness and tamper location of the algorithm were tested. The experimental results show that the algorithm is simple
safe
and has higher safety and covert and its tamper locating accuracy is 3 pixel×3 pixel. The algorithm can be widely used in the secure transmission of digital images.
WOLFGANG R B, PODILCHUK C I, DELP E J. Perceptual watermarks for digital images and video[J]. Proceedings of the IEEE, 1999, 87(7):1108-1126.
VAN SCHYNDEL R G, TIRKEL A Z, OSBORNE C F. A digital watermark[C]. Proceedings of the 1st International Conference on Image Processing , IEEE , 1994(2):86-90.
COX I J, KILIAN J, LEIGHTON T, et al .. Secure spread spectrum watermarking for images, audio and video[C]. Proceedings of the 3rd IEEE International Conference on Image Processing , IEEE , 1996:243-246.
COX I J, KILIAN J, LEIGHTON F T, et al.. Secure spread spectrum watermarking for multimedia[J]. IEEE Transactions on Image Processing, 1997, 6(12):1673-1687.
RUANAIDH J J K O, DOWLING W J, BOLAND F M. Phase watermarking of digital images[C]. Proceedings of the 3 rd IEEE International Conference on Image Processing , IEEE , 1999, 3:239-242.
KUNDUR D, HATZINAKOS D. A robust digital image watermarking method using wavelet-based fusion[C]. Proceedings of International Conference on Image Processing , IEEE , 1997:544-547.
赵博, 秦贵和.高鲁棒性的图像水印算法[J].吉林大学学报(工学版), 2017, 47(1):249-254.
ZHAO B, QIN G H. High robustness image watermarking algorithm[J]. Journal of Jilin University (Engineering and Technology Edition), 2017, 47(1):249-254. (in Chinese)
郑秋梅, 金萧, 顾国民, 等.一种基于Data Matrix的数字水印算法[J].中国石油大学学报(自然科学版), 2015, 39(1):188-193.
ZHENG Q M, JIN X, GU G M, et al.. A digital watermarking algorithm based on Data Matrix[J]. Journal of China University of Petroleum, 2015, 39(1):188-193. (in Chinese)
王沛, 姚恒, 李莉.结合图像空间域和小波域特性的自适应盲水印算法[J].光学 精密工程, 2006, 14(6):1057-1062.
WANG P, YAO H, LI L. A adaptive digital watermarking algorithm combining spatial and DWT domain[J]. Opt. Precision Eng., 2006, 14(6):1057-1062. (in Chinese)
LOUKHAOUKHA K, NABTI M, ZEBBICHE K. A robust SVD-based image watermarking using a multi-objective particle swarm optimization[J]. Opto-Electronics Review, 2014, 22(1):45-54.
QI X J, XIN X. A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization[J]. Journal of Visual Communication and Image Representation, 2015, 30:312-327.
SUTHAHARAN S. Fragile image watermarking using a gradient image for improved localization and security[J]. Pattern Recognition Letters, 2004, 25(16):1893-1903.
HE H J, ZHANG J SH, TAI H M. A secure fragile watermarking scheme for image authentication[C]. Proceedings of 2006 International Conference on Computational Intelligence and Security , IEEE, 2006:1180-1185.
KUNDUR D, HATZINAKOS D. Digital watermarking for telltale tamper proofing and authentication[J]. Proceedings of the IEEE, 1999, 87(7):1167-1180.
FRIDRICH J, GOLJAN M. Images with self-correcting capabilities[C]. Proceedings of 1999 International Conference on Image Processing , IEEE, 1999:792-796.
LIN P L, HUANG P W, PENG A W. A fragile watermarking scheme for image authentication with localization and recovery[C]. Proceedings of the 6 th International Symposium on Multimedia Software Engineering , IEEE, 2004:146-153.
王定成, 田翠翠, 陈北京, 等.基于四维四元数频域的彩色图像双重水印算法[J].吉林大学学报(工学版), 2015, 45(4):1336-1346.
WANG D CH, TIAN C C, CHEN B J, et al.. Dual watermarking for color images based on 4D quaternion frequency domain[J]. Journal of Jilin University (Engineering and Technology Edition), 2015, 45(4):1336-1346. (in Chinese)
BENNETT C H, BRASSARD G. Quantum cryptography:public key distribution and coin tossing[C]. Proceedings of the IEEE International Conference on Computers , Systems , and Signal Processing , IEEE, 1984.
王玉海, 朱长青, 苏守宝, 等.结合感知哈希与数字水印的遥感影像认证方法[J].光学 精密工程, 2016, 24(10):640-648.
WANG Y H, ZHU CH Q, SU SH B, et al.. An authentication method based on perceptual hashing and watermarking for remote sensing image[J]. Opt. Precision Eng., 2016, 24(10):640-648. (in Chinese)
SINGH A K, DAVE M, MOHAN A. Hybrid technique for robust and imperceptible image watermarking in DWT-DCT-SVD domain[J]. National Academy Science Letters, 2014, 37(4):351-358.
0
浏览量
487
下载量
5
CSCD
关联资源
相关文章
相关作者
相关机构
京公网安备11010802024621