基于混沌加密及HVS理论的数字图像盲水印算法的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
本文研究了基于混沌加密及HVS(Human Visual System)理论的数字图像盲水印算法,针对水印技术所要兼顾的鲁棒性和不可见性之间的矛盾,在整个嵌入过程中,采用各种技术尽量达到二者之间的折衷。文中进行了大量的仿真实验,实现了二值图像水印和灰度图像水印的嵌入和盲提取,并将各种攻击加入到含水印作品,从遭受攻击后的作品中提取出水印,通过对水印鲁棒性的分析验证算法的可行性。
     文章首先讨论了二值图像水印的嵌入算法。水印嵌入前,对水印进行混沌加密、置乱处理。嵌入过程利用提升小波变换在频域中进行,采用基于量化的抖动调制算法,并根据HVS理论考虑人眼视觉特性,自适应选取量化步长,完成二值图像水印的嵌入和盲提取。为提高水印的鲁棒性,本文在算法上进行了改进,在嵌入前又对水印进行了纠错编码,提取时进行解码,以便更好的提取出水印。在二值图像水印的基础上,又讨论了灰度图像水印的嵌入,应用位平面分解法嵌入灰度图像水印的重要信息,以兼顾水印的鲁棒性和不可见性。整个算法利用MATLAB仿真环境,实现数字图像水印的嵌入和盲提取,并仿真了水印在经受各种攻击后的提取情况,从实验结果上验证了本文所讨论的数字图像水印算法的可行性。最后,对全文进行了总结和展望。
With the growth of multimedia technology and digital network communication,the research of digital information security as well as multimedia copyrightprotection becomes an important issue. As a branch of information hidden, Digitalwatermark technology is an effective mean to resolve the issue of multimedia datacopyright protection.
     In this paper, digital image blind watermark algorithm based on chaosencryption and HVS theory is in depth study. The watermark embedding andextraction model is established, then the parts of the algorithm of model is intheoretical study. Simulation of the experiment realize the binary image embeddingand extraction. In order to test the feasibility of algorithm, watermark attackedextraction is simulated. Based on the analysis of simulation results, the furtherimproved algorithm is proposed. Compared to previous algorithm, the improvementhas stronger robustness. Finally, these theories is applied to the embedding andextraction of the gray image watermark.
     According to the traditional watermark technology, scrambling transformationis done before embedding in order to eliminate the spatial correlation among pixels.But the transformation usually has periodicity, the watermark can be restored bycertain iterative times. Based on these considerations, encryption is done beforescrambling transformation in order to enhance the security of watermark. In thispaper, Spatial-temporal chaotic sequence having the characteristic of initial valuesensitivity is used to encrypt. The binary chaotic sequence is generated by OCMLmodel and improved signal function method. Then sequence randomicity isapproved by experiment. The security of watermark can be enhanced by usingchaotic sequence for encryption
     The binary image and gray image are embedded into color image in this paper,the technology of embedding and extraction is adopted as follows:
     (1) The original color image is transformed into the YIQ color space,watermark is embedded into the Y luminance component of the YIQ.
     (2) The carrier image is transformed from space field to frequency field bylifting wavelet transform, the watermark is embedded into the wavelet domain.Comparing with the traditional wavelet transform, the lifting wavelet transform has many excellent characteristics, such as simple structure, lower calculation, inversetransform can be inversely realized directly, reversible integer to integer transform,save the memory space and calculation time.
     (3) The watermark is embedded into the color image using ditheringmodulation algorithm based on quantization. The main idea of algorithm is that thedifferent gray value of carrier image is quantized to the median of correspondingarea according to various quantization algorithms in different quantization condition.The method does not require the original carrier image to extract watermark, it is ablind watermark technique.
     (4) The HVS theory is applied to this paper in order to select quantization stepadaptively. The carrier image is analyzed according to the characteristic of HVS andmasking effect first, then select small quantization step to the smoothness and lowluminance field, the big quantization step to the texture and high luminance field.
     Using this theory, the watermark is embedded into the color image throughMATLAB simulative environment. In order to validate the robustness, add manyattacks to watermark image then extract watermark from the attacked image. Theresults show that the algorithm can withstand noise attack, zoom attack and daubingattack especial to the JPEG compress attack, but the ability of resisting circumrotateattack is lower, the robustness of filter attack, cut attack, luminance and contrastchange attack is not higher.
     Owing to the shortage existing in the algorithm, the improved algorithm isproposed, error-correcting codes theory is added to the former algorithm, this paperadopt hamming code, code before embedding, decode after extracting, the error bitscan be rectified in a certain using this theory, improve the robustness of thealgorithm.
     The binary image watermark has little information, in order to embed muchinformation, the paper study gray image watermark algorithm based on the binaryimage watermark. Decompose the gray image into many bit planes, the higher bitplanes with important information are embedded into the carrier image. The resultsshow this algorithm has stronger robustness to filter attack, luminance and contrastchange attack, daubing attack especial to noise attack, zoom attack and JPEGcompress attack, but feebler robustness to cut attack and circumrotate attack.
     To sum up, the paper study the binary image watermark technique, set up theembedding model and extraction model, adopt corresponding technique accordingto the different parts of model. The watermark embedding and extraction is realized through MATLAB simulative environment. The watermark which is attackedextraction is also simulated, According to the results of experiment, the improvedmethod is proposed to improve watermark robustness. At last, the gray imagewatermark algorithm is proposed based on the binary image watermark algorithmand special technology to gray image watermark. The experiment results show thatthe algorithm proposed in this paper has stronger robustness to the noise attack,zoom attack, daubing attack especial to JPEG compress attack, but the algorithm hassome shortage, such as the ability to resist cut attack and circumrotate attack isfeebler, so the author will improve the algorithm in the future.
引文
[1] J.Abbate. “The Electrical Century: Inventing the Web”. Proceedings of the IEEE,1999, 87(11): 1999-2002.
    [2] E.Koch, J.Zhao. “Towards robust and hidden image copyright labeling”. In Proc.1995 IEEE Workshop on Nonlinear Signal and Image Processing, IEEE, NeosMarmaras, Greece, Jun, 1995: 452-455.
    [3] J.J. Quisquater, O.Bruyndonckx, B.Macq. “Spatial method for copyright labeling ofdigital images”. In Proc. 1995 IEEE Workshop on Nonlinear Signal and ImageProcessing, IEEE, Neos Marmaras, Greece, Jun, 1995: 456-459.
    [4] I.Pitas, T H. Kaskalis. “Applying signatures on digital images”. In Proc. 1995 IEEEWorkshop on Nonlinear Signal and Image Processing, IEEE, Neos Marmaras, Greece,Jun, 1995: 460-463.
    [5] R.G.Van Schyndel, A.Z.Tirkel, N.Mee and C.F.Osborne. “A Digital Watermark”.Proceedings of IEEE International Conference on Image Processing, Austin,November, 1994, 2: 86-90.
    [6] Ruanaidh J K O , Dowling W J, Boland F M. “Phase watermarking of digital image”.Proc. IEEE lnt. Conf. On Image Processing, Piscataway: IEEE press, 1999, 3: 239-242.
    [7] Wolfgang R , Podilchuk C, Delp E. “Perceptual watermarks for digital image andvideo”. Proceedings of the IEEE, 1999, 87(7): 1108-1112.
    [8] 黄继武,Yun Q. Shi. 一种自适应图像水印算法. 自动化学报. 1999(4):477-482.
    [9] 牛夏牧, 陆哲明等. 彩色数字水印嵌入技术. 电子学报. 2000.9, Vol.28, No.9:10-12.
    [10] 孙圣和,王秋生.矢量变换域内数字图像水印嵌入算法.电子学报. 2001,12(A):782-1784.
    [11] F.A.P Petitcolas, RJ.Anderson, M.GKuhn. “Information Hiding-A Survey”.Proceedings of IEEE, 1999, 87(7): 1062-1078.
    [12] G.Voyatzis and I.Pitas. “The Use of Watermarks in the Protection of DigitalMultimedia Products”. Proceedings of the IEEE, 1999, 87(7): 1197-1207.
    [13] R.Barnet. “Digital Watermarking: Applications Techniques and Challenges”.Electronics and Communication Engineering Journal, 1999, 11(4): 173-183.
    [14] J.M.Acken. “How Watermarking Adds Value to Digital Content”. Communications ofthe ACM , 1998, 41(7): 74-77.
    [15] Bloom J. A., Cox I. J., Kalker T., et al. “Copy Protection for DVD Video”. In Proc. ofthe IEEE, 1999, 87(7): 1267-1276.
    [16] Sun Q., Chang S.F., Kurato M., et al. “A Quantitative Semi-fragile JPEG2000 ImageAuthentication System”. In 2002 International Conference on Image Processing, 2002,22(9): 921-924.
    [17] Liang T.S., Rodriguez J.J.. “Robust Watermarking Using Robust Coefficients”. In Proc.of SPIE, 2000, 30(5): 326-335.
    [18] Lin E.T., Delp E.J.. “A Review of Fragile Image Watermarks”. In Proc. of theMultimedia and Security Workshop at ACM Multimedia’99, 1999, 12(3): 25-29.
    [19] Lin E.T., Podilchuk C.I., Delp E.J.. “Detection of Image Alterations Using Semi-Fragile Watermarks”. In Proc. of the SPIE International Conference on Security andWatermarking of Multimedia Contents Ⅱ, 2000, 3971(10): 152-163.
    [20] A.Z.Tirkel, G.A.Rankin and R.van Schyndel. “Electronic Watermark”. In DigitalImage Computing Technology and Applications-DICTA 93, Macquarie University,1993: 666-673.
    [21] A.Garimella, M.V.V.Satyanarayana, R.Satish Kumar, P.S.Murugesh and U.C.Niranjan.“VLSI Implementation of Online Digital Watermarking Technique with DifferenceEncoding for 8-bit Gray Scale Images”. 16th International Conference on VLSI Design,Jan, 4-8, 2003: 283-288.
    [22] Q.Z.Wu, H.Y.Cheng, Y.W.Lin and S.Y.Lee. “Trust-worthy Video Enforcement forElectronic Toll Collection Digest of Technical Papers”. International Conference onConsumer Electronics (ICCE’2000), June, 13-15, 2000: 112-113.
    [23] P.W.Wong. “A Public Key Watermark for Image Verification and Authentication”.International Conference on Image Processing (ICIP’98), Oct, 4-7, 1998, 1: 455-459.
    [24] S.C.Byun, I.L.Lee, T.H.Shin and B.H.Ahn. “A Public-key Based Watermarking forColor Image Authentication”. IEEE International Conference on Multimedia andExpo(ICME’02), Aug, 26-29, 2002, 1: 593-596.
    [25] Brassil J.T., Low S.Maxemchuk N., et al. “Electrical Marking and IdentificationTechniques to Discourage Document Copying”. IEEE Journal on Selected Areas inCommunications, 1995, 13: 1495-1504.
    [26] Bender W., Gruhl D., Morimoto N., et al. “Techniques for Data Hiding”. IBM SystemJournal, 1996, 35(3-4): 313-336.
    [27] Deepa Kundur, Dimitrios Hatzinakos. “A robust digital image watermarking methodusing wavelet-based fusion”. Proceedings of the IEEE International Conference onImage Processing, ICIP’97, 1997, 10(1): 544-547.
    [28] Rasesh Dugad, Krishna Ratakonda, Narendra Ahuja. “A new wavelet-based schemefor watermarking images”. Proc. IEEE ICIP’98, 1998: 532-539.
    [29] 郝文化. MATLAB图形图像处理应用教程. 中国水利水电出版社,2004.
    [30] 冈萨雷斯. 数字图像处理. 电子工业出版社,2003.
    [31] 李兆林. MATLAB 6.x图像处理. 清华大学出版社,2004.
    [32] 刘贵忠, 邸双亮. 小波分析及其应用. 西安电子科技大学出版社,1992.
    [33] 崔锦泰. 小波分析导论. 西安交通大学出版社,1995.
    [34] 杨福生. 小波变换的工程分析与应用. 科学出版社,2001.
    [35] 胡昌华, 张军波, 夏军, 张伟. 基于MATLAB的系统分析与设计――小波分析.西安电子科技大学出版社,1999.
    [36] 齐锐. 基于变换域的数字图像水印技术的研究. 西安电子科技大学硕士学位论文,2003.
    [37] 郝文化. MATLAB图形图像处理应用教程. 中国水利水电出版社, 2004.
    [38] 胡小峰, 赵辉. Visual C++/MATLAB图像处理与识别实用案例精选. 人民邮电出版社,2004.
    [39] Mallat S. “A theory for multiresolution signal decomposition: the waveletrepresentation”. IEEE Trans. on PAMI, 1989, 11(7): 674-693.
    [40] 杨润伟. 基于小波提升的数字水印算法. 新疆大学硕士研究生学位论文,2005.
    [41] Zhishou Zhang, Qibin Sun, Wai-Choong Wong. “A novel Lossy-to-LosslessWatermarking Scheme for JPEG2000 Images”. 2004 International Conference onImage Processing (ICIP), 2004, pp: 573-576.
    [42] 江雪梅. 基于数字水印技术的数字作品版权保护研究. 武汉理工大学硕士学位论文,2003.
    [43] 梦庆洪, 高剑波. 一种二代小波变换的图像水印方案. 水利电力机械,2005,27(1),52-55.
    [44] 丁玮, 齐东旭. 数字图像变换及信息隐藏与伪装技术. 计算机学报,1998,21(9):838-843.
    [45] 吴晏升, 王介生, 刘慎权. 图像的排列变换. 计算机学报,1998,21(6):512-519.
    [46] 张华熊, 仇佩亮. 置乱技术在数字水印中的应用. 电路与系统学报,2001,6(3):32-36.
    [47] 纪薇,林梓,曲仁慧等. 基于时空二维混沌序列的变参数混沌加密算法. 吉林大学学报(理学版),2008,46(2):320-326.
    [48] 吴祥兴,陈忠.混沌学导论. 上海科学技术文献出版社,1996.
    [49] 杨维明.时空混沌和耦合映象格子.上海科技教育出版社,1984.
    [50] G.Alvarez, F.Montoya, M.Romera. “Keystream cryptanalysis of a chaoticcryptographic method”. Computer Physics Communications, 2004, 156: 205-207.
    [51] 章毓晋. 图像工程(上册)图像处理(第2版). 清华大学出版社,2006.
    [52] B.Chen and G.W.Wornell. “Quantization Index Modulation: A Class of Provably GoodMethods for Digital Watermarking and Information Embedding”. IEEE Transactionson Information Theory, 2001, 47(4): 1423-1443.
    [53] B.Chen and G.W.Wornell. “Quantization Index Modulation: A Class of Provably GoodMethods for Digital Watermarking and Information Embedding”. IEEE InternationalSymposium on Information Theory, June, 25-30, 2000: 46.
    [54] B.Chen and G.W.Wornell. “Digital Watermarking and Information Embedding UsingDither Modulation”. IEEE Second Workshop on Multimedia Signal Processing, 1998:273-278.
    [55] 孙圣和,陆哲明,牛夏牧等. 数字水印技术及应用. 科学出版社,2004.
    [56] 樊昌信,张甫翊,徐炳祥,吴成柯. 通信原理(第五版). 国防工业出版社,2001.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700