人眼视觉特性模型及其半脆弱水印算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数字水印技术是近年来国际信息安全界兴起的一个前沿研究课题,是一种十分贴近实际应用的信息隐藏技术。数字水印技术通过把水印信息嵌入到数字图像、音频、视频等多媒体数字信息中的方法,用以证明权益拥有者对其作品的所有权。同时,通过对水印信息的检测和分析保证数字信息的真实性,完整性及可靠性,从而成为保护多媒体信息版权和进行多媒体信息认证的有效手段。
     人眼视觉系统(Human Visual System,简称HVS)是一个非常复杂的系统。虽然至今我们仍不能完全了解其所有的特性,但是合理的利用某些人眼视觉特性已经可以有效的解决很多实际问题。为了求得最佳的视觉效果,许多数字水印算法也不可避免的要利用人眼视觉特性。如何合理有效的结合人眼视觉特性建立视觉特性模型是提高数字水印算法性能的重要环节。现存主要半脆弱水印算法均不同程度的利用人眼视觉特性来嵌入水印,但存在着透明性差、鲁棒性不够的问题。
     为了更好地提高半脆弱水印的透明性和鲁棒性,本文通过研究人眼视觉特性、分析目前主要的半脆弱水印算法,建立了小波变换域中人眼视觉特性模型,并在此模型基础上对待嵌入水印图像进行分类;提出了根据攻击特性嵌入水印的思想和根据实验得到的最佳水印恢复概率的概念;提出了用于参数调整的量化中心极限定理,使得在动态量化过程中嵌入的半脆弱水印能够达到最大的鲁棒性。此外,给出了逆小波变换后系数调整的方法,使得提取水印时对载体图像进行小波变换后得到的系数和当初嵌入调整时的系数保持一致,从而解决了逆小波变换后小数部分的舍入问题。实验表明,本文算法生成的载体图像透明性好,对JPEG压缩、噪声迭加和平滑滤波等常见图像处理操作,具有较强的鲁棒性,而且可嵌入的水印信息比特数达到了原始图像像素个数的1/4,并能准确定位恶意攻击的位置。
Digital watermarking technology has recently been a leading research subject in international information security field. It's an information hiding technology which is highly close to practical application. Through the method that embedding the mark into digital multimedia such as images, audios and videos, it can prove the ownership of content owners. Meanwhile, through examining and analyzing the watermarking, it can guarantee the facticity, integrality and reliability of the digital data. Digital watermarking has provided a valid solution to protect copyright and the authentication of multimedia.
     HVS (Human visual system) is a very complicated system. Although we are still not fully know all the features so far, rational using of certain visual features can solve many practical problems effectively. In order to pursue the best invisibility, many digital watermarking algorithms make use of the human visual features inevitably. How to integrate the human visual features to build human visual model is an important step to improve the digital watermarking algorithm. Many existing semi-fragile watermarking algorithms embed the mark based on human visual features, but they have bad invisibility and robustness.
     In order to improve the invisibility and the robustness of semi-fragile watermarking, through studying the human visual features and analyzing the popular semi-fragile watermarking algorithms, the paper puts forward a human visual features model in digital wavelet transform (DWT) domain and classifies images based on this model, and brings up the concept of the best restore probability of the pixel value which is from the idea of embedding watermark based on the characteristic of the attacks, and it has been adjusted in experiments. Meanwhile, it brings forward the quantized central limit theorem, which is to adjust the coefficients. These all make the embedded semi-fragile watermarking achieve the greatest robustness in the process of dynamic quantization. Besides, it gives a coefficient redressal algorithm that is how to round the decimal fraction of the coefficients after IDWT. This makes the obtained coefficients after DWT when fetch the mark and the modified one when embed the mark consistent with each other. Experimental results suggest that this algorithm leads up to a better invisibility of the carrier image, a better robustness to the image processing, such as JPEG compression, noise adding, filtering, and the other embedded information. And the bits of embeddable watermarking information account for one fourth of the number of pixel in the original image. Moreover, it can also ascertain the exact position for vicious attacks.
引文
[1]Lu C s, Liao H Y M. Multipurpose watermarking for image authentication and protection[J]. IEEE Transactions on Image Processing,2001,10(10):1579-1592.
    [2]I.J.Cox and M.L Mille. The first 50 years of electronics watermarking[J]. Journal of Applied Signal Processing,2002,56(2):126-132.
    [3]C.I.Podiclchuk and E.J.Delp.Digital watermarking:algorithms and application[J]. IEEE Signal Process Magazine, Jul.2001:33-46.
    [4]温泉,孙琰锋,王树勋.零水印的概念与应用[J],电子学报,2003,30(2):214-216.
    [5]许君一,熊昌镇,齐东旭,黄继武.量化水印算法分析[J].通信学报,2006,27(3):15-27.
    [6]李伟,袁一群,李晓强等.数字音频水印技术综述[J].通信学报2005,26(2):100-111.
    [7]马冀平,韩纪庆.DCT域音品水印: 嵌入对策和算法[J].电子学报,2006,34(7):1260-1264.
    [8]郭磊,郭宝龙,陈龙谭.基于小波零树结构的图像水印算法[J].西安电子科技大学学报,2003,30(5):667-681.
    [9]冯前进,陈凌剑,杨丰.基于整数小波变换的医学图象易碎水印方法[J].中国图象图形学报,2006,11(5):736-741.
    [10]刘连山,李人厚,高琦.基于DWT的彩色图象绿色分量数字水印方案[J].通信学报,2005,26(7):62-67.
    [11]凌贺飞,卢正鼎,邹复好.基于MPEG的实时视频水印技术[J].小型微型计算机系统,2005,26(12):2181-2185.
    [12]廖继旺,孙洪淋.用于word文档认证的脆弱型数字水印算法[J].科学技术与工程,2006,6(8):1082-1084.
    [13]潘志庚,孙树森,李黎.三维模型数字水印综述[J].计算机辅助设计与图形学学报,2006,18(8):1103-1110.
    [14]钟尚平,高庆狮.矢量地图水印归一化相关检测的可行性分析与改进[J].中国图象图形学报,2006,11(3):401-409.
    [15]张人奇,张永红,糠宝生.基丁RB曲线融合的数字图象隐藏技术[J].中国图象图形学报,2006,11(2):235-243.
    [16]李海峰,宋巍巍,王树勋.基于Coutourlet变换的稳健图象水印算法[J].通信学报,2006,27(4):87-94.
    [17]杨树国,李春霞,孙尧等.基于小波变换的零水印方案[J].中国图象图形学报,2003,6(8):664-669.
    [18]姚志强,潘日晶,邹柏贤等.用B样条方法实现数字水印[J].计算机辅助设计与图形学学报,2005,17(7):1463-1469.
    [19]王炎,王建军,黄旭明.一种基于ICA的多边形曲线水印算法[J].计算机辅助设计与图形学学报,2006,18(7):1054-1059.
    [20]向华,曹汉强,伍凯宁,等.一种基于混沌调制的零水印算法[J].中国图象图形学报,2006,11(5):720-724.
    [21]李段,徐刚.一种DT-CWT域内的图像零水印算法[J]。中国图象图形学报,2006,11(5):725-729.
    [22]朱从旭,陈志刚.一种灵敏的文本图象认证混沌脆弱水印技术[J].小型微型计算机系统,2006,27(1):151-154.
    [23]张杰,张士杰,高山青,等.一种基于混沌映射的易碎水印[J].计算机工程,2006,32(9):159-161.
    [24]和红杰,张家树.基于混沌置乱的分块自嵌入水印算法[J].通信学报2006,27(7):80-86.
    [25]李睿,李明,张贵仓.基于随机分块的脆弱性水印算法设计[J].武汉大学学报(信息科学版),2006,31(9):832-834.
    [26]Bender W, Gruhl D, Morimoto N, et al. Techniques for data hiding[J]. IBM System Journal,1996,35 (3 & 4):313-336
    [27]Nikolaidis N, Pitas I. Copyright protection of images using robust digital signatures[A]. In:IEEE Proceeding on International Conference on Acoustics, Speech, and Signal Processing[C], Atlanta, IEEE Press,1996:2168-2171.
    [28]Jiri Fridrich. Applications of data hiding in digital images[A]. In:the ISPAC'98 Conference[C]. Melbourne, Australia,1998.11.
    [29]Mahalingam Ramkumar. Data hiding in multimedia-theory and applications.[D], New Jersey, Department of Electrical and Computer Engineering, New Jersey Institute of Technology,1999.
    [30]郑江滨,冯大淦,张艳宁,赵荣椿.可恢复的脆弱数字图象水印[J].计算机学报,2004,27(3):371-376.
    [31]钱振兴,程义民,王以孝,等.一种图象自嵌入方法[J].电子学报,2006,34(7):1347-1450.
    [32]Cox I J, Matt L Miller. A review of watermarking and the importance of perceptual modeling[A]. In:SPIE Proceeding on Human Vision and Electronic Imaging[C],1997,3016:92-99.
    [33]孙中伟,冯登国.DCT变换域乘嵌入图象水印的检测算法[J].软件学报,2005,16(10):1798-1804.
    [34]Zhao J, Koch E. Embedding robust labels into images for copyright protection[A]. In:Proceedings of the KnowRight'95 Conference on Intellectual Property Rights and New Technologies[C],Vienna, Austria,1995:241-251.
    [35]曹荣,王颖,李象霖.一种基于离散傅立叶变换域相位和幅度的数字水印算法[J].计算机应用,2005,25(11):2536-2543.
    [36]HUANG DA, CHE Sheng-bing, HUANG Qiang-bo. A Semi-fragile Watermarking Algorithm Based on Non-fixed Frequency Point in Discrete Fourier Transform[A] In:Proceedings of the second International Conference on Computer Science & Education[C].Xiamen:Xiamen University press,2007,213-217.
    [37]TSAI M J,YU K Y, CHEN Y Z. Joint wavelet and spatial transformation for digital watermarking[J]. IEEE Trans on Consumer Electronics,2000,46(1): 241-245.
    [38]CHEN B. A class of provably good methods for digital watermarking and information embedding [J]. IEEE Trans on Information Theory,2001,46(4): 1423-1443.
    [39]CHEN B,WORNELL G W. Quantization index modulation methods for digital watermarking and information embedding multimedia[J]. Journal of VLSI Signal Processing,2001,(2)7:7-33.
    [40]FANG Y M, HUANG J W, WU S Q.CDMA-based watermarking resisting to cropping[A].ISCAS[C].2004,25-28.
    [41]GU L M,HUANG J W. Analysis of block coding strategies in watermarking channel[J]. Journal of Software,2004,15(9):1413-1422.
    [42]KANG X G, HUANG J W, SHI Y Q. A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression[J]. IEEE Trans on Circuits and Systems for Video Technology,2003,13(8):776-786.
    [43]王向阳,杨红颖,陈利科,赵红.用于图象内容认证的半脆弱水印嵌入算法[J].小型微型计算机系统,2005,26(11):2017-2020.
    [44]谢玲,张家树,和红杰.一种基于非均匀离散傅立叶变换的鲁棒音频水印算法[J].计算机学报,2006,29(9):1711-1721.
    [45]Zhang J, Zhang C T.Digital watermarking techniques for image authentication[J]. Journal of Image and Graphics,2003,8(4):367-373.
    [46]Guo J Y, Lu C S, Liao H Y M. Mean quantization based fragile watermarking for image authentication[J]. Optical Engineering,2001,40(7):1396-1408.
    [47]Hartung F, Girod B. Watermarking of MPEG-2 encoded video without decoding and re-encoding[A]. In:SPIE Proceeding on Multimedia Computing and Networking[C], San Jose,1997,3020:264-273.
    [48]Lintian Qiao, Klara Nahrsted. Non-invertible watermarking methods for MPEG encoded audio[A]. In:SPIE Proceedings on Security and Watermarking of Multimedia Contents[C], San Jose,1999,3657:194-202.
    [49]钟铧,焦李成.DCT域半易损水银技术[J].计算机学报,2005,28(9):1549-1557.
    [50]向辉.基于信息重组思想的多媒体数据压缩与多媒体数据安全技术研究[D].杭州:浙江大学CAD & CG国家重点实验室,1999.
    [51]易开祥,石教英.一种自适应二维数字水印算法[A].见:全国第二届信息隐藏学术研讨会论文集[C],北京:2000.6,108-112.
    [52]同鸣,郝重阳,刘晓军.基于听觉掩蔽特性的扩频信息隐藏方法[J].计算机工程,2006,32(5):137-139
    [53]沃焱,韩国强,张波.一种新的基于特征的图象内容认证方法[J].计算机学报,2005,28(1):105-112.
    [54]董刚,张良,张春田.一种半脆弱数字图象水印算法[J].通信学报2003,24(1):33-38.
    [55]张静,张春田.用于JPEG2000图象认证的半脆弱性数字水印算法[J].电子学报,2004,32(1):157-160.
    [56]张亚莉,郭雷,杨诸胜.一种用于图象认证的半脆弱性数字水印算法[J].计算机应用与研究,2005,11:247-249.
    [57]李春,黄继武.一种抗JPEG压缩的半脆弱图象水印算法[J].软件学报,2006,17(2):315-324.
    [58]陈志刚,朱从旭.一种基于分块DCT的混沌半脆弱图象水印技术[J].计算机应用研究,2006,12:319-322.
    [59]吴小云,刘红梅,黄继武.结合Zernike矩和水印的半脆弱图象认证[J].自动化 学报,2007,33(2):145-150.
    [60]王向阳,陈利科.一种新的自适应半脆弱水印算法[J].自动化学报,2007,33(4):361-366.
    [61]Zhang J, Zhang C T. Digital watermarking techniques for image authentication[J]. Journal of Image and Graphics,2003,8(4):367-373.
    [62]EkiciO, Sankur B, Akcay M. Comparative assessment of semi fragile watermarking methods[J]. Journal of Electronic Imaging,2004,13(1):209-216.
    [63]王向阳,杨红颖,陈利科等.基于视觉掩蔽特性的半脆弱水印技术研究[J].中国图象图形学报,2005,10(12):1548-1553.
    [64]Lewis A S, Knowles G. Image compression using the 2-D wavelet transformation[J]. IEEE Transactions on Image Processing,1992,1(4):244-250.
    [65]Manno s J L, Sakrison D J. The effect of a visual fidelity criterion on the encoding of images[J]. IEEE Transactions on Inform Theory,1974,20(2):525-536.
    [66]张素娟.数字图像水印技术的研究[D].北京:北京工业大学.2003.3.
    [67]Deepa Kundur. Energy Allocation For High-Capacity Watermarking In The Presence Of Compression[A]. IEEE Int Conf on Image Processing[C].Vancouver, Canada,2000,423-426.
    [68]N.Kaewkamnerd, K.R.Rao. Wavelet based image adaptive watermarking scheme[J]. Elecronics Letters,2000,36 (4):312-313.
    [69]Kwon O H, Kim Y S, Park R H. Watermarking for still images using the human visual system in the DCT domain [A]. In:Proceedings of the 1999 IEEE International Symposium on Circuits and Systems [C]. Piscataway, NJ, USA: IEEE,1999,76-79.
    [70]Christine I. Podilchuk. Image-Adaptive Watermarking Using Visual Models[J]. IEEE Journal on Selected Areas in Communications,1998,16(4):525-539.
    [71]Seong-Geun Kwon, Seong-Won Ban. Highly Reliable Digital Watermarking Using Successive Sub-band Quantization and Human Visual System[J]. IEEE Tans On Image Processing,1999,7(1):74-92.
    [72]殷虹,陈增强,袁著祉.基于超混沌和小波变换的鲁棒性数字水印算法[J].控制与决策,2006,21(9):1024-1027.
    [73]胡玉平,孙伟,石磊,韩德志.基于人眼视觉特性的小波树量化水印[J].小刑微型计算机系统,2004,25(7):1491-1494.
    [74]卢正鼎,杨双远.一种半易损图象水印认证技术[J].小型微型计算机系统,2005,26(9):1640-1642.
    [75]王江晴.图像压缩中小波变换技术的研究[J].武汉理工大学学报,2002,24(3):28-30.
    [76]车生兵,黄达,李光.基于复合混沌系统的数字图像加密研究[J].计算机工程,2006,32(21):148-151.
    [77]车生兵,黄达,李光.基于复合混沌的自适应图像加密研究[J].中国图象图形学报,2006,18(11):1557-1561.
    [78]张专成,张殿富,闫小萍.一种鲁棒的基于DWT域自适应量化步长的图象盲水印算法[J].中国图象图形学报,2006,11(6):840-847.
    [79]王向阳,杨红颖,邬俊.一种基于自适应量化的半脆弱图象水印算法[J].小型微型计算机系统,2006,27(5):896-900
    [80]李新娥,王珂,崔艳秋.基于小波波包变换和离散余弦变换的双水印算法[J].中国图象图形学报,2007,12(1):61-67.
    [81]Fridrich J. Security of fragile authentication watermarks with localization[A]. In: Proceedings of SPIE Photonic West Electronic Imaging 2002, security and watermarking of Multimedia Contents[C], San Jose, California,2002, 4675:691-700.
    [82]Queluz M P. Spatial watermark for image content authentication[J]. Journal of Electronic imaging,2002,11(2):275-285.
    [83]Li, J. Photo graphy image database[EB/OL]. http://www.stat.psu.edu/~jiali/index. download.html.
    [84]Hengfu Yang, Xingming Sun. Semi-Fragile Watermarking for Image Authentication and Tamper Detection Using HVS Model[A] In:Internationa] Conference on Multimedia and Ubiquitous Engineering[C],2007,1112-1117.
    [85]Zhang Hongbin, Yang Cheng. Tamper detection and self recovery of images using self-embedding[J]. High Technology Letters,2005,11(1):1-5.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700