用户名: 密码: 验证码:
基于混沌理论与密码的图像认证模型研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着信息化进程的加深,社会管理方式的变革,经济与人们生活方式的变化,图像的版权认证问题已经不再仅是一个学术价值的问题,而是演变为前沿的技术问题,不同的人根据各自不同的思维方式、学科背景、认识视角提出了不同的解决方案。已有方案的丰富性在给图像版权认证问题的解决提供了广阔的思路的同时,也增加了方案选择的难度。总结已有的思路,分析与评估现有的方案,重新对图像版权问题进行审视,结合现状,取其优,去其繁,在现有基础上设计一种新的认证方案不失为一种切实的选择。
     密码学致力于信息安全的保护,针对于信息的隐秘性、完整性、真实性与有效性四个方面,保护信息免受窃取、伪造、篡改等形式的攻击和破坏。本文就文件来源真实性与有效性的非实时认证协议机制问题展开研究,从认证的需求、协议的建立、协议安全性的论证三个具体方面入手,在综合考虑几种特殊类型的信息攻击形式的前提下设计协议模型,在针对认证安全性需求进行基于逻辑的形式化验证的基础上,论证该协议的可靠性。
     具体而言,本文所设计的协议是一种基于混沌理论,通过脆弱性透明水印形式体现的版权认证协议。
     本论文所作出的主要贡献包括以下几个方面:
     ○1改进了一种基于混沌理论的随机序列生成算法,分析了算法改进在协议设计中的意义。
     ○2改进并设计出一种基于混沌与小波包分解的水印嵌入与提取算法,分析了该改进算法的性能及算法改进在协议中的意义。
     ○3简要回顾密码学中认证相关协议的概念、分类。针对以脆弱性水印中认证信息防篡改问题,结合公钥密码学和认证协议,提出了一种具有实际应用价值、划分三方角色的认证协议。
     ○4针对所建立的认证协议模型,给出了基于逻辑的形式化证明,论证了该协议对安全性目标的有效性。
With the deepening process of information, the way of social management, economic and lifestyle have been changing, therefore, the problem of image copyright authentication is no longer of a problem only of academic value, but rather evolves into the forefront of technical problems. Towards this problem, different people propose different solutions following their special way of thinking , academic background and point of view. The richness of the program having existed concerning the problem of image copyright authentication provides a broad view, but also increases the difficulty of selecting the proper program. Summarizing the existing ideas, analysizing and evaluating of existing programs, re-examining the issue of image copyright with the current status is an excellent idea, resisting its complexity and designing a new program on the basis of the existing authentication scheme has become a more practical choice.
     Cryptography is committed to addressing the problem of the protection of information security, which focuses on protecting the secrecy, integrity, authenticity and effectiveness of information from theft, forgery, tampering and other forms of attacking and destructing. This paper tries to form a new model of the mechanism of non-realtime authentication protocol focusing on authenticity and validity of the sources of the image file from the perspectives of certification requirements, the establishment of an agreement, the demonstration of the safety of the agreement together with considering some form of special types of information attacks, and by logic-based formal verification on security requirements for authentication demonstrated the reliability of the agreement.
     Specifically, the protocol designed in this paper is a copyright authentication protocol based on both chaos theory and vulnerable transparent watermark.
     The main contribution made by this paper could be reflected in the following aspects:
     ○1 A new random sequence generating algorithm based on chaos theory is proposed, and the significance of the improvement of the algorithm is analyzed.
     ○2 An embedding and extracting algorithm concerning watermark based on chaos theory and wavelet packet decomposition is improved, and the significance of the improvement of the algorithm is analyzed.
     ○3 Relevant concepts, classification concerning about authentication problem of cryptography is briefly reviewed. Towards the problem of tampering the information hidden in the fragile watermark, considering public-key cryptography and authentication protocol, an authentication procotol with application value which is divided into three parts is proposed.
     ○4 A formal proof based on logic for the established authentication protocol model is given, and the effectiveness of the security goals of the agreement is demonstrated.
引文
[1]王钰婷.商标侵权判定的"混淆"与"相似"之辨[J].中国商界,2009,(12)_1.
    [2]邱国侠.商标近似的法律判定[J].安徽科技,2005,(9)_2.
    [3]任永华,王国营,马俊伟等.基于纹理分割的形状特征相似的商标检索技术[J].计算机与现代化,2009,(2)_5.
    [4]黄赛平,吴晓彬.基于距离融合的多特征商标图像检索[J].中国制造业信息化,2009,38(4).
    [5] Friedman G L. The Trustworthy digital camera: restoring credibility to the photographic image. [J].IEEE Transactions on Consumer Electronics, 1993, 39(10):905-910.
    [6]金聪.数字水印理论与技术[M].清华大学出版社,2008,15-18.
    [7]Tsung-Yuan Liu,Wen-Hsiang Tsai.Generic Lossless Visible Watermarking—A New Approach[J].IEEE Transactions on Image Processing,2010,19(5)_12.DOI:10.1109/ TIP.2010. 2040757.
    [8]H.-H. Tsai,H.-C. Tseng,Y.-S. Lai et al.Robust lossless image watermarking based on a-trimmed mean algorithm and support vector machine[J].The Journal of Systems and Software,2010,83(6)_14.
    [9]Panagiotis Sidiropoulos,Nikos Nikolaidis,Ioannis Pitas et al.Invertible chaotic fragile watermarking for robust image authentication[J].Chaos, Solitons and Fractals,2009,42(5)_8.
    [10]金聪.数字水印理论与技术[M].清华大学出版社,2008,15-18.
    [11]李蓓,金聪.基于混沌序列和奇异值分解的鲁棒数字水印算法[J].计算机应用, 2005,25(S1): 138-139.
    [12]王英,郑德玲,鞠磊.基于Lorenz混沌系统的数字图像加密算法[J].北京科技大学学报, 2004.26(12): 678-682.
    [13]Xingyuan Wang.An improved key agreement protocol based on chaos[J].Communications in nonlinear science and numerical simulation,2010, 15(12)_6.
    [14]Singh, N.,Sinha, A..Digital image watermarking using gyrator transform and chaotic maps[J].Optik,2010,121(15)_11.
    [15]李赵红,侯建军,宋伟等.基于图像块等级模型的多重认证水印算法[J].计算机研究与发展,2009,46(z1)_5.
    [16]Wu, XY,Guan, ZH.A novel digital watermark algorithm based on chaotic maps[J].Physics Letters. A,2007,365(5/6)_4.
    [17]Cong Jin,Shi-Hui Wang.Robust Watermark Algorithm using Genetic Algorithm[J].Journal of Information Science and Engineering,2007,23(2)_10.
    [18]赵健,齐华,田泽等.改进的小波域混沌数字水印算法实现[J].光子学报, 2004,33(10): 1236-1238.
    [19]金丽萍,顾翔,纪丽娜等.BAN逻辑及其在认证协议性质分析中的应用研究[J].电脑知识与技术,2008,2(12)_3.
    [20]Kramer, S. Cryptographic protocol logic: Satisfaction for (timed) Dolev-Yao cryptography [J]. Journal of Logic and Algebraic Programming, 2008, 77 (1/2) _32 .
    [21]王亚弟,束妮娜,韩继红,王娜.密码协议形式化分析[M].机械工业出版社,2006,28-31.
    [22]Kwang Yong Koh,Poong Hyun Seong.Smv Model-based Safety Analysis Of Software Requirements[J].Reliability Engineering & System Safety, 2009,94(2)_12.
    [23]Chen Hao,John A. Clark,Jeremy L. Jacob et al.Automated Design Of Security Protocols[J].Computational Intelligence, 2004 , 20(3)_14.
    [24]Wu, TC,Huang, TT,Hsu, CL et al.Recursive protocol for group-oriented authentication with key distribution[J].The Journal of Systems and Software,2008,81(7)_13.
    [25]Jamal Bentahar,John-Jules Meyer,Wei Wan et al. Model Checking Communicative Agent-based Systems [J]. Knowledge-Based Systems, 2009, 22 (3) _18.
    [26]Xiaoqi Ma,Xiaochun Cheng.Verifying security protocols by knowledge analysis[J]. International Journal of Security and Networks,2008,3(3)_10.
    [27]Ilsun YOU,Kouichi SAKURAI,Yoshiaki HORI et al.A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6 [J].IEICE Transactions on communications,2009, E92-B(6)_4.
    [28]Hasan, Osman.Formal Reliability Analysis Using Theorem Proving[J].IEEE Transactions on Computers,2010,59(5)_14.
    [29]S.G.K. Murthy,K. Raja Sekharam.Software Reliability through Theorem Proving[J].Defence science journal,2009,59(3)_4.
    [30]向涛.基于数字混沌的加密算法和密钥协商协议的研究[D].重庆大学博士学位论文,2008.
    [31]金聪.数字水印理论与技术[M].清华大学出版社,2008,25.
    [32]李小艳.基于混沌理论的数字图像加密算法研究[D].汕头大学硕士学位论文, 2008.
    [33]吴香琴.试论数字水印技术及其发展[J].兰台世界,2009,(08)
    [34]涂燕琼,贾昔玲.数字水印技术综述[J].科技情报开发与经济,2006,(12)
    [35]金聪.数字水印理论与技术[M].清华大学出版社,2008,8-9.
    [36]Cong Jin, Yan Jiang, Zhiguo Qiu, Zhongmei Zhang. A wavelet packets watermarking algorithm based on chaos encryption. [C].The 2006 International Conference on Computational Science and its Applications (ICCSA 2006), Glasgow, UK. Lecture Notes in Computer Science, Vol. 3980, Springer-Verlag, May 2006, 921-928.
    [37]周婕,王拥军.网络安全协议比较研究[J].舰船电子工程,2009,29(7)_4.
    [38]李廷元,秦志光,刘晓东等.Needham-Schroeder协议的认证测试方法形式化分析[J].计算机工程与应用,2010,46(19).
    [39]杨晓婕,缪祥华,仇细平等.一种改进的Woo-Lam协议[J].通信市场,2009,(9)_5.
    [40]卿斯汉.安全协议的设计与逻辑分析[J].软件学报,2003,14(7)_10.
    [41]张玉清,吴建平,李星等.BAN类逻辑的由来与发展[J].清华大学学报(自然科学版),2002,42(1)_4.
    [42]吴开贵,陈明.对SVO逻辑方法的改进[J].哈尔滨工程大学学报,2007,28(5)_6.
    [43]桑永宣,曾吉文.一种新的双方不可否认密码协议及其形式化分析[J].厦门大学学报(自然科学版),2008,47(5)_6.
    [44]汪学明.多方安全协议的形式化分析方法研究与应用[D].2008.
    [45]陈明.认证协议及其形式化分析研究[D].2007.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700