基于小波变换的数字图像水印技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着数字化信息时代的到来,越来越多的数字化产品普及到了人们的日常生活。虽然数字化技术对信息的处理、传播和复制了提供极大的便利,但同时它也带来了一些负面效果,如版权盗用、恶意篡改和非法拷贝等问题。数字图像作为多媒体信息重要载体,对它的版权保护和内容真实性的认证技术的研究具有重要的理论与实际应用价值。为此,本论文对这一课题进行了深入的研究,研究工作如下:
     (1)对哈尔小波变换、Logistic混沌和Arnold置乱的理论在图像处理应用上进行了研究,并给出了在计算机上对哈尔小波变换、Logistic混沌及Arnold置乱的模拟结果。
     (2)在零水印技术基础上,结合小波变换后对于图像低频信息保留原图像能量高的优点,本论文提出了一种利用拓展的版权水印和混沌密钥的图像零水印算法。该算法首先将由版权水印利用混沌密钥加密,然后利用图像特征稳定性,将原始图像生成图像特征矩阵与混沌加密后的用户版权水印矩阵进行相关运算生成版权认证矩阵,接着将版权认证矩阵、时间戳、图像信息保存到版权数据库以用作版权认证。实验表明,所提出的方案在对抗图像的常规攻击及裁剪攻击下具有良好的鲁棒性。
     (3)根据自嵌入图像认证思想,本论文提出一种新的基于哈尔小波变换的半脆弱图像数字水印算法。该算法首先利用峰值信噪比确定图像可嵌入水印的最大容取值,然后根据可嵌入水印的最大容取值将基于原始图像内容的构造的水印量化地嵌入小波变换之后的低频系数2*2分块中,最后将对接收到的图像内容和提取的水印进行分块相关性比较,检测图像内容完整性和真实性。实验表明,该算法对图像的抗压缩、噪声、滤波等常规攻击中具有较强的鲁棒性,能准确地实现篡改的检测,具有可行性和实用性。
With the advent of the digital information age, more and more digital products become popular in our Daily life. Although digital information technology of copying, and reproducing provides great convenience, meanwhile it brings some negative effects, such as the copyright theft and malicious tampering and illegal copying. As digital image is an important carrier of multimedia information, its copyright protection and authentication technology have important theoretical and practical value. Thus this paper conducts the research in this area and the contents are listed in the following
     (1) Firstly, it studies HAAR wavelet transform, Logistic chaos and Arnold scrambling in Image processing, and presents simulation results of HAAR wavelet transform, Logistic chaos and Arnold scrambling.
     (2) Based on non-watermark techniques, and the advantage of high energy of the original image after wavelet transform, this paper proposes a watermarking algorithm using the expandability of the copyright watermark technique and chaotic keys. Firstly, the algorithm encrypts the copyright image watermark by using chaos keys, then uses the stable features of the original image, and the characteristic matrix generated by the original image and copyright image watermark matrix with chaotic key encryption. Then, it makes some kinds of calculation for generating authentication matrix. Finally the authentication matrix, time stamp, and image information are saved to the watermark database for copyright authentication. Experiments show that the proposed scheme is robust against the conventional image attacks and the cutting attack.
     (3) According to the idea of embedded image authentication, this paper presents a new half fragile image watermarking algorithm based on HAAR Wavelet transform. Firstly, this algorithm determines the maximum value which the image can embed according to the needed peak signal-to-noise ratio value (PSNR) before and after image embedding. Then according to the maximum watermark capacity, the watermark image is embedded based on the HAAR wavelet-transform of the original image in the 2 * 2 low-frequency coefficients. Finally the embedded image content is extracted based on correlation comparison, detection images content integrity and authenticity. Experiments show that this algorithm is robust to image anti compress, noise, and filtering in conventional attacks, can accurately detect which region is tampered, and has the feasibility and practicability.
引文
[1]易开祥.数字图像加密与数字水印技术研究发展[J].中国图像图形学报,2001,6(2):111-117.
    [2]陈丹,王育民.基于水印的图像认证和完整性保护技术[J].通信技术,2003,139(7):93-95.
    [3]SWANSON M,KOBAYASHI K,TEWFIK A H.Multimedia data-embedding and watermarking technologies[J].Proc of theIEEE,1998,86(6):1064-1087.
    [4]Cox J, Kilian J, Leighton F T,et al. Spread Spectrum Watermarking for Multimedia [J]. IEEE transactions on imageprocessing,1997,6(12):1673.
    [5]E. Koch, J. Rindfrey, and J. Zhao. Copyright Protection for Data [A]. Proc. of the International Conference on Digital Media and Electronic Publishing [C].
    [6]ACKEN J M.How Watermarking adds value to digital content[J]·Communications of the ACM,1998,41 (7):74-77..
    [7]Schyndel R G van, Tirkel A Z, Osborne C F. A digital watermark. First IEEE International Image Processing Conference.1994:86-90
    [8]GC.Langelaar, R.L.Lagendijk, J.Biemond, metal.Removing Spatial Spread Spectrum Watermarks by Nonlinear Filtering.EUSIPCO98[C].Greece,1998.
    [9]尹浩,林闯,邱锋,丁嵘.数字水印技术综述[J].计算机研究与发展.2005年07期:1093-1099.
    [10]杨义先,钮心忻.数字水印与理论与技术[M].高等教育出版社,2006.3:1-80.
    [11]刘瑞祯,谭铁牛.数字图像水印研究综述[J].通信学报,2000年8月:39-48.
    [12]温泉,孙锬峰,王树勋.零水印的概念与应用[J]电子学报,2003,31(2):214-216.
    [13]Fridrich J, Goljan M. Images with self-correcting capabilities. In:Proc. of the ICIP'99. Kobe,1999.792-796.
    [14]Lin PL, Huang PW, Peng AW. A fragile watermarking scheme for authentication with localization and recovery. In:Proc. of IEEE the 6th Int'l Symp. on Multimedia Software Engineering (ISMSE 2004). IEEE Computer Society,2004.146-153.
    [15]和红杰,张家树.对水印信息篡改鲁棒的自嵌入水印算法[J].软件学报,2009.2,20(2):437-450.
    [16]He J, Zhang JS. Chaos-Based scramble self-embedding watermarking algorithm. Journal on Communications,2006,27(7):80-87 (in Chinese with English abstract).
    [17]Tirkel A Z. Electronic Watermark[C].Proceedings of Digital Image Computing:Techniques and Applications,1993:666-673.
    [18]BENDER W, GRUHL D, MORIMOTO N, et al. Techniques for Data Hiding[J]. IBM Systems Journal,1996,35(3/4)313-336.
    [19]M.S. Fu and O.C. Au, "Data Hiding Watermarking for Halftone Images," IEEE Trans. Image Processing, vol.11, no.4,2002, pp.477-484.
    [20]周利军,周源华.基于直接序列扩频码的图像空间域水印技术.软件学报,2002,13(2):298-303.
    [21]黄继武,yq Shi,程卫东.DCT域图像水印:嵌入对策和算法[J].电子学报,2000,28(4):57-60.
    [22]O'Ruanaidh J J K, Pun T. Rotation, scale and translation invariant spread spectrum digital image watermarking.S ignal Processing,1998,66(3):303-317.
    [23]黄达人,刘九芬等.小波变换域图像水印嵌入对策和算法[J].软件学报,2002,13(7)1290-1297.
    [24]李海峰,宋巍巍,王树勋.基于Contourlet变换的稳健性图像水印算法[J].通信学报.2006,27(4):87-94
    [25]Petitcolas, F.A. P., Anderson, R. J., and Kuhn, M. G., "Information hiding-A survey," in Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, Vol.87 (7), pp.1062-1078,1999.
    [26]贾永红.数字图像处理[M].2008.6:10-14.
    [27]金聪.数字水印理论与技术[M].清华大学出版社,2007.12:1-31.
    [28]王颖,肖俊,王蕴红.数字水印理论与技术[M].科学出版社,2003.7:1-17.
    [29]Kutter M,voloshynovskiy S,Herrigel A. The watermark copy attack[A].Proc of the SPIE[C].San Jose,2000:371-380.
    [30]Kutter M, Petitcolas F A P. A fair benchmark for image watermarking systems.proceddings of SPIE.security and Watermarking of Multimedia contents,1999,3657:226-239.
    [31]谢贤智.基于时间戳认证的零水印方案研究[J].微计算机信息,2007,10(18):45-49.
    [32]俞登峰.基于SVD分解和傅立叶一梅林变换的零水印技术研究[M].北京化工大学,2008.11:15-25.
    [33]王国栋,刘粉林,汪萍,耿楠楠.一种篡改检测与篡改定位分离的图像认证方案[J].计算机学报,2007,10(30):1880-1888.
    [34]张宪海,杨永田.基于脆弱水印的图像认证算法研究[J].电子学报,2007,35(2):34-35.
    [35]Chang C, Hu Y S, Liu T C. A Watermarking-based image ownership and tampering authentication scheme [J].Pattern Recogn.Lett.2006,27:439-446.
    [36]王向阳,陈利科.一种新的自适应半脆弱水印算法[J].自动化学报.2007,33(4):564-565.
    [37]王艳辉,王相海.基于提升方案小波的半脆弱水印图像认证算法[J].计算机工程与设计,2007.10,28(20):4955-4958.
    [38]乔静,袁海东,樊永良,王莎.多媒体信息内容认证中的半脆弱数字水印技术[J].计算 机应用,2007,6,27:268-270.
    [39]郝亮.面向图像认证的变换域数字水印技术研究[D].[硕士学位论文].西安理工大学,2010,Ⅰ-Ⅳ
    [40]田冰.用于图像认证的半脆弱数字水印技术研究[D].[硕士学位论文].上海交通大学,2007.1:1-3
    [41]吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报,2004.9:1153-1161.
    [42]马建湖,何甲兴.基于小波变换的零水印算法[J].中国图象图形学报,2007,12(4):581-585..
    [43]刘涛,曾祥利,曾军主编,冼劲审.实用小波分析入门[M].国防工业出版社,2006.4:40-101.
    [44]孙延奎.小波分析及其应用[M].机械工业出版社,2005.3:1-198.
    [45]林福宗.多媒体技术基础[M].清华大学出版社,2002.9:140-193.
    [46]张华熊,仇佩亮.置乱技术在数字水印中的应用*[J].电路与系统学报.2001.9,6(3):33-37.
    [47]郝柏林.从抛物线谈起—混沌动力学引论[M].上海科技教育出版社,1993,9:1-110.
    [48]Heinz georg schuster.deterministic chaos,an introduction (second revised edition).Federal Republic of Germany:VCH,1988.
    [49]V. I. Arnold and A. Avez, Ergodic Problems of Classical Mechanics (Benjamin, New York, 1968).
    [50]齐东旭,邹建成,韩效宥.一类新的置乱变换及其在图像信息隐蔽中的应用*[J].中国科学(E辑)2000,10.30(5):440-447.
    [51]陈晨,成礼智.基于奇异值的DWT域公开零水印技术.通信学报,2006,11.27(11A):81-84
    [52]Zhu B., Swanson M. D., Tewfik A. H.. Transparent robust authentication and distortion measurement technique for images[J]. In:Proceedings of the 7th IEEE Digital Signal Processing Workshop Loen. Norway,1996,45-48.
    [53]Yeung M, M intzer F. An invisible watermarking technique for image verification[J]. In: Proceedings of the IEEE International Conference on Image Processing, Santa Barbara, USA,1997,2:680-683.
    [54]孙宏琦,施维颖,巨永锋.利用中值滤波进行图像处理[J],长安大学学报.Mar.2003.Vo1.23,No.2.文章编号:1671-8879(2003)02-0104-03.
    [55]杨素敏,王嘉祯,彭德云,胡建理.基于HVS和小波变换的零水印数字图像算法[J],计算机工程与应用,2006,12:63-64.
    [56]Min-Jen Tsai,Chih-Cheng Chien. Authentication and recovery for wavelet-based semi-fragile watermarking. SPIE, June 2008.
    [57]Tien-You Lee, Shinfeng D, Lin. Dual watermark for image tamper detection and recovery. Patten Recognition,2008,41:3497-3506.
    [58]贺仁亚,程乾生.一种用于认证的小波变换域的数字水印技术[J],计算机辅助设计与 图形学学报,2001,13(9):812-815.
    [59]沃焱,韩国强,张波.一种新的基于特征的图像内容认证方法[J],计算机学报,2005,28(1):105-112.
    [60]Xie L H, Arce G R. A class of authentication digital watermarks for secure-multimedia. IEEE Transactions on Image Processing,2001,10(11):1754-1764.
    [61]朱从旭.实现图像版权通知、保护和内容认证的多功能水印[J],通迅学报,2009,30(11A):101-104.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700