基于小波变换的二值图像技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着多媒体技术和计算机网络技术的发展,数字产品的版权问题显得尤为重要,如何确保数字产品的安全已经成为国内外研究的热点。数字水印技术作为一种新的版权保护方法,从20世纪90年代提出至今,已经受到广大科技工作者和用户越来越多的关注,研究成果也是层出不穷,然而针对二值图像水印技术的研究还相当有限,由于二值图像自身的特殊性.与一般的图像水印有很大不同,用于灰度图像和彩色图像的数字水印隐藏方法一般很难应用于二值图像,而在实际中以二值形式出现的数字产品还是比较广泛的,如黑白图片、文档、签字、支票、合同、证明和印章等,其中黑白图片是黑白二色,支票可能是黑黄二色,而印章可能是红白二色。因此对它们的版权保护和防伪鉴定也是数字水印技术领域的一个重要研究方向。大部分现有的二值图像数字水印技术都是基于空间域的方法,隐含的信息量小,需记录的隐藏位置信息量多,嵌入和提取过程复杂,抗攻击能力差。针对大多数数字水印嵌入过程中数字水印鲁棒性和不可感知性之间的矛盾,讨论了一种新的数字水印技术——零水印。零水印是利用数字作品自身特征来构造所要嵌入的水印,从而在嵌入水印时不必改变原数字作品的信息。
     本文首先对课题的背景和当前国内外研究现状做了简单的回顾,着重讨论了二值图像数字水印的相关技术,归纳了水印技术的分类,分析了空间域图像水印、频率域图像水印的优点与缺点,给出了几种常用的检查并判断水印系统合适与否的指标及相应的计算方法。针对目前二值图像中嵌入水印的算法对于几何攻击的抵御较差,本文提出了一种基于全局DWT变换的鲁棒性数字水印算法,该算法有较好的抗几何攻击和噪声攻击的能力,且是盲水印,提取水印时不需要原始二值图像。主要思路是将二值图像进行小波变换,将变换后的系数进行二值化,观察发现小波高频系数绝对值较大,做几何变换之后系数的改变基本上不影响其二值化的结果,因此利用高频系数二值化后的矩阵与置乱加密后的水印图像进行异或运算生成相应的一个逻辑表,该逻辑表作为密钥,通过向第三方注册,来保护自己对原作品的版权。同时,通过这个密钥(Secret Key)可以提取出二值图像中与之对应的水印以证明自己对数字媒体的所有权。最后通过Matlab6.1模拟各种噪声攻击和几何攻击,试验证明该算法简单易行,嵌入水印容量大,具有更好的鲁棒性和隐蔽性,该方法具有一定的理论和应用价值,为二值图像数字水印发展提供了一些新的思路。
With the development of multimedia and network techniques, the Copyright Protection of digital media is becoming more and more important. How to ensure the security of digital media has become the focus of research work all over the world. As a new method of Copyright Protection, digital watermarking techniques has attracted more and more attention result are obtained. However, the technique research aiming at binary images is limited.Because of the characteristic of binary images itself,the binary images watermarking have big difference to the common watermarking,the data hiding methods which is used in gray image and color image is hard to be used in binary images.In practice, there are o lot of binary image such as black-white-photo、document、signature、contract、seal. So it’s an important research direction for their copyright protection in digital watermarking domain. Most of now available binary watermark algorithm are based spatial domain, there embedded information are limited and the operation process is complicated. For the conflict between robustness and imperceptibility during embedding, a new water- marking technique: non-watermarking is introduced. Non-watermarking utilizes the feature of the original works to construct a watermark, but does not modify.
     This paper first reviews background of subject and the current development condition, point out the technology of binary image watermark, sums up the types of watermark technology, analyzes the image watermark’s advantage and shortcoming of spatial and frequency domain and proposes a appropriate target of watermarking system and it’s computed method. A robustness algorithm is given which are based on DWT domain. This Algorithm has good ability to resist geometric and noise attacks. Without original image the watermarking can be extracted ,so it is a practical blind watermarking. First, Binaries the coefficient of the image that is wavelet transformed. Second, we use the high frequency part add to the watermark-image that disordered, so we obtain a logical array to protect copyright. The experiment result shows that the algorithm is simple and increased the information embedded and has better robustness and concealment. It is consequently known to us that the method brought forward in this paper has certain value of theory and application, under the wish to bring some novel thought for development of binary digital watermarking.
引文
[1] F. Hartung and M. Kutter. Multimedia Watermark Techniques. Proc. Of The IEEE, 1999,87(7): 1075-1077
    [2] Tirkel, G. Rankin, R. Van Schyndel, W. Ho, N. Mee,and C. Osborne. Electronic Watermark. Proc. DICTA 1993. Dec. 1993, 666-672
    [3] Schyndel R G van ,Tirkel A Z,Osborne C F. A digital watermark. First IEEE Internation Image Processing Conference, 1994, 2:86-90
    [4] Cox I J et al. Secure spread spectrum watermarking for multimedia. Technical Report95-10, NEC Research Institute, Princeton, NJ,1995
    [5] Pitas I. A method for signature casting on digital images. IEEE International Conference on Image Processing, 1996, 3: 215-218
    [6] 王炳锡等.数字水印技术 西安电子科技大学出版社. 2003, 11-12
    [7] Fabien A.P. Petitcolas, Ross J. Anderson, and Markus G.Kuhn, Atacks on Copyright Marking System[C], Lecture Notes in Computer Science, Portland, Oregon, USA, 14-17 April,1998, vol. 1525,pp. 218-238. Isbn 3-540-65386-4
    [8] Ramkumar M, Akansu A N, Image watermarks and counterfeit attacks: some problems and solutions[A]. Proceeding on Content Security and Data Hiding in Digital Media Conference[C]. Newark, NJ,1999,102-122.
    [9] Fabien A P Petitcolas, Anderson R J.Attacks on copyright marking system[A]. Information Hiding’98 Conference, Second International Workshop[C]. Portland, Oregon USA,1998,1525:218-238
    [10] Craver S,Memou N, Yeo B L. Resolving rightful ownerships with invisible watermarking techniques: Limitation, attack, and implication[J]. IEEE journal on selected areas in communication, 1998,16(4):573-586
    [11] 唐良瑞,马全明,景晓军等.图像处理实用技术.化学工业出版社。2002
    [12] 毕厚杰等,图像通信工程.北京:人民邮电出版社,1987
    [13] 周浩敏.信号处理技术基础,北京:北京航空航天大学出版社,2001
    [14] 易开祥,数字图像加密与数字说技术研究 博士学位论文,杭州:浙江大学,2001
    [15] Stefan Katzenbeisser, Fabien A.P. Petitcolas编,吴秋新,杨义先等译,信息隐藏技术—隐写术与数字水印,人民邮电出版社,2001.9
    [16] Tirkel A Z ,et al. Electronic watermark. Digital image computing Technology and Application(DICTA’93).1993, Mscquarie University, 666-673
    [17] Matsui K, K Tanaka. Video-Steganography: How to Secretly Embed a Signature in a Picture. Procedings of Technology Strategies for Protecting Intellectual Propertu in the Networked Multimedia Environment, Journal of the Interactive Multi-media Association Intellectual Property Project, 1994, 1(1):187-205
    [18] Bender W, et al. Techniques for data hiding. IBM System Journal,1996,35(3&4):313-336
    [19] Langelaar G C, Van-der-Lubbe J C A, Lagendijk R L. Rohust labeling methods for copy protection of image. Proceeding of IS&T and SPIE, Storage and Retrieval for Image and Video Database.1997,3002:298-309
    [20] Kutter M,Jordan F,Bossen F. Digital signature of color image using amplitude modulation. Proceeding of SPIE, storage and retrieval for image and video database,1997,3022:518-526
    [21] F. Hartung and B. Girod. Watermarking of MPEG-2 encoded video without decoding and re-encoding, Multimedia computing and Networking 1997, published as SPIE 3020:264273
    [22] LJ.Cox, J.Kilian, F.T.Leighton, and T.Shamoon."Secure Spread Spectrum Watermarking for Multimedia", IEEE Transactions on Image Processing, 6(12):16731687, 1997
    [23] Podilchuk C I, Zeng W J. Image-Adaptive Watermarking Using Visual Models IEEE Journal on Selected Areas in Communications, 1998,16(4):525-539
    [24] Tilki J F, Beex A A. Encoding a hidden digital signature onto an audio signal using psychoacoustic masking. 7th International Conference on Signal Processing Application Technology, 1996, 1:476480
    [25] Wang H J, Kuo C C J. Image protection via watermarking on perceptually significant wavelet coeffcients. In proceedings of the IEEE multimedia signalprocessing workshop, 998:278284
    [26] Percira S, Voloshynovskiy S, Pun T. Optimized wavelet domain watermark embedding strategy using linear programming. In proceedings of SPIE AeroSense, April 2000, Orlando, USA, Wavelet ApplicationsⅦ:26-28
    [27] Xia Xiang-Gen, Boncelet C G, Arce G R. Wavelet transform based watermark for digital images, Optics Express, 1998, 3(12):497511
    [28] Tsekeridon S, Pitas I, Embedding self-similar watermarks in the wavelet domain. IEEE Int. Conf. On Acoustics, Systems and Signal Processing, 2000:19671970
    [29] 刘九芬,黄达人,胡军全,数字水印中的双正交小波基.中山大学学报,2002,41 (4)
    [30] Jayewardena A, Lenders P. Embedding mufti resolution binary images into muftiresolution watermark channels in wavelet domain, Proceedings of the IEEE ICASSP'00, 2000:19831986
    [31] J. K. Su, F. Hartung, and B. Girod. Digital Watermarking of Text, Image,and Video Documents. Compute & Graphics, vol.22, No. 6, pp.687-695
    [32] 冉文波 梁华庆. 二值图像数字水印技术的研究进展[J]. 计算机工程与应用 2005.36 48-51
    [33] Matsui K, K Tanaka. Video-Steganography: How to Secretly Embed a Signature in a Picture. Procedings of Technology Strategies for Protecting Intellectual Propertu in the Networked Multimedia Environment, Journal of the Interactive Multi-media Association Intellectual Property Project, 1994, 1(1):187-205
    [34] Amano T,Misaki D.Feture calibration method of watermarking of document image[C]. In:5th Int’l Conf on Document Analysis and Recognition,1999:91-94
    [35] Brassi J T, Low S H, Maxemchuk N F.Copyright Protection for the Eletronic Distribution of Text Document[J]. Proc of IEEE,1999;87:1187-1196
    [36] Maxemchuk N F, Low S H.Marking text documents[J].Proc IEEE Int Conf On Image Processing,1997
    [37] Brassil J,O’Gorman L.Watermarking document images with bounding box expansion[C].In:lst Int’l Workshop on Information Hiding, Cambridge: Spring- Verlag,1996;227-235
    [38] 刘春庆,戴跃伟,王执铨. 一种新的二值图像信息隐藏方案[J]. 东南大学学报(自然科学版)2003;33(增刊)
    [39] 王慧琴 李人厚. 二值文本数字水印技术的研究与仿真[J]. 系统仿真学报,2004;16(3):521-524
    [40] 李京兵,黄席樾,周亚洲,一种鲁棒的二值文本图像数字水印算法及仿真. 计算机工程 2006 11 23-25
    [41] 李建平.小波分析与信号处理-运用及软件实现[M].重庆:重庆出版社,1997:12.
    [42] 彭玉华. 小波变换与工程应用. 北京:科学出版社,2005
    [43] 姚敏等. 数字图像处理. 北京:机械工业出版社, 2006.1
    [44] 杨福生.小波变换的工程分析与应用[M].北京:科学出版社,1999:9-122
    [45] 陈武凡等.小波分析在图像处理中的应用.北京:科学出版社,2002
    [46] C. I. Podilchuk, W.Zeng. Image-adaptive Watermarking Using Visual Models. IEEECommunication, 1998,16(4):525~539
    [47] J. F. Delaigle, C.D.Vleeschouwer,B.Macq. Watermarking Algorithm Based on a HumanVisual Model. Signal Processing,1998,66(3):319~335
    [48] 温泉,孙琰锋,王树勋. 基于零水印的数字水印技术研究. 见:全国第三届信息隐藏学术研讨会.西安.2001.西安:西安电子科技大学出版社,2001:102~109
    [49] 尹康康,石教英,潘志庚. 一种鲁棒性好的图像水印算法 软件学报,2001,12(5)
    [50] Tao B,Dickinson B. Adaptive watermarking in the DCT domain. International conf.on acoustics,speech,and signal processing(ICASSP),1997,4:2985一 2988.
    [51] 陈芳.数字水印在印刷品防伪中的应用研究.西北大学硕士学位论文. 2006.6
    [52] 李京兵. 一种可抗几何攻击的二值文本图像数字水印算法. 海南大学学报自然科学版. 2006,6 142-147
    [53] HUANG H C,WANG F H,PAN J S.A VQ-Based Robust Multi—Watermarking Algorithm[J].IEICE Transactions on Fundamentals of Electronics,Communication and Computer Sciences,2002(7):1719—1726

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700