基于状态参数的安全数码相机模型
doi: 10.3969/j.issn.0258-2724.2013.03.011
A New Secure Digital Camera Model Based on State Parameter
-
摘要: 现有安全数码相机不能识别二次获取图像且必须直接参与含水印数字照片的认证过程.针对上述问题,本文从含水印数字照片的密钥生成与传递方式入手,提出一种基于状态参数的新型安全数码相机模型.该模型通过设计相机密钥设置函数——级联-混沌映射,隐蔽地生成安全数码相机的相机密钥,然后以相机密钥和照片拍摄时相机的取景模式、焦距、拍摄时间等状态参数为明文数据,利用Hash函数计算出含水印数字照片的密钥,讨论分析了该模型中密钥的保密性和难伪造性,建立了相机与密钥的多对一非线性映射关系.实验结果表明,相机密钥或状态参数改变时,密钥的变化量近似均匀分布.Abstract: The current secure digital camera (SDC) model can not identify the secondary capture image and have to validate the integrity of watermarked images taken by it. To address these problems, a state parameter based SDC model is proposed by generating and transferring secret key which is used to produce a watermarked image. The cascade chaotic mapping is used to generate the camera key for the proposed SDC model. By the application of the plaintext data including camera key and state parameters in the image creation, such as viewfinder mode, focus, and time, the secret key is produced by Hash function. The confidentiality and anti-counterfeiting of secret key for the proposed SDC model were validated and one to many nonlinear mapping between the camera and the secret key was established. Experimental results demonstrate that the bit number variation of secret key follows approximately uniform distribution when the camera key or scene parameter is changed.
-
Key words:
- digital camera /
- digital image /
- forensics /
- state parameter
-
BIANCHI T, PIVA A. Secure watermarking for multimedia content protection[J]. IEEE Signal Processing Magazine, 2013, 30(2): 87-96. LUO Weiqi, QU Zhenhua, PAN Feng, et al. A survey of passive technology for digital image forensics[J]. Frontiers of Computer Science in China, 2007, 1(2): 166-179. BLYTHE P, FRIDRICH J. Secure digital camera[C]//Digital Forensic Research Workshop. Baltimore: [s.n.], 2004: 11-13. KORUS P, DZIECH A. Efficient method for content [JP3]reconstruction with self-embedding[J]. IEEE Transactions on Image Processing, 2013, 22(3): 1134-1147. HE Hongjie, CHEN Fan, TAI H M, et al. Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 185-196. ZHANG Xinpeng, WANG Shuozhong, QIAN Zhenxing, et al. Reference sharing mechanism for watermark self-embedding[J]. IEEE Transactions on Image Processing, 2011, 20(2): 485-495. 陈帆,和红杰,王宏霞. 用于图像认证的变容量恢复水印算法[J]. 计算机学报,2012,35(1): 154-162.CHEN Fan, HE Hongjie, WANG Hongxia. Variable-payload self-recovery watermarking scheme for digital image authentication[J]. Chinese Journal of Computers, 2012, 35(1): 154-162. MOHANTY S P. A secure digital camera architecture for integrate real-time digital rights management [J]. Journal of Systems Architecture, 2009, 55: 468-480. HIEW B Y, TEOH A B, YIN O S. A secure digital camera based fingerprint verification system[J]. Journal of Visual Communication and Image Representation, 2010, 21: 219-231. 田新,刘曼,杨祥辉. 一种带有水印嵌入功能的数码相机: 中国,200510003430[P]. 2007-07-04. FRIDRICH J, GOLJAN M, MEMON N. Cryptanalysis [JP3]of the Yeung-Mintzer fragile watermarking technique[J]. Electronic Imaging, 2002, 11(4): 262-274. 冯登国. 密码分析学[M]. 北京:清华大学出版社,2000: 1-3. 余旺科,马文平,陈和风. 分簇无线传感器网络密钥管理方案[J]. 西南交通大学学报,2011,46(2): 310-314.YU Wangke, MA Wenping, CHEN Hefeng. Key management scheme for clustered wireless sensor networks[J]. Journal of Southwest Jiaotong University, 2011, 46(2): 310-314. LIAN Shiguo, SUN Jinsheng, WANG Jinwei, et al. A chaotic stream cipher and the usage in video protection[J]. Chaos Solitons & Fractals, 2007, 34: 851-859. 刘丽,王永庆. 视频哈希的安全性分析[J]. 西南交通大学学报,2012,47(4): 675-679.LIU Li, WANG Yongqing. Security of video hashing[J]. Journal of Southwest Jiaotong University, 2012, 47(4): 675-679. 魏贵民,周仲礼,许必才. 概率论与数理统计[M]. 北京:高等教育出版社,2007: 26-31. ZHANG Jiashu, WANG Xiaomin. Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter[J]. Physics Letters A , 2007, 362(5/6): 439-448.
点击查看大图
计量
- 文章访问数: 932
- HTML全文浏览量: 57
- PDF下载量: 458
- 被引次数: 0