用户名: 密码: 验证码:
数字水印算法研究及其在公安图像处理系统中的应用
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
在公安刑侦及法庭判案领域中,数字图像作为重要的证据,其真实性和完整性
     直接影响到执法结果。随着数字图像处理技术的快速发展,对数字图像进行处理
     修改变得越来越容易,处理效果也越来越逼真。蓄意修改图像证据的内容以便遮
     掩事实得到期望的断案结果通常被称为恶意篡改,其后果的严重性已经受到有关
     部门的关注。因此,公安刑侦图像证物的篡改提示这一课题亟待解决。
     鉴别图像是否被篡改,嵌入水印是行之有效的方法。本文就是以数字水印技
     术为基础,展开这个课题的研究。通过调研发现:用于证据图像篡改提示的数字
     水印,对图像细微的更改要具有高灵敏度,对常规的图像处理(如:滤波,亮度
     增强)要具有一定的容忍度。针对这两个特点,本文在对现有的数字水印算法及
     相关技术进行了大量分析、研究的基础上提出了两个改进算法,分别满足图像证
     物水印的不同要求:
     (1)基于LU矩阵分解和Arnold置乱变换的空域水印算法;
     (2)基于JND的小波域水印算法。
     同时,结合实际应用,开发出水印嵌入及提取模块,将其添加在公安刑侦图像
     处理软件中并投入使用,达到了预期效果。
With the rapid development of digital images processing, It turns to be easy to modify digital images and the result is more and more similar to the original images. As the most important evidence, the images always decided the result that made by policemen and judges. The illegal modification of images could get the expected result. The serious infection was focused on by policemen and the departments concerned and should be solved urgently.Fragile watermark is the efficient way to judge whether the images were changed or not. The dissertation research the issue based watermark. Firstly, I investigated the forensic images and get results that the watermark in forensic images should be fragile and they should found the tiny change in images, on the other hand the watermark should be robust to some common image process, for example, adjust brightness and filter. After that, I found out a lot of watermark arithmetic and do research on them. Finally, two method were bring out aim at the two attributes:(1) the watermark based LU decomposition and Arnold transfer.(2) the watermark based JND and wavelet decomposition. They were put into works and run well.
引文
[1] 刘瑞祯,谭铁牛,数字水印研究综述,通信学报,2000,21,39-49
    [2] Ingemar J. Cox, Matthew L. Miller, Digital Watermark, 王颖,黄志蓓译,第一版,2003,电子工业出版社,102-143
    [3] 陈明奇,钮心忻,杨义先,数字水印的研究进展和应用,通信学报,2001,22,71-79
    [4] Jana Dittmann, Mark Stabenau and Ralf Steinmetz, Robust MPEG Video Technologies, Proc, Of the 6th ACM International Conference on Multimedia, 1998, 71-80
    [5] Ingemar J. Cox, Joe Killian, F Thomson and Talal Shamoon, Secure Spread Spectrum Watermarking for Multimedia, IEEE Trans. On Image Processing, 1997, 6, 1673-1687
    [6] Xia Xiang-Gen, Charles G. Boncelet and Gonzalo R. Arce, A Multiresolution Watermark for Digital Images, Proc. Of IEEE, 1997, 548-551.
    [7] Zeng Wndjun and Liu Bede, On Resolving Rightful Ownerships for Digital Images by Invisible Watermarks, Proc. Of IEEE, 1997, 552-555
    [8] Wengwu Zhu, Zixiang Xiong and Ya-Qin Zhang, Multiresolution Watermarking for Images and Video: A Unified Approach, Proc. Of International Conference on Image Processing, 1998, 1, 465-468
    [9] G. Voyatzis and I. Pitas, Chaotic Watermarks for Embedding in the Spatial Digital Image Domain, Proc. Of the IEEE, 1998, 432-436
    [10] Raymond B. Wolfgang, Christine I. Podilchuk and Edward J. Delp, Perceptual Watermarks for Digital Images and Video, Proc. Of the IEEE, 1999, 87, 1108-1126
    [11] R. G. Van Schyndel, A. Z. Tirkel and C. F. Osborne, A Digital Watermark, Proc. Of IEEE, 1994, 86-90
    [12] Gang Qu and Miodrag Potkonjak, Analysis of Watermarking Techniques for Graph Color Problem, roc. Of the 1998 IEEE/ACM International Conference on Computer-aided Design, 1998, 90-193
    [13] Mohan S. Kankanhalli, K. R. Ramakrishnan and Rajmohan, Content Based Wateramrking of Images, Proc. Of the 6 ACM International Conference on Multimedia, 1998, 61-70
    [14] Emil Praun , Hugues Hoppe and Adam Finkelstein , Robust Mesh Watermarking, Proc. Of SigGraph, 1999, 99, 49-56
    [15] Ryutarou Ohbuchi, Hiroshi Masuda, and Masaki Aono, Watermarking Three-Dimensional Polygonal Models Through Geometric and Topological Modifications, IEEE Hournal on Selected Areas in Communications, 1998, 16, 551-560
    [16] M. J. B. Maes and C. W. Van Overveld, Digital Watermrking by Geometric Warping, Proc. Of IEEE International Conference on Image Processing, 1998, 1, 424-426
    [17] Puate J. , Jordan F., Using Fractal Compression Scheme to Embedded a Digital Signature into An Image, Proc. Of SPIE, 1996, 345-349
    [18] J. Brassil, S. Low, N. Maxemchuk and L. 0' Gorman, Copyright protection for the electronic distribution of text document, Proc. IEEE, 1999, 7, 1181-1196
    [19] Turner L. F. , Digital data security system, Patent IPN W089/08915, 1989, 564-568
    [20] W. Bender, D. Gruhl and N. Morimoto, Techniques for Data Hiding, IBM Syst. J. , 1996, 35, 313-336
    [21] Deepa Kundur , Dimitrios Hatzinakos , Digital Watermarking Using Multiresolution Wavelet Decomposition, In Proceedings of IEEE ICASSP 1998, 5, 2969 - 2972
    [22] 牛夏牧,陆哲明,孙圣和,彩色数字水印嵌入技术,电子学报,2000, 28, 9,
     10-12
    [23] 刘九芬,黄达人,胡军全,数字水印中的正交小波基,电子与信息学报,2003,25,453-459
    [24] J. O Ruanaidh, T. Pun, Rotation Scale and Translation Invariant Spread Spectrum Digital Image Watermarking, Signal Processing, 1998, 303-317
    [25] VI Arnold, A Avez. Ergodic, Problems of Classical Mechanics Mathematical Physics Monograph Series, NewYork, WABen-jamin, Inc., 1968
    [26] 齐东旭,分形及其计算机生成,第一版,1994,科学出版社,143-145
    [27] 杜耀刚,Hilbert曲线及其应用,北京电子科技学院学报,2001,9,97-102
    [28] Fridrich J, Gol jan, Invertivble authentication watermark for JPEG images, Proc. Information Technology Coding and. computing, 2001, 8, 223-227
    [29] 胡云,赵辉,一种基于LU分解的脆弱水印算法,视频技术应用于工程,2003,254,67-69
    [30] Lewis A S , Knowles G, Image compression using the 2-D wavelettransformation, IEEE Trans. on Image Processing, 1992, 1, 244-250
    [31] 沈兰荪,卓力,田栋,汪孔桥,视频编码与低码率传输,第二版,2001,电子工业出版社,85-87

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700