用户名: 密码: 验证码:
数字水印技术在图像认证和版权保护上的应用
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数字图像和视频由于可以方便的编辑、存储、传输和使用,越来越广泛应用于当今社会。但也出现了篡改信息和破坏信息的现象,因此如何在网络环境下实现有效的版权保护和信息安全已成为一个重要的现实问题。
     论文中提出一种JPEG图像内容认证的新颖水印算法。图像认证方法是基于一种半脆弱特征,这种半脆弱特征具有区分“内容保持”和“恶意篡改”的能力。因此我们提出的算法可以确定和定位攻击。
     还提出一种应用于版权保护的鲁棒水印算法。利用通信理论中的信道估计原则,用提取出的参考水印和已知的参考水印对信道进行估计,并根据贝叶斯(Baves)决策理论,对提取出的水印进行决策,以提高水印的鲁棒性。
Digital images and videos are more and more widely used in nowadays society. They are much more convenient in editing, storing, transmitting and usage. But unfortunately, due to the malicious modification, digital media become unsafe. Therefore, effective copyright protection and multimedia security are becoming a highlight.
    In this thesis, a novel approach to content authentication for JPEG images is proposed. The image authentication method is based on a semi-fragile feature. Our proposed scheme has the capability of differentiating "content preserving" modifications from "malicious" attacks and so can ascertain and locate the "malicious".
    Also, we proposed a robust watermarking algorithm for copyright protection. We employ channel estimation principles to improve the performance of robust watermarking. A binary symmetric channel (BSC) model of the watermark channel is introduced to more accurately characterize signal tampering. By relying on statistical Bayes decision theory, we make decisions on the extracted watermark to further improve the performance.
引文
1. Yuewei Dai, Stefan Thiemert, Martin Steinbach, Enric Hauer, Jana Dittmann. Feature-based watermarking scheme for MPEG-Ⅰ/Ⅱ video authentication. Conference on Security, Steganography, and Watermarking of Multimedia Contents Ⅵ, part of the IS&T/SPIE Symposium on Electronic Imaging 2004, 18-22 January 2004 in San Jose, CA USA (has been accepted)
    2. Jinshen Wang, Yuewei Dai, Stefan Thiemert, Zhiquan Wang. A feature-watermarking scheme for JPEG image, authentication. International Workshop On Digital Watermarking 2003, 20-22 October 2003 in Seoul, Korea. And will be published by Springer-Verlag in the LNCS series.
    3. Jessica Fridrieh. Security of Fragile Authentication Watermarks with Localization, Proc. SPIE Photonic West, Vol. 4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents Ⅳ, San Jose, California, January, 2002, pp. 691-700.
    4. Ching-Yung Lin and Shih-Fu Chang, Semi-Fragile Watermarking for Authenticating JPEG Visual Content, SPIE Security and Watermarking of Multimedia Contents Ⅱ, EI '00, San Jose, CA, Jan. 2000.
    5. Mehmet U. Celik , Gaurav Sharma, A. Murat Tekalp and Eli Saber. Video authentication with self-recovery. Video Authentication with Self-Recovery, Proceedings of SPIE, Security and Watermarking of Multimedia Contents Ⅳ, January 2002.
    6. Ching-Yung Lin and Shih-Fu Chang, Issues and Solutions for Authenticating MPEG Video, SPIE Security and Watermarking of Multimedia Contents, EI'99, San Jose, CA, Jan. 1999.
    7. Kuato Maeno, Qibin Sun, Shih-Fu Chang, Masayuki Suto. New semi-fragile image authentication watermarking techniques, using random bias and non-uniform quantization. Proceedings of SPIE, Security and Watermarking of Multimedia Contents Ⅳ, Vol.4675. Jan., 2002. pp. 659~670
    8. Iwan Setyawan, Reginald L. Lagendijk. Low bit-rate video watermarking using temporally extended differential energy watermarking (DEW) algorithm. Proceedings of the SPIE. SPIE Security and Watermarking of Multimedia Contents Ⅲ, San Jose, Jan. 21-26, 2001
    9. A. Hanjalic, G.C. Langelaar, P.M.B. van Roosmalen, J. Biemond, R.L. Lagendijk. Image and video databases: restoration, watermarking and retrieval. First edition, Netherlands, ISBN: 0444505024.
    10. Dittmann,, Jana, Stabenau, Mark, Steinmetz, Ralf: Robust MEG Video Watermarking Technologies, Proceedings of ACM Multimedia'98, The 6th ACM International Multimedia Conference, Bristol, England, pp. 71-80
    11. J. Dittmann, A. Mukherjee, M. Steinebach, Media-independent Watermarking Classification and the need for combining digital video and audio watermarking for media authentication, Proceedings of the International Conference on Information Technology: Coding and Computing, 27 - 29 March, Las Vegas,
    
    Nevada, USA, pp. 62-67, IEEE Computer Society, ISBN 0- 7695 - 0540 - 6, 2000
    12. Jana Dittmann, Martin Steinbach. Joint watermarking of audio-visual data. 2001 IEEE Fourth Workshop on Multimedia Signal Processing, October 3 - 5, Cannes France, IEEE, Piscataway, NJ, USA, pp. 601 - 606, ISBN 0-7803-7025-2, 2001
    13. Bijan G. Mobasseri, Aaron T. Evans. Content-dependent video authentication by self-watermarking in color space. Proceedings of the SPIE. SPIE Security and Watermarking of Multimedia Contents Ⅲ, San Jose, Jan. 21-26, 2001
    14. Lisa M. Marvel, George W. Hartwig , Jr. and Charles Boncelet, Jr. Compression-compatible fragile and semi-fragile tamper detection. Proceedings of the SPIE. SPIE Security and Watermarking of Multimedia Contents Ⅲ, San Jose, Jan. 21-26, 2001
    15. Eugene T. Lin , Christine Ⅰ. Podilchuk , Edward J. Delp. Detection of image alterations using semi-fragile watermarks. Proceedings of the SPIE. International Conference on Security and Watermarking of Multimedia Contents Ⅱ, Vol. 3971, January 23 - 28, 2000, San Jose, CA.
    16. Chun-shien Liu, Hong-Yuan Mark Liao , and Chwen-Jye Sze. Combined watermarking for image authentication and protection. Proc. 1st IEEE Int. Conf. on Multimedia and Expo, New York City, NY, USA, Vol. Ⅲ, pp. 1415-1418, Jul. 30~Aug. 2, 2000
    17. Dinu Coltue, Philippe Bolon, Jean-Marc Chassery. Fragile and robust watermarking by histogram specification. Proc. SPIE Photonic West, Vol. 4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents Ⅳ, San Jose, California, January, 2002, pp. 701-710.
    18. Chih-wei Tang and Hsueh-ming Hang. An image feature based robust digital watermarking scheme. Proceedings of SPIE, Security and Watermarking of Multimedia Contents, Vol.4675. Jan., 2002. pp. 584~595
    19. Ping Wah Wong, Nasir Memon. Secret and public key authentication watermarking schemes that resist vector quantization attack. Proceedings of SPIE, Security and watermarking of multimedia contents Ⅱ, 2000. pp. 417~427
    20. M.M. Yeung and E Mintzer, An invisible watermarking technique for image verification. Proceedings of ICIP, Oct., 1997.
    21. Peng Yin, Hong Heather Yu. Classification of video tampering methods and countermeasures using digital watermarking. Invited paper for SPIE's International Symposium: ITCOM 2001, Denver, Colorado, USA, 2001.
    22. Bruce Schneier. Applied cryptography—protocols, algorithms, and source code in C. John Wiley & Sons, Inc. 1996
    23. Ingmar J. Cox, Matthew L. Miller, Jeffrey A. Bloom. Digital Watermarking. An Imprint of Academic Press. 2002.
    24. Ching-Yung Lin.Watermarking and Digital Signature Techniques for Multimedia Authentication and Copyright Protection. Ph.D thesis.
    25. Deepa Kundur. Multiresolution Digital Watermarking: Algorithms and Implications for Multimedia Signals. Ph.D thesis.
    26. W. Diffie and M. E. Hellman. New Directions in Cryptography. IEEE Trans. On
    
    Information Theory, Mol.22, No. 6, pp.644-654, Nov 1976.
    27. G. L. Friedman. The Trustworthy Digital Camera: Restoring Credibility to the Photographic image. IEEE Trans. on Consumer Electronics. Vol.39, No.4, pp.905-910, November 1993.
    28. I. J. Cox, J. Killian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. Tech. Rep. 95-10, NEC Research Institute, 1995.
    29. I. Pitas. A method for signature casting on digital images. Proc. IEEE Int. Conference on Image Processing, vol. 3, pp. 215-218, 1996.
    30. M. D. Swanson, B. Zhu, and A. H. Tewfik. Transparent robust image watermarking. Proc. IEEE Int. Conference on Image Processing, vol. 3, pp. 211-214, 1996.
    31. F. Hartung and B. Girod. Fast public-key watermarking of compressed video. Proc. IEEE Int. Conference on Image Processing. Vol. 1, pp. 528-531, 1997.
    32. S. Haykin. Communication Systems. Toronto: John wiley &Sons, Inc., third ed., 1994.
    33. R. B. Wolfgang and E. J. Delp. A watermarking for digital images. Proc. IEEE Int. Conference on Image Processing, vol.3, pp. 219-222, 1996.
    34. I. J. Cox, J. Killian, T. Leighton and T. Shamoon. Secure spread spectrum watermarking for multimedia. Tech. Rep. 95-10, NEC Research Institute, 1995.
    35. R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne. A digital watermark. Proc. IEEE Int. Conference on Image Processing, vol. 2, pp. 86-90, 1994
    36. J. R. Smith .and B. O. Comiskey. Modulation and information hiding in images. Proc. First Int. Workshop on Information Hiding (R. Anderson, ed.), no. 1174 in Lecture Notes in Computer Science, pp. 207-226, May/June 1996.
    37. F. Hartung and B. Girod. Digital watermarking of raw and compressed video. Proc. SPIE, Digital Compression Technologies and Systems for Video Communication, vol. 2952, pp. 205-213, October 1996.
    38. A. Z. Tirkel, C. E Osborne, and R. G. van Schyndel. Image watermarking- a spread spectrum application. Proc. IEEE Int. Symposium on Spread Spectrum Techniques and Applications, vol. 2, pp. 785-789, 1996.
    39. I. J. Cox and J. P.M.G. Linnartz. Public watermarks and resistance to tampering. Proc. IEEE Int. Conference on Image Processing, vol. 3, pp. 13-16, 1997.
    40. A. Piva, M. Barni, F. Bartolini and V. Cappellini. DCT-based watermark recovering without resorting to the uncorrupted original image. Proc. IEEE Int. Conference on Image Processing, vol. 1, pp. 520-523, 1997.
    41. W. Zhu, Z. Xiong and Y.-Q. Zhang. Multiresolution watermarking for images and video: A unified approach. Proc. IEEE Int. Conference in Image Processing, vol. 1, 1998.
    42. D. Kundur and D. Hatzinakos. Digital watermarking using multiresolution wavelet decomposition. Proc. IEEE Int. Conference on Acoustics, Speech and Signal Processing, vol. 5, pp. 2069-2972, 1998.
    43. B. Chen and G. W. Wornell. Digital watermarking and information embedding using dither modulation. Proc. IEEE Workshop on Multimedia Signal Processing, 1998.
    
    
    44. D.Kundur, D.Hatzinakos. A Robust Digital Image Watermarking Method Using Wavelet-based Fusion. Proceedings of the International Conference on Image Processing. 1997:544~547
    45. C. Fei, D. Kundur and R. H. Kwong. Transform-Based Hybrid Data Hiding for Improved Robustness in the Presence of Perceptual Coding. Mathematics of Data/Image Coding, Compression and Encryption Ⅳ, with Applications, M. S. Schmalz, ed., Proc. SPIE (vol. 4475), San Diego, California, pp. 203-212, July 2001.
    46. Voloshynovskiy, F. Deguillaume, S. Pereira and Thierry Pun. Optimal adaptive diversity watermarking with channel state estimation. IS&T/SPIE's 13th Annual Symposium, Electronic Imaging 2001: Security and Watermarking of Multimedia Content Ⅲ, SPIE Proceedings, San Jose, California USA, 23-27 January 2001.
    47. Ingemar J. Cox, Matthewl L. Miller, AND Andrew L. Mckellips. Watermarking as Communications with Side Information. Procedings of the IEEE. Vol.87, No.7, July 1999
    48. F.Hartung and M.Kutter . Multimedia Watermarking Techniques. Proc. IEEE. Jul. 1999. vol.87(7). 1097-1107
    49. M. Barni, F. Bartolini, A. De Rosa and A. Piva. Capacity of the Watermark-Channel: How Many Bits Can Be Hidden Within a Digital Image?. SPIE Conf. On Security and Watermarking of Multimedia Contents, Vol. 3657, pp. 437-448, San Jose, January 1999.
    50. M. Rarnkumar and A. N. Akansu. A Capacity Estimate for Data Hiding in Internet Multimedia. Symposium on Content Security and Data Hiding in Digital Media, NJIT, Jersey City, May 1999.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700