用户名: 密码: 验证码:
灰度图象数字水印的研究与应用
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数字水印是保护数字作品版权,防止数字作品篡改和非法传播等的一门技术。从1990年提出至今,有关这方面的研究倍受科技工作者和广大用户的重视,已成为国内外研究的热门课题之一,研究成果也层出不穷。但是数字水印技术远未成熟,许多问题亟待解决。
     本文重点对灰度图象数字水印技术进行研究,主要工作如下:
     1) 鉴于目前数字水印的理论研究比较薄弱的现状,本文通过分析数字水印的特点,建立了一个数字水印的数学模型,为进一步研究数字水印打下了基础;
     2) 根据以上建立的模型,通过引入容量和稳健度的概念为数字水印提供了一个客观评价方法,并对一些数字水印算法进行了分析;
     3) 为增强数字水印抵抗几何攻击的能力,研究了受几何攻击的图象的复原问题,并给出了一个计算图象几何变换参数的方法;
     4) 通过分析图象灰度插值算法和Haar小波变换的特点,结合HVS的掩蔽效应,设计了一个公开的有意义数字水印算法,实验结果表明本算法具有较强的稳健性;
     5) 目前许多水印算法都是通过在空域或频域修改象素值的方法嵌入水印的,这种方法面临着透明性和稳健性的矛盾,为解决这个矛盾,本文提出以图象的某些稳定的数字特征为水印的观点,并结合Hermite矩阵的特点设计了相应的水印算法,实验结果表明该算法具有较好的稳健性。
Digital watermarking is a technique which can protect the copyright of multimedia data and prevent digital material from being tampered and distributed unauthorizedly etc. Digital watermarking can be traced back as far as 1990. Since that time, it has won more and more recognition from scholars and consumers, and a number of watermarking technologies have been developed and deployed for a variety of applications. Now digital watermarking has become a very active area of research. But, though considerable process has been made in the last ten years, digital watermarking is still in its infancy, and much interesting work remains to be done
    This thesis addresses some problems in the gray-scale image digital watermarking that are summarized below:
    1) Whereas the basic theory of digital watermarking is still very poor, a digital watermarking mathematic model based on imperceptibility and robustness is presented by analysising the characteristic of digital watermarking;
    2) Based on the model constructed above, by defining the measures of capacity and robustness of digital watermarking, an objective method for evaluating the digital watermarking is introduced and used to analysis some algorithms;
    3) Whereas geometric distortion always influences the restoration of watermark, we advocate to enhance the robustness against geometric distortion by restoring the image which has been distorted by geometric transformation, and a method is designed for estimating the parameters of geometric transformation;
    4) Based on the conclusion discussed above, and combined with the masking effects of HVS, a novel public meaningful gray-scale image digital watermarking is designed by analysising the characteristics of image gray-scale interpolation and Haar wavelet transformation. The experimental results show that the method is indeed powerful;
    5) Whereas many image digital watermarking schemes, which embed watermark by modifying the values of pixels in spatial domain and transformed domain, are confronted with the conflict between the imperceptibility and robustness, we advocated to use some stable digital characteristics of host image as watermark and a algorithm based on Hermite matrix is designed. The experimental results show the proposed algorithm is effective.
引文
[1] A.B.Waston, G.Y.Yang, J.A.Solomon, and J.Villasenor, "Visibility of wavelet quantization noise," IEEE Trans. Image Processing, vol. 6, pp.1164-1174, 1997.
    [2] M. Wu and B. Liu, "Data hiding in image and video: part 1—fundamental issues and solutions," IEEE Trans. Image Processing, vol. 12, pp.685-695, 2003.
    [3] 周亚训,叶庆卫,许铁峰.基于二值运算的数字图象水印嵌入与检测算法,计算机辅助设计与图形学学报,vol.14,pp.148-152,2002.
    [4] M. U. Celik, G. Sharma, E. Saber, and A. M. Tekalp, "Hierarchical watermarking for secure image authentication with localization," IEEE Trans. Image Processing, vol. 11, pp. 585-594, 2002.
    [5] 易开祥,石教英.自适应二维数字水印系统,中国图象图形学报,vol.6(A),pp.444-449,2001.
    [6] 潘蓉,高有行.基于小波变换的图象水印嵌入方法,中国图象图形学报,vol.7(A),pp.667-671,2002.
    [7] 张力,韦岗.一种基于图象内容的小波域鲁棒水印技术,中国图象图形学报,vol.7(A),pp.975-979,2002.
    [8] A. Nikolaidis and I. Pitas, "Region-based image watermarking," IEEE Trans. Image Processing, vol. 10, pp. 1726-1739,2001.
    [9] P. Moulin and M. K. Mihcak, "A framework for evaluating the data-hiding capacity of image source," IEEE Trans. Image Processing, vol, 11, pp. 1029-1042, 2002.
    [10] 孙锐,孙洪,姚天任.多通道的小波域彩色图象水印算法,计算机辅助设计与图形学学报,vol.15,pp.992-997,2003.
    [11] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Processing, vol. 6, pp. 1673-1686, 1997
    [12] 宋玉杰,谭铁牛.基于脆弱性数字水印的图象完整性验证研究,中国图象图形学报,vol.8(A),pp.1-7,2003.
    [13] 刘瑞祯,王蕴红,谭铁牛.基于图象内容的数字水印模型,中国图象图形学报,vol.6(A),pp.558-562,2001.
    [14] 张力,韦岗.闭环图象数字水印技术,中国图象图形学报,vol.7(A),pp.968-974,2002.
    [15]张鸿宾,张素娟.基于嵌入式小波编码的数字图象水印算法,中国图象图形学报,vol.7(A),PP.105-110,2002.
    [16] 徐军,叶澄清,向辉.基于神经网络分类的图象数字水印算法。模式识别与人工智能,vol.14,pp.261—264,2001.
    [17] 丁玮,闫伟齐,齐东旭.基于U系统的数字图象水印技术,中国图象图形学报,vol.6(A),pp.552-557,2001.
    [18] 张军,乇能超,施保昌.基于混沌映射和遗传算法的公开数字水印技术,模式识别与人工智能,vol.15,pp.42—47,2002.
    
    
    [19] C. S. Lu, H. Y. M. Liao and M. Kutter, "Denoising and copy attacks resilient watermarking by exploiting prior knowledge at detector," IEEE Trans. Image Processing, vol. 11, pp. 280-291, 2002.
    [20] Y. Wang, J. F. Doherty, and R. E. V. Dyck, "A wavelet-based watermarking algorithm for ownership verification of digital image," IEEE Trans. Image Processing, vol. 11, pp. 77-87,2002.
    [21] M. Wu, H. Yu, and B. Liu, "Data hiding in image and video: partll—designs and applications," IEEE Trans. Image Processing, vol. 12, pp. 696-704,2003.
    [22] 易开祥,石教英,孙鑫.数字水印技术研究进展,中国图象图形学报,vol.6(A),pp.111-117,2001.
    [23] A. B. Watson and J. A. Solomon, "A model of visual contrast gain control and pattern masking," [online] available:citeseer, ist. psu.edu.
    [24] P. C. Teo and D. J. Heeger," Perceptual image distortion, "[online] available: citeseer, ist. psu. edu.
    [25] 孙鑫,易开祥,石教英,费敏锐.公开钥数字水印系统研究,计算机辅助设计和图形学学报,vol.7,pp.875-879,2003.
    [26] M. Barni, F. Bartolini, V. Cappellini and A. Piva, "A dct-domain system for robust image watermarking, "Signal Processing, vol. 66, pp. 357-372, 1998.
    [27] J. J. K. ?.Ruanaidh and T. Pun, "Rotation, scale and translation invariant spread spectrum digital image watermarking," Signal Processing, vol. 66, pp. 303-317, 1998.
    [28] J. Tzeng, W. L. Hwang, and I. L. Chern, "Enhancing image watermarking methods with/without reference images by optimization on second-order statistics," IEEE Trans. Image Processing, vol. 11, pp. 771-782, 2002.
    [29] I. J. Cox and M. L. Miller, "The first 50 years of electronic watermarking", [online] available:citeseer.ist.psu.edu.
    [30] L. M. Marvel, C. Boncelet, Jr., and C. T. Retter, "Spread spectrum image steganography," IEEE Trans. Image Processing, vol. 8, pp. 1075-1083,1999.
    [31] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn. "Information hiding—a survey," Proceedings of the IEEE, vol. 87, NO.7,1999. [online] available:citeseer.ist.psu.edu.
    [32] 胡荣,陈健.数字图象的水印技术,上海交通人学学报,vol.35,pp.951.954,2001.
    [33] 李艳芳.数字水印及其应用,现代计算机,vol.135,pp.44-46,2002.
    [34] 钟桦,刘芳,焦李成.一种有意义水印盲提取算法,中国图象图形学报,vol.7(A),pp.1000-1004.2002.
    [35] C. J. van den B. Lambrecht, J. E. Farrell, "Perceptual quality metric for digital coded color images" , [online] available:citeseer.ist.psu.edu.
    [36] J. F. Delaigle, C. D. Vleeschouwer, and B. Macq, "Watermarking algorithm based on a human visual model," Signal Processing vol. 66, pp. 319-335, 1998.
    [37] M. Ramkumar, A. N. Akansu, and A A. Alatan, "A robust data hiding scheme for images uding DFT," [online] available:citeseer.ist.psu.edu.
    [38] A. Z. Tirkel, G. A. Rankin, R. M. van Schyndel, W.J. Ho, N. R. A. Mee, and C. F. Osborne,
    
    "Electronic water mark," [online] available:citeseer.ist.psu.edu.
    [39] C, S. Lu, H. Y. M. Liao, S. K. Huang, and C. J. Sze, "Cocktail watermarking on images," [online] available:citeseer.ist.psu.edu.
    [40] A. G. Boars and I. Pitas, "Image watermarking using DCT domain constraints," [online] available:citeseer.ist.psu.edu.
    [41] R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, "A digital watermark," [online] available:citeseer.ist.psu.edu.
    [42] I. J. Cox, M. L. Miller, and J. A. Bloom, "Watermarking applications and their properties," [online] available:citeseer.ist.psu.edu.
    [43] 崔锦泰著,程正兴译,小波分析导论,西安交通大学出版社,1997.
    [44] St?phane Mallat著,杨力华等译,信号处理的小波导引,机械工业出版社,2003.
    [45] 程正兴,小波分析算法与应用,西安交通大学出版社,2001.
    [46] Kenneth.R.Castleman著,朱志刚等译,数字图象处理,电子工业出版社,1998.
    [47] 孙家广,杨长贵等,计算机图形学,清华大学出版社,1998.
    [48] S.C.Katzenbeiseer,F.A.P Petitcolas著,吴秋新等译,信息隐藏技术:隐写术与数字水印,人民邮电出版社,2001。
    [49] 章毓晋,图象处理和分析,清华大学出版社,2003.
    [50] B. Vidakovic, "Statistical modeling by wavelets", John Wiley & Sons, INC. 1999.
    [51] 王耀明,图象的矩函数——原理、算法和应用,华东理工大学出版社,2002.
    [52] 孙文爽和陈兰祥,多元统计分析,高等教育出版社,1994.
    [53] 孙继广.矩阵扰动分析(第二版),科学出版社,2001.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700