• ISSN 0258-2724
  • CN 51-1277/U
  • EI Compendex
  • Scopus
  • Indexed by Core Journals of China, Chinese S&T Journal Citation Reports
  • Chinese S&T Journal Citation Reports
  • Chinese Science Citation Database
Volume 26 Issue 3
Jun.  2013
Turn off MathJax
Article Contents
HE Hongjie, CHEN Fan, YIN Zhongke. A New Secure Digital Camera Model Based on State Parameter[J]. Journal of Southwest Jiaotong University, 2013, 26(3): 460-466. doi: 10.3969/j.issn.0258-2724.2013.03.011
Citation: HE Hongjie, CHEN Fan, YIN Zhongke. A New Secure Digital Camera Model Based on State Parameter[J]. Journal of Southwest Jiaotong University, 2013, 26(3): 460-466. doi: 10.3969/j.issn.0258-2724.2013.03.011

A New Secure Digital Camera Model Based on State Parameter

doi: 10.3969/j.issn.0258-2724.2013.03.011
  • Received Date: 15 Jul 2012
  • Publish Date: 25 Jun 2013
  • The current secure digital camera (SDC) model can not identify the secondary capture image and have to validate the integrity of watermarked images taken by it. To address these problems, a state parameter based SDC model is proposed by generating and transferring secret key which is used to produce a watermarked image. The cascade chaotic mapping is used to generate the camera key for the proposed SDC model. By the application of the plaintext data including camera key and state parameters in the image creation, such as viewfinder mode, focus, and time, the secret key is produced by Hash function. The confidentiality and anti-counterfeiting of secret key for the proposed SDC model were validated and one to many nonlinear mapping between the camera and the secret key was established. Experimental results demonstrate that the bit number variation of secret key follows approximately uniform distribution when the camera key or scene parameter is changed.

     

  • loading
  • BIANCHI T, PIVA A. Secure watermarking for multimedia content protection[J]. IEEE Signal Processing Magazine, 2013, 30(2): 87-96.
    LUO Weiqi, QU Zhenhua, PAN Feng, et al. A survey of passive technology for digital image forensics[J]. Frontiers of Computer Science in China, 2007, 1(2): 166-179.
    BLYTHE P, FRIDRICH J. Secure digital camera[C]//Digital Forensic Research Workshop. Baltimore: [s.n.], 2004: 11-13.
    KORUS P, DZIECH A. Efficient method for content [JP3]reconstruction with self-embedding[J]. IEEE Transactions on Image Processing, 2013, 22(3): 1134-1147.
    HE Hongjie, CHEN Fan, TAI H M, et al. Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 185-196.
    ZHANG Xinpeng, WANG Shuozhong, QIAN Zhenxing, et al. Reference sharing mechanism for watermark self-embedding[J]. IEEE Transactions on Image Processing, 2011, 20(2): 485-495.
    陈帆,和红杰,王宏霞. 用于图像认证的变容量恢复水印算法[J]. 计算机学报,2012,35(1): 154-162.CHEN Fan, HE Hongjie, WANG Hongxia. Variable-payload self-recovery watermarking scheme for digital image authentication[J]. Chinese Journal of Computers, 2012, 35(1): 154-162.
    MOHANTY S P. A secure digital camera architecture for integrate real-time digital rights management [J]. Journal of Systems Architecture, 2009, 55: 468-480.
    HIEW B Y, TEOH A B, YIN O S. A secure digital camera based fingerprint verification system[J]. Journal of Visual Communication and Image Representation, 2010, 21: 219-231.
    田新,刘曼,杨祥辉. 一种带有水印嵌入功能的数码相机: 中国,200510003430[P]. 2007-07-04.
    FRIDRICH J, GOLJAN M, MEMON N. Cryptanalysis [JP3]of the Yeung-Mintzer fragile watermarking technique[J]. Electronic Imaging, 2002, 11(4): 262-274.
    冯登国. 密码分析学[M]. 北京:清华大学出版社,2000: 1-3.
    余旺科,马文平,陈和风. 分簇无线传感器网络密钥管理方案[J]. 西南交通大学学报,2011,46(2): 310-314.YU Wangke, MA Wenping, CHEN Hefeng. Key management scheme for clustered wireless sensor networks[J]. Journal of Southwest Jiaotong University, 2011, 46(2): 310-314.
    LIAN Shiguo, SUN Jinsheng, WANG Jinwei, et al. A chaotic stream cipher and the usage in video protection[J]. Chaos Solitons & Fractals, 2007, 34: 851-859.
    刘丽,王永庆. 视频哈希的安全性分析[J]. 西南交通大学学报,2012,47(4): 675-679.LIU Li, WANG Yongqing. Security of video hashing[J]. Journal of Southwest Jiaotong University, 2012, 47(4): 675-679.
    魏贵民,周仲礼,许必才. 概率论与数理统计[M]. 北京:高等教育出版社,2007: 26-31.
    ZHANG Jiashu, WANG Xiaomin. Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter[J]. Physics Letters A , 2007, 362(5/6): 439-448.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索
    Article views(932) PDF downloads(458) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return