用户名: 密码: 验证码:
基于脆弱水印的二值图像认证与篡改定位研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着全球信息资源的数字化进程日益加快,以及电子商务、电子政务的日趋流行,对网上发行的电子刊物进行盗版追踪,对来往的电子信函、公文或传真进行完整性认证变得曰益紧迫。由于绝大部分数字资源为二值图像格式,因此对二值图像进行版权保护和完整性认证显得尤为重要。相对于灰度或彩色图像,二值图像仅有两个亮度等级,一黑一白视觉反差极大,任何不恰当的改动即使很细微也容易引起明显的修改痕迹,甚至改变图像表达的信息。因此一般针对灰度或彩色图像的水印嵌入方法都不能直接应用于二值图像。
     本文深入分析了现有基于脆弱水印的二值图像认证算法所存在的问题,在此基础上提出新的二值图像认证和篡改定位算法。并进一步提出适用于需要对图像进行精确再处理等应用场合的无损水印认证算法:
     1.基于纠错码的二值图像脆弱水印认证及篡改定位算法。利用二值图像中的像素构造纠错码,通过嵌入其校验码来实现对图像的完整性认证和篡改定位。该算法仅需较低的嵌入负载,还可在图像的不同区域调节嵌入负载的大小,解决了二值图像冗余信息少且分布不均匀等问题;并且充分考虑了人类的视觉特性,有效地保证了嵌入水印后图像良好的视觉效果。
     2.基于高容量脆弱水印的二值图像无损认证算法。基于模式块替换思想,选择二值图像的边缘作为水印的嵌入位置,通过相互交错的图像块划分方式和不定长的嵌入方式最大限度地提高了‘嵌入容量。另外结合各类型模式块的出现频率,采用哥伦布编码实现对用于原始图像无损恢复的辅助信息的有效压缩。
     本文的研究将为二值图像的完整性认证提供新方法和关键技术,其研究成果将为医学、军事、以及法律鉴定等领域提供技术基础,将为社会稳定和发展起到重要的作用。
Along with the speeding up of the global information digitalization process and the increasing popularity of e-commerce, e-government, copy tracing of the electronic journals issued online, and integrity authentication of the E-mails,official documents, and fax are pressing issues which need to be addressed.However, most of these documents are binary images.As a result, copyright protection and integrity authen-tication for binary images are gaining importance.Compared with color and grayscale images,binary images that only take two values have great visual contrast between black and white pixels.Any improper modification would result obvious distortion, even change the information represented by the images.Therefore, data hiding meth-ods for gray or color images can not be directly applied to binary images.
     This paper makes a deep investigation into the existing binary image authentica-tion watermarking, and proposes a novel algorithm for binary images authentication based on their drawbacks.Moreover, a reversible data hiding scheme for binary im-ages authentication is presented for some regions,where accurate re-treatments are needed.
     1.Binary image fragile authentication watermarking and tamper localization al-gorithm based on error-correcting codes.Image authentication and tamper localization are achieved by embedding the check codes constructed according to the pixels'val-ues in binary image.The suitable places for embedding are limited and unevenly dis-tributed can be handled by low embedding payloads and adaptive adjustments in dif-ferent regions.Furthermore, the visual quality is improved by sufficiently incorpo-rating with the properties of human vision.
     2.High capacity fragile watermarking for binary image lossless authentication. This novel reversible data hiding scheme is based on pattern substitution.Boundaries of a binary image are chosen as the hiding locations.The embedding capacity is fully exploited by employing interlaced block partition scheme and a variable length em-bedding scheme. Moreover, the side-information for lossless image recovery can be effectively compressed by the Golomb Code incorporating with the occurrence fre-quency of each pattern to achieve higher embedding capacity.
     This paper will not only provide new methodology and key techniques for binary image authentication watermarking, but also offer an identification technology for the applications,such as medical,military, and legal images etc.The research made in this paper, therefore,plays a very important role in the social stability and develop-ment.
引文
[1]孙圣和,陆哲明,牛夏牧等.数字水印技术及应用.北京:科学出版社,2004,14-50
    [2]R G Schyndel,A Z Tirkel,C F Qsborne.A digital watermark.In:Proc.of Int. Conf. on Image Processing, New York:IEEE Press,1994,2:86-90
    [3]S Katzenbeisser, F A P Peticolas.Information hiding:Techniques for steg-anography and digital watermarking, Boston:Artech House,2000,1-2
    [4]J J K Ruanaidh, W J Dowling, F M Boland.Phase watermarking of digital im-ages.In:Proc.of Int.Conf. on Image Proces'sing, New York:IEEE Press,1996, 239-242
    [5]俞龙江,牛夏牧,孙圣和.一种旋转、尺度变换和平移鲁棒水印算法j电子学报,2004,31(B12):2071-2073
    [6]李黎,潘志庚.一种稳健性好的图象盲水印算法.中国图象图形学报,2003,8(5):567-571
    [7]H Zhao, M Wu,Z Wang, et al.Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting. IEEE Trans.Image Processing,2005,14(5): 646-661
    [8]C S Lu, C Y Hsu. Near-optimal watermark estimation and its countermeasure: antidisclosure watermark for multiple watermark embedding. IEEE Trans.Cir-cuits and Systems for Video Technology,2007,17(4):454-467
    [9]牛晓莉,刘琚,孙建德等.一种抗拷贝攻击的水印方案.山东大学学报(理学版),2006,41(4):121-123
    [10]王津申,戴跃伟,王执铨.用于JPEG图像认证的特征水印算法.中国图象图形学报,2008,13(7):1265-1271
    [11]X Zhang, S Wang. Statistical fragile watermarking capable of locating individual tampered pixels.IEEE Signal Processing Letters,2007,14(10):727-730
    [12]H Yuan, X P Zhang. Multiscale fragile watermarking based on the Gaussian mixture model.IEEE Trans.Image Processing,2006,15(10):3189-3200
    [13]X Zhang, S Wang.Fragile watermarking with error-free restoration capability. IEEE Trans.Multimedia,2008,10(8):1490-1499
    [14]W Diffie, M E Hellman.New directions in cryptography. IEEE Trans.Informa-tion Theory,1976,IT-22:644-654
    [15]L L Phen, C K Hsieh, P W Huang.A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition,2005,38: 2519-2529
    [16]X Zhang, Y Yang, Y Zhu.A secure hierarchical fragile watermarking method with tamper localization.In:Proc.of 1th Int.Multi-Symposium on Computer and Computational Sciences,New York:IEEE Press,2006,2:69-74
    [17]M U Celik, G Sharma, E Saber, et al.Hierarchical watermarking for secure im-age authentication with localization.IEEE Trans.Image Processing,2002,11(4): 585-595
    [18]E T Lin, E J Delp.A review of fragile image watermarks.In:Proc. of ACM Workshop on Multimedia and Security, New York:ACM Press,1999:25-29
    [19]冉文波,梁华庆.二值图像数字水印技术的研究进展,计算机工程与应用,2005,36:48-51
    [20]M Wu, E Tang, B Liu. Data hiding in digital binary image.In Proc.of IEEE Int. Conf. on Multimedia and Exposition, New York:IEEE Press,2000:381-384
    [21]周琳娜,杨义先,郭云彪等.基于二值图像的信息隐藏研究综述,中山大学学报,2004,43(2):71-75
    [22]C W Honsinger, P W Jones,M Rabbani,et al.Lossless recovery of an original image containing embedded data. U S Patent.6278 791,2001-08-21
    [23]C D Vleeschouwer, J F Delaigle, B Macq. Circular interpretation of bijective transformations in lossless watermarking for media asset management.IEEE Trans.Multimedia,2003,5(1):97-105
    [24]J Tian.Reversible data embedding using a difference expansion.IEEE Trans. Circuits and Systems for Video Technology,2003,13(8):890-896
    [25]J Fridrich, M Goljan, R Du.Invertible authentication watermark for JPEG im-ages.In:Proc.of Conf. on Security and Watermarking of Multimedia Contents, New York:IEEE Press,2001,1:197-208
    [26]M U Celik, G Sharma, A M Tekalp,et al.Lossless generalized-LSB data embed-ding.IEEE Trans.Image Processing,2005,14(2):253-266
    [27]宋玉杰,谭铁牛.基于脆弱性数字水印的图像完整性验证研究综述.中国图像图形学报,2003,8(1):1-7
    [28]W Bendeer, D Gruhl,N Morimoto.Techniques for data hiding.IBM Systems Journal.1996(35):131-336
    [29]M S Fu, O C Au. Data hiding watermarking for halftone images.IEEE Trans. Image Processing,2002,11(4):477-484
    [30]M Wu,E Tang, B Liu.Data hiding in Binary Image for authentication and anno-tation. IEEE Trans.Multimedia,2004,6(4):528-538
    [31]H Yang, A C Kot.Data hiding for bi-level documents using smoothing technique. In:Proc.of Int.Symposium on Circuits and Systems,New York:IEEE Press, 2004,5:692-695
    [32]C H Tzeng, W H Tsai.A new approach to authentication of binary images for multimedia communication with distortion reducation and security enhancement. IEEE Communications Letters,2003,7(9):443-445
    [33]C L Tsai,H F Chiang, K C Fan,et al.Reversible data hiding and lossless recon-struction of binary images using pair-wise logical computation mechanism.Pat-tern Recognition,2005,38(11):1993-2006
    [34]Y A Ho,Y K Chan, H C Wu,et al.High-capacity reversible data hiding in binary images using pattern substitution.Computer Standards & Interfaces,2009,31(4): 787-794
    [35]J S Pan,H Luo,Z M Lu. A lossless watermarking scheme for halftone image authentication. Int.Journal of Computer Science and Network Security,2006, 6(28):147-151
    [36]H Y Kim, R L de Queiroz.Alteration-Locating authentication watermarking for binary images.In:Proc of Int.Workshop on Digital Watermarking, Berlin: Springer,2004:125-136
    [37]H Yang, A C Kot. Binary image authentication with tampering localization by embedding cryptographic signature and block identifier. IEEE Signal Processing Letters,2006,13(12):741-744
    [38]N B Puhan, A T S Ho.Secure tamper localization in binary document image au-thentication.In:Proc.of Int.Conf. on Knowledge-Based Intelligent Information and Engineering Systems,Berlin:Springer,2005:263-271
    [39]郑江滨,冯大淦,张艳宁.可恢复的脆弱数字图像水印.计算机学报,2004,27(3):371-376
    [40]S B Wicker, V K Bhargava. Reed-Solomon Codes and Their Applications.Now York:John Wiley & Sons,1999,1-15
    [41]林福宗,陆达著.多媒体与CD-ROM.北京:清华大学出版社,1995,32-67
    [42]H Yang, A C Kot.Pattern-Based data hiding for binary image authentication by connectivity-preserving.IEEE Trans.Multimedia,2007,9(3):475-486
    [43]M Niimi,H Noda, E kawaguchi.Steganography based on region segmentation with a complexity measure. Systems and Computers in Japan,1998,30(3): 1132-1140
    [44]S V D Pamboukian, H Y Kim.Reversible data hiding and reversible authentica-tion watermarking for binary images.In:Proc.of the 6th Brazilian Symposium on Information and Computer System Security, Santos:SBSeg Press,2006
    [45]G R Robertson, M F Aburdene, R J Kozick.Differential block coding of bi-level images.IEEE Trans.Image Processing,1996,38(11):1368-1370
    [46]S W Golomb.Run-length encodings.IEEE Trans.Information Theory,1966, IT-12:399-401
    [47]D Salomon, G Motta, D Bryant.Data Compression:The Complete Reference, 3rd Edition,Berlin:Springer,2004,57-64
    [48]R Gallager, D V Voorhis.Optimal source codes for geometrically distributed in-teger alphabets.IEEE Trans.Information Theory,1975,IT-21:228-230
    [49]C Podilchuk, E Delp.Digital watermarking:algorithms and applications.IEEE Signal Processing Magazine,2001,18(4):33-46
    [50]F Hartung, M Kutter. Multimedia watermarking techniques. In:Proc.of IEEE, New York:IEEE Press,1999,87(7):1079-1107
    [51]M Swanson, M Kobayashi,A Tewfik. Multimedia data-embedding and water-marking technologies.In:Proc.of IEEE,New York:IEEE Press,1998,86(6): 1064-1087
    [52]G Langelaar, I Setyawan, R Lagendijk.Watermarking digital image and video data. IEEE Signal Processing Magazine,2000,17(5):20-46
    [53]H Lu, J Wang, A C Kot, et al. An objective distortion measure for binary docu-ment images based on human visual perception. In:Proc.of Int. Conf. on Pattern Recognition, New York:IEEE Press,2002,4:239-242

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700