基于静态图象的数字水印技术的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
伴随着网络技术和多媒体技术的飞速发展,多媒体数据逐渐成为人们获取信息的重要来源,并成为人们生活的重要组成部分。因而,如何保护多媒体信息的安全成为国际上研究的热门课题。本论文主要探讨有关数字图象信息安全中的数字水印技术。数字水印技术作为版权保护的重要手段,得到广泛的研究和应用。它通过在原始数据中嵌入秘密信息—水印(watermark)来证实该数据的所有权或完整性,以此来抵制对数字作品的盗版或篡改等。
     本人在导师的指导下,经过努力,在数字水印技术方面得到了以下的结果:
     1.提出了一种基于DCT和SVD的一种灰度水印嵌入算法:现在大部分的数字水印技术所嵌入的水印一般是随机信号或者是二值图象,那么用有意义的灰度图象作为水印信号的嵌入技术很少见,本人所提出的这种算法对这方面的技术进行了尝试,提出了一种基于DCT和SVD的灰度水印嵌入算法,这种算法的先进之处就是嵌入的水印信息是信息量很大的灰度图象。经过实验仿真,把该算法能够经受住噪声、中值滤波、压缩、高通滤波、低通滤波等的处理,具有很强的鲁棒性。
     2.提出了一种基于DWT和DCT的盲的数字水印嵌入技术:现在大部分的数字水印技术在检测水印时都需要原图象,但是这样的水印嵌入技术实用性不强,为了增加水印嵌入技术的实用性,本人提出了一种基于DWT和DCT的盲的数字水印嵌入技术,这种技术在检测水印时不需要原图象,而且水印信号是一种有意义的二值图象信号。该算法首先对图象进行小波分解,对LL图象按照一定大小进行分块,然后对每一块进行离散余弦变换,把水印图象的值嵌入到变换后的系数上,最后再进行逆变换。把该算法能够经受住噪声、中值滤波、压缩、高通滤波、低通滤波等的处理,具有很强的鲁棒性
The digital media has become a main way for information communication along with the wide use of network. At the same time, multimedia information security problems including copyrights piracy emerged as side effects of the popularity of digital representation and distribution over network. Information hiding, also called Sicganography , digital watermarking technology provide novel ways to solve these security problems for multimedia information. In this dissertation, we study the technologies and application of multimedia information security in the area of digital watermarking. The main contributions of this dissertation are:
    A Newly Watermarking Algorithm With Gray-level Image based on DWT And SVD is proposed: Now, most of the watermarking algorithms hide the random signal or two-value image into the image; only a few watermarking algorithms hide the gray-level image into the image. In my dissertation, we study the algorithm that hides the gray-level image into the image and gain some result. The algorithm that we study is based on DWT and SVD. The main merit of the algorithm is the capacity of the watermarking information that is hid into the image is much more than the capacity of the random signal and two-value image. The experiment based on this algorithm demonstrate that the watermarking is robust to the common signal processing techniques including compressing、 noise、low pass filter、high pass filter and median filter.
    A blind watermarking for digital image based on DWT and DCT is proposed: Now , in the most of the watermarking algorithms , the detection of the watermarking need the original image, so the practicability of the watermarking is not good . In order to strengthen the practicability of the watermarking,we proposed a blind watermarking algorithm for Digital Image Based On DWT and DCT. This algorithm manipulate the original image by DWT, then adds watermark onto the important wavelet coefficients located in the low frequency sub-band which is splitted into blocks and manipulated by DCT. The experiment based on this algorithm demonstrate that the watermarking is robust to the common signal processing techniques including compressing、 noise、low pass filter, high pass filter and median filter.
引文
1. W. Bender, D. Gruhl, N. Morimoto, A. Lu. Techniques for Data Hiding", IBM System Journal, Vol. 35, No. 3&4:313-335, 1996
    2. Fabien A.P. Petitcolas, Ross J. Anderson and Markus (3. Kuhn. Information Hiding-A Survey, Proc. of IEEE, 87(7): 1062-1078, 1999
    3. W. Bender. Data Hiding, News in the Future. MIT Media Laboratory, Lecture Notes, 1994
    4.易开祥:数字图象加密与数字水印技术研究。浙江大学博士学位论文。2001年3月浙江杭州。
    5. T.B. Maples and G. A. Spanos, "Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-time Video" In Proceedings of the 4th International Conf. on Computer Communications and Networks, September, 1995.
    6. Lei Tang, "Methods for Encrypting and Decrypting MPEG Video Data Efficiently" In Proceedings of the ACM Multimedia96, pages 219-229, Boston, Nov., 1996.
    7. W. Bender, D. Gruhl, N. Morimoto, A. Lu. Techniques for Data Hiding", IBM System Journal, Vol. 35, No. 3&4:313-335, 1996
    8. C. Shi and B. Bhargava, "Light-weight MPEG Video Encryption Algorithm." In Proc. of the Int'l Conf. on Multimedia'98, January, 1998, pages 55--61, New Delhi, India.
    9. C. Shi and B. Bhargava, "A Fast MPEG Video Encryption Algorithm," In Proc. of ACM Multimedia'98, Electronic Proceeding, 1998,.
    10. Lintian Qiao, Klara Nahrsted, "Comparison of MPEG Encryption Algorithms," Computer & Graphics, Vol. 22, No. 4, pp. 437-448, 1998
    11. Josef Scharinger, "Fast Encryption of Image Data Using Chaotic Kolmogorov Flows," SPIE Vol. 3022, pp.278-289, 1997[FRID97] Jiri Fridich, "Secure Image Ciphering Based on Chaos," Final Technical Report, Rome Laboratory, New York, February, 1997
    12. Q Ruanaidh J J, Dowling W J, Boland F M. Watermarking digital images for copyright protection. In: IEEE proceeding on Vision, Signal and Image Processing, 1996.8, 143 (4): 250~256.
    13. Kobayashi. Digital Watermarking: Historical Roots. IBM Research Reports, Tokyo Research Laboratories, 1997.
    14. Voyatzis G, Nikolaidis N, Pitas Ⅰ. Digital watermarking: an overview. In: 9th European Signal Processing Conference, Island of Rhodes, Greece, 1998:9-12.
    15. Jiri Fridrich. Applications of data hiding in digital images. In: the ISPAC'98 Conference in Melbourne, Australia, 1998.11.
    16. Mahalingam Ramkumar. Data hiding in multimedia-theory and applications. [Ph.D. Degree], New Jersey, Department of Electrical and Computer Engineering, New Jersey Institute Of Technology, 1999.
    17. Cox I J, Matt L Miller. A review of watermarking and the importance of
    
    perceptual modeling. In: SPIE Proceeding on Human Vision and Electronic Imaging, 1997, 3016: 92~99.
    18. Matias Y., Shamir A.. A Video Scrambling Technique Based on Space Filling Curves. Prof. Of CRYPTO' 87:389-417, 1988,
    19. Ross Anderson(Ed.), Information Hiding, First International Workshop, Lecture Notes In Computer Science, 1996: Vol. 1174.
    20. R. J. Anderson, Stretching the Limits of Steganography, Information Hiding: First International Workshop, Vol. 1174 of Lecture notes in computer science, Springer Verlag, Berlin, May 1996
    21. E. Ander. Digital Signal Encoding and Decoding Apparatus. U.S. patent No.4939515, 1990.
    22. I Pitas. A Method for Signature Casting on Digital Image. Proc of International Conference on Image Processing, vol 3:215-218,1996.
    23. Van Schyndel, R., Tirkel, A., and Osborne, C. A digital watermark. In Proceedings of ICIP (Austin, Tex., Nov.) IEEE Press, 1994, pp. 86-90
    24. N.Nikolaidis, I.Pitas, Copyright Protection of Images using Robust Digital Signatures, In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP Atlanta, GA., May). IEEE Press, 1996, pp.2, 168-2, 171
    25. F Hartung and B.Girod, Watermarking of MPEG-2 encoded video without decoding and re-encoding, Multimedia Computing and Networking 1997, published as SPIE 3020, pp.264-273
    26.韦志辉等.基于小波域中视觉门限模型的数字水印技术.东南大学学报.1998,28(5):44-48.
    27.黄继武,SHI YunQ.一种自适应图象水印算法.自动化学报,1999,25(4):477-482.
    28.黄继武,SHI YunQ,姚若河.基于块分类的自适应图象水印算法.中国图象图形学报,1999,4(8):640-643.
    29.易开祥,石教英.一种自适应二维数字水印算法,全国第二届信息隐学术研讨会论文集,pp:108-112,北京,2000.6
    30.孙淑玲,代数结构,中国科技大学出版社,1990
    31.孙家广、杨长贵编著,计算机图形学(新版),清华大学出版社,北京:1995.
    32.崔屹编著,数字图象处理技术与应用,电子工业出版社,北京:1997.
    33.沈庭方、方子文编著,数字图象处理及模式识别,北京理工大学出版社,北京:1998.
    34.吴曼升,王介生,刘慎权.图象的排列变换.计算机学报,21(6):514-519,1998
    35.李宇寰.组合数学.北京师范大学出版社,1988
    36.Blggs N L,White A T 著,赵春来译.置换群与组合结构.北京大学出版社,1987.
    37.齐东旭,周建成.一类新的置乱变换及其在图象信息隐藏中的应用.中国科学(E集),30(5):440-447,2000.
    38.丁玮、齐东旭,数字图象变换及信息隐藏与伪装技术,计算机学报.1998,Vol.21(9):838-843.
    39.丁玮,数字图像信息安全的算法研究,中科院博士论文,2000.5,北京,中科院计算机研究所.
    40.丁玮、齐东旭,信启、伪装中一种新的数字图像变换.信息科学与微电子技术,北
    
    京:中国科学技术出版社,1998:309-311.
    41.丁玮、闫伟齐、齐东旭,基于生命游戏的数字图象置乱与数字水印技术,北方工业大学学报,2000,Vol.12(1):1-5.
    42. Ding Wei, Yan Wei-Qi, Qi Dong-Xu, Digital Image Scrambling Technology Based on Gray Code, Proc. of the 6th International Conference on Computer Aided Design & Computer Graphics, Wen Hui Publishers, Dec., 1999, 3:900-904.
    43.丁玮、闫伟齐、齐东旭,基于置乱与融合的数字图像隐藏技术及其应用,中国图像图形学报,2000,Vol.5(A)(8):644-649.
    44. E.Berlekamp, J. Conway and R.Guy, Winning Ways for Your Mathematical Plays, Academic Press, 1982.
    45. Arnold, V.I. et al. Ergodic Problems of Classical Mechanics, Mathematical Physics Monograph Series, New York: W.A.Benjamin, INC,1968.
    46. Qi Dongxu, Zou Jiangcheng, Han Xiaoyou, A New Class of scrambling transformation and its application in the image information covering, Chinese In Science (Series E), 2000, 43(3):304-312.
    47. C. Shi and B. Bhargava. Light-weight MPEG Video Encryption Algorithm. In Proc. of the Int'l Conf. on Multimedia'98, January, 1998, pages 55--61, New Delhi, India.
    48. Josef Scharinger. Fast Encryption of Image Data Using Chaotic Kolmogorov Flows, SPIE Vol. 3022, pp.278-289, 1997
    49. Hui Xiang, et al. Digital Watermarking Systems with Chaotic Sequences, Electronic Imaging'99, Security and Watermarking of Multimedia Contents, SPIE Vol. 3657, pp.449-457, 1999.1
    50. May, R. M. Simple mathematical model with very complicated dynamics, Nature, 261, 459-281, 1976
    51. Dawson, E., Linear feedback shift register and stream cipher, Number Theory and Cryptography, J. H. Loxton (eds.), London Mathematical Society Lecture Notes Series, 154, Cambridge University Press, 1990
    52. A. Lippman. Receive-Compatible Enhanced ED TV Syatem. U.S. Patent No.5010404, 1991.
    53. L Boney, A.H.Tewfik, K.N.Hamdy, Digital Watermarks for Audio Signals, IEEE International Conference on Multimedia Computing and Systems, Hiroshima, Japan, 17-23 June 1996, pp.473-480
    54. F Hartung, B Girod, Watermarking of MPEG-2 encoded video without decoding and re-encoding, Multimedia Computing and Networking 1997, published as SPIE 3020 pp. 264-273
    55. F. Hartung, B. Girod, Copyright Protection in Video Delivery Networks by Watermarking of Pre-Compressed Video, in S. Fdida, M. Morganti(Eds.), "Multimedia Appliactions, Services and Techniques-ECMAST'97", Springer Lecture Notes in Computer Science, Vol. 1242, pp.423-436 Springer, Heidelberg, 1997
    56. Hartung and B. Girod, Digital Watermarking of Raw and Compressed Video", Proc. European EOS/SPIE Symposium on Advanced Imaging and Network Technologies, Berlin, Germany, Oct. 1996.
    
    
    57. T. Kohda. A. Tsuneda, Pseudonoise Sequences by Chaotic Nonlinear Maps and Their Correlation Properties, IEICE Trans. Commun., Vol. E76-B, No.8, Aug, 1993
    58. T. Kohda, A. Tsuneda, Explicit Evaluation of Correlation Functions of Chebyshev Binary and Bit Sequences Based on Perron-Frobenius Operator, IEICE Trans. Fundamentals, Vol. E77-A, No.11, Nov. 1994
    59. T. Kohda, A. Tsuneda, Explicit Evaluation of Correlation Functions of Chebyshev Binary and Bit Sequences-Based on Perron-Frobenius Operator, IEICE Trans. Fundamentals, Vol. E77-A, No. 11, Nov. 1994
    60. T. Kohda, A. Tsuneda, Chaotic Bit Sequences for Stream Cipher cyptography and Their Correlation Properties, IEICE Trans. Commun., SPIE Vol. 2612, 1995
    61. Jean-Paul Linnartz, Ton Kaller, Geert Depovere, Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks, In Information Hiding, Second International Workshop, volume Springer Lecture Notes in Computer Science v 1525, IH'98, Portland, Oregon, USA, April 1998, pages 73-82.
    62. I.J. Cox, J. Kilian, T. Leighton, and T. Shamoon, Secure Spread Spectrum Watermarking for Multimedia," NEC Research Institute, Technical Report 95-10.
    63. I.J. Cox, J. Kilian, T. Leighton, and T. Shamoon, A Secure, Robust Watermark for Multimedia, Info Hiding 96, pp. 185-206
    64. I.J. Cox, J. Kilian, T. Leighton, and T. Shamoon, Secure Spread Spectrum Watermarking for Images, Audio and Video, Proc. 1996 International Conference on Image Processing, ICIP'96, Vol. Ⅲ, pp.243-246, Jan.1996
    65. V.I.Arnold and A.Avez, Ergodic Problems of Classical Mechanics. Mathematical Physics Monograph Series, W.A.Benjamin, INC. New York, 1968
    66.王道顺,数字图像可视隐藏、加密和水印技术的若干理论问题及其应用,博士学位毕业论文,四川大学,2001,3
    67.江早,信息伪装---一种崭新的信息安全技术,中国图形图象学报,No.1,1998
    68. S. Craver, N. Memon, B.L. Yeo, and M. M. Yeung. Can Invisible Watermarks Resolve Rightful Ownerships?" Proceedings of the IS&T/SPIE Conference on Storage and Retrieval for Image and Video Databases V, San Jose, CA, USA, Feb. 13-14, 1997, vol. 3022, pp. 310-321.
    69. R. J. Anderson, F. A. P. Peticolas, On the Limits of Steganography, IEEE Journal of Selected Areas in Communications (JSAC)--Special Issue on Copyright & Privacy Protection, 16(4), May 1998 (to appear)
    70. J. Zollner, H. Federrath, H. Kilmant, R. Piotraschke, A. Westfeld, G. Wicke, G Wolf, Modelling the Security of Steganographic Systems, In Information Hiding, Second International Workshop, volume Springer Lecture Notes in Computer Science v 1525, Portland, Oregon, USA, April 1998, pages 329-343.
    71. Christian Cachin, An Information-Theoretic Model for Steganography, In Information Hiding, Second International Workshop, volume Springer Lecture Notes in Computer Science v 1525, Portland, Oregon, USA, April 1998, pages 329-343.
    72. Ramkumar M, Akansu A N. Image watermarks and counterfeit attacks: some problems and solutions. In: Proceeding on Content Security and Data Hiding in
    
    Digital Media Conference, Newark, NJ, 1999, 102~112.
    73. Maxemchuk N F. Electronic document distribution. AT&T Technical Journal, 1994. 9, 73(5): 73~80.
    74. Nikolaidis N, Pitas I. Copyright protection of images using robust digital signatures. In: IEEE Proceeding on International Conference on Acoustics, Speech, and Signal Processing, Atlanta, IEEE Press, 1996:2168~2171.
    75. Hartung F, Girod B. Watermarking of MPEG-2 encoded video without decoding and re-encoding. In: SPIE Proceeding on Multimedia Computing and Networking, San Jose, 1997, 3020: 264~273.
    76. Lintian Qiao, Klara Nahrsted. Non-invertible watermarking methods for MPEG encoded audio. In: SPIE Proceedings on Security and Watermarking of Multimedia Contents, San Jose, 1999, 3657: 194~202.
    77. Hui Xiang, et al. Digital Watermarking Systems with Chaotic Sequences. In: SPIE Proceeding on Security and Watermarking of Multimedia Contents, San Jose, 1999, 3657:449~4571
    78. Barni M, Bartolini F, Cappellini V, et al. A DWT-based technique for spatial-frequency masking of digital signatures. In: SPIE Proceeding on Security and Watermarking of Multimedia Contents,1999, 3657:31~39.
    79. Cox I J, Kilian J,et al. Secure spread spectrum watermarking for images, audio and video. In: IEEE Proceeding on International Conference on Image Processing: 1996, 3: 243~246.
    80. Cox I J, Kilian J, Leighton T, et al. Secure spread spectrum watermarking for multimedia. IEEE Trans. on Image Processing, 1997, 6(12): 1673~1687.
    81. Christine I Podilchuk, Wenjun Zeng. Digital image watermarking using visual models. In: SPIE Proceeding on Human Vision and Electronic Imaging, 1997, 3016: 100-111.
    82. Fabien A P Petitcolas, Ross J Anderson, Markus G Kuhn. Attacks on copyright marking systems. In: Information Hiding'98-Conference, Second International Workshop, volume Springer Lecture Notes in Computer Science,, Portland, Oregon, USA, 1998, 1525:218~238.
    83. Scott Craver, Nasir Memon, Boon-Lock Yeo. Resolving rightful ownerships with invisible watermarking techniques: limitations, attack, and implications. IEEE journal on selected areas in communication, 1998.5, 16(4): 573~586.
    84.张春田,苏育停,管晓康.多媒体数字水印技术.通信学报,21(9):46-52,2000
    85. Emil Praun、Hugues Hoppe、Adam Finkelstein,Robust Mesh Watermarking,Proc.Of SigGraph'99,1999:49-56.
    86. Ryutarou Ohbuchi、Hiroshi Masuda、Masaki Aono, Watermarking Three-Dimensional Polygonal Models Through Geometric and Topological Modifications, IEEE Journal on Selected Areas in Communications, 1998, Vol. 16(4):551-560.
    87. M.J.J.J.B.Maes、C.W.A.M.Van Overveld,Digital Watermarking by Geometric Warping, Proc. Of IEEE International Conference on Image Processing, 1998. Vol. 1:424-426.
    88.黄继武,自适应图像压缩编码和图像水印技术研究,中国科学院自动化所博士
    
    学位论文,1998年11月.
    89.黄继武,一种自适应图像水印算法,自动化学报,1999,Vol.25(4):476-482.
    90.黄继武、Yun Q.Shi、陈卫东,DCT域图像水印:嵌入队策和算法,电子学报,2000,Vol.28(4):72-76.
    91.全国第二界信息隐藏学术研讨会论文集,2000年6月,北京.
    92.尹康康.多媒体数据数字水印技术研究.[硕士学位论文].杭州,浙江大学CAD&CG国家重点实验室,2000.4
    93.黄继武,SHI YunQ,姚若河.基于块分类的自适应图象水印算法.中国图象图形学报,1999,4(8):640~643.
    94.张军,王能超,施保昌.数字图象的公开水印技术.计算机辅助设计与图形学学报,2002,Vol,14(4):365-368
    95. Christine I. Podilchuk, Wenjun Zeng, Digital Image Watermarking using Visual Models, in Human Vision and Electronic Imaging Ⅱ, SPIE3016, San Jose, CA, USA, February 1997
    96.王振武,刘九芬,黄达人.一种有意义的图象水印算法.中山大学学报(自然科学版).2003.Vol.42(1):1-4
    97. Srefen Katzenbeisser, fabien A.P.Petitcolas: Information Hiding Techniques for Steganography and Digital Watermarking.ARTECH HOUSE,INC.
    98. Lin C, Chang S.A robust image authentication method distinguishing JPEG compression from malicious manipulation[J].IEEE Trans.on IP.2001,11(2). 153-168
    99.孙锐,孙洪,姚天任.基于奇异值分解的半易损水印算法.电路与系统学报.2002年9月,第7卷,第3期.
    100. Christine I. Podilchuk, and Wenjun Zeng, Image-Adaptive Watermarking Using Visual Models, IEEE Journal on Selected Areas in Communications, 1998, Vol.16, No.4
    101.黄继武,SHI YunQ,姚若河.基于块分类的自适应图象水印算法.中国图象图形学报,1999,4(8):640-643.
    102. Hui Xiang,et al Digital Watermarking Systems with Chaotic Sequences, Electronic Imaging'99, Security and Watermarking of Multimedia Contents, SPIE Vol. 3657, pp.449-457, 1999.1
    103. Kaixiang Yi, Jiaoying Shi. an adaptive 2-dimension digital watermark system, accepted by SPIE 2001
    104. Q Ruanaidh J J, Dowling W J, Boland F M. Watermarking digital images for copyright protection. In: IEEE proceeding on Vision, Signal and Image Processing, 1996. 8, 143(4): 250~256.
    105. Jiri Fridrich. Applications of data hiding in digital images. In: the ISPAC'98 Conf. in Melbourne, Australia, 1998.11.
    106. S. Walton, "Information Authentication for a Slippery New Age", Dr. Dobbs Journal, 20(4):18-26, Apr 1995.
    107.张春田,苏育停,管晓康.多媒体数字水印技术.通信学报,21(9):46-52,2000
    108. M. Yeung, and F. Mintzer, "An Invisible Watermarking Technique for Image Verification", Proc. ICIP'97, Santa Barbara, California, 1997.
    109. P. Wong, "A Watermark for Image Integrity and Ownership Verification", Proc.
    
    IS&TPIC, Portland, Oregon, 1998.
    110. R.G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, "A Digital Watermark", Proc. of the IEEE Int. Conf. on Image Processing, vol. 2, pp. 86-90, Austin, Texas, Nov 1994.
    111.刘瑞桢,谭铁牛。基于奇异值分解的数字图象水印方法。电子学报,2001年2月
    112. R.B. Wolfgang and E. J. Delp, "Fragile Watermarking Using the VW2D Watermark", Proc. SPIE, Security and Watermarking of Multimedia Contents, San Jose, California, Jan 25-27, 1999, pp. 204-213.
    113. D. Kundur and D. Hatzinakos, "Towards a Telltale Watermarking Technique for Tamper Proofing", Proc. ICIP, Chicago, Illinois, Oct 4-7, 1998, vol 2.
    114. Eugene T. Lin, Christine I. Podilchuk and. Edward J. Delp. Detection of Image Alterations Using Semi-Fragile Watermarks. Proc. of SPIE, San Jose, CA., 2000, Vol. 3971: 152-163
    115. C.-Y.Lin and S.-F.Chang. Semi-Fragile Watermarking for Authenticating JPEG Visual Content. SPIE International Conf. on Security and Watermarking of Multimedia Contents Ⅱ, San Jose, California, 2000, 3971:140-151
    116. Jiri Fridrich. Visual Hash for Oblivious Watermarking. Proc. SPIE Photonic West Electronic Imaging 2000, Security and Watermarking of Multimedia" Contents, San Jose, California, 2000, 3971:286-294
    117. J. Fridrich, "A Hybrid Watermark for Tamper Detection in Digital Images", ISSPA'99 Conf, Brisbane, Australia, August 22-25, 1999.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700