用户名: 密码: 验证码:
基于变换域的图像水印技术的研究与实现
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数字水印是在数字多媒体载体中隐藏一些包括数字作品的版权所有者、发行者、购买者、日期、序列号等需要注明的信息,目的是在检查盗版行为时可以从数字载体中提取出有关信息,来证明数字产品的版权,指证盗版行为。本文从数字水印的基本原理、攻击方式以及主要算法等方面出发,进行两种基于变换域图像水印算法的研究。一种是基于Arnold变换的DCT域水印算法。对原始图像进行DCT变换,选择低频系数嵌入水印,在嵌入前用Arnold变换对水印图像进行预处理,提高水印的安全性。一种是基于DCT和DWT混合变换域的水印算法。先对原始图像进行小波分解,再对得到的低频逼近子图进行DCT变换,将水印嵌入不同的中、低频系数中。并分别对每种水印方案进行压缩、加噪声、滤波、剪切等攻击,用实验结果验证算法的鲁棒性。
With the development of computer and communication technologies, data exchange and transmission has become a relatively simple and quick process. Using electronic installations, people may transmit the digital information rapidly; Carry out academic exchanges and the electronic commerce activities. But the side effect is also obvious, malicious individuals or groups may copy and broadcast the copyrighted content with no owner's permission .So how to solve the problems of copyright protection and the information security becomes an imminent realistic question. Digital watermarking has the dual securities, Embedding watermark is unknown, the key protect the watermark extraction. It provides a new solution idea for the protection of copyright.
     In this thesis, I study digital watermarking of images based on transformation domain. I have read a large amount of documents and materials about digital watermarking technology, and then I sum up the developing history of multimedia digital watermarking, frame models etc. After the conception, specialties and application domains of digital watermarking are introduced, many kinds of embedding technology of digital watermarking is analyzed carefully, and point out the advantages of algorithm based on the transformation domain. Image watermarking algorithm can be roughly divided into two categories: the space watermarking and transformation domain watermarking. Most of the space domain watermarking algorithm lack of stability of the image processing. But transformation domain watermarking algorithm has many advantages: watermark energy can be spread to all the pixel space domain, this will help to ensure that the invisible watermark in the transform domain; the human visual system can more easily integrated into watermark encoding process ; it compatible with the international data compression standard. Transformation domain algorithms are highly robust.
     This thesis proposes two watermarking algorithm .One is a DCT domain image digital watermarking algorithm based on Arnold transformation. The algorithm embeds watermark in the low-frequency coefficients use multiplication rules. Before embedding, we use Arnold transform, even watermark was extracted, and it is difficult to restore the original watermark image. After scrambling, the watermark image pixel distribution to the entire space, so even if the watermark image suffered malicious attacks, we can extract good watermark. Another algorithm is based on the mixed transform domain of DCT and DWT. First, we make wavelet decomposition for the primitive image; wavelet approximation graph is the ideal regional of watermark embedding. But it is the human visual sensitivity, so we make DCT transformation, and watermark is embedded in the DCT-IF coefficient. And carried on a lot of robust testing laboratories for the two algorithms, through these experiments analyzed the anti-attack capability of each algorithm regarding the JPEG compression, the value filter, the noise, cutting and revolving. This article research content is the international related domain the front topic, has the important theory significance and the application prospect.
引文
[1] 刘瑞祯,谭铁牛.数字图像水印研究综述.通信学报,2000,21(8),39-48
    [2] LIU R Z, TAN T N.Watermarking for digital images[A].Proc of ICSP’98[C].1998(2):944-947
    [3] F. A. P. Petitcolas, R .J. Anderson and M. G. Kuhn. Information hiding - a survey. Proceedings of IEEE.1999, 87(7):1062-1078
    [4] Voyatzis G, Pitas I. The use of watermarking in the protection of digital multimedia products.Proceedings of the IEEE.1999, 87(7): 1197-1207
    [5] R. Barnett. Digital Watermarking: Applications, Techniques and Challenges. Electronics & Communication Engineering Journal.1999, 11(4):173-183
    [6] 向辉.基于信息重组思想的多媒体数据压缩与多媒体数据安全技术研究 [D].杭州:浙江大学 CAD&CG 国家重点实验室,1999
    [7] 吴秋新,钮心忻,杨义先等.信息隐藏技术――隐写术与数字水印.北京:人民邮电出版社,2000
    [8] 汪小帆,戴跃伟,茅耀斌.信息隐藏技术―方法与应用.机械工业出版社2001
    [9] 陈明奇, 钮心忻, 杨义先. 数字水印的研究进展和应用. 通讯学报, 2001,22(5):71-79
    [10] 王向阳,杨红颖.基于视觉掩蔽特性的小波域彩色数字水印技术[J].计算机辅助设计与图形学学报.2004,9,16(9):1240-1243
    [11] Kim, Y. S, O. Kwon, R. Park. Wavelet Based Watermarking Method For Digital Images Using The Human Visual System [J]. Electronics Letters. 1999,35(6): 466-468
    [12] Christine I, Podilchuk. Image-Adaptive Watermarking Using Visual Models [J], IEEE Journal on Selected Areas in Communications. 1998, 16(4):525-539
    [13] Seong-Geun Kwon Seong-Won Ban. Highly Reliable Digital Watermarking Using Successive Subband Quantization and Human Visual System [J].IEEE Tans. On Image Processing,1997,(1):74-92
    [14] R.G.van Schyndel, A.Z.Tirkel and C.F.Osbome. A digital watermarking .In Proc.IEEE Int. Conference on Image Processing, 1994,Vol.2:86-90
    [15] Bender W, Gruhl D. Techniques for data hiding. IBM System Journal.1996,35(3,4):313-336
    [16] Q.Ruanaidh, T.Pun. Rotation, Scale and Translation Invariant Spread Spectrum Digital Watermarking. Signal Processing, 1998, 66(3):303-317
    [17] C-Y Lin, M.Wu, J.A.Bloom, et al. Rotation, Scale and translation resilient watermarking for images. IEEE Transactions on Image Processing, 2001, 5(10):767-782
    [18] M.Wu, M.L.Miller, J.A.Bloom, and I.J. Cox. A rotation, scale, and translation resilient public watermark. In Proc.IEEE.ICASSP’99, Phoenix, AZ,1999
    [19] Zhao J., Koch E. Embedding robust labels into images for copyright protection .Proceedings of the KnowRight’95 Conference on Intellectual Property Rights and New Technologies, 1995, 241-251
    [20] 黄 继 武 ,SHI YQ. 一 种 自 适 应 图 像 水 印 算 法 [J]. 自 动 化 学报.1999,25(4):476-482.
    [21] C.I.Podilchuk, W.Zeng. Image-adaptive Watermarking Using Visual Models.IEEE Journal on Special Areas in Communication, 1998, 16(4):525-539
    [22] I.J.Cox, J.Killian, F.T.Leighton, etal. Secure Spread Spectrum Watermarking for Multi- media. IEEE Trans. On Image Processing, 1997, 6(12):1673-1687
    [23] Bors A.G., Pitas I .Embedding parametric digital signatures in images. European Conference on signal Processing (EUSIPCO’96), Trieste, Italy, 1996, 1701-1704
    [24] KUDUR D, HATZINAKOSD. A robust digital image watermarking method using wavelet- based fusion [J]. in Proceedings of IEEE ICIP’97,1997: 544-547
    [25] Xia X.G., Boncelet C.G., Arce G.R. Wavelet transform based watermark for digital images. OPTICS EXPRESS, 1998, 3(12), 497-511
    [26] Quan Yuan. Blind watermarking method based on DWT middle frequency pair.Proc. of IEEE International Conference on Multimedia an Expo(ICME’02), 2002,(2):473-476
    [27] Jun Zhang, Nengchao Wang, Feng Xiong. Hiding a logo watermark into the multiwavelet domain using neural networks. Proceedings of 2002 14th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2002), 2002:477-482
    [28] RUANAIDH J, PUM T. Rotation, translation and scale invariant digital image watermarking [J]. In Proceedings of IEEE ICIP’97,1997: 536–539
    [29] Joan Puate , Frederic Jordan. Using fractal compression scheme to embed a digital signature into an image.In Proceedings of the SPIE, Video Techniques and Software for Full-Service Networks, Vol.2915, pp.108-118, Boston, MA, USA, November 1996
    [30] KUTTERM, BHATTACHARJEE S, EBRAHIM IT. Towards second generation watermarking Schemes [J].in Proceedings of IEEE ICIP’99, 1999: 26 - 58
    [31] BAS P, CHASSERYJ, MACQ B. Geometrically invariant watermarking using feature points[C]. IEEE Transaction on Image Processing, 2002
    [32] 华 先 胜 , 石 青 云 . 局 部 化数字 水 印算 法 [J]. 中国 图 形图 像 学报 ,2001,5(7): 642-647
    [33] J.P.M.G. Linnartz, M.van Dijk, Analysis of the sensitivity attack against electronic watermarking in images. Proceedings of the Second International Workshop on Information Hiding, Springer, 1998, 1525: 258-272
    [34]http://www.cl.cam.ac.uk/~fapp2/watermarking/stirmark/index.html.Fabien A.P.Petitcolas, Ross J.Anderson, Markus G.Kuhn. Attacks on copyright marking systems, in David Aucsmith(Ed), Information Hiding, Second International Workshop, IH’98, Portland, Oregon, U.S.A., April 15-17,1998,Proceedings,LNCS 1525, Springer-Verlag,ISBN 3-540-65386-4, pp.219-239
    [35] Craver S, Memon N. Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks and implications. IEEE Journal on Selected Areas in Communications, 1998, 16(4): 573-586
    [36] Kutter M, Voloshynovskiy S, Herrigel A. The Watermark copy attack. Security and watermarking of Multimedia contend 2, SPIE, 2000, 3971, 23-38
    [37] Wenjun Zeng, Liu B.A Statistical watermark detection technique without using original images for resolving rightful ownerships of digital images. IEEE Transactions on Image Processing, 1999, 8(11): 1534-1548
    [38] 孙圣和,陆哲明,牛夏牧等.数字水印技术及应用.北京:科学出版社,2004
    [39] H.Berghel,L.O’Gorman. Protecting ownership rights through digital watermarking [J].IEEE Comut.Mag. 1996,101-103
    [40] 刘芳,贾云得.一种新的 Arnold 反变换在数字水印中的应用[A].第十二届全国图像图形学学术会议论文集[C]北京:中国图象图形学学会,2005,172-175
    [41] 王丽娜,郭迟,李鹏.信息隐藏技术实验教程.武汉大学出版社,2004
    [42] 华宏虎.数字水印研究及 MATLAB 仿真实现.现代电子技术,2007,05
    [43] 高珍, 台莉春, 张志浩. 数字水印对抗几何攻击方法的研究[J]. 计算机工程, 2006, 32(5):135-137
    [44] K. R. Castle man. 数字图像处理. 朱志刚等译. 北京:电子工业出版社,1998
    [45] 赵荣椿. 数字图像处理导论. 西北工业大学出版社, 1995
    [46] 赵红,王丽萍,温文雅,崔永瑞.基于 DWT 及 DCT 的数字图像水印综述.微计算机应用,2008,29(1):1-5
    [47] 闫晓涛,刘宏伟,谢维信,喻建平.基于DWT和DCT域的二值图像数字水印算法.计算机与数字工程,2007,35(3):5-7
    [48] 宋伟,谢胜曙.一种新的基于复合变换域灰度数字水印算法.信息安全与通信保密,2007,4:93-95

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700