用户名: 密码: 验证码:
数字水印技术在版权保护中的应用研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着计算机网络、多媒体技术的飞速发展,多媒体数字产品得到了日益普及和广泛应用。数字产品易于编辑、复制、传输,这一方面促进了人类信息的共享,推动了社会的进步,但另一方面随之而来的数字版权保护和内容认证问题也变得日益突出,成为数字世界迫切需要解决的问题。作为解决数字版权和数据认证的关键技术手段之一的数字水印技术的应用研究已逐渐得到国内外专家、学者的广泛关注。数字水印技术的应用研究大致可分为两个方面:一是数字水印算法的研究;二是如何将数字水印算法应用到数字版权保护中,即应用协议的研究。论文对此进行了研究,主要研究成果如下:
     (1)给出了一种基于混沌映射与小波树量化的可读水印算法。在该算法中,水印是一幅有意义的二值图像,水印嵌入前利用混沌序列进行混沌调制。在分析图像小波分解系数的树结构关系以及人眼视觉系统模型的基础上,在宿主图像的两棵小波系数树中嵌入一位水印信息,通过量化使它们呈现足够大的统计差别从而使水印检测时能提取水印信息,并且检测时不需要原始图像和原始水印。实验结果表明,此方法是一种行之有效的图像版权保护方法。
     (2)水印对抗几何攻击是一个十分困难和富有挑战性的课题。给出了基于模板嵌入的旋转及缩放估计方法和模板匹配有较低的运算复杂度;给出的基于不变质心提取的平移估计方法,解决了原始水印图像和待测图像的平移同步问题。将研究的方法应用于已有的水印算法,实验结果表明:其抗几何攻击、JPEG2000压缩的性能优于两种典型的同类算法。
     (3)在分析数字版权保护系统中作者、经销商、购买者和版权中心的责任及要求的基础上,给出了一种参与各方权益公平的数字版权保护协议。该协议均衡考虑了数字作品使用的合法性、数字作品的完整性、传输的安全性,并很好地保证了数字作品交易的公平性。
With the rapid development of computer networks and multimedia technology, digital multimedia products are becoming increasingly popular and extensively applicable, which are so easy to be edited, copied and transmitted that they have facilitated the share of information and boosted the progress of today's society. However, on the other hand, some problems concerned with Digital Right Management (DRM) and content authentication are becoming more and more striking, which is a urgent problem for solving in the digital world. The digital watermarking technology as an essential technical method solving DRM and content authentication has already started to draw wide attention of many scholars in this field all over the world. The research on digital watermarking technology can be divided into two aspects approximately. One is the digital watermark algorithm study. The other is about how to apply the digital watermark algorithm to the DRM, namely application protocol study, and they are researched deeply in the dissertation. Main achievements are summarized as follows:
     (1) This thesis proposed a wavelet tree-quantization readable watermarking algorithm based on chaotic mapping and human visual system. In the algorithm, the watermark is a meaningful binary bitmap and is modulated by a chaotic sequence before embedding. By analyzing the tree structure relation of wavelet coefficients and the model of human visual system, each watermark bit is embedded using two wavelet trees of host image, The trees are so quantized that they exhibit a large enough statistical difference which will later be used for watermark extraction and the watermarking detection needs no host image and original watermark. Experiment results show the watermarking is invisible, and robust to several kinds of attack.
     (2) The watermark resisting to geometric distortion is a very difficult and challenging subject. To solve this problem, two method are proposed.One method, which estimates rotation and scaling based on template embedding, has low computing complexity for template matching.One method which estimates translation based on invariant centriod has solve the translation synchronization of the original watermarking images and test images in the wavelet domain watermark. In the experiments, we applied the two methods to the proposed watermarking algorithm, and compared the algorithm with two typical watermarking algorithms resisting to geometric distortion, the results of experiments show it has higher performance in resisting to geometric distortion and JPEG2000 compression.
     (3) On the basis of analyzing the obligations and requirements for the authors, the sellers, the buyers and the copyright centers in the system of DRM, we have produced a protocol to protect the rights and interests of each participator in the digital media transaction process. The protocol takes into account the usage legality, integrity, and communication security for digital works and also protects the trading fairness at one time.
引文
[1]Briassouli, P. Tsakalides, M.G. Strintzis, Hidden messages in heavy-tails: dct-domain watermark detection using alpha-stable models. IEEE Trans. Multimedia,2005,7(4):700-715
    [2]Briassouli, M.G. Strintzis. Optimal detection under quantization in the transform domain.IEEE Trans.Circuits Syst.Vidio Technol.,2004,14(12):1308-1319
    [3]江雪梅.数字作品版权保护与认证的若干基本理论及关键技术研究:[博士学位论文].武汉:武汉理工大学,2002,10-22
    [4]胡玉平.小波域数字图像水印研究:[博士学位论文].武汉:华中科技大学图书馆,2005,1-40
    [5]Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom.数字水印.王颖,黄志蓓译.北京:电子工业出版社,2003.7-27
    [6]尹浩,林闯,邱锋等.数字水印技术综述.计算机研究与发展,2005,42(7):1093-1099
    [7]张军.图像数字水印技术:[博士学位论文].武汉:华中科技大学图书馆,2003,12-44
    [8]Hartung F, Kutter M. Multimedia Watermarking Techniques. Proceedings of IEEE,1999,87(7):1079-1107
    [9]R.G. vanSchyndel, A.Z. Tirkel, C.F. Osborne. A digital watermark. In: Proceedings of the IEEE International Conference on Image Processings. Austin. Feb,1994,86-89
    [10]W. Bender, D. Gruhl, N. Morimoto. Techniques for digital hiding. IBM Syst J., 1996,35(4):313-336
    [11]A.Z. Tirkel. Electronic. Digital image computing technology and applications. Macquarie University,1993,666-673
    [12]Bruyndonckx. Spatial method for copyright labeling of digital images. In:IEEE workshop on nonlinear signal and image processing. Halkidiki, Greece. June 1995.221-226
    [13]T. Kalker, Depovers, J. Haitsna, et al. A video watermarking system for broadcast monitoring. In:Proceeding IS&SPIE'11'th aymo, Electronic image in'99:Secutity and watermarking of Multimedia Content. Baltimore, USA. Jan, 1999,3657-3671
    [14]M. Kutter, F. Jordan, F. Bossen. Digital signature of color images using amplitude modulation. Proceeding of SPIE, storage and retrieval for image and video databases,1997,30(22):518-526
    [15]Chen, G.W. Wornell. Dither modulation:a new approach to digital watermarking and information embedding, San Jose, CA, USA. Jan 1999,342-353
    [16]Maws. Digital watermarking by geometric warping. In Proceedings of ICIP, 1998,6:324-331
    [17]J. Puate, F. Jordan. Using fractal compression scheme to embed a digital signature into an image. In Proceedings of the SPIE,1996,29(15):108-118
    [18]J. Q. Ruanaidh, W. J. Dowling, F. M. Boland. Phase watermarking of digital I mages. In:Proceedings of the International Conference on Image Processing. Olden bourg Verlag,1996,239-242
    [19]De Rosa, M. Barni, F. Bartolini, et al. Optimal decoding of non-additive full fram DFT watermarks. In:proceeding of 3th Workshop on information hiding. Dresden, German,1999,159-171
    [20]J. Cox, J. Killin, F. LT. Leighton. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing,1997,6(12):1673-1686
    [21]M. Barni, F. Bartolini, A. De Rosa, et al. A new decoder for the optimum recovery of nonadditive watermarks. IEEE Transactions on Image Processing, 2001,10(5):755-766
    [22]伯晓晨,沈林成,常文森.一种新的盲图像水印检测算法.计算机学报,2001,24(12):1279-1286
    [23]I. Podilchuk, W. J. Zeng. Image-Adaptive Watermarking Using Visual Models. IEEE Journal on Selected Areas in Communications,1998,16(4):525-539
    [24]J. Puate, F. Jordan. Using fractal compressing scheme to embed a digital signature into an image. Proceedings of SPIE Photonics East'96 Symposium. Newport Beach,California, USA,1996,103-124
    [25]李冠华,赵耀.基于分形图像编码的数字水印技术研究.铁道学报,2001,23(4):48-53
    [26]M. Coni, G. Nicchioti. Wavelet-based image watermarking copyright protection. IN:Scandinavian Conference on Image Analysix SCA,97. Munich, Germany. June 1997,22-30
    [27]Kundur, D. hatzinakos. A robust digital image watermarking method using wavelet-based fusion. In:Proceedings of the IEEE International Conference on Image Processing, ICIP'97. San Jose, CA. October,1997,544-547
    [28]Rakesh Dugad, Krishna Ratakonda, Narendra Ahuja. A New Wavelet-Based Scheme for Watermarking Images. In:Proceedings of the IEEE International Conference on Image Processing, ICIP'98. San Jose, CA. October,1998, 223-227
    [29]PO-Chyi Su, Houng-Jyh, Mike Wang,et al. Digital Image Watermarking in Regions of Interest. IN:PICS'99. Bombay, India,1999,295-300
    [30]J. L. Vehel, Manoury. Wavelet packet based digital watermarking. In: Procedings of the 15th International Conference on Pattern Recognition. Zurich, Switzerland. Sept,2000,43-47
    [31]Pommer, A. Uhl. Wavelet packet methods for multimedia compression and encryption. In:Proceedings of the 2001 IEEE Pacific Rim Conference on communications, Computers and Signal Processing. Victoria, Canaa. August, 2001,1-4
    [32]]D. Kundur, D. Htazinakos. Digital watermarking using multiresolution. In: proceeding of the 1998 IEEE international conference on Acoustic, Speech and Signal Processing. seattle, washinton. May,1998,2969-2972
    [33]张中月,齐开国.应用Hash函数增强数字图像半易损性水印的易损性.计算机辅助设计与图形学报,2004,16(6):845-849
    [34]M.Loytynoja, T.Seppanen, N.Cvejic. Rights Management of Information Products on the Mobile Internet.Finland:Helsinki Institute for Information Technology,2003,47-52
    [35]Ray Hunt. PKI and Digital Certification Infrastructure. In:Bob Werner eds. 9thIEEE International Conference on Networks (ICON'01). Los Alamitos, New York:IEEE Press,2001,234-239
    [36]Laurent Mathy. Features of the ACCOPI Multimedia Transport Service. InB.Butscher Proceeding of European Workshop IDMS'96. New York:Springe 1996,174-194
    [37]Silviu'Burtescu, Christoph Busch, Martin Einhoff. Protecting Confidentia Information using CIPRESS. CG topics,2000,12(1):20-22
    [38]Silviu Burtescu, Christoph Busch, Hartmut Chodura. CIPRESS:The ReEncryptio TM System. CG topics,2000,12(1):5-7
    [39]毛琼,陈明奇,夏光开等.安全数字水印体系结构的研究.电子与信息学报,2001,23(9):833-840
    [40]M.A.Kaplan. IBM Cryptolopes:SuperDistribution and Digital Rights Management. Working Paper, v1.3.0, December,1996:398-407
    [41]Olin Sibert, David Bernstein, David Van Wie. The DigiBox:A Self-Protecting Container for Information Commerce. Proceedings of the 1st USENIX Workshop on Electronic Commerce, New York, July,1995:812-823
    [42]Podilchuk, W.Zeng. Image Adaptive Watermarking Using Visual Models. IEEE Journal on Selected Areas in Communications,1998,16(4):525-540
    [43]Xiong Zhenghua, Li Zexiang. On the Discrete Symmetric Localization Problem. International Journal of Machine Tools and Manufacture,2003,43(9):863-870
    [44]Gleb Naumovich, Nasir Memon. Preventing Piracy, Reverse Engineering and Tampering. IEEE Computer Society Press,2003,36(7):64-71
    [45]邹潇湘,李锦涛,彭聪.非对称数字水印技术研究.计算机工程与应用,2002,38(16):7-10
    [46]余文莹,汤书昆.中国网络信息资源版权保护问题研究.价值工程,2004,23(3):11-14
    [47]Richard A. Spinello. The Future of Intellectual Property. Ethics and Information Technology,2003,5(1):2-4
    [48]王育发,张彤,黄继武.信息隐藏理论与技术.北京:清华大学出版社,2006.12-42
    [49]Nikolaidis, S.Tsekeridou, A.Tefas and V.Solachidis. A survey on watermarking application scenarios and related attacks.International conference on image processing,2001,3(10):991-994
    [50]P.Dong and N.P.Galatsanos. Affine transformation resistant watermarking based on images normalization. Proceedings of ICIP2002,2002,3(9):24-28
    [51]尹萍.版权标记系统协议层安全分析.合肥:中国科技大学,2001,22-24
    [52]陶栋,李之棠.混沌加密图像算法.计算机工程与科学,2003,25(4):7-9
    [53]P.Duhamel, T.Furon. An Asymmetric Public Detection Watermarking Technique.In Proceedings of the Third International Workshop on Information Hiding, Springer Lecture Notes in Computer Science,1999:88-100.
    [54]张冠男,王树勋,温泉.‘一种嵌入可读水印的自适应盲水印算法.电子学报,2005,33(2):308-312
    [55]M Kutter, S K Bhattacharjee, T Ebrahimi. Towards second generation watermarking schemes.Proc 6th int. conf on Image Processing ICIP'99. Piscateway:1999,320-323
    [56]纪震,李慧慧,肖微微等.基于混沌序列的数字水印信号研究.电子学报,2004,32(7):1131-1134
    [57]T. Kohda, A. Tsuneda. Stalistics of chatotic binary sequence. IEEE Transaction on information theory,1997,6(43):104-112
    [58]胡玉平,余胜生,周敬利等.一种新颖的图像水印嵌入方法.计算机科学,2003,30(8):147-150
    [59]S. Lewos, G. Knowles. Image compression using the 2-D wavelet transform. IEEE Transaction Image Proc,1992,1(4):244-250
    [60]Bas P, Chassery J. M., Macq B. Image watermarking:an evolution to content approaches. Pattern recognition,2002,35:545-561
    [61]胡玉平,韩德志,羊四清.抗几何变换的小波域图像水印.系统仿真学报,2005,17(10):2470-2475
    [62]C-Y Lin, M. Wu, A. Bloom, et al. Rotation, scale, and translation resilient watermarking for image. IEEE Transaction on Image Processing,2001,10(5): 767-782
    [63]Zhang Li, Sam Kwong, and Gang Wei. Geometric moment in image watermarking]. Proceedings of the 2003 International Symposium on Circuits and Systems, 2003,2:25-28
    [64]Alghoniemy M and Tewfik A H.Geometric distortions correction in image watermarking[C]. Proceedings of SPIE on Security and watermarking of multimedia content. California, USA,2003,1:381-392
    [65]Kim Bum-Soo, Choi Jae-Gark. A Robust digital image watermarking method against geometrical attacks. Real-Time Imaging,2003,9(2):139-149
    [66]胡玉平,钟铭,韩德志.基于小波变换的自适应水印.华中师大学报,2002,12(4):451-454
    [67]S.Even, O.Goldreich, A.Lempel. Arandomized Protocol for Signing Contracts. Communications of the ACM,1985,28(3):637-647
    [68]Brickell E, Chaum D, Damgard I, et al. Gradual and Verifable Release of A Secret.In:Advances in Cryptology Proceedings of CRYPT87. Berlin:Springer-Verlag,1998,95-211
    [69]M.Benor, O.Goldreich, S.Micali, et al. A Fair Protocol for signing Contracts. IEEE Transactions on IT,1990,36(1):40-46
    [70]Damgard. Practical and Provably Secure Release of a Secret and Exchange of Signatures. In:Advances in Cryptology Proceedings of EURO-CRYPT93. Berlin:Springer-Verlag,1994,200-217
    [71]T.Coffey, P.Saidha. Non-repudiation with Mandatory Proof of Receipt. Computer Communication Review,1996,26(1):6-18
    [72]Chor, S.Goldwasser, S.Micali, et al. Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults. In:Proceedings of the 26th IEEE Symposiumon Foundations of Computer Science. London:1985,383-395
    [73]M.K.Franklin, M.K.Reiter. Fair Exchange with A semi-Trusted Third Party. In: Proceedings of the 4th ACM Conference on Computer and Communication' Security. New York:ACM Press,1997,1-5
    [74]Robert H Deng, Li Gong, Aurel A Lazar, et al. Practical Protocols for Certified Electronic Mail. Journal of Network and System Management,1996,4(3): 162-174
    [75]C.H.You, J.Zhou, K.Y.Lam. On the Efficient Implementation of Fair Non-Repudiation. Computer Communication Review,1998,28(5):50-60
    [76]Holger Burk, Andreas Pfitzmann. Payment System Senabling Security and Unobsevability. Computers and Security,1989,8(5):399-416
    [77]J.Zhou, D.Gollmann. Certified Electronic Mail. In:Proceedings of 1996 European Symposiumon Research in Computer Security. Rome:Springer-Verlag, 1996,160-171
    [78]Hao-hua Chu, Lintian Qiao. A Secure Multicast Protocol with Copyright Protection. ACM SIGCOMM Computer Communication Review,2002,32(2): 42-60
    [79]C.C Chang, C.Y Chung. An Enhanced Buyer-Seller Watermarking Protocol. Communication Technology Processings,2003,15(2):1779-1783
    [80]M.Stadler. Publicly Verifiable Secret Sharing. In:Advances in Cryptology Proceedings of EUROCRYPT96, LNCS1070, Berlin:Springer-Verlag,1996. 191-199
    [81]Asokan N, Shoup V, Waidner M. Optimistic Fair Exchange of Digital Signatures.In:Advances in Cryptology Proceedings of EUROCRYPT98. Berlin:Springer-Verlag,1998,591-606
    [82]徐军,叶澄清,蒋晓宁.基于公平交易协议的数字图像电子交易方案.计算机辅助设计与图形学学报,2002,14(2):153-157
    [83]L. Qian, K. Nahrstedt. Watermarking Schemes and Protocols for Protecting Rightful CP and Customer's Rights. Journal of Visual Communication and Image Representation,1998,29(4):194-210
    [84]Open Mobile Alliance (OMA). Open mobile alliance:DRM architecture draft version 2.0-20 August 2004[EB/OL].2004(2004-08-27)[2005-09-08]. http:// www.openmobilealliance.com
    [85]袁征,温巧燕,刁俊峰.基于水印和密码技术的数字版权保护模式.北京邮电大学学报,2006,29(5):98-102
    [86]刘立刚,陈晓苏,胡蕾,抗协议攻击的版权保护安全方案.中山大学学报,2004,43(2):83-86

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700