小脊变换域中感知水印算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
论文从数字水印发展的现状出发,对数字水印技术的发展、数字水印技术的基本原理及其通用模型、数字水印技术主要应用的领域及其性能要求、数字水印的分类与典型算法等多个角度进行了综述。
     由于小脊变换的特点,使得在小脊变换域中建立视觉模型比在DCT、DWT域中建模更自然,更有优势。因此,我们研究了现有的关于人类视觉系统的理论,第一次在小脊变换域中建立起视觉模型。就目前现有的文献来看还没有人做过这项十分有意义的工作。
     论文提出了一种小脊变换域中感知水印算法。我们知道在水印技术中水印坚固性和透明性存在着矛盾。如何在区分不出嵌入水印后的图像与原始图像视觉差异的前提下,设计出一种水印算法,使之能够抵抗多数的图像信号处理和人为地恶意攻击,是一项十分富有挑战的工作。论文根据小脊变换域中的视觉模型,按照小脊变换域中计算出水印嵌入强度的权重,用扩频的方法来嵌入水印信息。实验结果表明该方法能够在水印不可见的前提下,能够嵌入更多的水印信息,提高了数字水印的鲁棒性,是一种有效的新的水印算法。同时该水印算法能够较好的抵抗公开的水印标准检测程序Stirmark中微小扭曲的月何攻击。
In this paper, we establish a visual model in ridgelet transform domain, and a new perceptual watermarking algorithm in the ridgelet domain is proposed. The ridgelet transform (Candes and Donoho, 1999) was introduced as a new efficient multi-scale representation for functions that are smooth away from discontinuities along lines. Ridgelet transform decompose the spatial frequency domain into some subbands with different directions and frequencies. This hierarchy matchs the multi-channel model of HVS(Human Visual System) better than wavelet transform . In this paper, we build a visual model in the ridgelet domain by taking advantage of the current knowledge of visual perception, which is a pioneer work. Then we propose a new perceptual watermarking algorithm in the ridgelet domain. We adjust the strength of embedded watermark in according to the visual model in the ridgelet domain. Experimental results show that our algorithm is very effective. Performance improvement is obtained.
引文
[1] F. Hartung and M.kutter, "Multimedia Watermarking Techniques", Proc. IEEE. Jul. 1999.vol. 87(7), Page 1097-1107.
    [2] Jiri Fridrich,"Application of Data Hiding in Digital Images", ISPACS'98 Conference in Melbourne, Australia November 4-6, 1998.
    [3] D. Kilbum, Dirty linen, dark secrets. Adweek,1997.
    [4] E. F. Hembrooke, "Identification of sound and like signals", United States Patent, Page 3004-3014, 1961.
    [5] S. Craved, N. Memon, B.-L. Yeo, and M. Yeung, "Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks and implications", IEEE Trans. on Selected Areas of Communications, 16(4):573--586, 1998.
    [6] D. R. Stinson., "Cryptography: Theory and Practice", CRC Press, 1995.
    [7] G. L. Friedman, "The trustworthy camera: restoring credibility to the photographic image", IEEE Trans. On Consumer Electronics, 39(4),Page 905--910, 1993.
    [8] C.-Y. Lin and S.-F. Chang, "A robust image authentication algorithm surviving jpeg compression", In SPIE Storage and Retireval of Image/Video Databases, 1998.
    [9] C. -Y. Lin and S. -F. Chang, "Issues and solutions for authenticating mpeg video", In Proc. IS&T/SPIE on Electronic Imaging: Science and Technology (EI'99)-SPIE Security amd Watermarking of Multimedia Contents, 1999.
    [10] A. E. Bell, "The dynamic digital disk", IEEE Spectrum, 36(10) Page 28--35, 1999.
    [11] G. J. Simmons, "The prisoners' problem and the subliminal channel", In Proc. CRYPTO'83, pages 51—67, Plenum Press, 1984.
    [12] R. B. Wolfgang, C. I. Podilchuk, and E. J. Delp, "Perceptual watermarks for digital images and video", Proc. of the IEEE, 87(7): Page 1108—1126, 1999.
    [13] F. A. P. Petitcolas, R. Anderson, and M. G. Kuhn, "Information hiding a survey", Proceedings of the IEEE, 87(7):Page 1062—1077, 1999.
    [14] I. Cox and M. L. Miller, "A review of watermarking and the importance of perceptual modeling", In Proceedings of SPIE, Human Vision & Electronic Imaging Ⅱ, volume 3016, pages 92—99, 1997.
    [15] F. Hartung and M. Kutter, "Multimedia watermarking techniques", Proceedings of the IEEE, 87(7):Page1079—1107, 1999.
    [16] I. J. Cox and J.-F. Lirmartz., "Some general methods for tampering with watermarks",IEEE Trans. on Selected Areas of Communications, 16(4):Page587—593, 1998.
    [17] J. A. Bloom, I. J. Cox, T. Kalker, J.-P. Linnartz, M. L. Miller, and B. Traw, "Copy protection for DVD video", Proceedings of the IEEE, 87(7):Page 1267—1276, 1999.
    [18] W Bender, D Gruhl, N Morimoto, A Lu, "Techniques for Data Hiding ", IBM Systems Journal v 35 no 3—4(96)page 313—336, 1996.
    [19] IJ Cox, J Kilian, T Leighton, T Shamoon, "A Secure Robust Watermark for Multimedia",
    
    Info Hiding 96 page 185—206, 1996.
    [20] CI Podilchuk, W Zeng, "Image-Adaptive Watermarking Using Visual Models", IEEE Journal on Special Areas in Communications v 16 no 4 (May 98) page 525—539,1998.
    [21] J.-P. Linnartz, T. Kalker, G. Depovere, "Modeling the False Alarm and Missed Detection Rate for Electronic Watermarks",Info Hiding 98, page 329—343,1998.
    [22] D. Kundur, D. Hatzinakos, "Improved robust watermarking through attack characterization", Optics Express v 3 n 12 pp 485—490,1998.
    [23] Joachim J. Eggers and Jonathan K. Su, "Performance of a Practical Blind Watermarking Scheme", Proceedings of SPIE Vol. 4314:Security and Watermarking of Multimedia Contents Ⅲ,San Jose, Ca., Jan. 2001.
    [24] Avi Levy and Neri Merhav, "An Image Watermarking Scheme Based on Information Theoretic Principles ", HP Labs Israel, January 7, 2001.
    [25] Jim Chou, Sandeep Pradhan, Laurent El Ghaoui and Kannan Ramchandran, "A Robust optimization Solution to the Data Hiding Problem using Distributed Source Coding Principles", Proceedings of SPIE Vol. 4314:Security and Watermarking of Multimedia Contents Ⅲ,San Jose, Ca., Jan. 2001.
    [26] S. Walton,"Information authentication for a slippery new age," Dr. Dobbs Journal,vol.20,no.4,pp. 18-26,April 1995.
    [27] R. van schyndel, A. Tirkel, and C. Osborne, "A digital watermark", proceedings of the IEEE International conference on Image Processing, vol. 2, pp. 86-90,Austin, Texas,November 1994.
    [28] R.. wolf gang and E. Delp, "A watermark for digital images", Proceedings of the IEEE International conference on Image Processing, vol. 3, pp. 219-222,1996.
    [29] M. Wu and B .Lin, "Watermarking for image authentication", Proceedings of the IEEE International Conference on Image Processing, vol.2, pp.437-441, Chicago Illinois, October 1998.
    [30] D. L. Donoho, M. Vetterli, R. A. DeVore, and Ⅰ. Daubechies, "Data compression and harmonic analysis", IEEE Trans. Inform. Th., vol. 44, no. 6, pp. 2435—2476, October 1998.
    [31] K. R. Rao and P. Yip, "Discrete Cosine Transform: Algorithms, Advantages, Applications", Academic Press, 1990.
    [32] E. J. Candes and D. L. Donoho, "Ridgelets: a key to higher-imensional intermittency", Phil. Trans. R. Soc. Lond. A., page 2495—2509, 1999.
    [33] S. R. Deans, "The Radon transform and some of its applications", John Wiley & Sons, 1983.
    [34] E. D. Bolker, "The finite Radon transform", in Integral Geometry (Contemporary Mathematics, Vol. 63), S. Helgason R. L. Bryant, V. Guillemin and R. O. Wells Jr., Eds., page.27—50. 1987.
    [35] I. Gertner, "A new efficient algorithm to compute the two-imensional discrete Fourier transform", IEEE Trans. Acoust. Speech Sig. Proc., vol. 36, page. 1036—1050, Jul 1988.
    [36] F. Matus and J. Flusser, "Image representation via a finite Radon transform", IEEE Trans. Pattern Anal. Machine Intell., vol. 15, no. 10, pp. 996—1006, Oct 1993.
    [37] N. D. Vvedenskaya and S. G. Gindikin, "Discrete Radon transform and image
    
    reconstruction", in Mathematical problems of tomography (Translations of mathematical monographs, Vol. 81), I. M. Gelfand and S. G. Gindikin, Eds., American Mathematical Society, page. 141—188. 1990.
    [38] Mirth N. Do and Martin Vetterli, "Discrete Ridgelet Transforms for Image Representation", Submitted to IEEE Transactions on Image Processing, April 2001.
    [39] William E. Glenn "Review of video compression which depends on visual perception limits", SPIE vol. 1976 High-Definition Video (1993), pp 119~126
    [40] D. H. Hubel and T. N. Wiesel "Receptive fields, binocular interaction and functional architecture in the cat's visual cortex", J.phys.v. 160 pp106~154(1962)
    [41] R. L. Devalois, D. G. Alrecht, and L. G. Thorell "spatial frequency selectivity of cells in the macaque visual cortex" Vis Res.V.22pp.545~559(1982)
    [42] C. Blake more and F. W. Campbell "on the existence of neurons in the human visual system selectivity sensitive to the orientation and size of retinal image", J. phys. V.203.pp.237~260(1969)
    [43] Eeli. Peli "contrast in complex images", J.O.S.A.A, Vol.7,1990,page 2032-2040
    [44] Scott Daly, "The visible differences predictor: an algorithm for the assessment of image fidelity", SPIE, V.1666 Human Visual Processing and Digital Display, Page 2--15,1992.
    [45] A.Z.Tirkel and G.A. Rankin and Van Schyndel, R.M. and W.J. Ho and N.R.A. Mee and C.F., Osborne, "Electronic Watermark", Digital Image Computing, Technology and Applications-- DICTA'93, Macquarie University, Sidney, pp 666--673, 1993
    [46] IJ Cox, JPMG Linnartz, "Public watermarks and resistance to tampering", IEEE International Conference on Image Processing (ICIP'97), Santa Barbara, CA, USA, 26--29 October 1997
    [47] L Boney, AH Tewfik, KN Hamdy, "Digital Watermarks for Audio Signals", IEEE International Conference on Multimedia Computing and Systems, Hiroshima, Japan pp 473—480, 1996
    [48] F Hartung, B Girod, "Watermarking of MPEG-2 encoded video without decoding and re-encoding", Multimedia Computing and Networking, published as SPIE v 3020 pp 264—273,1997
    [49] Jean-Luc Dugelay and Fabien A.P.Petitcolas, "Possible counter-attacks against random geometie distortion", Proceedings of SPIE Vol. 4314:Security and Watermarking of Multimedia Contents Ⅲ, San Jose, Ca., Jan. 2001.
    [50] Max H.M.Costa, "Writing on dirty paper", IEEE Transactions on Information Theory,VOL.IT-29,NO.3,pp439--441,1983.
    [51] J. Fridrieh, M. Goljan, and R Du, "Invertible Authentication", Proc. SPIE, Security and Watermarking of Multimedia Contents, San Jose, California, January 23-26, 2001.
    [52] R.B.Wolfgang, C.I.Podilchuk, and E.J.Delp, "Perceptual watermarks for digital images and video", Proc. IEEE, vol.87, pp.1108--1126, 1999.
    [53] D.Kundur and D.Hatzinakos, "A robust digital image watermaking method using wavelet-base fusion", Proc.4th IEEE Int. Conf. Image Processing '97,pp544-547,1997.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700