基于相关性分析的信息隐藏与生物认证方法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着因特网的进一步发展与流行,数字信号处理技术和多媒体信息安全显得日益重要。信息隐藏技术作为信息安全的一个重要分支吸引了众多国内外学者及相关部门的目光。
     本文首先简要阐述了信息隐藏技术的研究史、基本原理、理论模型和经典算法等问题。介绍了信息隐藏技术在现实生活中与生物认证技术相结合的应用。目前基于图像内容特性的图像间的相关性分析密写方法成为信息隐藏领域的主导趋势,但此类研究尚处于不成熟阶段,没有代表性的算法和理论模型。
     本文提出了一种充分利用图像之间相关性的方法,分析载体图像和秘密图像之间的相关性,并且将嵌入信息由原来的秘密图像改为能量小的残差图像。为了实现嵌入量与隐蔽性的双达标,又将原有的空域算法进行改进。通过对所提出的算法进行了大量仿真实验。结果表明进行相关性分析的方法无论是不可见性还是鲁棒性能都优于忽略图像之间相关性的原始方法。之后在与远程生物认证的结合中依然具有明显的优势。
Recently, with the development and popularity of the Internet, digital signal processing technology and multimedia information security become increasingly important. Information hiding technology as an important branch of information security has attracted many scholars and relevant departments’eyes.
     This paper briefly describes the history of information hiding technology research, basic principles, theoretical models and classical algorithms and so on. Introduction of information hiding technology in real life with the combination of biometric technology applications.
     This paper proposes a novel multimodal biometric images hiding approach based on correlation analysis, Compared with existing methods, we representing the biometric images using the corresponding content of cover image results to the generation of the residual images with much less energy. Hiding the residual images instead of the original secret images into the cover image. Embedded in definite,The original Spatial domain algorithm has been improved. Extensive experimental results demonstrate that the proposed approach not only provides good imperceptibility, but also resists some common attacks and assures the effectiveness of network-based multimodal biometrics identification.
引文
[1]王朔中张新鹏张开文著《数字密写和密写分析─互联网时代的信息战技术》清华大学出版社2005年4月。
    [2]R. G. van Schyndel, A. Z. Tirkel, C. F. Osbome. A Digital Watermark. Proceedings of IEEE International Conference on Image Processing, 1994, 2:86-90.
    [3]孙圣和、陆哲明、牛夏牧等著《数字水印技术及应用》科学出版社2004年11月。
    [4] N. K. Ratha, J. H. Connell, R.M. Bolle, Secure data hiding in wavelet compressed fingerprint images, in: International Multimedia Conference, Proceedings of the 2000ACMWorkshop on Multimedia, (2000): 127–130.
    [5] Huiyan Qi, Dong Zheng, Jiying Zhao, Human visual system based adaptive digital image watermarking, Signal Processing 88(2008) 174-188.
    [6]易开祥,石教英,孙鑫。数字水印技术研究进展。中国图像图形学报,2001,6(2):111~117。
    [7]王秋生,孙圣和。一种在数字音频信号嵌入水印的新算法。声学学报,2001,26(5):464~467。
    [8]张立和,杨立先,钮心忻,牛少彰,软件水印综述,软件学报,2003,14(2):268~277。
    [9]M.L.Miller,A.Bloom and I.J.Cox.Digital Watermarking. Morgan Kaufmann,2002.
    [10]A.Nikolaidis,S.Tsekeridou,A.Tefas and V.Solachidis. A Survey on Watermarking Application. Scenarios and Related Attracks. International Conference on Image Processing,Oct7~10,2001,3:991~994.
    [11]杨立先,钮心忻,多媒体信息伪装综论.通信学报,2002,23(5):32~38。
    [12]M.Arnold. Attacks on Digital Audio Watermarks and Countermeasures. Third International Conference on Web Delivering of Music,Sept 15~17,2003,55~62.
    [13]S.Voloshynovskiy,S.Pereira,T.Pun,J.J.Eggers and J.K.Su. Attacks on Digital Watermarks: Classification,Estimation Based Attacks,and Benchmarks. IEEE Communication Magazine,2001,39(8): 118~126.
    [14]T.Muntean and M.Najim. Unitary Approach of Watermarking and Attack Algorithms for Audio Signals. Third International Conference on Web Delivering of Music,Sept15~17,2003,63~66.
    [15]R.G.van Schyndel,A.Z.Tirkel,C.F.Osbome.A Digital Watermark.Proceedings Of IEEE International Conference on Image Processing,1994,2:86-90.
    [16]Kawaguchi E, Eason R O. Principle and Application of BPCS-Steganography. In Proceedings of SPIE: Multimedia Systems and Applications,3528.1998.464~472.
    [17]Wu D C, Tsai W H. A Steganographic Method for Image by Pixel-Value Differencing. Pattern Recognition Letters,2003,24:1613~1626.
    [18] Wold, H.: Partial least squares, In S. Kotz and N. L. Johnson, editors, Encyclopedia of the statistical Sciences 6 (1985) 581-591.
    [19] Holland J. Adaptation in natural and artificial systems.University of Michigan Press, 1975.
    [20]D. Goldberg, Genetic Algorithms in Search Optimization and Machine Learning, Addison-Wesley Publishing, 1989.
    [21] Chang-Chun Zhou, Guo-Fu Yin, Xiao-Bing Hu, Multiobjective optimization of material selection for sustainable products: Artificial neural networks and genetic algorithm approach, Materials and Design 30, 2009, pp. 1209-1215.
    [22] G. Voyatzis, I. Pitas, Chaotic mixing of digital images and applications to watermarking, Proceedings of European Conference on Multimedia Applications, Services, and Techniques, vol. 2, 1996, pp. 687–694.
    [23] Kennedy, J., Eberhart, R.: Particle Swarm Optimization. Proceeding of the 1995 IEEE International Conference on Neural Network (1995) 1942-1948.
    [24] 21.Sun, T.H: Applying particle swarm optimization algorithm to roundness measurement, Expert Systems with Applications 36 (2009) 3428-3438.
    [25] 22.Zhou, J.Z., Fang, R.C., Li Y.H., Zhang, Y.C., Peng, B.: Parameter optimization of nonlinear grey Bernoulli model using particle swarm optimization, Applied Mathematics and Computation 207 (2009) 292-299.
    [26] 23.Oliveira, M.V., Schirru, R.: Applying particle swarm optimization algorithm for tuning a neuro-fuzzy inference system for sensor monitoring, Progress in Nuclear Energy 51 (2009) 177-183.
    [27]Lee I.H, Tsaia, W.H: Data hiding in grayscale images by dynamic programming based on a human visual model, Pattern Recognition 42 (2009) 1604-1611.
    [28]Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems, Lecture Notes in Computer Science 1768 (2000) 61-75.
    [29] Yang, J., Zhang, D. Frangi, A.F., Yang, J.Y.: Two-dimensional PCA: a new approach to appearance-based face representation and recognition, IEEE TRANSACTION ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 26 (2004) 131-137.
    [30] Zhang, J.G., Tan T.N, Ma, L.: Invariant Texture Segmentation via Circular Gabor Filters, International Conference on Pattern Recognition 2 (2002) 901-904.
    [31]Qi, M, Lu, Y.H, Li, J.S., Li, X.L., Kong, J.: User-Specific Iris Authentication Based on Feature Selection, CSSE (2008) 1040-1043.
    [32] Chan, C.K, Cheng, L.M.: Hiding data in images by simple LSB substitution, Pattern Recognition 37 (2004) 469-474.
    [33] Tsai, Y.Yu, Wang, C.M.: A novel data hiding scheme for color images using a BSP tree, Journal of System and Software 80 (2007) 429-437.
    [34].Chang, C.C., Kieu, T.D., Wu, W.C.: A lossless data embedding technique by joint neighboring coding, Pattern Recognition 42 (2009) 1597-1603.
    [35].Kermani, Z.: A Robust Steganography Algorithm Based on Texture Similarity Using Gabor Filter, IEEE signal processing and Info. Technology (2005) 578-582.
    [36]Wang, R.Z., Tsai, Y.D: An image-hiding method with high capacity based on best-block matching and k-means clustering, Pattern Recognition 40 (2007) 398-409.
    [37]Shen, J.J., Hsu P.W: A robust associative watermarking technique based on similarity diagrams, Pattern Recognition 40 (2007) 1355-1367.
    [38]Hedieh Sajedi, Mansour Jamzad: Cover Selection Steganography Method Based on Similarity of Image Blocks, IEEE 8th International Conference on Computer and Information Technology Workshops (2008) 379-384.
    [39]Muhammad Khurram Khan, Jiashu Zhang, Lei Tian: Chaotic secure content-based hidden transmission of biometric templates, Chaos, Solitons and Fractal 32 (2007) 1749-1759.
    [40]王朔中张新鹏张开文著《数字密写和密写分析─互联网时代的信息战技术》清华大学出版社2005年4月。
    [41]R. B. Wolfgang, C. I. Podilchuk, E. J. Delp. Perceptual Watermarks for Digital Images and Video Proceedings of the IEEE.1999,87(7):1108~1126.
    [42][美]冈萨雷斯(Gonzalez,R.C.)等著阮秋琦等译,《数字图像处理》(第二版)电子工业出版社2003年3月。
    [43][美]冈萨雷斯(Gonzalez,R.C.)等著阮秋琦等译,《数字图像处理》(MATLAB版)电子工业出版社2005年9月。
    [44][英]Petrou,M.等著,赖剑煌等译,数字图像处理疑难解析》机械工业出版社, 2005年4月。
    [45]王育民等著《信息隐藏:理论与技术》清华大学出版社2006年3月。
    [46]Ratha, N.K., Connell, J.H., Bolle, R.M.: An analysis of Minutae Matching Strength, Proc. Third Int’l. Conf. Audeo-Based Biometric Person Authentication (2001) 223-228.
    [47]Ratha, N.K., Connell, J.H., Bolle, R.M.: Secure data hiding in wavelet compressed fingerprint images, Proceedings of the 2000 ACM Workshop on Multimedia (2000) 127-130.
    [48] A.K. Jain, U. Uludag, R.L. Hsu: Hiding a face in a fingerprint image, in: proceeding of the International Conference on Pattern Recognition 3 (2002) 756-759.
    [49]Mohamed Mostafa Abd Allah: Embedded biometric data for a secure authentication watermarking, SPPR (2007) 191-196.
    [50] Vatsa, M., Singh, R., Mitra, P., Noore, A.: Comparing robustness of watermarking algorithms on biometrics data, Proceedings of the Workshop on Biometric Challenges from Theory to Practice-ICPR Workshop (2004) 5-8.
    [51]Vatsa, M., Singh, R., Noore, A.: Feature based RDWT watermarking for multimodal biometric system, Image and Vision Computing 27 (2009) 293-304.
    [52]Noore, A, Singh, R., Vatsa, M., Houck, M.M.: Enhancing security of fingerprints through contextual biometric watermarking, Forensic Science International 169 (2007) 188-194.
    [53]Vatsa, M., Houck, M.M., Morris, K.: Robust biometric image watermarking for fingerprint and face template protection, IEICE Electron. Express 3 (2006) 23-28.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700