基于图像内容的半易损水印技术的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着多媒体技术和计算机网络的迅速发展,越来越多的数字信息产品通过网络广泛传播。在给人们带来便利的同时,由此而引发的非法拷贝和恶意篡改等侵权行为也引起了人们的关注。在这一背景下,数字水印技术在多媒体,尤其是图像的内容认证中得到了广泛的应用,也引起了人们越来越多的重视。数字水印按照它的特性可以分为鲁棒性水印和易损性水印两种,两种水印都有其优缺点。本文综合了两种水印的优点,重点研究了介于两者之间的半易损水印技术。
     本文首先介绍了数字水印的国内外发展现状,接着讲述了数字水印的基本原理和相关的理论知识,然后分析了几种基于图像内容的数字水印的算法,阐述了课题中要用到的如小波变换,HVS人类视觉系统,半易损水印技术等方面的理论基础知识。最后参考和综合了多方面的研究资料,研究了一种基于图像内容的半易损水印算法。该算法将原始图象进行小波变换,将其变换后的小波近似系数用伪随机序列进行调制从而生成基于图象内容的水印信号。小波变换具有良好的空频特性,而且能够很好地匹配人类视觉系统,同时也与新的JPEG2000标准相兼容。论文在完成水印的嵌入之后对它的抗攻击性进行检测,讲述了如何确定篡改区域和篡改类型的半易损水印的方法。通过仿真试验证明,该算法具有好的鲁棒性和识别被篡改区域的能力。
Along with the fast development of the multimedia technology and computer network, more and more digital products are being transmitted through the internet. While bringing great convenience to people's life, it also cause illegal copy and malicious tempering. Digital watermarking in accordance with its characteristics can be divided into robust watermark and the vulnerability of the two watermark, the watermark both have their advantages and disadvantages. In this paper the advantages of two watermarking, focuses on the one in between semi-fragile watermarking technology.
     In this paper, the development of digital watermarking status at home and abroad, and then a digital watermark on the basic principles and relevant theoretical knowledge, and then analyzed the contents of several image-based digital watermarking algorithms, on an issue such as the use of wavelet Transform, HVS human visual system, semi-fragile watermarking technology, and other aspects of the theoretical foundation of knowledge. Finally reference and comprehensive information on various aspects of the study, which is based on image content Semi-fragile watermarking algorithm. This algorithm will be the original images wavelet transform, its approximation of wavelet transform coefficient using pseudo-random sequence modulation resulting in the formation of the content-based image watermark signal. Wavelet transform has good air-frequency characteristics, but also a good match human visual system, but also with the new JPEG2000 standard compatible. Papers completed the watermark embedded in it after the attacks of the anti-testing, to determine how to tamper with the regional and tampering with the type of semi-fragile watermarking method. Simulation experiments show that the algorithm has good robustness and identification were tampered with regional capacity.
引文
[1]刘九芬,黄达人等.数字水印中的正交小波基.电子与信息学报,2003,25(4):453-459.
    [2]刘彤,裘正定.图像内容真实性认证的半易损水印方案研究,通信学报,2004,25(5):138-142.
    [3]刘国华,华柏兴等.一种基于小波域的鲁棒性数字盲水印算法.杭州电子科技大学学报,2006,26(3):1-7.
    [4]华先胜,石青云.局部化数字水印算法.中国图像图形学报.2001,6:7-9.
    [5]齐东旭.分形及其计算机生成.北京:科学出版社,1997,36-39.
    [6]张磊,王汇源.基于混沌加密和HVS的数字水印技术,信息化与信息技术,2005,(3):453-459.
    [7]李水根,吴纪桃.分形与小波.北京:科学出版社,2002,10.
    [8]杨义先,钮心忻编著.数字水印理论与技术[M]北京:高等教育出版社,2006.
    [9]陈明,王书文.基于小波变换的图像自适应水印算法.西北名族大学学报,2006,27(62):31-34.
    [10]易开祥,孙鑫等.一种新的基于图像内容的半易损水印技术.系统仿真学报,2002,14(9):12001207.
    [11]胡玉平,陈志刚.用于图像认证的小波域半易损水印算法.电子学报,2006,(9):653-657.
    [12]倪蓉蓉,阮秋琦.一种基于迭代映射和图像内容的自适应水印算法.通信学报.Vol.25,No.5,May 2004.
    [13]贾竹君,邹志勇等.基于小波变换和纹理特征的自适应水印算法.微电子学与计算机,2006,23(8):171-180.
    [14]郭宝龙,郭磊.小波域数字图像水印算法的研究.计算机工程与应用,200238(13):45-48.
    [15]Ingemar J.Cox,Matthew L.Miller,Jeffery A.Bloom 著.王颖,黄志蓓等译.数字水印[M].北京:电子工业出版社,2003.
    [16]Athanasios Nikolaidis and loannis Pitas.Robust Watermarking of Facial Images Based on Salient Geometric Pattern Matching.IEEE Transactions on Multimedia.Vol.2,No.3,September 2000.
    [17] B. M. Macq, J. J. Quisquater. Cryptology for digital TV broadcasting. Proceedings of IEEE, 1995, 83(6): 945-957.
    
    [18] Chih-Wei Tang and Hsueh-Ming Hang,A Featured-Based Robust Digital Image Watermarking Scheme. IEEE Trans.on Signal Processing,Vol.51,No.4,April 2003.
    
    [19] Christine I. Podichuk and Wenjun Zeng. Image-Adaptive Watermarking Using Visual Models. IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, 1998:525-539.
    
    [20] Deepa Kundur,Dimitrios Hatzinakos. Robust Digital Image Watermarking Method using Wavelet-Based Fusion. In International Conference on Image Processing, IEEE, Santa Barbara,California, USA, October 1997:544-547.
    
    [21] Deepa Kundur, Dimitrios Hatzinakos. Digital Watermarking Using Multiresolution Wavelet Decomposition. In Proceedings of IEEE ICASSP'98, volume 5, Seattle, WA, USA, May 1998:2969-2972.
    
    [22] Emil Praun, Hugues Hoppe, Adam Finkelstein. Robust Mesh Watermarking. Proc. Of SigGraph'99,1999:49-56.
    
    [23] Fabien A. P. Petitcolas, Ross J. Anderson, Markus G. Kuhn. Attacks on Copyright Marking System. David Aucsmith, Ed., Information Hiding, Second International Workshop, IH' 98,1998, Proceedings, LNCS 1525, Springer-Verlag:219-239.
    
    [24] Fabien A. P. Petitcolas, Ross J. Anderson. Evaluation of Copyright Marking Systems. Proc. Of IEEE multimedia Systems(ICMCS'99), Vol. 1, 1999:574-579, 7-11.
    
    [25] G. Voyatzis, I. Pitas. Chaotic Watermarks for Embedding in the Spatial Digital Image Domain. Proc. Of the IEEE, 1998:432-436.
    
    [26] Hae-YeounLee,Hyungshin Kim,Heung-Kyu Lee.Robust image watermarking using local invariant features. Optical Engineering 45(3),037002(March 2006).
    
    [27] Ingemar J.Cox, Joe Killian, F.Thomson,Talal Shamoon. Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans. On Image Processing, Vol. 6, No. 12, 1997:1673-1687.
    
    [28] Ioannis Pitas. A Method for Watermark Casting on Digital Image. IEEE Trans. On Circuit and Systems for Video Technology, Vol. 8, No. 6, 1998: 775-780.
    [29]J.Acken.How Watermarking Adds Value to Content.Communication of the ACM,1998,41(7):74-77.
    [30]Jana Dittmann Content-fragile watermarking for image authentication[J].Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents Ⅲ[C],Ping Wah Wong,Edward J.Delp,vol4314,pp:175-184.2001.
    [31]Jana Dittmann,Mark Stabenau,Ralf Steinmetz.Robust MPEG Video Technologies.Proc.Of the ACM International Conference on Multimedia,1998:71-80.
    [32]Koch E,Zhao J.Image-adaptive watermarking using visual models.IEEE Hournal on Special Areas in Communications,1998,16(4):525-539.
    [33]Lewis A S,Knowles G.Im age compression using the 2-D wavelet.Transformation[J].IEEE Trans.on Im age Processing,1992,1:244-250.
    [34]Lin E T,Podilchuk C I,Delp E J.Detection of image alterations using semi-fragilewatermarks[A],Proceedings ofSPIEConference onSecurity and Watermarking of Multimedia Contents Ⅱ[C],san Jose,California,USA,Jan 2000,3971:152-163.
    [35]Lu C S,Liao H Y M.Multipurpose watermarking for image authentication and protection[J].IEEE Transactions on Image Processing,2001,10(10):1579-1592.
    [36]M.J.B.Maes,C.W.Van Overveld.Digital Watermrking by Geometric Warping.Proc.Of IEEE International Conference on Image Processing,1998,Vol.1:424-426.
    [37]Mohan S.Kankanhalli,K.R.Ramakrishnan,RaJmohan.Content Based Wateramrking of Images:Proc.Of the 6'0 ACM International Conference on Multimedia,1998:61-70.
    [38]P.Bas,JMChassery.Geomctrically invariant watermarking using feature points.IEEETrans.on Image Processing,Vol.11(2002) 1014-1028.
    [39]P.Kuesmaner.Optimal Stack Filters under Rank Selection and Structural
    [40]Puate J.,Jordan F.Using Fractal Compression Scheme to Embedded a Digital Signature into An Image.Proc.Of SPIE,1996.
    [41]Raymond B.Wolfgang,Christine I.Podilchuk,Edward J.Delp.Perceptual Watermarks for Digital Images and Video.Proc.Of the IEEE,Vol.87,No.7,1999:1108-1126. Constraints.Signal Proceeding.1995(41):309-338.
    [42]Xia Xiang-Gen,Charles G.Boncelet,and Gonzalo R.Arce.A Multiresolution Watermark for Digital Images.Proc.Of IEEE,1997:548-551.
    [43]Xiao jun Qi.Image content-based geometric transformation resistant watermarking approach.IEEE ICASSP Vol.2(2005)29-32.
    [1]htp://www.image.com
    [2]htp://www.tydata.com
    [3) htp://www.chinaInfo.gov.cn
    [4) htp://www.aybook.com
    [5]htp://www.21ic.com

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700