基于数字图像变换域的隐写术研究与实现
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
网络技术和多媒体技术的迅猛发展,为多媒体信息的存储、获取和分发提供了极为便利的条件,但随之而来的作品侵权、篡改及网络信息的非法截取和查看等问题也日益严重。版权保护和保密通信两大应用需求,成为信息隐藏技术的主要推动力。在信息安全领域,信息隐藏也是研究的热点方向。传统的加密技术保护了信息内容,但却暴露了通信过程,而信息隐藏技术能在保护信息内容的同时,隐藏通信过程,从而提供更高的安全性。隐写术是信息隐藏技术的一个重要分支,主要应用于隐蔽通信。本文针对基于图像变换域的隐写术进行了深入研究,主要工作如下:
     1.通过对离散小波变换、离散余弦变换和彩色图像的色彩模型及色彩模型间转换的研究分析,提出了基于彩色图像的混合变换域隐藏算法。算法首先从彩色图像的某种色彩模型下提取出载体图像,对载体图像先后进行离散小波变换和离散余弦变换,将秘密信息以量化方式嵌入混合变换域系数中。实验结果表明,混合变换域算法对抵抗常见图像攻击具有较好的鲁棒性。同时,基于不同的色彩模型,混合变换域算法性能会有所差异。
     2.研究了小波包变换的相关理论,提出了基于小波包变换的多区域信息隐藏算法。小波包变换是小波变换的扩展和延伸,小波包能够提供更加精细的分析方法,对小波分解中没有分解的高频部分作进一步细分,从而拓宽了嵌入空间,并且小波包变换存在最优小波包基。算法首先对载体图像进行最优小波包变换,然后选取若干频域子带作为嵌入区域,将秘密信息重复地嵌入到这些区域,信息提取时采用了二次提取的方式。实验结果表明,算法具有较好的不可感知性,对常见图像攻击具有较好的鲁棒性。
     3.以本文的算法为基础,设计并实现了一个基于图像的信息隐藏原型系统。
With the development of network technology and multimedia technology, multimedia information can be conveniently storaged, accessed and distributed. But the following problems are also increasingly serious, such as the illegal interception and view of network information and so on. The intense demands of copyright protection and secure communication have accelerated the development of information hiding technology. In the field of information security, information hiding is a hot research direction too. Traditional encryption technology can protect the information content, but it exposed the communication process. Compared with the encryption technology, information hiding technology can hide the communication process, thereby providing a higher level of security. Steganography is an important branch of information hiding, mainly used in the covert communications. This paper researches the steganography based on image transform domain, the principal tasks are as follows:
     1. An algorithm is proposed based on hybrid transform domain of color image, which is based on research and analysis about DWT, DCT and color models of color image, and the transformation between the color models. The algorithm first extracts a component from a kind of color model of color image as carrier image, then making discrete wavelet transform of the carrier image, and doing discrete cosine transform of the result from the DWT. Lastly, embedding the secret information into the coefficients of hybrid transform domain by using quantization embedding idea. The experimental results show that the proposed algorithm based on hybrid transform domain has strong capability in resisting common image attacks. At the mean time, comparing with the different color models, the performance of the algorithm will vary.
     2. Through research the theory of wavelet package transform, an algorithm based on wavelet package transform on multi-section is proposed. The wavelet package transform is the expansion and extension of the wavelet transform, it can provide more sophisticated analysis method and decompose the high frequency that not decompose in wavelet transform, thereby widening the embedded space. The algorithm first making best wavelet package transform of the carrier image, and then choose some sub-band frequency as embedded sections, then embedding the secret information into the extracted sections using repeat manners. Information extracting taking the method of double extracting. The experimental results show that the algorithm has good performance on imperceptible. At the same time, the algorithm has good robustness in resisting common image attacks.
     3. According the algorithms introduced in this paper, we design and implement an information hiding prototypical system based on digital image.
引文
[1] Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding-a survey. Proceedings of the IEEE, 1999, 87(7):1062-1077.
    [2] Faisal Alturki. Theory and application of information hiding in still images. Submitted in partial fulfillment of requirement for the degree of PHD of computing, 2001, UMI Number:3003824.
    [3] Simmons G J. The Prisoners’ Problem and the Subliminal Channel. In Advance in Cryptlopy, Proceedings of CRYPTO’83, Plenum Press 1984:51-67.
    [4] Schyndel R G, Tirkel A Z, Osborne C F. A Digital Watermark. In Proc. of IEEE Int. Conf. on Image Processing, 1994, 2:86-90.
    [5] Turner L F. Digital data security system. Patent IPNW089/08915, 1989.
    [6] 张鸿宾, 陈坤. 基于最优低位替换和 Tabu 搜索的图像隐藏. 自动化学报, 2004, 30(2):306-315.
    [7] 张新鹏, 王朔中, 张开文. 抗统计分析的 LSB 密写方案. 中国图象图形学报, 2003, 8(9):1055-1059.
    [8] W Bender, D Gruhl, N Morimoto. Technique for Data Hiding. Proceedings of the SPIE 2420, storage and retrieval for image and video database, 1995, 3:164-173.
    [9] Brassil J, Low S, Maxemchuk N, et al. Electronic marking and identification techniques to discourage document copying. Proceeding of IEEE INFOCOM’94, Toronto, 1994, 3:1278-1287.
    [10] Cox Ingemar J, Joe Kilian, F Thomason Leighton, et al. Secure spread spectrum watermarking for multimedia. IEEE Transaction on Image Processing, 1997, 6(12): 1673-1687.
    [11] Tao B, Dickinson B. Adaptive watermarking in the DCT domain. In: Proc. IEEE International Conference on Image Processing, Lausanne, Switzerland, September, 1996.
    [12] 黄继武, SHI YUN Q. 一种自适应图像水印算法. 自动化学报, 1999, 25(4):476-482.
    [13] 黄继武, YunQ SHI, 程卫东. DCT 域图像水印:嵌入对策和算法. 电子学报, 2000, 28(4):57-60.
    [14] 黄继武, YunQ SHI, 姚若河. 基于块分类的自适应图像水印算法.中国图象图形学报, 1999, 4(8):640-643.
    [15] Cheng W D, Huang J W, Liu H M. A 3D-DCT-Based Information Hiding Algorithm for Color Images. Acta Automatica Sinica, 2003, 29(2):258-265.
    [16] Cox Ingemar J, Linnartz J P. Some general methods for tempering with watermarks. IEEE Journal on Selected Areas in Communication, 1998, 16(4):587-593.
    [17] Kundur D, Hatzinakos D. “A robust digital image watermarking method using wavelet-based fusion”. in: Proc. IEEE Int’l Conf. on Image Processing, Santa Barbara, CA, 1997, 1:544-547.
    [18] Rakesh Dugad, Krishna Ratakonda, Narendra Ahuja. “A new wavelet-based scheme for watermarking images”. In Proceedings of IEEE International Conference on Image Processing ICIP’98, Chicage, 1998, 2:419-423.
    [19] Huang D R, Liu J F, Huang J W. An embedding strategy and algorithm for image watermarking in DWT domain. Journal of Software, 2002, 13(7), 1290-1297.
    [20] Fang Y M, Wu S Q, Huang J W. DWT-Based CDMA Watermarking Resist Cropping. Acta Automatica Sinica, 2004, 30(3):442-448.
    [21] Won Gee Kwak, Rae Hong Park. Data hiding using bit repetition in the wavelet significant tree structure. Proceedings of 4th IASTED International Conference on Signal and Image Processing, 2002, 520-524.
    [22] Chih- Yang Lin, Yu-Tai Ching. A robust image hiding method using wavelet technique. Journal of Information Science and Engineering, 2006, 22(1):163-174.
    [23] M Fahmy Tolba, M A-Said Ghoniemy, Ismail Abdoul-Hameed, et al. Reliable blind information hiding into coloed images using reversible wavelet transforms. International Journal of Computer and Their Applications, 2005, 12(3):133-140.
    [24] Kundur D, Hatzinakos D. Digital Watermarking Using Multiresolution Wavelet Decomposition. Int. Conf. Acoustic, Speech and Signal Processing, IEEE, 1998, 2969-2972.
    [25] Pereira S, Voloshynovskiy S, Pun T. Optimized wavelet domain watermark embedding strategy using linear programming. In Proceedings of SPIE Aerosennse, 2000, Orlando, USA, Wavelet Applications VII: 26-28.
    [26] 杨恒伏, 陈孝威. 小波域鲁棒自适应公开水印技术. 软件学报, 2003,14(9):1652-1660.
    [27] P H W Wong, O C Au. A Blind Watermarking Technique in JPEG Compressed Domain. IEEE International Conference on Image Processing, 2002, 3:497-500.
    [28] K Li, X P Zhang. An Imgae Watermarking Method Integrating with JPEG-2000 Still Image Compression Standard. Canadian Conference on Electrical and Computer Engineering(CCECE’2003), 2003, 3:2051-2054.
    [29] 徐军, 叶澄清, 向辉. 基于神经网络分类的图像数字水印算法. 模式识别与人工智能, 2001, 14(3):261-265.
    [30] Pao-Ta Yu, Hung-Hsu Tsai, Jyh-Shyan Lin. Digital watermarking based on neural networks for color images. Signal Processing, 2001, 81:663-671.
    [31] 柳保芳, 平西建, 邓宇虹. 基于融合的数据隐藏算法. 电子学报, 2001, 29(11): 1445-1447.
    [32] 陈克非. 信息安全——密码的作用与局限. 通信学报, 2001, 22(8):93-99.
    [33] 尤新刚, 周琳娜, 郭云彪. 信息隐藏学科的主要分支及术语. 信息隐藏全国学术研讨会(CIHW2000/2001)论文集, 西安:西安电子科技大学出版社, 2001.
    [34] B Pfitzmann. Information hiding terminology. In: Proceeding of First Information Hiding Workshop, Cambridge, UK, 1996, 347-350.
    [35] Chen B, Wornell G W. Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding. IEEE Transactions on Information Theory, 2001, 47(4):1423-1443.
    [36] 孙圣和, 陆哲明, 牛夏牧. 数字水印技术及应用. 北京: 科学出版社, 2004.
    [37] H P Lu, A C Kot, J Cheng. Secure Data Hiding in Binary Document Images for Authentication. Proceedings of the 2003 International Symposium on Circuits and Systems(ISCAS’03), 2003, 3:806-809.
    [38] R J Hwang, C H Kao, R C Chang. Watermark in Color Image. First International Symposium on Cyber Worlds, 2002:225-229.
    [39] H Z Hel-Or, Y Yitzhaki, Y Hel-Or. Geometric Hashing Techniques for Watermarking. International Conference on Image Processing, 2001, 2:498-501.
    [40] M S Fu, O C Au. Data Hiding Watermarking for halftone Images. IEEE Transactions on Image Processing, 2002, 11(4):477-484.
    [41] 郭云彪. 信息隐藏的安全性研究. 博士学位论文, 天津大学, 2005.
    [42] 丁玮, 闫伟齐, 齐东旭. 基于Arnold变换的数字图像置乱技术. 计算机辅助设计与图形学学报, 2001, 13(4):339-342.
    [43] 刘向东, 焉德军, 朱志良, 等. 基于排序变换的混沌图像置乱算法. 中国图象图形学报, 2005, 10(5):656-660.
    [44] Chen G. Zhan X Y, Li J L. A self-adaptive algorithm on image encryption. Journal of Software, 2005, 6(11):562-568.
    [45] Zhu G B, Cao C X, Hu Z Y, et al. An image scrambling and encryption algorithm based on affine transformation. Journal of Computer-Aided Design & Computer Graphics, 2003, 15(6):711-715.
    [46] J C Yen. Watermarks Embedded in the Permuted Image. The 2001 IEEE International Symposium on Circuits and Systems (ISCAS’2001), 2001, 2:53-56.
    [47] 臧萍, 范延滨. 小波包和多小波图像数字水印的研究与比较. 计算机工程, 2006, 32(23):162-164.
    [48] 郭建星, 李德仁, 刘松林, 等. 小波包变换及其在数字水印算法中的应用. 华中科技大学学报, 2007, 35:224-227.
    [49] 付炜, 景源, 孟娟, 等. 一种基于小波包分解的自适应数字水印算法. 计算机科学, 2004, 31(9):220-225
    [50] 飞思科技产品研发中心. 小波分析理论与 MATLAB7 实现. 北京: 电子工业出版社, 2005.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700