基于DCT域的数字水印技术的应用研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着信息时代的到来,特别是Internet的普及,信息的安全保护问题日益突出。另一方面,多媒体技术已被广泛应用,需要进行加密、认证和版权保护的声像数据也越来越多。传统的信息安全技术基本上都以密码学理论为基础,但随着计算机处理能力的快速提高,这种方法变得越来越不安全。数字水印是一种在其它媒介上通过嵌入一些重要标识信息以保护媒介的隐私、版权等的安全技术。
     论文主要应用数字水印技术和指纹识别技术,将要持证件人的指纹图像作为水印嵌入到要作证件的相片中;然后采集证件使用人的指纹和证件里的指纹水印进行相似度比较来辨别真伪。
     本文以DCT快速变换、图像压缩编码技术、人类视觉系统特性为基础,利用图像本身特征和人的视觉特性确定水印的嵌入位置,设计了一种算法。该算法将图像进行8×8分块后对各块图像进行DCT变换,选择宿主图像的纹理子块作为嵌入水印的地方,然后利用置乱的方法将水印嵌入到这些子块的DCT中高频分量中,水印的提取和检测不需要原始图像。实验结果表明:文中算法不仅具有较好的透明性和鲁棒性,而且即使在含水印图像遭受不同程度的压缩、剪切、滤波等攻击后仍能有效地检测到水印的存在。
Information security protection technology is now attracting more and more attention in this Information Age. The demand of copyright protection, secure transmission and confidential communication is increasing dramatically as the multimedia technology widely spreaded. Most of conventional information security techniques are based on the theory of Cryptology. It is obvious that with the calculating ability of modern computers rapidly improved, there is less possibility to keep security. Digital watermark is a security technique which used to protect some information such as privacy, authority through embedding watermark into target mediators.
     In this thesis we applied digital watermark technique and fingerprint identification technique in ownership verification of certificates. The image of owner’s fingerprint was embedded as watermark into the photo which is to be used in certificate making. After that we compare the watermark with the fingerprint we got.
     A novel algorithm was proposed in our work by discrete cosine transformation (DCT), still image compression coding technique, and human visual system (HVS) to calculate the position embedded. The DCT is applied in blocks of 8×8 pixels in this approach. Texture blocks of the host image are selected as target positions, and then the watermark was inserted in the DCT high and middle frequency of those parts with scrambling technique. The extraction and detection of the watermark does not need the original image. The experiment results show that the algorithm we use meets the demand of transparency and robustness effectively: the watermark can be detected even the watermarked image was compressed, clipped or filtered greatly.
引文
[1] R.G.van Schyndel,A.Tirkel,C.F.Osborne.A digital watermarking.First IEEEInternational Image Processing Coference,2004(2):86-90.
    [2] I.J.Cox and M.L.Miller.The first 50 years of electronic watermarking.Journal of Applied Signal Processing,2003(2):126-132.
    [3] I.Pitas.A method for signature casting on digital images.1996 IEEE International Coference on Image Processing,1996(3):215-218.
    [4] K,Boney,A.Tewfik,K.Hamdy.Digital watermarks for audio signal.IEEE Int.Conf.on Multimedia Computing and Systems,2004(1):473-480.
    [5] G.Voyatzis and I.Pitas.Embedding robust watermarks bychaotic mixing. 13th International Conference on Digital Signal Processing,2003(1):213-216.
    [6] D.Kundur and D.Hatzinakos.Digital watermarking for tellaletamperpro- fing and authentication.Proceedings of the IEEE Special Issue on Identification and Protection of Multimedia,1999,87(7):1167-1180
    [7] G.C.Langelar,R.L.Lagendijk,and J.Biemond.Realtime labeling methods for MPEG compressed video.18th Symposium on Information Theory, 1997(1):25-32.
    [8] Stefan Winkler.A vision-based masking model for spread spectrum Image watermarking.IEEE Trans.Image Processing,January 2002,11(1):16-25.
    [9] C.I.Podilchuk,W.Zeng.Image-adaptive watermarking using visual models.IEEE Journal on Seclected Areas in Cmmunications,May 1998,16(4):525-539.
    [10] Barnett R. and Pearson D.Attack Operators for Digitally Watermarked Images.IEEE Proceedings Vision,Image and Signal Processing,271-279p
    [11]阮秋崎.图像处理基础.北京:中国铁道出版社,1998.
    [12] F.Hartung and B.Girod.Watermarking of uncompressed video.Signal Processing,1998,66(3):283-301.
    [13] Neil F.Johnson,Sushil Jajodia.Exploring Steganography:Seeing the Unseen.IEEE Computer,February 1998,31(2):26-34.
    [14] Ross Anderson,Roger Needham,Adi Shamir.The stegnographic file system.Proceeding Information Hiding,1998,73-82.
    [15] A.Z.Tirkel,G.A.Rankin,R.M.Van Schyndel.Electronic watermark,Digital Image Computing.Technology and Application,1993(1):666-673.
    [16] Fabien A.P.Petitcolas,Ross J.Anderson and Markus G.Kuhn.InformationHiding A Survey,Proc.of IEEE.1999,87(7):1062-1078.
    [17] F.Hartug,M.Kutter.Multimedia watermarking techniques.Proceedings of the IEEE,1999,87(7):1079-1107.
    [18] G.Voyatzis,I.Pitas.The use of watermarks in the protection of digital multimedia products.Proceedings of the IEEE,1999,87(7):1197-1207.
    [19] H.J.Ramon,P.Rernando.Statistical analysis of watermarking schemes for copyright protection of images.Proceedings of IEEE,1999,87(7):1142-1166.
    [20] C.I.Podilchuk,W.Zeng.Image-adaptive watermarking using visual models.IEEE Journal on Seclected Areas in Cmmunications,May 1998,16(4):525-539.
    [21] Barnett R. and Pearson D.Attack Operators for Digitally Watermarked Images.IEEE Proceedings Vision,Image and Signal Processing,271-279.
    [22]阮秋崎.图像处理基础[M].北京:中国铁道出版社,68-72.
    [23]傅德胜,寿亦禾著.图形图像处理学[M].南京:东南大学出版社,279-284.
    [24]陈祖尚.DCT快速新算法及滤波器结构研究与子波变换域图像降噪研究[D].广州:华南理工大学博士论,2004.
    [25]王建哲,姜县明.一种基于DCT变换的数字水印技术[J].计算机工程与应用.2004,38(6):105~105.
    [26]易开祥.数字图像加密与数字水印技术研究[博士学位论文].杭州:浙江大学,2001:20~25.
    [27]郑江滨,郑延平,赵荣椿.基于彩应分量DCT域的数字图像水印[J].西北工业大学学报.20(1):70~74.
    [28]梅袭羹,卢宗庆,谢维信.一种彩色图像自适应数字水印算法[J].深圳大学学报(理工版) .18 (3):19~27.
    [29]刘景.基于样图的二维纹理合成技术研究.河海大学硕士学位论文.2003.
    [30]王炳锡.数字水印技术[M].西安:西安电子科技大学出版社.2003.
    [31]钟桦,焦李成.数字水印与图像认证-算法及应用[J].西安:西安电子科技大学出版社.2006.
    [32]杨洁.数字文本图像的水印嵌入和提取算法研究[D].西安:西安科技大学. 2006.
    [33]黄倩蓉.基于DCT和指纹识别的数字水印在身份认证中的应用[D].哈尔滨:哈尔滨工程大学硕士论文2006.
    [34]李京兵.基于变换域抗几何攻击数字水印算法研究[D].重庆:重庆大学.2007.
    [35]吴杰.基于DCT变换的分块数字水印算法[D].电脑知识与技术.2007.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700