用户名: 密码: 验证码:
基于分形理论的信息隐藏技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
人们对信息隐藏技术的研究由来已久,它是一种被认为信源和信道安全的技术。作为其分支之一的数字水印是应用于数字版权管理(DRM)的一种新技术,已成为当前多媒体安全领域发展最快的热门技术,受到国际学术界以及研究组织的广泛关注。分形理论是一种新的非线性科学,被广泛应用于自然科学和社会科学的各个领域,对计算机图形和图像处理、曲线或曲面的分形插值具有很好的理论指导意义。本文开展了基于分形理论并结合传统变换域理论的水印算法进行研究分析,主要工作如下:
     1.研究和仿真了基于分形编码和离散余弦变换(DCT)、离散小波变换(DWT)的图像水印算法,并在保证图像不可感知性的前提下对两种方案进行分析和仿真。仿真结果表明应用局部自仿射变换进行图像编码后,算法可以较好地抵抗离散余弦变换的块效应;分形编码后的图像和小波变换的多分辨率思想、人类视觉系统特性是一致的,具有较好的鲁棒性。根据函数迭代系统(IFS),采用具有四种仿射变换的IFS生成的图形作为水印进行嵌入,在一定程度上提高了抗旋转攻击能力。
     2.研究数字音频的流特性和压缩编码方案,提出一种基于DWT多尺度分析的、根据分形插值函数的分维数大小不同来嵌入不同强度的水印算法。该算法使用小波分解级数和垂直因子作为密钥,使安全性得到加强;水印通过在中低频系数嵌入,既保证了不可感知性又增强了稳健性。针对高低通滤波和压缩编码攻击,进一步提出基于小波包分解的在高频分量和低频分量上嵌入双重水印的算法,仿真表明算法具有较好的效果。
     3.研究数字视频的流特性和压缩编码算法,提出了一种基于压缩视频和带参量的分形树水印算法。通过计算视频序列的前后两个Ⅰ帧DCT系数的差值,并和预先设定的门限进行比较,在不同的门限内嵌入参量不同的分形树。该算法利用带参量IFSP绘制出类似于动画的图形,将其嵌入到视频中,符合视频帧的运动特性;门限的设定保证不会增加码率同时减少了失真累积,视频质量得到保证。仿真结果表明,水印不可见性好。
People have researched the information hiding technology which is considered source-channeling safety technology for a long time; it is concerned with digital rights, information security and covert commutation. As one branch of information hiding, digital watermarking, which is used for digital rights management (DRM), is becoming fast developing technology in the multimedia area and has already aroused widely attention from international academe and research organization. Fractal theory, which is a fresh and novel nonlinear science, has been widely applied to many cases or fields of natural and social science and has a remarkable guiding significance for computer graphics, image processing, curve/surface fractal interpolation and so on. In this paper, watermarking algorithm based on fractal theory is researched and analysed in conventional transform domain, the main working is as follows:
     1.In this paper, two digital image watermarking algorithms are proposed separately and simulated, which are based on fractal code and DCT/DWT under the precondition of watermarking invisibility. Simulated results show that the DCT-based method bears a good function against block effect of DCT with local self-affine transform, and the coded image with fractal quad tree is corresponding to the features of Mufti-Resolution Analysis (MRA)of DWT and Human Vision System (HVS). This method has a good robustness performance. Otherwise, on the basis of Iterated Function System (IFS), a novel method is proposed to enhances the resist of rotation attack in some degree, which uses four affine transform of IFS to create an image as a watermark
     2.The features of digital audio and compress coding schemes are studied in detail and a watermarking algorithm is presented. According to the size of fractal dimension, this algorithm embeds different capacity watermark with fractal interpolation function (FIF) and MRA of DWT, and vertical proportion scale and DWT decomposing level L are adopted as keys that make it safe. In order to assure watermarking invisibility and robustness, this method embeds watermark in coefficients of mediate and low frequency. Future more, a scheme is proposed that embeds two watermarks in both detail and approximate coefficients based on wavelet packet decompose, aiming at the attack of high pass or low pass filter and compress coding. Simulated results show it has a good performance.
     3.The features of video and some video compress coding scenarios are studied. Then, a algorithm is presented based on compressing video and fractal trees with parameters.After computing the difference of fore-and-aft I frames'DCT coefficients and comparing with two thresholds, this method embeds different fractal trees in video I frames. This scheme uses IFSP to create cartoon-like pictures, which is consistent with the motion characteristics of video frame, and embeds these pictures into video frames. Presetting thresholds guarantee not to increase the bit rate while reducing the cumulative distortion. Simulated results show that watermark invisibility is good.
引文
[1]P.W.Wong, E.J. Delp, Eds.Security and Watermarking of Multimedia Contents.vol. 3657,San Jose,California,U.S.A.,25-27 Jan.1999.
    [2]D.Kahn.The History of Steganography. Anderson 402:1-5,1996.
    [3]B.Pfitzmann. Information Hiding Terminology. Anderson 402:347-350,1996.
    [4]M.D.Swanson, M. Kobayashi, A.H.Tewfik. Multimedia Data-Embedding and Watermarking Technologies. Proceedings of the IEEE, vol.86:1064-1087,June 1998.
    [5]T.G. Handel, M.T. Stanford. Hiding Data in the OSI Network Model. Anderson(402):23-38,1996.
    [6]J.S.Pan, H.C.Huang and L.C.Jian. Intelligent Watermarking Techniques. World Scientific,2004.
    [7]M. Wu, E. Tang, and B.Liu. Data hiding in digital binary image.IEEE Int. Conf. Multimedia & Expo (ICME'00), New York,2000.
    [8]F. Hartung and M. Kutter. Multimedia watermarking techniques.Proc, IEEE,,vol. 87:1079-1107, July 1999.
    [9]I.J. Cox, M.L. Miller, and J.A. Bloom. Digital Watermarking. San Mateo, CA:Morgan Kaufmann,2001.
    [10]M. Wu, H. Yu, and B.Liu. Data hiding in images and videos:Part Ⅱ-Designs and applications. IEEE Trans. Image Processing, vol.12:696-705,June 2003.
    [11]P.S.L.M. Barreto,H.Y. Kim, V. Rijmen. Toward secure public-key block wise fragile authentication watermarking. IEEE Proc. Vision Image Signal Process.149 (2):57-62,2002.
    [12]M. Kutter. Digital Image Watermarking:Hiding Information In Images.PhD thesis, EPFL, Lausanne, Switzerland,1999.
    [13]S.P. Mohanty. Digital Watermarking:A Tutorial Review. Dept of Comp Sc and Eng. Unversity of South Florida,1999.
    [14]李水根,吴纪桃.分形与小波.北京:北京科学出版社,2002.
    [15]M.F. Barnsley and L.P. Hud. Fractal Image Compression. AK Peters, Ltd.,Wellesley, Massachusetts,1993.
    [16]M.F. Barnsley. Fractal functions and interpolation. Constructive Approximation, Vol.2, No.1,303-329,1986.
    [17]M.F. Barnsley. Fractals Everywhere.Academic Press Professional, Cambridge,1993.
    [18]LI Xin-Fu, LI Xiao-Fan. An Explicit Fractal Interpolation Algorithm for Reconstruction of Seismic Data. Chinese Physics Letters, Vol.25,No.3,1157-1159,2008.
    [19]Jacquin A E A novel fractal block-coding technique for digital images.1990.
    [20]M.F. Barnsley and S.Demko.Iterated function systems and the global construction of fractals. Proceedings of the Royal Society of London, A399:243-275,1985.
    [21]孙洪泉.分形几何及其分形插值研究.河北工业大学学报,2002.
    [22]P.R. Massopust. Fractal Functions, Fractal Surfaces, and Wavelets.Academic Press, San Diego,1994.
    [23]韦岗.混沌、分形理论与语音信号处理.电子学报,1:34-39,1996.
    [24]张济忠.分形.北京:清华大学出版社,1995.
    [25]陈亮,张雄伟.基于分形维数实现语音分割和增强.北京邮电大学学报,6:112-115,2003.
    [26]陈琦,王炳锡.一种基于DCT变换的语音数字水印算法研究.信号处理,17(3):238-241,2001.
    [27]S.Voloshynovskiy, S.Pereira, T. Pun, J.Eggers, J.K. Su. Attacks on Digital Watermarks:Classification,Estimation-Based Attacks,and Benchmarks.IEEE Communications Magazine, vol.39, issue 8:118-126, Aug,2001.
    [28]I. Cox, M. Miller and J. Bloom, "Digital Watermarking",Morgan Kaufmann Publishers, San Francisco, CA,2003.
    [29]Venkatesan R, Jakubowski M. Image watermarking with better resilience. In:Proceeds ICIP 2000,2000.
    [30]ISO/IEC 15444. Information technology JPEG2000 image coding system:Part 1.Core coding system,2000.
    [31]何琴,邹华兴,白剑.基于小波变换的语音信息隐藏算法.计算机应用研究,,22(12):118-119,2005.
    [32]刘峰,苏育挺,张春田.MPEG-2码流中的数字水印.Trans.Fundamentals, Vol. E83-A,No.1,Jan 2000.
    [33]J. Haitsma, T. Kalker, F. Bruekers. Audio watermarking for monitoring and copy protection. Proc. ACM Multimedia Workshop, Marina Del Ray, CA,119-122,2000.
    [34]王文圣,丁晶,向红莲.小波分析在水文学中的应用研究及展望.水科学进展.Vol113,No14,Jul,2002.
    [35]X.G. Xia, C.G. Boncelet, G.R. Arce.Wavelet transform based watermark for digital images.Optics Express, vol.3:497-511,Dec.1998.
    [36]Mallat S"Wavelet Tour of Signal Processing,"Academic Press, San Diego, CA,2001.
    [37]T. Kalker. Considerations on watermarking security. Proc. IEEE 4th Workshop Multimedia Signal Processing,201-206,2001.
    [38]M.D.Swanson, B.Zhu, A.H. Tewfik, L.Boney. Robust audio watermarking using perceptual masking. Signal Processing, vol.66:337-355,May 1998.
    [39]M.F. Mansour and A.H. Tewfik. Secure detection of public watermarks with fractal decision boundaries.Proc. Eur. Signal Processing Conf (EUSIPCO), Vol.1:295-298,2002.
    [40]Lee C-H, Lee H-K. Geometric attack resistant watermarking in wavelet transform domain. Opt Express,13:1307-21,2005.
    [41]M. Akbas.Zero-assigned Filter Banks and Wavelet. Ms.Sc. Thesis, Electrical and Electronics Engineering Department, Bilkent University,2001.
    [42]M.J Lai.On the Digital Filter Associated with Daubechies Wavelet. IEEE Transactions on Signal Processing, vol.43,No.9:2203-2205,1995.
    [43]P. Meerwald, A. Uhl.A survey of wavelet-domain watermarking algorithms. Proceedings of SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents III. Volume 4314, San Jose, January 2001.
    [44]秦兵、沙宗先.连续小波变换在语音分形特征以及语音分割中的应用.重庆第三届人机通讯会议.1994.
    [45]Hisashi, Inoue. A Digital Watermark method using the Wavelet Transform for Video Data. IEICE,2000.
    [46]Shuenn-ShyangWang, Sung-Lin Tsai.Automatic image authentication and recovery using fractal code embedding and image inpainting. Department of Electrical Engineering, Taturig University, May 2007.
    [47]高尚兵,张建伟,夏德深.DCT域的分形图像编码算法的改进.计算机工程,,32(23):221-223,2006.
    [48]沙济彰,冯忠义,曹宁.分形图像编码的IFS方法及其发展.8:27-29,2000.
    [49]吴慎山,吴东芳.信息安全与信息隐藏技术.河南科技学院学报(自然科学版).2005.
    [50]黄继武,程卫东.DT域图像水印:嵌入对策和算法.电子学报28(4):386-389,2000.
    [51]石磊,耿红琴.一种基于分形编码的小波域自适应水印.小微型计算机系统,12:2254-2257,2004.
    [52]刘九芬,黄达人,胡军全.数字水印中的正交小波基.电子与信息学报25(4),2003.
    [53]尹秀丽,张玉杰,张崇.基于四叉树小波分形的医学图像压缩.影像技术,6:34-36,2005.
    [54]郭欢基于小波域的分形图像压缩武汉理工大学学报.27-28,2005.
    [55]J.P. Antoine, P. Vandergheynst. Two-dimensional directional wavelets in image processing. Int. J.Imag. Syst. Technol.,Vol.7:152-165,1996.
    [56]G. Gibert, G. Bailly & F. Elisei.Evaluating a virtual speech cuer.2006.
    [57]全笑梅,张鸿宾.基于小波包域听觉感知分析的统计音频水印算法.电子学报,Vol.35,No.4,Apr 2007.
    [58]王潇,柏森,袁晓芳.一种小波域新颖鲁棒语音扩谱水印.微电子学与计算机,2006.
    [59]潘月秋,戴振宇,卞喜玉.音频压缩编码技术分析.齐齐哈尔大学学报.Vol.21.No.4.Dec,2005.
    [60]张涛,李海,全浩军.AC-3编码器中的高效比特分配算法.天津大学学报.Dec,2009.
    [61]许慧.基于小波包变换的数字水印技术.长沙:湖南大学,2008.
    [62]Arnold, M. Audio watermarking:features, applications and algorithms. IEEE International Conferenc Multimedia and. Expo, vol.2:1013-1016,2000.
    [63]JI Bing, ZHANG De, JI Xiaoyong. A novel audio watermarking scheme using multi-scale wavelet modulation. Progress in natural science,14(8),2004.
    [64]LI Xueyao, ANG Min, N Shiliang. Adaptive audio watermarking algorithm based on SNR in wavelet domain[J].IEEE Signal Processing Magazine,20:287-292,2003.
    [65]Abdelhamid B.,T. Nana, A.C.Pascu. Measuring Watermarking Robustness Using Fractal Dimensions. Journal of Communication and Computer, Vol.7, No.1,Jan,2010.
    [66]P. Jessop.The business case for audio watermarking. ICASSP,2077-2080,1999.
    [67]Potros Maragos.Fractal Aspects of Speech Signals Dimension and Interpolation. IEEE 8p:417-420,1991.
    [68]T. Vynne, F. Jordan. Embedding a Digital Signature in a Video Sequence using Motion Vectors. Submitted to ICIP 96, No.869792 filed on Jun,1997.
    [69]Yuta Nakashima, Ryuki Tachibana, and Noboru Babaguchi.Watermarked Movie Soundtrack Finds the Position of the Camcorder in a Theater. IEEE Trans.on Multimedia. Volume 11,Issue 3:442-454, April 2009.
    [70]C.Y. Lin, S.F. Chang. Issues and Solutions for Authenticating MPEG Video.IEEE: 54-65,1999.
    [71]A. Johnson, M. Biggar. Transform Permuted Watermarking for Copyright Protection of Digital Video.Globecom 98,Sydney, Australia,8-12 Nov.1998.
    [72]T. Kalker, G. Depovere, J. Haitsma, M. Maes. A video watermarking system for broadcast monitoring.Wong, Delp(10):103-112,1999.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700