基于中文Word文档的数字水印算法
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着多媒体技术和网络技术的飞速发展和广泛应用,对图像、音频、视频等内容的知识产权保护成为迫切需要解决的问题。加密和拷贝保护机制不能完全解决这一问题:加密只在传输过程中保护数据,而拷贝保护机制又易被破坏。于是一种新的保护途径应运而生,即数字水印技术。它甚至被认为是知识产权保护的最后一道防线。数字水印技术不仅可用于知识产权的保护,还可用于认证、注释等。目前对图像等方面的数字水印方法很多且比较有效,但这些方法一般不适合应用于文本。
     文本数字水印技术是一个涉及密码学、图形学、视觉科学、中文信息处理、图像处理、通信及信息安全等学科的交叉边缘科学,目前在理论上是很新的一个研究方向。已经取得的文本数字水印研究成果主要集中在基于文本格式的算法方面。最为典型的有字移、行移及特征编码等。但是这类算法的水印信息不是加载到文本内容之中,因此难以抵抗打印、格式转换等常见文档处理操作。而将水印嵌入文本内容的基于自然语言处理的文本水印算法中计算机自然语言处理技术是个瓶颈。另外,一篇文档里含有多个作者版权水印信息的时候,真正的版权信息难以确定,一些论文针对这种攻击提出了很多协议,但是这些协议过于复杂,或者在有效性上执行的不是很好。
     本文提出并实现了一种基于字符属性的多组文本数字水印算法。WORD文档中的字符存在某些属性,其默认值的修改具有很强的隐蔽性,如字符作为WORD中的range对象,其NoProofing属性默认值保持不变而仅在编程时方可修改此值;字符的LanguageIDFarEast属性,可将其默认值改为wwdTraditionalChinese或wdChineseSingapore等。
     通过对以汉字为对象的特定属性值的修改可以达到嵌入水印信息的目的。实验证明,此水印算法一方面水印隐蔽性强,水印容量不受限制,另一方面,该方法具备较强的抗攻击能力并兼具较强的文本完整性检测性能。
With the explosive growth in multimedia and network technologies, intellectual propertyprotection of images, audio, video etc are more urgent than ever. Encryption and copyprotection mechanisms can not fully solve the issue. Encryption usually protects data only on the transport channel and copy protection mechanisms are often circumvented easily. In this context, digital watermarking has been proposed as the last line of defense in the protection of intellectual property. Moreover, watermarking can be applied to authentication, captioning etc Now there are many effective digital watermarking methods for image etc, but these methods are not usually suitable for text.
     The technology of the text digital watermark is a cross marginal subject which relates to researches of cryptography, graphics, science of vision, Chinese information processing, image processing, communications, and information security, etc and is a very new research direction in theory at present. So far the acquired achievements on text digital watermarking are mainly focused on the algorithms based on text format. The most typical representatives are algorithms on word-shifting, line-shifting and character-coding. As the watermark information of this kind of algorithm is not inserted into the text content, the algorithms can not resist some common document operations such as format conversion, print processing.
     A multiple text calculating method based on the characters' attributes and the words' content is proposed in this paper, and its merits are also analyzed. It is of good imperceptibility to modify the default numerical values of characters' specific attributes in a Word Document .For example, the character is regarded as the object of range in the Word Document, the default numerical value of NoProofing's attribute can only be modified during programming; and the default numerical value of LanguageIDFarEast, one of the character's attributes, can be modified to wwdTraditionalChinese or wdChineseSingapore.
     To embed text watermarks, we can modify the default numerical values ofcharacters' specific attributes. Experiments show that the watermarks can be hided effectively and have unlimited capacity. Moreover, it has a good anti-attacking ability and good performance in text integrity detection.
引文
[1]梁华庆,钮心忻.基于数字水印的证件防伪技术.信号处理,2004,20(2):143-146.
    [2]刘春庆,王执铨,戴跃伟.常用数字图像水印攻击方法及基本对策.控制与决策,2004,19(6):601-606.
    [3]Wong P H W,Au O C.A novel blind multiple watermarking technique for images.IEEE Transactions On Circuits and Systems for Video Technology,2003,13(8):813-830.
    [4]Petitcoas F A,Ross J,Anderson et al.Information hiding-A survey.Proceeding of the IEEE.1999,87(7):1062-1078.
    [5]易开祥.数字图像加密与数字水印技术研究.浙江大学博士学位论文:(博士学位论文).杭州:浙江大学,2001.
    [6]Gonzalez R C,Wintz P.Digital image Processing 2nd Edition.Addison-Wesley Publishing Co/IEEE Press,1987.
    [7]周四清,余英林.基于数字水印的消费者权益保护协议研究.计算机工程,2002,28(1):73-74.
    [8]Lewis A S,Knowles G.Image compression using the 2-D wavelet transform.IEEE Trans Image Proc.1992,1(2):244-250.
    [9]肖亮,韦志辉,吴慧中.一种利用人眼视觉掩盖的小波域数字水印.通信学报2002,23(3):100-106.
    [10]Barni M,Bartolini F,Piva A.Improved wavelet-based watermarking through pixel-wise masking.IEEE Trans on Image Processing,2001,10(5):783-791.
    [11]Pateux S,Guelvouit G L.Practical watermarking scheme based on wide spread spectrum and game theory.Signal Processing:Image Communication,2003,18(4):283-296.
    [12]肖利.OMA数字版权管理的研究和实现:(硕士学位论文).西安:电子科技大学,2007.
    [13]Cvejic N,Seppanen T.Spread spectrum audio watermarking using frequency hopping and attack characterization.Signal Processing,2004(84):207-213.
    [14]Ruanaidh J J K,Pun T.Rotation scale and translation invariant spread spectrum digital image watermarking.Signal Process,1998,66(3):303-317.
    [15]谷利民,黄继武.数字水印信道种的分组编码策略分析.软件学报,2004,15(9):1413-1422.
    [16]Baudry S,Delaigle J F,Sankur B et al.Analysis of error correction strategies for typical communication channels in watermarking.Signal Processing,2001,81(6):1239-1250.
    [17]孙圣和,陆哲明,牛夏牧.数字水印技术及应用.北京:科学出版社,2004.
    [18]Bogumil D.Reversing Global and Local Geometrical distortions in image watermarking.Lecture Notes in Computer Science.Heidelberg:Springer Berlin,2004.
    [19]陆哲明,姜守达,董寒丽.基于人类视觉系统的自适应水印嵌入算法.哈尔滨工业大学学报(自然科学版),2003,35(2):11-13.
    [20]Licks V,Ourique F,Jordan R et al.The effect of the random jitter attacks on the bit error rate performance of spatial domain image watermarking.International Conference on Image Processing.USA,2003(2):455-458.
    [21]张焕国,郝彦军,王丽娜.数字水印、密码学比较研究.计算机工程与应用.2003,9(2):63-67.
    [22]Venturini I.Counteracting Oracle attacks.International Multimedia Conference.Magdeburg,Germany,2004:187-192.
    [23]Graver S,Mernon N,Yeo B L et al.Resolving rightful ownerships with invisible watermarking techniques:limitations,attacks,and implications.IEEE Journal on Selected Areas in Communications,1998,16(4):573-586.
    [24]Li W B,Chen T H.A public verifiable copy protection technique for still images.Journal of Systems and Software,2002,62(3):195-204.
    [25]Yoloshynovskiy S.Attacks on digital watermarks:classification estimation based attacks and benchmarks.IEEE Communications Magzine,2001,39(8):118-126.
    [26]张春田,苏育挺,管晓康.多媒体数字水印技术.通信学报,2000,21(9):46-52.
    [27]Van Schyndel R,Tirkel A,Osborne C.A digital watermark.International Conference on Image Processing,Austin,Tex.USA,1994:86-90.
    [28]张永平,郭宝龙.认证水印技术的研究.计算机工程与应用,2004,3(1):60-67.
    [29]Nikolaidis N,Pitas I.Copyright Protection of images using robust digital signatures.International Conference on Acoustics,Speech,and Signal Processing,Atlanta,USA,1996:2168-2171.
    [30]Koch E,Zhao J.Image-adaptive watermarking using visual models.IEEE Hournal on Special Areas in Communications,1998,16(4):525-539.
    [31]孙星明,殷建平,陈火旺.汉字的数学表达式研究.计算机研究与发展,2002,39(6):707-711.
    [32]Barni M,Cappellini V.A DCT Domain System for Robust Image Watermarking.Signal Processing,1998,66(3):357-372.
    [33]Xia X,Boncelet C G,Arce G R.Wavelet transform based watermark for digital images.Optics Express,1998,3(12):497-511.
    [34]黄华,齐春,李俊等.文本数字水印.中文信息学报.2002,15(5):52-57.
    [35]Kundur D,Hatzinakos D.Robust digital image watermarking method using wavelet based fusion.International Conference on Image Processing,Santa Barbara,Califor-nia,USA,1997:544-547.
    [36]徐南.文本脆弱水印技术的研究:(硕士学位论文).秦皇岛:燕山大学,2006.
    [37]刘九芬,黄达人,胡军全.数字水印中的正交小波基.电子与信息学报,2003,25(4):453-459.
    [38]周惠.抵抗同步攻击的数字视频水印算法研究:(硕士学位论文).南京:南京航空航天大学,2006.
    [39]李向辉.基于Word文本文档的信息隐藏方法研究:(硕士学位论文).南宁:广西大学,2006.
    [40]张洪雷,付鹂.基于小波变换的数字水印技术.科技资讯,2007,8(17):101-102.
    [41]刘超.基于模糊聚类方法的盲文本数字水印研究:(硕士学位论文).长沙:湖南大学,2006.
    [42]周新民,孙星明,刘超.基于汉字结构知识的鲁棒性公开文本水印.计算机工程,2006,8(3):165-169.
    [43]罗纲,孙星明.汉字数学表达式开发平台的设计与实现.计算机工程与应用,2005,5(4):113-116.
    [44]刘芳,姚霞.基于视觉掩蔽的二维数字水印算法.西安电子科技人学学报(自然科学版),2003,30(1):38-41.
    [45]鲁芳.多重文本数字水印技术研究:(硕士学位论文).长沙:湖南大学,2005.
    [46]张韵杨.基于数据可用性的XML数字水印研究与设计:(硕士学位论文).长沙:湖南大学,2007.
    [47]华铎.信息隐藏与检测技术的研究与应用:(硕士学位论文).杭州:浙江大学,2006.
    [48]Huang D R,Liu J F,Huang J W.An embedding strategy and algorithm for image watermarking in DWT domain.Journal of Softwear,2002,13(7):1291-1297.
    [49]Liu F,Yao X.The two-dimension digital image watermarking algorithm based on visual masking.Journal of Xidian University,2003,30(1):38-41.
    [50]Zhang Z M,Wang L.Semiblind image watermarking algorithm in I)CT domain with chaotic encryption.Computer Engineering,2003,29(17):10.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700