用户名: 密码: 验证码:
基于混沌和小波的数字多水印算法
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着网络技术和数据通信技术的飞速发展,多媒体数据对人们的生活产生了越来越重要的影响,数字产品的版权保护也就成为人们关注的焦点,因此,数字水印技术作为版权保护的重要手段,成为当前的研究热点。近年来,虽然已有多种数字水印设计方案被提出,但大多属于基于一种标志性水印方案,即单水印方案,不能满足实际需要。本文的研究目标是设计一种在数字产品中嵌入多水印的方案,选题具有重要的理论意义和现实意义。
     (1)研究了一种基于混沌的数字多水印算法混沌序列是一种纯伪随机序列,具有生成形式简单、对初始条件极其敏感、不可逆推性和白噪声统计特性。采用混沌序列来确定水印嵌入位置,使嵌入的水印位置具有随机性,提高了数字水印的安全性和抗攻击的能力,同时设计了一个信息映射表,嵌入第一个数字水印时需要密钥K_1,这时根据K_1的值在信息映射表中来选择第二个数字水印, K_1与信息映射表中的数字水印一一对应,嵌入第二个水印时同样需要密钥K_2。在提取水印时,首先,用密钥K_2提取第二个水印,然后根据第二个水印的信息,从信息映射表中得到为第一个水印提取所需要的密钥K_1,最后才提取出第一个水印。上述过程保证了,只要密钥K_1, K_2中任意一个不正确,就无法提取出水印信息,增加了对数字水印的保护。
     (2)研究了一种基于混沌和小波的数字多水印算法在基于混沌的数字多水印算法中,对抗剪切几何攻击鲁棒性较低,因此对该算法做了改进。在水印嵌入域上,选择了具有与人眼视觉特性十分符合的离散小波变换,研究了基于混沌和小波的数字多水印算法,考虑到水印的鲁棒性和含水印图像的视觉质量问题,对图像做三级小波分解,分别在图像的两个中频带HL_3,LH_3中各嵌入一个水印。
The digital media has become more and more important along with the booming development of network and data communication technology. At the same time, copyright protection of digital media is becoming a problem. As an important measure, digital watermarking technology provides a novel way to solve this problem. In recent years, many different schemes have been proposed, but all of them are single watermarking. However, in many applications they need multi-watermarking. So the paper proposes a kind of multi-watermarking schemes, which has the important theory and the practical significance. Contents of the paper have two parts as shown.
     (1)A digital multi-watermarking based-on chaotic sequence was researched. Chaotic sequence is a type of pure pseudo-random sequences. It has characters of simple form, extremely sensitive to initial condition, irreversible and white noise. The locations of watermarking embedded are determined by chaotic sequence, so that they are random, however, security and anti-attack ability are enhanced. And a mapping table was designed, when the first watermarking is embedded, the key K_1 is needed, then according to K_1 to select the second watermarking in mapping table, K_1 and the second watermarking in mapping table is one correspondence, when the second watermarking is embedded, K_2 is also needed. When watermarks are extracted, first, the second watermarking is extracted according to K_2, then in accordance with the second watermarking to select the key K_1 in mapping table, at last, the first watermarking is extracted according to K_1. As long as not all the two keys is right, watermarks will not be able to extracted rightly, so watermarks are protected.
     (2)A digital multi-watermarking based-on chaotic sequence and Discrete Wavelet Transform (DWT) was researched. In a digital multi-watermarking algorithm based on chaotic sequence, its robustness is low against cropping attacks, so the algorithm is improved. In the watermark embedding domain, choosing DWT that in line with HVS, and researching a type of digital multi-watermarking based on chaos and DWT, also and taking into account the watermarking robustness and the quality of vision image with watermarking, original image make the three wavelet decomposition, frequency coefficients of image are separately embedded a watermarking.
引文
1 Schyndel, R G. van A.Z. Tirkel, C.F. Osborn. A Digital Watermark. International Conference on Image Processing, Austin, Texas, U.S.A.[J],1994,(2):86-90
    2 BENDE. R W, GRUHL. D, Morimoto. N, Techniques for Data Hiding[J].IBM system journal, 1996,35(3):313-336
    3 Nikolaidis N. Pitas I, Copyright Protection of Image Using Robust Digital Signatures[A].IEEE Proceeding on International Conference on Acoustics, Speech, and Signal Processing[C].Atlanta, IEEE Press,1996:2168-2171
    4 Cox I J, Kilian J, Leighton T, etal. A Secure,Robust Watermark for Multimedia In.R. J.Andesoned. Information hiding: First international workshop, in lecture Notes in Computer Science, Berlin, Germany:Springer-Vertag,1996,1174:183-206
    5钟桦,焦李成.基于自适应频带选择的数字水印技术[J].电子与信息学报,2006,(3):289-294
    6宿富林,马国强,吴江.一种对图像剪切具有鲁棒性的数字水印算法[J].电子与信息学,2005,25(3):295-299
    7 C.J. Podilchuk,, Zeng Wenjun, Image-Adaptive Watermarking Using Visual Models, IEEE J. on Selected Areas in Communications,1998,16(4):525-539
    8孙锐,孙洪,姚天任,一种自适应的彩色图像水印算法[J].数据采集与处理,2002,(9):283-287
    9 Cox I J, Leighton F T etal. Secure Spread Spectrum Watermarking for Multi-media [J]. IEEE Transactions on Image Processing, 1997,6(12):1673-1680
    10胡玉平,宋乃平.基于小波系数树的扩频水印[J].计算机工程与应用,2003,15:53-55
    11毛秉毅.基于小波分解的自适应数字图像水印算法[J].计算机科学,2006,30(2):92-95
    12杨树国,李春霞,孙尧.基于位平面分解的图像数字水印方法[J].计算机工程与应用,2003,(18):111-113
    13胡正平,王世民,王成儒.基于位平面的渐进式数字水印技术[J].计算机工程,2003,29(14):154-155
    14 Bas P, Chassery J M, Macq B. Image Watermarking: An Evolution to Content-based Approaches. Pattern Recognition [J], 2002,35(3):545-561
    15尹康康,潘志庚,石教英.一种强壮的网络水印算法[J].计算机辅助设计与图像学学报,2001,13(2):102-107
    16王卫卫,杨波,宋国乡.基于图像特征的小波域水印技术[J].光子学报,2001,30(7):856-860
    17刘瑞祯,王蕴红,谭铁牛.基于图像内容的数字水印模型[J].中国图像图形学报,2001,6(6):558-562
    18武栓虎,谈正.基于混沌序列的视频图像数字水印隐藏与多分辨检测[J].西安交通大学学报,2000,34(6):35-39
    19 Cox I J, Miller M L. Digital Watermarking. New York :Academic Press, 2002,25(6)248-253
    20 Hsu C T, Wu J L, Hidden Digital Watermarking in Images. IEEE Transaction on Image Processing, 1999,8(1):58-68
    21周利军,周源华,支峥.基于m序列的多重图像水印.上海交通大学学报,2001,35(9):1317-1320
    22李京兵,黄席樾,周亚训,金炜.一种鲁棒的多水印嵌入和检测算法与仿真.计算机仿真,2005,22(9):254-258
    23钟桦,刘芳.自适应空域易损水印.计算机研究与发展,2006,40(6):825-830
    24董刚,张良,张春田.一种半脆弱性数字水印算法.通信学报,2005,24(1):33-38
    25祁明,刘迎风.信息隐藏与数字水印技术及其应用.通信技术,2001,6(117):16-19
    26 S. Craver, N. Memon, B. Yeo. Resolve Rightful Ownerships With Invisible Watermarking Techniques: Limitation, Attacks, and Implication. IEEE Jo urnal of Selected Areas in Communications,1998,16(4)573-586
    27 M. D. Swanson, B. Zhu, A. H. Tewfik. Multiresolution Scene-based Watermarking Using Perceptual Models. IEEE Journal on Selected Areas in Communications, 1998,16(4):573-586
    28王志雄,王智琴,李人厚.数字水印应用中的攻击和对策综述.通信学报,2002,23(11):73-77
    29 Pia. A, Barni. M, Bartolini f. DCT-based Watermark Recovering without Resorting to the Uncorrupted Original Image. Proc IEEE Int Conf Image Processing[c], 1997,15(6):520-530
    30 Pldilchuk. C, Zeng. W. Image-adaptive Watermarking Using Visual Models. IEEE Trans Selected Areas in Communications,1998,16(4):525-539
    31 Zhong Wei. Image Watermarking Using Legendre Arrray. Journal of China Institute of Communications,2001,22(1):1-6
    32 Watson. A. B, Yang. G. Y, Solomon. J. A. Visibility of Wavelet Quantization Noise. IEEE Trans Image Processing,1997,6(8):1164-1174
    33李天岩, J. Yorke.周期3则乱七八糟.美国数学月刊,1975,15(6):235-240
    34 Jim Chou, Sandeep Pradhan S, Kannan Ramchandran. On the Duality Between Distributed Source Coding and Data Hiding, Thirty-third Asilomar conference on signal, system, and computers,1999,2(33):1503-1507
    35 Nick G, Kings Bury, Redmill D. W. Image and Video Wavelet Coding for Noisy Channels. In Processings of the SPIE AeroSense Conference 97, Orlando, FL, USA, 1997,(4):113-118
    36凌聪,孙松庚.混沌扩频码序列产生器.电子科学学刊,1998,20(2):235-240
    37 Nikolaids A, Pitas I. Comparison of Different Chaotic Maps With Application to Image Watermarking [A].Processing of IEEE Circuits and Systems,2000,56(8):509-512
    38 Teskeridou S, Solachidis V, Nikolaidis N. Statistical of Watermarking System Based on Bernoulli Chaotic Sequence[J]. Signal Processing,2001,81(6):1273-1293
    39张春田,张静.基于混沌映射的鲁棒性图像水印算法.电子学报,2002,30(1):69-72
    40张玉双.数字水印及其在静止图像中的应用.[西安电子科技大学硕士学位论文],2002:36-37
    41易开祥.数字图像加密与数字水印技术研究.[浙江大学博士学位论文],2001:11-34
    42陈永红.基于混沌的图像的数字水印隐藏算法[J].计算机仿真,2003,20(9):63-65
    43邹潇湘,李锦涛,彭聪.非对称数字水印技术研究[J].计算机工程与应用,2002,38(16):7-10
    44张力,韦岗.一种DCT域的闭环数字水印技术[J].通信学报,2002,7(7):1-10
    45潘蓉,高有行.基于小波变换的图像水印嵌入方法.中国图象图形学报,2002,23(4):667-671
    46 J. Jiang, A. Armstrong. Data Hiding Approach for Efficient Image Index. [J] Electronics letters.7th November 2002,38(23):1424-1425
    47彭玉华.小波变换与工程应用.北京:科学出版社,1999:8-46
    48刘贵忠,邸双亮.小波分析及应用.西安:西安电子科技大学出版社,1992:17-36
    49 Mallat. S. A Theory for Multiresolution Signal Decomposition: the Wavelet Representation. [J] IEEE Trans. PAMI,1989,11(7):674-693
    50 J. Cox, J. Linnartz. Public Watermarks and Resistance Tampering. Proc of ICIP97, 1997,18(9)26-29
    51 J. Cox, J. Linnartz. Some General Methods for Tampering with Watermarks. IEEE Journal on Special Areas in Communications,1998,16(4):587-593
    52刘九芬,黄达人,黄继武.图像水印抗几何攻击研究综述.电子与信息学报,2006,9(26):1495-1503
    53 N G Kingsbury. Image Processing with Complex Wavelets, phil. Trans. Royal society London A,1999,9(357):2543-2560

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700