结合人类视觉特性的小波域图像数字水印算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
本文主要研究了基于小波变换的数字图像水印技术。系统地介绍了数字水印的研究背景及意义、研究现状、特征和分类,给出了图像数字水印技术的基本框架、常见攻击、评价标准以及典型算法,并简要的概述了小波分析理论。本文提出了几种结合人类视觉特性的小波域图像数字水印算法。
     提出了一种基于人类视觉系统的小波域图像水印算法。算法利用人类视觉特性和小波变换的特点对小波域JND门限模型进行改进,并计算载体图像各小波系数临界可见误差(JND)门限,通过选择一组JND门限较大的小波系数嵌入数字水印信息。实验结果显示该算法具有很强的鲁棒性和不可见性。由于各个小波系数的嵌入强度是一样的,算法较强的抗攻击性能是建立在水印透明性有一定程度破坏的基础上,如果水印过大这种破坏就比较明显。因此,该算法适应于小容量水印系统。
     提出了一种基于水印容量的小波域图像水印算法。确定水印嵌入模型,通过修改小波系数实现水印的嵌入,水印嵌入强度由JND门限计算得到。由此,利用水印容量公式建立该水印模型下载体图像水印容量的估计方法;并根据水印攻击类型和强度,对载体图像的水印容量进行估计值,根据此估计值调整水印的大小。针对水印攻击类型和强度无法确定情况下,通过对水印容量公式的分析,选择水印失真上限较高的一组小波系数嵌入水印信息提高水印鲁棒性。实验表明该水印算法具有较好的不可见性,对于常见的水印攻击如:添加噪声、图像滤波和JEPG压缩有很强鲁棒性。由于算法利用混沌系统预处理水印,使得算法具有较高的安全性并且对图像剪切攻击也有较强的鲁棒性。对于其他几何攻击下,算法提取的水印效果不理想。
     提出了一种基于小波变换的抗几何攻击图像水印算法。介绍了几种常见的抗几何攻击水印方案,本文选择基于图像特征抗几何攻击方案实现算法的抗几何攻击性能,将小波分解的低频子图作为载体图像的图像特征嵌入水印信息。通过对低频子图的小波系数的分块量化实现水印的嵌入,并且根据人类视觉特性和几何攻击特点增加低频子图纹理区小波系数的量化步长。水印提取过程:将水印图像的低频子图进行分块,根据多数原则判定各个子块所含的1bit水印信息。试验结果表明,该算法具有水印容量大,水印盲提取,水印不可见性好以及抗攻击性能好的特点,其中算法抗攻击性能包括算法对常见几何攻击和添加噪声、JEPG压缩等有较强的鲁棒性。
This dissertation studied technique of image digital watermarking based on wavelet transform. The purpose of the research, the history of the watermarking technique, the development status of multimedia watermarking and the characteristics and classification of watermarking were reviewed. This dissertation surveys systematically, the basic frame of the watermarking system and attacks classification and typical algorithms. Then, this dissertation introduces the basic knowledge of wavelet transformation including the background of wavelet analyzing, consecutive wavelet transformation, discrete wavelet transformation, and multi-differentiating analyzing and Mallat algorithm. On this basis, several image digital watermarking algorithms based on wavelet transform were presented.
     This dissertation introduced a wavelet watermarking method based on human visual system (HVS). In the algorithm, using the HVS to compute the JND threshold in wavelet domain of original image, the watermark information were embedded into a set of wavelet coefficients of lager JND threshold. The experiments showed that this algorithm had strong robustness and invisibility. As the embedding intension of each wavelet coefficient was the same, the strong resistance to watermark attacks of this algorithm wad based on watermark transparency damaged, If the watermark was too large, such damage was more evident. Therefore, the algorithm was adapted to small-capacity watermarking system.
     This dissertation studied the image watermarking capacity analysis in wavelet domain. First, the watermark embedding model was determined, which was achieved by the rule of modifying the wavelet coefficients, the watermark embedding intension was calculated by JND model. Then, the estimation of watermarking capacity were established by the watermarking capacity formula in this watermark embedding model; By the watermark attack type and intensity, watermarking capacity estimates of original image could calculate. Algorithm could adjust to the size of watermark by the estimate. Generally, as the type and intensity of watermark attacks could not be determined, a group of wavelet coefficients with lager allowable distortion was chosen to embedded watermark based on the watermarking capacity analysis, the watermark embedding intension was decided by allowable distortion. Experimental results showed that this algorithm could get a watermarked image with perceptual invisibility. Moreover, the algorithm was robust to typical watermark attacks such as: noise adding, image filter and JPEG compression. As the algorithm used chaotic system to pre-process watermark, algorithm had high security and robustness to cropping attack. Whereas, the effect of watermark extraction by this algorithm under others geometric attacks were not perfect.
     A geometric attack resistant image digital watermarking algorithm based on wavelet transform was proposed in this dissertation. First, several typical geometric attack resistant watermarking scheme were introduced. This algorithm regarded the low-frequency subband of original image as the image character to embed watermark. The low-frequency subband was divided into many blocks, and then 1 bit of watermark information was embedded into each block repeatedly by quantization, and according to the characteristics of human visual system, we increased the quantization step of wavelet coefficients in highly textured areas. For watermark extracting, the 1 bit of watermark information was obtained by majority rule from each block. The watermark capacity of the algorithm was large and we didn’t need the original image to extract watermark. Experimental results showed that the algorithm could effectively resist geometric attacks in various ways, and it also strongly robusted against the common attacks such as noise adding and JPEG compression etc.
引文
[1] Wolfgang R B, Podilchuk C I, Delp E J, Perceptual watermarks for digital images and video. Proceedings of the IEEE, 1999, 87(7), pp.1108~1126
    [2] Hu Y, Kwong S. Wavelet domain adaptive visible watermarking[J]. Electronics Letters, 2001, 37(20), pp.1219~1220
    [3] Cox I J, Kilian J, Leighton F T, Shamoon T. Secure spread spectrumwatermarking for multimedia[C]. IEEE Transactions on Image Processing,1997,6(12),pp.1674~1687
    [4] Walker C. Personal Communication[J]. Muzak Corporation, June 2001
    [5] Tirkel A Z, Rankin G A, van Schyndel R M, et al.. Electronic water mark[A]. Proceedings DICTA. Sydney, Dec.1993: 666~672
    [6]孙圣和,陆哲明.数字水印处理技术[J].电子学报,2000,28(8):85~9
    [7]刘瑞祯,谭铁牛.数字图像水印研究综述[J].通信学报,2000,8:39~48
    [8]黄继武,谭铁牛.图像隐形水印综述[J].自动化学报,2000,26(5):645~654
    [9] Ingemar J, Cox, Matt, L Miller. The First 50 Years of Electronic Watermarking[J]. Journal of Applied Signal Processing, 2002, 2: 126~132
    [10]刘振华,尹萍.信息隐藏技术及其应用[M].北京:科学出版社,2002,2,142~147
    [11]孙圣和,陆哲明,牛夏牧.数字水印技术及应用[M].北京:科学出版社,2004年11月,48~49
    [12]王丽娜,张焕国.信息隐藏技术与应用[M].武汉:武汉大学出版社,2003年8月,29~31
    [13] Van Schyndel R G, Tirkel A Z, Osborne C F. A digital watermark. Processing of ICIP'94. 1994,2: 86~90
    [14]陈明奇,钮心忻,杨义先.数字水印的研究进展和应用[J].通信学报,2001,5:71~79
    [15]罗守山,刘珺,钮心忻等.信息安全技术讲座第1讲信息隐藏技术[J].中国数字通信, 2002, 4(10): 83~88
    [16] Chiou-Ting Hsu, Ja-Ling Wu. Hidden Digital Watermarks in Images[J]. IEEE Transactions on Image Processing, 1999, 8(1): 58~68
    [17] Bruce Schneier. Applied Cryptography Second Edition: Protocols, Algorithms, and Source Code in Data hiding[C]. John Wiley & Sons Inc. 1996
    [18] Koch E, Zhao J. Toward Robust and Hidden Image Copyright Labeling[J]. Proc. Workshop Nonlinear Signal and Image Processing, Marnaros, Greece, June, 1995
    [19]尹康,向辉,石教英.多媒体数据数字水印系统及其攻击分析[J].计算机科学, 1999, 26(10): 44~48
    [20] Cox I J. Secure Spread Spectrum Watermarking for Images Audio and Video[J]. NJ: NEC Res Inst, Princeton, 1995: 95~103
    [21] Voloshynovskiy S, Pereira S, Iquise V. Attack Modeling: towards a Second Generation Watermarking Benchmark[J]. Signal Processing, 2001: 1177~1214
    [22] Moulin P O, Sullivan J A. Information Theoretic Analysis of Information Hiding[J]. IEEE Transactions on Information Theory, 2003, 49(3): 563~593
    [23] ISO/IEC JTC1/SC29/WG1 JPEG2000 part I final committeedraft version1 [S/OL]. http:// www. jpeg. org/public/fcd15444-1.pdf. 2000, 03: 16
    [24] ISO/IEC JTC1/SC29/WG11, N 2323. Overview of the MPEG-4 Standard. Dublin, Ireland, 1998
    [25] Jana Dittmann, Mark Stabenau, and Ralf Steinmetz. Robust MPEG Video Watermarking Technologies[J]. Proc. Of the 6th ACM International Conference on Multimedia, 1998: 71~80
    [26] Xia Xiang-Gen, Charles G. Boncelet, and Gonzalo R. Arce. A Multiresolution Watermark forDigital Images[J]. Proc. Of IEEE, 1997: 548~551
    [27] Wengwu Zhu, Zixiang Xiong, and Ya-Qin Zhang. Multiresolution Watermarking for Images and Video: A Unified Approach[J]. Proc. Of International Conference on Image Processing, 1998, Vol. 1: 465~468
    [28] Ioannis Pitas. A Method for Watermark Casting on Digital Images[J]. IEEE Trans. On Circuit and Systems for Video Technology, Vol. 8, No. 6, 1998: 775~780
    [29]周利军,周源华.基于直接序列扩频码的图像空间域数字水印技术[J].软件学报, 2002, 13(2): 298~303
    [30] Garimella A, Satyanarayana M V V, R Satish Kumar, et al. VLSI Implementation of Online Digital Watermarking Technique with Difference Encoding for 8-bit Gray Scale Image[J]. 16th International Conference on VLSI Design, Jan. 4-8, 2003: 283~288
    [31] Bender W, Gruhl D, and Morimoto N. Technique for Data Hiding[J]. IBM System Journal, 1996, 35(3-4): 313~336
    [32] Hayes M H. The Reconstruction of a Multidimensional Sequence from the Phase of Magnitude of the FFT[J]. IEEE Transactions on Acoustics, Speech and Signal Processing, 1992: 108~154
    [33] Hong I, Kim I, Han S. A Blind Watermarking Technique Using Wavelet Transform[J]. IEEE International Symposium on Industrial Electronics(ISIE’2001), June 12-16, 2001, 3: 1946~1950
    [34]崔锦泰著,程正兴译.小波分析导论[M].西安交通大学出版社,1995,1
    [35] Lemarie P G. Sur I. existence des Analyses Multiresolutions en Theorie des Ondeletter Rev. Mat Iberoamericana,1992,8:457~474
    [36] Daubechies I,著;李建平,杨万年,译.小波十讲[M].北京:国防工业出版社,2004.127~153.
    [37]徐晨,赵瑞珍,甘小冰.小波分析-应用算法[M].北京:科学出版社, 2004: 81~117.
    [38]葛哲学,沙威.小波分析理论与MATLAB R2007[M].电子工业出版社,2007,10
    [39] Wang H J, Su P C, et al. Wavelet-based digital image watermarking[J]. Optics Express, 1998, 3(12): 491~496
    [40] Mallat S. Multifrequency channel decompositions of images and wavelet models[J]. IEEE Transaction on Acoustics Speech and Signal Processing, 1989, 37(12):2091~2110
    [41]魏海.基于小波的压缩域图像检索技术的初步研究[D].北京:北京工业大学,2001
    [42]肖亮,韦志辉,吴慧中.一种利用人眼视觉掩盖的小波域数字水印[J].通信学报2002, 23(3): 100~106.
    [43]董彬,林小竹,徐凤.基于人类视觉系统的小波域数字水印算法[J].计算机工程,2006, 32(24): 138~140.
    [44] Lewis A S, Knowles G. Image compression using the 2-D wavelet transform. IEEE Trans on Image Processing[J],1992, 1(4): 244~25.
    [45] Barni M,Bartolini F,Piva A .Improved Wavelet-based Watermarking Through Pixel-wise Masking[J].IEEE Trans. on Image Processing, 2001, 10(5): 783~791
    [46]王育民,张彤,黄继武.信息隐藏-理论与技术[M].北京:清华大学出版社,2006.3
    [47] Levicky D,Foris P. Human Visual System Models in Digital Image Watermarking[J]. Radio engineering, 2004, 13(4):1123~1126
    [48]张晓威,江世媛.小波域内JND数字水印算法的改进[J].哈尔滨工程大学学报,2005,Vol.26(6): 814~817
    [49] Derchyuan L, Jianglung L, MingChang C. Digital Watermarking Using Multiresolution Wavelet Transform[C]. Proc. of the 37th IEEE Annu. Int. Carnahan Conf. on Security Technology, 2003: 370~377
    [50]陆哲明,姜守达,董寒丽.基于人类视觉系统的自适应水印嵌入算法[J].哈尔滨工业大学学报,2003,35(2):138~141
    [51]刘宏伟,谢维信,喻建平,闫晓涛.基于人类视觉系统的自适应数字水印算法[J].上海交通大学学报,2008,7(42):1144~1147
    [52]柏均.基于人眼视觉特性的自适应图像水印算法研究:[硕士学位论文].陕西:西安科技大学,2005
    [53] Cox I J, Miller M L, McKellips A L. Watermarking as communications with side information. Proc. IEEE, 1999, 87: 1 127~1 141
    [54] Servetto S D, Podilchuk C I, Ramchandran K. Capacity issues in digital image watermarking. in: Proceedings 1998 International Conference on Image Processing. Chicago, IL, USA: IEEE, 1998: 445~449
    [55] Barni M, Bartolini F, De Rosa A. et al. Capacity of the watermark-channel: how many bits can be hidden within a digital image. in: Proceedings of the 1999 Security and Watermarking of Multimedia Contents. San Jose, CA, USA: SPIE, 1999.437~448
    [56] Moulin P. The role of information theory in watermarking and its application to image watermarking. Signal Processing, 2001, 81(6):1121~1139
    [57] Costa Max H M. WRITING ON DIRTY PAPER. 1983, IT-29(3): 439~441
    [58] Zhang Fan, Zhang Hongbin. Capacity and reliability of digital watermarking. in: Proceedings of 2004 International Conference on the Business of Electronic Product Reliability and Liability. Shanghai, China: IEEE, 2004.162~165
    [59] Zhang Fan, Zhang Hongbin. Digital watermarking capacity research. in: Proceedings of the International Conference on Communications, Circuits and Systems. Chengdu, China: IEEE, 2004.796~799
    [60]张帆,张鸿宾.小波域图像水印容量分析[J].计算机工程,2005,31(18):138~139
    [61] Moulin P, O’Sullivan J A. Information-theoretic analysis of information hiding [J]. IEEE Trans. Inf. Theory, 2003, 49(3):563~593
    [62]张帆.视觉失真和图像信息隐藏研究:[博士学位论文] .湖北:华中科技大学,2008
    [63] Cohen A S, Lapidoth A. The Gaussian watermarking game. IEEE International Symposium on Information Theory, 2002, 48(6): 1639~1667
    [64]王兴元,王明军.二维Logistic映射的混沌控制[J].物理学报,2008(57)(02):0731~06
    [65]钱书胜,杨红梅.基于人类视觉系统的水印容量分析[J].计算机应用与软件,2008,25(5): 225~226
    [66]王振飞,施保昌,王能超.基于小波变换和人类视觉系统的稳健水印算法[J].华中科技大学学报(自然科学版),2007,35(1):26~28
    [67] S.Jin Seo and Yoo Chang D.Image watermarking based on invariant regions of scale-space representation[J]. IEEE Trans.On Signal Process.,Appril 2006,vol.54,no.4.
    [68]刘九芬,黄达人,黄继武.图像水印抗几何攻击研究综述[J].电子与信息学报2004,26,09.
    [69]李昌利,卢朝阳.数字水印的去同步攻击及其对策[J].中国图象图形学报, Vol.10, No.4, Apr., 2005, pp. 403-408
    [70]潘蓉.数字图像的盲水印技术研究:[博士学位论文] .陕西:西安电子科技大学,2005
    [71]许文丽,李磊,王育民.抗噪声、几何失真和JPEG压缩攻击的鲁棒数字水印方案[J].电子与信息学报. 2008, 30(4): 933~936
    [72]李京兵.基于变换域抗几何攻击数字水印算法研究:[博士学位论文] .重庆大学,2007
    [73] Kutter M, Jordan F, and Bossen F. Digital watermarking of color images using amplitude modulation[J]. J Electron Imag, Apr.1998, vol.7,no.2,pp.326~332.
    [74] Setyawan J I, Kalker T, and Lagendijk R. Exhaustive geometrical search and the false positivewatermark detection probability[A]. Proc. SPIE-Security and Watermarking of Multimedia Contents V,vol.5020,pp.203~214,Jan.2003.
    [75]王丹.抗几何攻击的信息隐藏技术研究:[博士学位论文] .上海,复旦大学,2008
    [76] Pereira S and Pun T. Fast robust template matching for affine resistant image watermarking [A]. in International Workshop on Information Hiding, ser. Lecture Notes in Comuter Science. Berlin, Germany: Springer-Verlag,Sept.29-Oct.1,1999,vol.LNCS 1768,pp.200~210
    [77] Pereira S, O’Ruanaidh J J K, Deguillaume F, et al.. Template based recovery of Fourier-based watermarks using log-polar log-log maps[A]. IEEE Int. Conf on Multimedia Computing and Systems(ICMCS’99), Florence, June 1999, Italy
    [78] Herrigel A, Voloshynovskiy S,and Rytsar Y. The watermark template attack[A], in Proc. IS&T/SPIE Electronic Imaging,San Jose,CA,Jan.2001,pp.394~405
    [79] Dong P, Brankov J. Geometric robust watermarking through mesh based correction[A]. In: Proceedings of International Conference on Image Processing 2002[C], Rochester, USA, 2002: 493~496
    [80] Davoine F. Triangular meshes. A solution to resist to geometric distortions based watermark removal softwares[A]. in Proc. Eur. Signal Processing Conf., vol.3, Jun.2000, pp.493~496
    [81]胡玉平,韩德志,羊四清.抗几何变换的小波域自适应图像水印算法[J].系统仿真学报, Oct. 2005, Vol.17 No.10
    [82] Lin C Y, Wu M, Bloom J A, et al.. Rotation, scale, and translation resilient public watermarking for images. IEEE Trans.on Image Processing,2001,10(5):755~766
    [83] Lin C Y. Public watermarking surviving general scaling and cropping. An application for print-and-scan process, Multimedia and Security Workshop at ACM Multimedia 99, Orlando, Fl, USA, Oct. 1990
    [84] O’Ruanaidh J J K, Pereira S. A secure robust digital image watermark, In Electronic Imaging: Processing , Printing and publishing in Colour, SPIE Proceedings, Zurich, Switzerland, May 1998
    [85] O’Ruanaidh J J K, Deguillaume F, et al. Template based recovery of Fourier-based watermarks using log-polar and log-log maps, IEEE Int. Conf on Multimedia Computing and Systems(ICMCS’99), Flrience, Italy, June 1999
    [86] Woo C S, Du J, and Pham B, Geometric invariant domain for image watermarking, Shi Y Q and Jeon B(Eds): IWDW2006, LNCS4283, pp. 294~307
    [87] Kutter M, Bhattacharjee S K, Ebrhimi T. Towards second generation watermarking schemes [A]. ICIP’99, Kobe, Japan,October 25-28,1999,Vol.3:320~323
    [88]兰红星,陈松乔,胡爱娜,李陶深.基于小波域的第二代数字水印算法的研究[J].电子学报,2007, 35(4):1799~1803
    [89] Celik M U, Saber E, Sharma G, et al. Analysis of feature-based geometry invariant watermarking[A]. In Proceedings of SPIE: Security and Watermarking of Multimedia Contents III, Jan. 2001, Vol. 4314: 261~268
    [90]李旭东.抗几何攻击的空间域图像数字水印算法[J].自动化学报,2008,34(7):832~837
    [91]李雷达,郭宝龙,武晓钥.一种新的空域抗几何攻击图像水印算法[J].自动化学报,2008,34(10):1235~1242
    [92]刘九芬,黄达人,黄继武.抗几何攻击的小波变换域图像水印算法[J].浙江大学学报(工学版),2003,37(4):386~391

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700