用户名: 密码: 验证码:
数字图像的完整性验证与自修复水印算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着多媒体和网络技术的迅速发展,对数字媒体的完整性、媒体内容的真实性认证显得日益重要。目前,图像编辑软件已经广泛普及,如Adobe PhotoShop、Microsoft Paint、PaintShop Pro等,利用这些软件很容易对一幅数字图像进行篡改,使得对图像内容的完整性提出质疑。本文的研究目的是利用水印技术对一幅数字图像的完整性进行验证,如果发现图像被篡改,应对篡改区域进行定位,并对篡改区域尽可能的修复。
     目前用于数字图像完整性验证及自修复的数字水印方案主要有完全脆弱性水印、半脆弱性水印、自嵌入水印等,本文主要研究自嵌入及半脆弱数字水印,分别从空域及变换域角度详细分析当前国内外现有的各种算法,指出其不足之处,并提出了相应的改进算法,实验结果表明本文算法的有效性与实用性。本文的创新之处总结如下:
     (1)提出了一种改进的具有修复功能的空域自嵌入水印算法,利用分组编码保存量化后的DCT系数,改善了修复效果,克服了以往使用位图矩阵的不足,具有通用性与实用性。
     (2)鉴于分形图像压缩具有很高的压缩比且重构图像效果好的优点,本文利用分形压缩实现了一种空域自嵌入水印算法,不但能对篡改区域进行有效定位,而且具有修复功能。
     (3) 由于现有的空域自嵌入水印算法大多数是对位图图像嵌入水印,在抗JPEG压缩方面显得过于脆弱,因此本文实现了一种直接对JPEG图像进行自嵌入的数字水印算法,具有检测篡改及修复功能,对于当今网络时代来讲具有重要意义。
     (4) 由于小波变换具有良好的空间—频率局部特性以及与人眼视觉特性相符的变换机制,在新一代静止图像压缩标准(JPEG 2000)和运动图像压缩标准MPEG-4中占据了重要位置。因此,本文利用小波系数均值来嵌入水印,提出了一种基于小波域的图像完整性验证的半脆弱水印算法,在鲁棒性和脆弱性方面达到了很好的平衡,对非恶意攻击有很强的鲁棒性,而对于恶意的篡改操作有很强的识别和定位能力。
With the development of internet and multimedia technology, the authentication of digital media becomes more and more important. Powerful publicly available image processing software packages such as Adobe PhotoShop, Microsoft Paint and PaintShop Pro make digital forgery a reality. It is possible to carefully tamper an digital image while leaving barely detectable traces by using these tools. So, the problem is how to ensure the integrity of image content. The purpose of this thesis is to authenticate the integrity of a digital image using watermarking technology, which is to check if the image has been tampered and identify the tampered portions. If possible try to recover portions of the image that have been tampered without accessing the original image.
    In the past, several techniques and concepts based on data hiding or steganography have been introduced as a means for tamper detection in digital images and for image authentication-fragile watermarks, semi-fragile watermarks, and self-embedding watermarks. The research of this thesis mainly includes self-embedding and semi-fragile watermarks. We propose several watermarking techniques after analyzing other watermarking methods detailedly. The main contributions can be summarized as following:
    (1) Based on previous work, we proposed an improved spatial self-embedding watermarking technique. We save the quantized DCT coefficients using group encoding while not using bit matrix which restricts saving bit length of each DCT coefficient. This method has many advantages compared to the latter and is testified by many images.
    (2) Because fractal coding has the characteristic of high compression ratio, this thesis designed a spatial self-embedding watermarking technique. After self-embedding, it can detect any changes to a watermarked image as well as localizing the areas that have been tampered. It is also possible to recover portions of the image which have been tampered. Experiments on real images verify the effectiveness of the proposed technique.
    
    
    
    (3) Since the current self-embedding watermarking techniques are too fragile to resist noise or JPEG compression, we proposed a self-embedding method based on JPEG images which plays an important role in current internet environment.
    (4) Designed an image authentication method of semi-fragile watermarking technique based on DWT. We transform the image into wavelet domain and group the four adjacent wavelet coefficients. Utilizing the characteristics of the human visual system, we embed a digital signal into the average value of the four adjacent wavelet coefficients since the average value has better stability than single wavelet coefficient. This method needn't original image when the watermark is extracting. Experiment results show the effectiveness of this method which is robust to common image process and fragile to malicious attack, i.e. this method can detect the tampered portions.
引文
[1] Lin E.T, Delp E.J. A review of fragile image watermarks. In: Multimedia and Security Workshop at ACM Multimedia 99.Orlando. FL .USA. 1999.
    [2] 宋玉杰,谭铁牛.基于脆弱性数字水印的图像完整性验证研究.中国图像图形学报.2003.8(1):1-7.
    [3] Stinson.D.R. Cryptography: Theory and Practice. Boca Ration, FL:CRC Press,1995.
    [4] 王颖.黄志蓓等译.数字水印.电子工业出版社.2003.7
    [5] Friedman.GL. The trustworthy digital camera: restoring credibility to the photographic image. IEEE Transactions on Consumer Electronics, 1993.39(4):905-910.
    [6] Friedman.G.L. Digital camera with apparatus for authentication of images produced from an image fde. United States Patent, (5,499,294), 1996.
    [7] Fridrich J. Methods for tamper detection in digital images. In: Multimedia and Security Workshop at ACM Multimedia 99, Orlando, FL, USA, 1999.
    [8] 杨义先,钮新忻.多媒体信息伪装综论.通信学报.2002.23(5):32-38.
    [9] Yeung M, Mintzer F C. An Invisible Watermarking Technique For Image Verification. In: International Conference on Image Processing(ICIP'97),Washington DC,USA,1997, 2.. 680-683.
    [10] Wong P W.A Public Key Watermark For Image Verification And Authentication. In: Proc. Of the IEEE International Conference on Image Processing (ICIP'98),Chicago,Illinois.USA. 1998,1:455-459.
    [11] M.Wu and B. Liu. Watermarking for Image Authentication. IEEE Proc. of ICIP, Chicago,Oct. 1998.
    [12] Fridrich J, Goljan M. Protection of digital images using self embedding. In: Symposium Content Security and Data Hiding in Digital Media, New York,NJ,U S A,May. 1999.
    [13] Fridrich J, Goljan M. Images with self-correcting capabilities. In: IEEE
    
    International Conference on Image Processing (ICIP'99),Kobe, Japan, Oct. 1999.
    [14] 钟桦,刘芳等.自嵌入空域易损水印技术.计算机研究与发展,2003.40(6):825-830.
    [15] Ching-Yung Lin, Shih-Fu Chang. SARI: Self-Authentication-and-Recovery Image Watermarking System. ACM Multimedia 2001,Ottawa,Canada, Sep.30-Oct.5,2001.
    [16] Ching-Yung Lin, Shih-Fu Chang. Semi-Fragile Watermarking for Authenticating JPEG Visual Content. In: Proceeding of SPIE Interiaational Conference on Security and Watermarking of Multimedia Contents Ⅱ,EI'00,San Jose, CA, USA,2000:
    [17] Franco Bartolini, Roberto Caldelli, Alessandro Piva. Secure self recovery authentication of still images in the DWT domain. IEEE transactions on circuits and systems for video technology, Vol.???, No.??? 2003.
    [18] Ching-Yung Lin, Shih-Fu Chang. A Robust Image Authentication Method surviving JPEG lossy compression. In: Proceedings of SPIE International Conference on Storage and Retrieval of Image/Video Database,EI'98,San Jose,CA,USA, 1998.
    [19] Ching-Yung Lin, Shih-Fu Chang. A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation. CU/CTR Technical Report 486-97-19,Dec. 1997.
    [20] Delp J, Podilchuk C I, Lin E T. Detection of image alterations using semi-fragile watermarks. In: Proceedings of SPIE International Conference on Security and Watermarking of Multimedia Contents Ⅱ,EI'00,San Jose,CA,USA,2000,3971 (14).
    [21] 李德全,苏璞睿等.一个基于DCT压缩编码的多媒体认证系统.计算机研究与发展,2002.39(6):678-683.
    [22] 董刚,张良等.一种半脆弱性数字图像水印算法.通信学报,2003.24(1):33-38.
    [23] R G Schyndel, A Z Tirkel, C F Oshorne. A digital watermark.lCIP'94,Austin,Texas,1994.
    
    
    [24]Jacquin A E. Fractal Image Coding: A Review. In: Proceedings of the IEEE, 1993.10: 1451-1465.
    [25]沈志超,夏峰等.分形编码算法及其参数的研究.计算机工程,2003.29(5):136-138.
    [26]精英科技编著.视频与音频编码技术冲国电力出版社,2002:153-163.
    [27]Joan Puate, Fred Jordan. Using fractal compression scheme to embed a digital signature into an image. In: Proceedings of SPIE Photonics East'96 Symposium, Boston, Massachusetts, 1996.
    [28]胡臻平,葛孚华等.基于分形压缩编码的数字水印技术.计算机应用.2001.21(3):34-36.
    [29]Independent JPEG Group's free JPEG software http://www.ijg.org/
    [30]刘芳,姚霞.基于视觉掩蔽的二维数字水印算法.西安电子科技大学学报(自然科学版),2003.30(1):38-41.
    [31]李钢,杨杰.改进的基于离散小波变换的数字水印技术.红外与激光工程,2003.32(1):96-100.
    [32]刘挺,尤韦彦.一种基于离散小波变换和HVS的彩色图像数字水印技术.计算机工程,2003.29(4):115-117.
    [33]王慧琴,李人厚.一种基于DWT的彩色图像数字水印算法.小型微型计算机系统,2003.24(2):299-302.
    [34]王振武,刘九芬等.一种有意义的图像水印算法.中山大学学报(自然科学版),2003.42(1):1-4.
    [35]肖亮,吴慧中等.用多数字基整数实现小波域多重数字水印嵌入.计算机辅助设计与图形学学报,2003.15(2):200-204.
    [36]Deepa kundur, Dimitrios hatzinakos. Digital Watermarking for Telltale Tamper Proofing and Authentication. Proceedings of the IEEE, 1999.87(7): 1167-1180.
    [37]肖亮,韦志辉等.一种基于整数小波变换的脆弱水印技术.南京理工大学学报,2002.26(2):1 62-166.
    [38]Han Ho Ko, Sang Ju Park. Semi-Fragile Watermarking for Telltale Tamper Proofing and Authenticating. ITC-CSCC 2002, July, 2002.pp. 623-626.
    [39]Alexandre H. Paquet, Rabab K.Ward. Wavelet-based Digital Watermarking for Image Authentication. In: IEEE Canadian Conference on Electrical and Computer Engineering, Vol. I, Winnipeg, Manitoba, May 2002, pp. 879-884.
    
    
    [40]王慧琴,李人厚.一种基于DWT的R-F数字水印技术.计算机工程与应用,2002.38(22):106-109.
    [41]杨福生 著.小波变换的工程分析与应用.科学出版社,2000.
    [42]刘贵忠,邸双亮著.小波分析及其应用.西安电大出版社,1992.
    [43]胡昌华,张军波等编著.基于MATLAB的系统分析与设计-小波分析.西安电子科技大学出版社,2001.
    [44]黄达人,刘九芬等.小波变换域图像水印嵌入对策和算法.软件学报,2002.13(7):1290-1298.
    [45]A B Warson,G Y Yang, J A Solomon, and Villasenor. Visibility of wavelet quantization noise. IEEE Trans. Image Process. 1997.6(8):1164-1175.
    [46]Marcia G Ramos and Sheila S Hemami. Perceptual quantization for wavelet-based image coding, Proc. IEEE Int. Conf. on Image Processing,Vancouver, BC,Sep.2000.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700