用户名: 密码: 验证码:
BMP图像中嵌入多重数字水印算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数字水印技术的研究已引起广泛关注,而多重水印问题却很少有人提及,多重水印技术是用来解决多著作权问题以及数字产品在发布,销售,使用等不同阶段的版权认证问题。多重水印信号在生成,嵌入算法上均比单个水印信号算法有更多的要求,如水印信号必须满足生成简单,数量众多且多个水印信号之间应满足互不相关,多个水印信号在嵌入和检测时应互不干扰等,水印信号的透明性和鲁帮性的问题都更为复杂。其中最为重要的问题是,如何保证嵌入到同一载体的多个水印信号之间互不影响。考虑到数字产品的迅速发展和版权保护的需求日益增加,有必要研究多重水印的嵌入算法以及先后嵌入的水印相互之间的影响等多方面的问题。BMP图片是当前一种常用的图像编码方式,本文选取BMP图片作为水印载体进行多重水印嵌入研究,具有典型的代表意义。
     论文利用正交序列将多个水印信号融合成一个水印信号嵌入到载体图像中,由于正交序列是一种自相关很大而互相关性为零的序列,因此这种多重水印信号的生成有一定保密性和容错性;然后利用交织器对多重水印信号进行编码和交织,增强水印序列的鲁棒性;随后论文对水印载体所能嵌入的水印容量以及容错性进行了讨论,若利用交织矩阵的长宽作为密钥,攻击者在不知道加密密钥的情况下对多重水印进行分解就会遇到大数分解的难度,因此经过交织器的水印信号几乎不可能破译;最后将各水印信号叠加在图像小波分解低频系数上,从而做到各水印信号在嵌入和提取时互不干扰,也可以防止水印信号被恶意移走,这样就增强了水印信号的安全性;为进一步提高性能,论文提出了一种分组量化逐次逼近的水印嵌入方法来增强水印信号的鲁棒性,以有效地实现水印信号的透明性和鲁棒性的均衡,由于不需要判决的先决条件,因此可以实现多重水印信号的盲检测提取。
     本文依托上海市科委重点攻关项目,提出了基于正交序列融合多个水印信息成为多重水印的算法。在此基础上,将本算法应用在移动通信的票证安全系统,其主要应用在两种特殊图片:龙贝码图片和PDF417条形码图片,都取得了良好的实验效果。
In recent years, Digital Watermarking technology research has aroused wide concern. However, few people have mentioned Multiple Watermark. Multiple Watermarking technology is used to solve many copyright issues and digital products in the publication, sale, and different using stages of the certification rights. Compared to single watermark, Multiple Watermarking signal's generation and the algorithms to embed watermark signal has more requests. For example, the watermark signal must meet the formation of simple, and the large number of Multiple Watermarking signals should unrelated, Moreover, how to keep the Multiple Watermark signal transparency and its robustness is more complex. Among all these questions, the most important one is how to ensure several watermark signals embedded into the same carrier has no impact on each other. Taking into account the rapid development of digital products and the growing demand of copyright protection, it is necessary to study multiple watermark embedded algorithm and how the embedded watermark signals have mutual influence between each other. BMP image is a popular image coding method used epidemically recently. Hence, it’s a typical representative of significance for this paper to select BMP images as the carrier of multiple watermarking.
     In this paper, we propose a useful method to embedded Multiple Watermark into the carrier. Firstly, we use orthogonal sequence to merger several watermark signal into one signal, then we embedded the combination signal into the image carrier. Since the orthogonal sequence is a great autocorrelation and zero cross correlation sequence, we can assure the confidentiality and fault-tolerance of the multiple watermark signals; The next step is to use interleave to make the multiple watermark signal intertwined, in this stage, how many watermark signals the image carrier can carry and fault-tolerance were discussed; If we use the intertwined matrix as a key dimensions, the attacker would not aware of encryption keys under the right circumstances for Multiple Watermarking decomposition will encounter the Factorization difficulty, so the conclusion is that the intertwined watermark signal almost impossible deciphered; Finally, the watermark signal superimposed on the image wavelet decomposition of low-frequency coefficients, so do the watermark embedded in the signal extraction and Noninterference can also prevent malicious watermark signals are removed, thus, the security of the watermark signal were enhanced. To further enhance performance and considering the localization character of wavelet transform in spatial domain, a block-based rounding method is adopted to achieve the purpose of precise embedding. As to the detecting algorithm, a novel difference detecting algorithm is created to improve the robustness of system. As a prerequisite for no judgment, we can achieve multiple watermark detection signals blindly.
     The research work and results of this paper were relying on a major key project in Shanghai Science and Technology Commission, we proposed an algorithm to integrate multiple orthogonal sequence information into multiple watermarking. On this base, we apply the algorithm to mobile security coupons system, the main application were two special photos: Long-pei pictures and PDF417 photo, and the experiment has produced good results.
引文
[1] N.F. Johnson, S. Jajodia. Steganography: Seeing the Unseen. IEEE Computer, 1998-02.
    [2] J. Fridrich, R. Du, Meng Long. Staganalysis of LSB Encoding in Color images Proc. IEEE Int’l Conf. Multimedia and Expo, CD-ROM, IEEE Press, Piscataway, NJ, 2000
    [3] R. vanSehyndel, A. Tirkel, C. Osborne. A digital watermark proceeding of the IEEE International Conference on Image Processing. Austin, Texas, 1994(2):86-90pp.
    [4] G.L. Friedman. The trustworthy digital camera: Restoring credulity to the Photographic image. IEEE Trans. on Consumer Electronies.1993 (39):905-910pp.
    [5] R.B, Wolfgang and E.J. Delp. A watermark for digital images. Proceedings of the IEEE International Conference on Image Proceeding, 1996(3):219-222pp.
    [6] R.B. Wolfgang and E.J.delp. Fragile watermark using the VW2D watermark. Proceedings of the SPIE/IS&T International Conference on Security and Watermarking of Multimedia Contents. San Jose,CA,1999(3657):204-213pp.
    [7] C-Y. Lin and S.F.Chang. Issues and solutions for authenticating MPEG video. Proc. Of spice security and watermarking of multimedia contents. El’99,San Jose,CA,1999
    [8] C-Y. Lin and S.F.Chang. Generating Robust Digital Signature for Image/Video Authentication. Multimedia and Security Workshop at ACM Multimedia’98,Bristol. U.K.,September 1998
    [9] C-Y.Lin and S-F. Chang. SARI: Self-Authentication-and-Recovery Image Watermarking System. ACM Multimedia 2001,Ottawa,Canada,September 30-Oetober 5,2001
    [10] N.n1kolaidis,I.Pitas. Robust Image Watermarking In The Spatial Domain. Signal Processing. 1988,66(3):385-403pp.
    [11] Cox1.J,Kilian J,Leighton F.t.etal. Secure spread spectrum watermarking for multimedia. IEEE transaction on image processing,1997,6(12):1673-1687pp.
    [12] G.K.Wallance. The JPEG Still Picture Compression Standard. Communications ACM,1991,34(4):31-44pp.
    [13] M.Barni,F.Bartolini,V.CaPPellini. Robust watermarking of still images for copyright protection. Proc. Of Digital signal Processing,1997,499-502pp.
    [14] A.Piva,MBarni,F.Bartolini,V.CapPellini. DCT-Based Watermark Recovering without Resorting to the uncorrupted Original. Proc. Of International Conference on Image Processing,1997,(1)520-523pp.
    [15] Huang Jiwu,Yun Q.Shi. Adaptive image watermarking scheme based on visual masking. Electronics letters online. No:19980570,1998,748-750pp.
    [16] Chiou-ting Hsu,Ja-Ling Wu. Hidden digital watermarks in images. IEEE Trans. On image proeessing.1999,8(1):58-68pp.
    [17] Chiou-ting Hsu,Ja-Ling Wu. DCT-Based watermarking for Video. IEEE Trans. On Consumer Electronics,1998,44(1):206—216pp.
    [18] Chiou-ting Hsu,Ja-Ling Wu. Multi resolution watermarking for digital images. IEEE Trans. On Circuits and Systems-Ⅱ: Analog and Digital Signal Processing,1998,45(8):1097-1101pp.
    [19] Weili Tang,Yoshinao AOKI.A DCT-Based Coding of Images in Watermarking. Proc. Of International Conference on Information,Communications and Signal Processing,1997,510-512pp.
    [20] Centric Coding of Moving Pictures and Associated Audio Information: Video. ISO/IECIS 13818-2,1995
    [21] Video Coding for low Bit-rate Communication. Draft ITU-T Recommendation H.263,ITU,1995
    [22] Jana dustman , Mark Stableman , Ralf Steinmetz. Robust MPEG Video watermarking Technologies. Proc. Of the 6th ACM International Conference on Multimedia,71-80pp.
    [23] Xia Xiang-Gen,Charles G. Boncelet,Gonzalez R.Arce,A Mu1tiresolution Watermark for Digital Images. Of IEEE,1997,548-555pp.
    [24] Zeng Wen jun,Liu Bdede. On resolving rightful ownerships of digital images by invisible watermarks. Proc. Of IEEE,1997,552-555pp.
    [25] Zeng Wen jun,Zixiang Xiong,Ya-Qin Zhang. Multi resolution watermarking for images and video: A unified approach. Proc. Of International Conference on Image Processing,1998,(1):456-468pp.
    [26] Ioannis Pitas. A method for watermark casting on digital images. IEEE Trans. On circuits and systems for video technology 8(6):775-780pp.
    [27] G.Voyatis,I.Pitas. Chaotic watermarks for embedding in the spatial digital image domain. Proc. Of IEEE,1998,433-436pp.
    [28] I.Pitas. A method for signature casting on digital image. Proc. Of international conference on image processing,1996,(3):215-218pp.
    [29] Raymond B. Wolfgang,Edward J. Delp. A watermark for digital images. Proc. Of IEEE,1996,219-222pp.
    [30] Gang Qu,Miodrag Potkonjak,Analysis of watermarking techniques for graph color problem. Proc. Of the 1998 IEEE/ACM International conference on computer-aided design,1998,190-193pp.
    [31] Mohan S. Kandanhalli,L. R. Ramakrishnan,Rajmohan. Concert based watermarking of images Proc,of the 6th ACM International Conference on Multimedia,1998,61-70pp.
    [32] Emi1 Praun,Hughes Hoppe,Adam Finkelstein. Robust mesh watermarking Proc. Of Seraphs’99 1999,49-56pp.
    [33] Ryutarou Ohbuchi,Hiroshi Masaki Aono. Watermarking three-dimensional polygonal models through geometric and topological modificational 1998,16(4):551-560pp.
    [34] M.J.J.J.B. Maes,C.W.A. M Van overfed. Digital watermarking by geometric wrapping Proc. Of IEEE International Conference on Image Processing,1998,(1):424-426pp.
    [35] Puate J.,Jordan F..Using Fractal Compression Scheme to Embedded a Digital Signature into An Image. Proc. Of SPIE,1996
    [36] Fabien A.P. Petitcolas,Ross J. Anderson,Markus G.Kuhn. Attacks on copyright marking systems. David Aucsmith,Ed,Information Hiding,Second International workshop,IH’98,1998,Proceedings,LNCS1525,springer-Verlag,219-239pp.
    [37] Fabien A.P. Petitcolas,Ross J. Anderson. Evaluation of copyright marking systems. Proc. Of IEEE multimedia Systems(ICMCS’99),(1):574-579pp,7-11pp.
    [38] R. Barnett,D. Pearson. Attack operators for digitally watermarked image IEE Proc.-Vis. Image Signal Process,1998,145(4):271 一 279P
    [39] Stott Craver,Nassir Memos,Boon-Lock Yeo,Minerva M.Yrung. Resolving rightful ownerships with invisible watermarking techniques: limitations,attacks, and implications. IEEE Journal on Selected Areas in Communications,1998,16(4):573-586pp.
    [40] Cao Hanqiang,Zhu Guangxi,Zhu Yaoting,Zhang Zhengbing. Embedding a signature in an image based on fractal compress transformations. Journal of China Institute of Communications,1998,19(5):69-74pp.
    [41] 钮心忻,杨义先。基于小波变换的水水印隐藏与检测算法。计算机学报。2000,23(1):21-27pp.
    [42] 常青。数字水印与多媒体著作权保护。数字通信,2000,27(1):47-49pp.
    [43] 何军辉,蔡汉添。频域图像数字水印技术.通信保密,1999,(4):70-74pp.
    [44] 胡俊,刘振华,舒畅。单向数字水印.密码域信息,1998,(2):42-49pp.
    [45] 丁玮,阎伟齐,齐东旭。基于离散余弦变换的数字图像水印值入技术。 北方工业大学学报,1999,11(3):71-75pp.
    [46] Ding Wei, Yan Wei-Qi, Qi Dong-Xu. Digital watermark image embedding based on U-system. Proceedings of the 6th International Conference on Computer Aided Design & Computer Graphics, 1999,(3):893-899pp.
    [47] Kangkang Yin, Zhigeng Pan, Hui Xiang, Jiaoying Shi. A secure transaction model based on digital steganography and watermarking. Proc. Of the 6thInternational Conference on Computer Aided Design & Computer,Wen Hui Publishers,1999,(3):1319-1322pp.
    [48] Podilchuk C I. Image-adaptive watermarking using visual models. IEEE Journal on Selected Areas in Communications,1998,16(4):525-539pp.
    [49] 韦志辉,秦鹏,欧阳宏彬。小波域中视觉门限模型的数字水印技术。南大学学报,1998,25(5):41-45pp.
    [50] 刘兵,梁勇,李海燕等。基于空间视觉掩蔽效应的图像数字水印频域技术,云南大学学报,1999,21(5):399-402pp.
    [51] T.Furonand, P.Duhamel. An Asymmetries Pubic Detection Watermarking Technique. In Workshop on Information Hiding,resident,Germany,October,1999
    [52] 马义德,陆福相。一种多重数字水印技术研究。计算机工程与应用,2004,4:162-163pp.
    [53] 唐明,王丽娜,张焕国。动态多重数字水印设计方案。计算机应用研究,2006,3:28-30pp.
    [54] Jeng-Shyang Pan, Hsiang-Cheh Huang, Feng-Hsing Wang. A VQ-based robust multi-watermarking algorithm, TENCON '02. Proceedings. 2002 IEEE Region 10 Conference on Computers, Communications, Control and Power Engineering, Volume 1, 28-31 Oct. 2002 Page(s):117 - 120 vol.1
    [55] Wenliang Huang, Jin Gou, An Image Fusion-Based Multi-Watermarking Algorithm, Networking, Sensing and Control, 2006. ICNSC '06. Proceedings of the 2006 IEEE International Conference on,23-25 April 2006 Page(s):266 – 269
    [56] I.J.Cox, J Kilian, F T Leighton, et al. Secure spread spectrum watermarking for multimedia [J]. IEEE Transactions on Image Processing ,1997 ,6 (12) :1673~1687
    [57] Zhihui Wei, et al. Perceptual digital watermark of images using wavelet transform [J] . IEEE Transactions on Consumer Electron2ics , 1998 ,44 (4) :1267~1272
    [58] N Jay ant, J Johnson, R Safranek. Signal compression based on models of human perception [J] . Processing of the IEEE, 1993,81 (10) :1385~1421
    [59] A Vassilev. Contrast sensitivity near borders significance of test stimulus: Form, size, and duration [J]. Vision Research, 1973,13 (11) : 719~730
    [60] E Peli. In search of a contrast metric: Matching the perceived Contrast of Gabor patches of different phases and bandwidths [J] .Vision Research ,1997 , 37 (23) :3217~3224
    [61] Petitcolas F A P, Anderson R J. Evaluation of Copyright Marking Systems[C]. Proceeding of IEEE Multimedia Systems'99,1999.6
    [62] 汪小帆,戴路伟,茅耀斌。信息隐藏技术-方法与应用,北京:机械工业出 版社,2001。
    [63] 牛夏牧。数字水印处理算法与测试研究。博士学位论文。哈尔滨工业大学,2000。
    [64] 周亚训,徐铁峰。基于二值运算的隐形签名数字水印算法.通信学报,2002,2(23):107-112pp.
    [65] A.Z.Tirkel, G.A.Rankin and R.van Schgndel, Electronic Watermark [J], Digital Image Computing, Technology and Applications-DICTA93, Macquarie University,1993:666-673pp.
    [66] W. bender, D.Gruhl and N.Morimoto. Technique for Data Hiding. Proceedings of the SPIE 2420.storage and retrieval for image and video database,1995,3:164-173pp.
    [67] N Jay ant, J Johnson, R Safranek. Signal compression based on models of human perception [J] . Processing of the IEEE, 1993,81 (10) :1385~1421
    [68] J.J.K. O’Ruanaidh and T.Pun. Rotation, Scale and Translation Invariant Spread Spectrum Digital Image[C], Watermarking. International Conference on Image Processing,1997,1:536-539pp.
    [69] M.H. Hayes, The Reconstruction of a Multidimensional Sequence, IEEE Transactions on Acoustics,Speech and signal Processing,Apr.1992,140-154pp.
    [70] J.J.K. O’Ruanaidh and T.Pun. Rotation,Scale and Translation Invariant spread Spectrum Digital Image watermarking [C]. IEEE Int. Conf. Signal Processing,1998,66(3):303-318pp.
    [71] 杜青。基于 DCT 和量化的彩色图像数字水印算法。苏州大学学报(工科版)。2006,26(2):47-51pp.
    [72] 王向阳,杨红颖。DCT 域自适应彩色图像二维数字水印算法研究。计算辅助设计与图形学学报。2004,16(2):243-247pp.
    [73] 凌贺飞,卢正鼎,杨双远。基于 YCbCr 颜色空间的二维 DCT 彩色图像数字水印实用技术。小型微型计算机系统。2005,26(3):482-484pp.
    [74] 罗建禄,杨娟.基于离散余弦变换的数字图像水印算法及其 MATLAB 实现 科技经济市场。2006,3:295-198pp.
    [75] 唐世福。基于混沌置乱的 DCT 域彩色图像自适应水印算法。四川大学.硕士论文.2004
    [76] 李宁。基于 DCT 技术的数字图像水印的研究与实现。四川大学.硕士论文, 四川大学。
    [77] E. Koeh,Labeling,J. Zhao,IEEE,Towards Workshop Robust and Hidden image Copyright on Nonlinear Signal and Image Processing,Neon manners,Greece,June1995,
    [78] I.J. Cox,J. Kilian,T. Leighton,and T.Shamoon. Secure spectrum watermarking for multimedia. IEEE Trans. On Image Processing,1997,6(12):1673-1687pp.
    [79] C.T.Hsu and J.L.Wu. Hidden signatures in images. In Proc. IEEE int. Conference on Image Processing,Vol.3,1996.223-226pp.
    [80] M.Barni,F.Bartolini,V.Cappellini and A.Piva. A DCT-domain System for Robust Image watermarking. Signal Proeessing.1998,66(3):357-372pp.
    [81] Kuncler,D. Hatzinakos. A Robust Digital Image Watermarking Method Using Wavelet Based Fusion. IEEE International Conference on Image Processing,1997,10:544-577pp.
    [82] X.G.Xia,C.Q.Boneelet,and G.R.Aree. Wavelet transform base watermarking for digital images. Optec Express,vol.3, Deeember-1998. 497-508pp.
    [83] T.A. Wilson,S.K. Rogers,and L.R. Myers. Perceptual-based hype Spectral image fusion using multi resolution analysis. Optimal Engineering,vol.34,No11,PP.3154-3164,November1995.
    [84] H.J.M. Wang,P.C. Su,C.C.J. Kuo. Wavelet based digital image watermarking,Optics Express,vol.3,No12,PP.491-96,December 1998.
    [85] Joan Puate and Frederie Jordan. Using fractal compression scheme to embed a digital signature into an image. In Proceedings of the SPIE,Video Techniques and Software for Full-Service Networks,vol.2915,PP.108-118,Boston,MA,USA,November1996.
    [86] P.Davem and M.Scott. Fractal based image steganography. In Lecture Notes in Computer Science: Information Hiding,vol.1174,PP.279-294.Springer,May/June1996.
    [87] Patriek Bas and Jean-Mare Chassery, Using Fractal ode to watermarking images. In Proceedings of the International Conference on Image Processing,vo1.1,1998.
    [88] 黄继武,一种自适应图像水印算法。自动化学报。1999,25(4):477-482pp.
    [89] 黄继武,姚若河。基于块分类的自适应图像水印算法,中国图像图形学报, 1999,4(8):640-643pp.
    [90] 韦志辉,基于小波域视觉门限模型的数字水印技术。东南大学学报。1998,28(5):44-48pp.
    [91] 易开祥,石教英。一种自适应二维数字水印算法,全国第二届信息隐藏学术研讨会论文集[C].北京.2000:108-112pp.
    [92] 易开祥,石教英,孙鑫.数字水印技术研究进展[J].中国图像图形学报,2001,6( 2):111-117pp.
    [93] Wang H.J, Kuo C.J. Image Protection Via Watermarking on Perceptually Significant Wavelet Coeficients[C].Proceedings of the IEEE Multimedia Signal Processing Workshop,1998,(11):278-284pp.
    [94] Kuncler,D.Hatzinakos. A Robust Digital Image Watermarking Method Using Wavelet Based on Fusion[C] International Conference on Image Processing。1997,(10):544-547pp.
    [95] 张专成,张殿富,闫小萍。一种鲁棒的基于 DWT 域自适应量化步长的图像盲水印算法。中国图像图形学报,2006,6(11):840-847pp.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700