用户名: 密码: 验证码:
数字图像水印算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数字水印技术是一门新兴的网络信息安全技术,经过近些年来的迅猛发展,已经成为网络安全方面的一个研究热点,在版权保护和信息隐藏等领域具有广阔的应用前景。
     本文首先对水印技术进行了概括性介绍,总结了水印算法模型和攻击手段,概括了现有的图像水印算法。接着在小波分析理论的基础上,利用混沌序列的伪随机性和图像作为水印的可视性,提出了一种基于混沌序列的数字水印改进算法。然后在这一水印算法的基础上,使用小波提升技术来改进小波分析方法,再使用通信理论中的纠错编码方法对水印信号进行纠错控制,并提出了一种基于纠错编码的数字水印算法。最后以第二代水印技术为基础,利用图像的局部特征,提出一种基于噪声可见性函数的彩色图像水印算法。以上三种水印算法都具有较强的鲁棒性和可靠性。
Digital watermarking has been a rising network information security technology. With the rapid development in recent years, it has become a popular topic in network security domain. And it hold wide application prospect in several domains, for example copyright protection, information hiding and etc.
    At first, this paper introduced watermark technology synoptically. It summarize the algorithm model and attack means of the watermark and generalized the existing picture watermark algorithm. Then we put forward a kind of improved digital watermark algorithm based on chaos array according to the shelter character of luminance and texture of the human visual system. Then we use lifting scheme improve wavelet analysis methods and proposed a kind of digital watermark algorithm based on error-correcting coded which is a method of communication theory and is to correct watermark signal. At last, we utilize the some characteristic of the picture and put forward a kind of the second generation watermark algorithm based on noise visibility function. The above three algorithms all show robust and dependability.
引文
[1] Tanaka, K., Y. Nakamura, and K. Matsui, "Embedding Secret Information Into a Dithered Multi-level Image," in Proceedings of the 1990 IEEE Militar Communications Conference, 1990, pp.216-220
    [2] R.G.V.Schyndel, A.Z.Tirkel and C.F.Osborne, A Digital Watermark, Proc. Of ICIP'94, Vol.2, pp. 86-90, 1994.
    [3] W.Bender, D.Gruhl, N.Morimoto and A.Lu, Techniques for data hiding, IBM Systems Journal, Vol.35, No.3 & 4, pp.313-218, Sep. 1996.
    [4] I.Pitas, A method for signature casting on digital images, Proc. of ICIP'96, Vol.3, pp.215-218, Sep. 1996.
    [5] G.C.Langelaar, J.C.A.V.D.Lubbe and J.Biemond, Copy protection for multimedia data based on labeling techniques, 17th Symposium on Information Theory in the Benelux, Enschede, The Netherlands, May 1996.
    [6] G.C.Langelaar, J.C.A.V.D.Lubbe and R.L.Lagendijk, Robust labeling methods for copy protection of images, Proc. of SRIV'97, pp.298-309, 1997.
    [7] I.J.K.O Ruanaith et al, "Phase watermarking of digital images," Proc. of ICIP'96, Vol.3, pp.239-242, 1996.
    [8] I.J.K.O Ruanaith and T.Pun, "Rotation, scale and translation invariant digital image," Proc. of ICIP'97, Vol. 1, pp.536-539, 1997.
    [9] M.H.Hayers, "The reconstruction of a multidimensional sequence from the phase or magnitude of the FFT," IEEE Trans. On ASSP, No.4, pp. 140-154, 1992.
    [10] E.Koch and J.Zhao. Toward robust and hidden image copyright labeling, in Proc. Workshop Nonlinear Signal and Image Processing, Marmaros, Greece, June 1995.
    [11] A.G.Bors and I.Pitas, "Embedding parametric digital signatures in images," European Conference on Signal Processing, EUSIPCO96, Trieste, Italy, 1996.
    [12] C.T.Hsu and J.L.Wu, "Hidden digital watermarks in images," IEEE Trans. Image Processing, Vol8, pp.58-68, Jan. 1999
    [13] M.Barni, F.Bartoloni, V.Cappellini, A.Piva, "A DCT-domain system for robust image watermarking," Signal Processing, Vol.66, No.3, pp.303-317, 1998.
    [14] C.T.Hsu and J.L.Wu, "Multiresolution watermarking for digital image," IEEE Trans, on Circuits and Systems Ⅱ:Analog and Digital Signal Processing.
    [15] D.Kundur and D.Hatzinakos, "A robust digital image watermarking method using wavelet-based fusion," Proc.of ICIP'97, Vol. 1 ,pp.544-547,1997
    [16] X.G.Xia, C.G. Boncelet and G.R.Arce, "Wavelet transform based watermark for digital images," OPTICS EXPRESS, Vol.3, No. 12, pp.497, 1998.
    [17] H.M.Wang, P.C.Su and C.J.Kuo, "Wavelet-based digital image watermarking,"
    
    OPTICS EXPRESS, Vol.3, No. 12, pp.491-496, 1998.
    [18] C.I.Podilchuk, Wenjun Zeng, "Image-adaptive watermarking using visual model," IEEE Journal on Selected Areas in Communications, Vol.16, No.4, pp.525-539,1998.
    [19] I.J.Cox, J.Kilian, T.Leighton,, et al, Secure spread spectrum watermarking for multimedia, IEEE Trans, Image Processing. Dec. 1997, 6:1673-1687.
    [20] M.Kutter, S.Winkler, A Vision-based Masking Model for Spread-spectrum Image Watermarking, IEEE Trans, Image Processing, 2002, 11(1): 16-25.
    [21] Bhattacharjee S.K. and Kutter M. Compression tolerant image authentication. Proc. OfICIP'98, 1998, 1:435-439.
    [22] Kutter M., Bhattacharjee S.K. and Ebrahimi T. Towards second generation watermarking scheme. Proc of ICIP'99, 1999, 1:320-323.
    [23] Sviatoslav Voloshynovskiy, A.Herrigel, N.Baumgaertner, and T. Pun, "A Stochastic Approach to Content Adaptive Digital Image Watermarking," Proc. of Third Information Hiding Workshop, 1999.
    [24] F.Mintzer, G.W.Braudaway, M.M.Yeung, "Effective and ineffective digital watermarks," Proceedings of ICIP'97, Intern. Conf. Image Processing, vol.3, pp. 9-12,S.Barbara, CA, USA, October 26-29, 1997.
    [25] Min Wu, Bede Liu, "Watermarking for Image Authentication," Proc. of ICIP'98, vol.2, pp.437-441, 1998.
    [26] Hyuncheol Park, Kwangjo Kim, "Visible Watermarking using Verifiable Digital Seal Image," SCIS 2001 The 2001 Symposium on Cryptography and Information Security Oiso, Japan, January 23-26, 2001 The Institute of Electronics, Information and Communication Engineers.
    [27] S.Craver, N.Memon, B.L.Yeo and M.M.Yeung, Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications, IEEE Journal on Selected Areas in Communications, Vol. 16, No.4, pp.573-586, 1998.
    [28] L.T.Qiao and K.Nahrstedt, Watermarking schemes and protocols for protecting rightful ownership and customer's rights, Journal of Visual Communication and Image Representation, Vol.9, No.3, pp. 194-210, 1998.
    [29] Arto Salomaa.公钥密码学.北京:国防工业出版社,1998.1.
    [30] 冯登国,裴定.密码学导引.北京:科学出版社,1999.4.
    [31] 杨义先.林须端.编码密码学.北京:人民邮电出版社,1992.12.
    [32] S.Craver, N.Memon, B.L.Yeo and M.M.Yeung, "Technical Trials and Legal Tribulations," Communications of the ACM, Vol.41, No.7, Jul. 1998, pp.44-54.
    [33] S.Voloshynovskit et al, Attack Modelling: Towards a Second Generation Watermaerking Benchmark, Signal Processing, Special Issue on Imformation The oretic Issues in Digital watermarking, 2001, Vol.87, No.5:127-214.
    [34] F.Hartunq J.Ku and B.Girod, Spread Spectrum watermarking: mallerious attacks and counter-attacks, Security and Watermarking on multimedia contents, Proc.SPIE,
    
    Vol.3657, Son Jose CA, Jan, 1999.
    [35] Petttcolas F, Anderson R J, Kun M G., Attacks on copyright marking system, Proc of Imformation Hidding'98, 1998, 213-238.
    [36] I.J.Cox, J.-Plinnarz and T.Shamoon, Public watermarks and resistance to tampering, In Proceedings of the International conference on Image processing(ICIP), 1997.
    [37] W.Zeng, B.Liu "On resolving rightful ownerships of digital images by invisible watermarks," Proceedings of ICIP'97, Intern. Conf. on Image Processing, Vol.1, pp.552-555, S.Barbara, CA, USA, October 26-29, 1997.
    [38] G.L.Friedman, "The trustworthy digital camera: restoring credibility to the photographic image," IEEE Trans. on Consumer Electronics, Vol.39, pp.905-910, November 1993.
    [39] Fabien A.P.Petitcolas, Ross J.Anderson, Markus G.Kuhn, "Attacks on Copyright Marking Systems," David Aucsmith, Ed., Second workshop on information hiding, in vol. 1525 of Lecture Notes in Computer Science, Portland, Oregon, USA, 14-17 April, 1998, pp. 218-238.
    [40] Daubechies I. Orthonormal bases of compactly supported wavelets. Comm. Pure Appl. Math, 1988,41:909-996.
    [41] Daubechies I. Ten Lectures on Wavelets. CBMS Conference Series in Applied Mathmatics, SIAM, Philadelphia, 1992.
    [42] 李建平,唐远炎著.小波分析方法的应用.重庆:重庆出版社,2000:1-94.
    [43] 胡昌华,张军波,夏军,张伟.基于Matlab的系统分析与设计—小波分析.西安:西安电子科技大学出版社,1999.12
    [44] 陈武凡.小波分析及其在图像处理中的应用.北京:科学出版社,2002.4
    [45] Mallat S. A theory for multiresolution signal decomposition: the wavelet representation. IEEE Trans. On PAMI, 1989.7,11 (7):674-693.
    [46] Mallat S. Multifrequency channel decomposition of images and wavelets. IEEE Trans. ASSIP., 1989.12,37:2091-2110.
    [47] Mallat S. A Wavelet Tour of Signal Processing. London: Academic Press, 1998.
    [48] Hui Xiang,et al Digital Watermarking Systems with Chaotic Sequences, Electronic Imaging'99, Security and Watermarking of Multimedia Contents, SPIE Vol. 3657, pp.449-457,1999.1.
    [49] Hao Bai-Lin. Staring with parabolas: an introduction to chaotic dynamics [M]. Shanghai: Shanghai Scientific and Technological Education Publishing House, 1993.
    [50] 武拴虎,谈正.基于混沌序列的视频图像数字水印隐藏与多分辨检测.西安交通大学学报,2000.6.
    [51] 王惠琴,李人厚,王志雄.基于混沌加密的频率域数字图像水印算法.计算机应用研究,2002.1.
    [52] 孟兵,周良柱,万建伟,楼生强.基于小波变换的静态图像数字水印算法.计算机
    
    辅助设计与图形学学报,2000.10.
    [53] 毛秉毅.基于纠错编码和小波变换的数字图像水印算法.计算机工程与应用,2003.3.
    [54] 王向阳,杨红颖.一种基于离散小波变换的图像数字水印算法.微型机与应用2003年第2期.
    [55] 张奇志,张春红.一种基于小波变换和最优量化的数字水印技术.北京机械工业学院学报,2002.12.
    [56] 孙锐,孙洪,姚天任.新颖的基于小波变换的数字水印方案.红外与激光工程,2002 8.
    [57] Sweldens W. The lifting scheme: A custom-design construction of biorthogonal wavelets. Appl. Comut. Harmon. Appl., 1996, 3(2): 186-200.
    [58] Sweldens W. and Schroder P. Building your own wavelets at home. Wavelets in Computer Graphics, ACM SIGGRAPH Course Notes, 1996, 15-87.
    [59] Sweldens W. The lifting scheme: A construction of second generation wavelets. SIAM J. Math. Anal., 1997, 29(2): 511-546.
    [60] 曾剑芬,马争鸣.提升格式与JPEG2000.中山大学学报(自然科学版)第41卷第一期,2002.1.
    [61] 李洪刚,吴乐南.基于任意小波的提升格式的设计 东南大学学报(自然科学版)第31卷第4期,2001.7.
    [62] 汤焱,莫玉龙.第二代小波变换应用于图象的无损压缩编码.中国图象图形学报,2000.8.
    [63] 袁超伟,王桃荣.基于第二代小波变换的多分辨率图像水印方案.北京邮电大学学报,2002.9.
    [64] I.Daubechies, Wim Sweldens. Factoring wavelet transforms into lifting steps. J. Fourier Anal., 1998, 4(3):245-267.
    [65] A Said, W A Pearlman. A New Fast and Efficient ImageCode Based on Set Partitioning in Hierarchical Trees. IEEE Transactions on Circuits and Systems for VideoTechnology, 1996,6(3).
    [66] G.C.小克拉克,J.B.凯恩.数字通信中的纠错编码.北京:国防工业出版社,1988.7.
    [67] 梅时春,李人厚,党红梅.基于差错控制编码的数字图像水印方法.计算机工程与应用,2003.24.
    [68] Ki-Ryong Kwon, Seong-Geun Kwon, Je-Ho Nam, et al, Content Adaptive Watermark Embedding in the Multiwavelet Transform Using a Stochastic Image Model, Lecture Notes in Computer Science, Vol.2613, 2003.
    [69] 王亥,胡建栋.Logistic-Map混沌扩频序列.电子学报,1997,(1):19-23.
    [70] 朱近康.扩展频谱通信及其应用.合肥:中国科学技术大学出版社,1993.
    [71] 昌风军.数字图像处理编程入门.清华大学出版社,1999.
    
    
    [72] Stefan Katzenbeisser, Fabien A. P. Petitcolas.信息隐藏技术-隐写术和数字水印.北京:人民邮电出版社,2001.9.
    [73] 韦志辉,秦鹏,欧阳宏彬,富煜清.基于小波域中门限模型的数字水印技术.东南大学学报,1998.9.
    [74] M.D.Swanson, B.Zhu, and A.H.Tewfik. Transparent robust image watermarking, in Proc. ICIP'96, pp.211-214.
    [75] R.Claypoole and G.Davis. Nonlinear wavelet transforms for image coding via lifting, IEEE Transactions on Image Processing, 1999.
    [76] Roger L. Claypoole, Jr. and Richard G. Baraniuk. Flexible Wavelet Transforms Using Lifting, Proceedings of the 68th SEG Meeting, New Orleans, Louisiana, USA, 1998.
    [77] 勒中鑫.数字图像信息处理.北京:国防工业出版社,2003.1.
    [78] 刘瑞祯,王蕴红,谭铁牛.基于图象内容的数字水印模型.中国图象图形学报,2001.6.
    [79] 张兆礼,赵春晖,梅晓丹.现代图像处理技术及Matlab实现,北京:人民邮电出版社,2001.11.
    [80] 何斌,马天予,王运坚,朱红莲.Visual C++数字图像处理.北京:人民邮电出版社,2001.4.
    [81] 李兰友.Visual C++.NET图形图像编程.北京:电子工业出版社,2002.1.
    [82] 张益贞,刘滔.Visual C++实现MPEG/JPEG编解码技术.北京:人民邮电出版社,2002 11.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700