数字水印技术在数字版区域地质图上的应用
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着多媒体技术和计算机网络的迅速发展,越来越多的数字信息产品通过网络广泛传播。在这一背景下,数字水印作为图像的内容认证中的应用主要手段,正得到广泛研究与应用,本论文以数字图像为研究对象,本文提出了一种对图像的剪切操作具有较好检测能力同时对中等强度JPEG压缩和图像处理具有较高鲁棒性的半易损水印方案。应用于区域地质图中。
     此方案利用8×8图像分块的直流系数生成二值水印序列W,对W采用Baker映射进行置乱得到最终水印Wb,然后将其嵌入到载体图像中。通过比较直接解出的兰乱水印和经Baker映射反变换后的解出水印,完成水印的嵌入之后对它的抗攻击性进行检测,提出了如何确定篡改的区域和篡改的类型是半易损水印的方法。实验结果表明,该算法具有好的鲁棒性和识别被篡改的区域能力。
With the multimedia technology and the rapid development of computer networks, more and more digital information products widely disseminated over the network. Brought in to facilitate the same time, which caused the illegal copying and malicious tampering, and other violations have also attracted attention. Against this backdrop, the official digital watermarking technology was born. Now, as a digital watermark image of the contents of the certification application of the main tools are widely research and application. This paper to digital images for the study, this paper presents a picture of the shear operation with better detection capability at the same time on the strength of middle-JPEG compression and image processing with high robustness of the semi-fragile watermarking program.
     This program uses 8×8 block images of the DC coefficient to generate binary sequence watermark W, on the adoption of W mapping Baker has been scrambling for the final watermark Wb, and then embedded vector images. By comparing the direct solution of a blue watermark chaos and anti-Baker mapping out solutions transformed watermark, the watermark is embedded after the completion of its aggressive anti-testing, raised the question of how to identify tampering with the regional and tampering with the type of semi-fragile Watermark. The results show that the algorithm is good and robust identification has been tampered with the region's capacity.
引文
1 W. W. Zhu, Z. X. Xiong and Y. Q. Zhang. Multiresolution Watermarking for Images and Video: A Unified Approach.In Proceedings of the IEEE International Conference on Image Processing, Chicago, USA, 1998: 456-468
    2 P. Kuesmaner. Optimal Stack Filters under Rank Selection and Structural Constraints. Signal Proceeding. 1995(41): 309-338
    3 J. Acken. How Watermarking Adds Value to Content. Communication of the ACM, 1998, 41(7): 74-77
    4 B. M. Macq, J. J. Quisquater. Cryptology for digital TV broadcasting. Proceedings of IEEE, 1995, 83(6): 945-957
    5 Ingemar J.Cox,Matthew L.Miller,Jeffery A.Bloom著.王颖,黄志蓓等译.数字水印[M].北京:电子工业出版社,2003
    6杨义先,钮心忻编著.数字水印理论与技术[M]北京:高等教育出版社,2006
    7 Ingemar J.Cox,Joe Killian,F.Thomson,Talal Shamoon.Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans. On Image Processing, Vol. 6, No. 12, 1997:1673-1687.
    8 Xia Xiang-Gen, Charles G. Boncelet, and Gonzalo R. Arce. A Multiresolution Watermark for Digital Images. Proc. Of IEEE, 1997: 548-551.
    9 Puate J.,Jordan F. Using Fractal Compression Scheme to Embedded a Digital Signature into An Image. Proc. Of SPIE, 1996.
    10 Fabien A. P. Petitcolas, Ross J. Anderson, Markus G. Kuhn. Attacks on Copyright Marking System. David Aucsmith, Ed.,Information Hiding, Second International Workshop, IH' 98,1998, Proceedings, LNCS 1525, Springer-Verlag:219-239.
    11 Fabien A. P. Petitcolas,Ross J. Anderson. Evaluation of Copyright Marking Systems. Proc. Of IEEE multimedia Systems(ICMCS' 99),Vol. 1, 1999: 574-579, 7-11.
    12 Cao Hanqiang, Zhu Guangxi, Zhu Yaoting, Zhang Zhenbing. Embedding a signature in an ImageBased on Fractal Compress Transformations. Journal of China Institute of Communications,Vol. 19, No. 5, 1998:69-74.
    13 Su P C,Wang H, Kuo C J.Digital Watermarking on EBCOT Compressed Images SPIE’s 44th Annual Meeting Applications of Digital Image Processing XXII(SD4 1),1999.
    14高珍,张伟.一种新的基于图块分类的水印算法.计算机工程Vol.31,No.24,Dec.2005.
    15倪蓉蓉,阮秋琦.一种基于迭代映射和图像内容的自适应水印算法.通信学报.Vol.25,No.5,May 2004.
    16 Hsieh Ming-shing,Tseng Din-chang,Huang Yong-huai.Hiding Digital Watermarks Using Multi-resolution Wavelet Transform.IEEE Transaction on Industrial Electro nics,2001,48(5).
    17刘彤,裘正定.小波域自适应图像水印算法研究.计算机学报,2002,25(11).
    18P.Bas,JMChassery.Geometrically invariant watermarking using feature points.IEEETrans.on Image Processing,Vol.11(2002)1014-1028.
    19 Chih-Wei Tang and Hsueh-Ming Hang,A Featured-Based Robust Digital Image Watermarking Scheme.IEEE Trans.on Signal Processing,Vol.51,No.4,April 2003.
    20Hae-YeounLee,Hyungshin Kim,Heung-Kyu Lee.Robust image watermarking using local invariant features.Optical Engineering 45(3),037002(March 2006)
    21 Mallat S,Zhong S.Characterization of signals from multiscale edges.IEEE Trans Pattern Analysis and Machine Intelligence,1992,14(7):710-732.
    22华先胜,石青云.局部化数字水印算法.中国图像图形学报.Vol.6(A),No.7,Jul 2001.
    23 Athanasios Nikolaidis and Ioannis Pitas.Region-Based Image Watermarking.IEEE Transactions on Image Processing.Vol.10,No.11,September 2001.
    24 Athanasios Nikolaidis and Ioannis Pitas.Robust Watermarking of Facial Images Based on Salient Geometric Pattern Matching.IEEE Transactions on Multimedia. Vol.2,No.3,September 2000.
    25 Harris C G,Stephens M J.A Combined Corner and Edge Detector.Proceedings Fourth Alvey Vision Conference,Manchester,1988:147~151.
    26 Xiaojun Qi.Image content-based geometric transformation resistant watermarking approach.IEEE ICASSP Vol.2(2005)29-32.
    27杨恒伏,陈孝威.小波域鲁棒自适应公开水印
    28 L.in E T, Podilchuk C 1, Delp E J. Detection of image alterations using semi-fragile watermarks[A],proceedings of SPIE Conference on Security and Watermarking of Multi-media Contents II[C] , san Jose, California, USA, 2000,3971:152-163.
    29 Marvel L M,Hartwig G W, C. Boncelet Jr CG Compressing compatible fragile and semi-fragile tamper detection Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents II[C],san Jose, CA,USA,2000,3971(12).
    30 Dittmann Jana. Content-fragile watermarking for image authentication [J].Proceedingsof SPIEConference on Security and Watermarking of Multimedia content III [c], 2001, 4314: 175-184.
    31 Eggers J., Girod B. Blind watermarking applied to image authentication [C]Proceedings of IEEE ICASSP, Salt Lake City, UT May 2001.
    32董刚,张良,张春田一种半易损性数字图像水印算法.通信学报2003,24 (1) : 33-38
    33 Lan TH, Mans our M F, Tewfik A H. Robust high capacity data embedding[C].ICASSP 2001,Utah April 2001、
    34 Paquet Alexandrea H, et al. Wavelet-based digital watermarking for image authentication [C].Proc.2002IEEE Canadian Conf Electrical and Computer Engineering 2002,12.
    35钟桦,焦李成DCT域半易损水印技术计算机学报,2005,28(9):1549-1557
    36Lin C Y, Chang S F. Semi-fragile watermarking for authentication JPEG visual content[A] proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents II [C], san Jose, CA. USA, Jan 2000, 3971( I 2):140-181. 51 Lin C Y, Chang S F. SARI: Self-Authentication-and-Recovery Image Watermarking System. ACM Multimedia 2001, Ottawa, Canada, Sep. 30-Oct 5., 2001

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700