数字图像水印算法与系统实现
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着数字多媒体技术的发展和网络技术的不断普及,一方面使得越来越多的数字化产品不断地涌现,另一方面人们可以很方便的通过互联网进行无限制的上传、拷贝和下载数字资源。因此,如何能够更为有效的保护版权所有者的权利不受损害成为了一个亟需解决的课题。数字水印技术就是在这种背景下不断发展起来的。
     数字水印技术是信息隐藏技术的一个重要分支,它是通过将具有特定意义的符号或文字嵌入到数字产品中,并且水印信息在传播过程中不容易被擦除或破坏。当发生版权纠纷时,可以将提取出的水印作为侵权的证据,以此来证明产品的版权归属。近年来,数字水印技术已被广泛的应用于知识产权保护和信息安全等领域,并取得了显著的成效。
     目前,针对数字水印的算法比较多。采用空间域的算法,有运算速度快,能较快的嵌入和提取水印等优点,但是该水印鲁棒性较差;基于变换域的水印算法有较好的不可见性和鲁棒性,但是抗几何攻击的性能有待研究。本文采用小波变换(DWT)和奇异值分解(SVD)相结合的算法,来增强水印的鲁棒性和抗几何攻击能力。论文的工作如下:
     论文首先分析了数字水印技术发展现状、学习了数字水印的相关理论和性能评估标准。基于小波变换和奇异值分解方法和特点,进行了小波变换和奇异值相结合的数字水印算法研究;其次,分别对BMP和JPEG图像进行了数字水印处理和研究,实验表明小波奇异值算法较基于DWT的数字水印算法有较好的效果;再次,设计了一个基于Microsoft Visual C++6.0的数字水印软件,该软件具有水印嵌入、水印提取、图片质量评价等功能,使用简单,应用效果较好;最后,在FPGA开发平台上进行了算法的硬件化工作,完成了数字水印的硬件装置,使得该装置可以脱离PC机而独立运行。
With the development of digital multimedia technology and the popularization of network technology, on the one hand, more and more consumer electronics constant ly emerging, on the other hand, People can easily unlimited upload, copy, and downloa d digital resources via the Internet. Therefore, how to more effective protection for c opyright holders are not undermined become an urgent need to address the issue. Di gital watermarking technology is the continuous development in this context.
     Digital watermarking information hiding technology is an important branch of, it is through will have specific meaning symbols or text into the digital products, an d watermarking information during the process of transmission is not easy to be era sed or destroyed. When there is a copyright issue, can will be extracted watermark as evidence of infringement, as evidence that a product of the copyright belongs to. In recent years, digital watermarking technology has been widely used in intellectu al property protection and information security and other fields, and have achieved r emarkable results.
     At present, there are a lot of algorithms for digital watermarking. For domain alg orithms, it can be faster to embed and extract watermark, but poor resistance to attack; t ransform domain-based watermarking algorithm has better invisibility and robustness, bu t there has more work to be studied against geometrical attacks. Combing the Wavele t transform (DWT) and Singular Value Decomposition (SVD) algorithm, the watermar k will has robustness and resistance to geometric attacks. The work of the paper is as fo Hows:
     This paper first analyzes the development status of the digital watermarking technol ogy and learns theory and performance evaluation standards for digital watermarking. It propose a improved method to combine the Wavelet transform and singular value ba sed on wavelet transform and singular value decomposition method and characteristic s; Secondly, Researching on digital watermarking and research with BMP and JPEG im ages, it experiments show that wavelet and the singular value decomposition algorith m has a good effect than DWT; Thirdly,Developing a digital watermark software b ased on the Microsoft Visual C++6.0, the software has the watermark embedding, water mark extraction, image quality evaluation and other funcations. it is easy to use and has better performance on application; Lastly, it has done hardware work on FPGA development platform for algorithm and achieve the design of the hardware device, whic h can run independently without PC.
引文
[1]国家知识产权局.各国版权及创意产业发展现状。知识产权报,2007,9
    [2]Cox I,J,Miller M L. The first 50 years of electronic watermarking. EURASIP J. of Applied Signal Processing,2002,2:126-132
    [3]Tirkel A Z,et al.Electronic watermark.Digital image computing,Technology and Ap plication,1993:666-673
    [4]Schyndel R G van, tirkel A Z,Osborne C F.A digital watermark. First IEEE Inter national Image Processing Conference,1994,2:86-90
    [5]Petitcolas F A P,Anderson R J,Kuhn M G.Information hiding-a survey.Proceedings of IEEE,1999:1062-1078
    [6]Cox I J,et al.Secure spread spectrum watermarking for multimedia.Technical Repor t95-10,NEC Research Institute,Princeton,NJ,1995
    [7]Kundur D,Hatzinakos D.Digital watermarking for telltale tamper-proofing and auth entication.Proceedings of the IEEE,1999:1167-1180
    [8]Bender W,et al.Techniques for hiding.IBM Systems Journal,1996:313-336
    [9]Matsui K, Tanaka K.Video-steganography:How to secretly embed a signature in a picture。 IMA Intellectual Property Project Proceedings,1994,1:187-206
    [10]Tsekeridou S,et al.Bernoulli shift generated chaotic watermarks theoretic investigat ion.IEEE International Conference on Acoustics,Speech,and Signal Processing,2001:19 89-1992
    [11]王丽娜,于戈,王国仁.基于混沌序列特性改进的小波数字水印算法.电子学报,2001:1424-1426
    [12]HARTUNG F, GIROD B.Watermarking of M PEG-2 encoded video without dec oding and reencoding. Multimedia Computing and Networking,1997, SPIE, Vol.302 0:264-273
    [13]Pitas I.A Method for Signature Casting on Digital Image.IEEE Interantional Conf erence on Image Processing(ICIP'96),1996,Lausanne,Switzerland,September, vol.Ⅲ:215-218
    [14]王炳锡等.数字水印技术。西安:西安电子科技大学出版社,2003,11:44-58
    [15]Kutter M,Petitcolas F A P.Fair evaluation methods for image watermarking syste ms.Journal of Electronic Imaging,2000:445-455
    [16]Peitcolas F A P,Anderson R J.Evaluation of copyright marking systems.Proceedin gd of IEEE Multimedia Systems'99,1999:574-579
    [17]Langelaar G C,Lagendijk R L,Biemond J.Removing spatial spread spectrum wate rmarks by non-linear filtering.EUSIPCO'98,1998:2281-2284.
    [18]Fleet D,Heeger D.Embedding invisible information in color images.Proceedings I EEE International Conference on Image Processing,1997:532-535
    [19]Kutter M.Watermarking resisting to translation,rotation and scaling.Proc.of SPIE: Multimedia Conference on Image Processing,1997:532-535
    [20]Cox I J,Linnartz Jean-Paul M G.Some general methods for tampering with water marks.IEEE Journal on Selected Areas of Communicatins,1998:587-593
    [21]徐树方,矩阵计算的理论与方法,北京:北京大学出版社,1994
    [22]Barni,M.Podilchuk,C.I,Bartolini,F,Delp,E.J.Siena Univ.Watermark embedding hidi ng a signal within a cover image,IEEE Communications Magazine,2001
    [23]Runanaidh,T Pun.Rotation.Scale and translation invariant digital image watermar king[J].Signal Processing,1998:303-317
    [24]Xiangwei Kong, Yu Liu, Huajian Liu, and Deli Yang,Object Watermarks for D igital Images and Video, Image andVision Computing, Elsevier:583-595
    [25]Bender W,et al.Techniques for data hiding.IBM Systems Journal,1996:313-336
    [26]周波,陈建.基于奇异值分解的抗几何失真的数字水印算法.中国图像图形学报,2004,9:506-512
    [27]王刚,张潋.基于FPGA的SOPC嵌入式系统设计与典型实例.北京:电子工业出版社,2009,1
    [28]Graver S,et al.on the invertibility of invisible watermarking techniques.proc.IEEE inter.Conf.Image Processing,1997:540-543
    [29]R.Gallager.Information theory and reliable communication.John Wiley and Sons,1 968
    [30]Inoue H,et al.A digital watermark based on the wavelet transform and its robust ness on image compression.Proceedings of the IEEE ICIP',1998
    [31]王卫卫,杨波,宋国乡。基于图像小波变换低频系数的数字水印算法。信号处理,2001:554-557
    [32]陈青,苏详芳,王延平。采用小波变换的鲁棒隐形水印算法。通信学报,2001:61-65
    [33]牛夏牧,陆哲明,孙圣和。基于多分辨率分解的数字水印技术。电子学报,2000
    [34]STEINEBACH M, PETITCOLAS F A P, RAYNAL F, DITTMANN JJ, FONT AINE C, SEIBEL S, FATES N, FERRI L C:StirMark benchmark:audio waterma rking attacks.Information Technology:Coding and Computing,2001.Proceedings.Interna tional Conference on,2001,49-54
    [35]SCHYNDEL R,ZRIKEL A,OSBORNE C. A digital watermark[J]. IEEE Int Conf on Image Proc,1994,:86-90
    [36]汪国强SOPC技术与应用.北京:机械工业出版社,2006
    [37]李兰英NiosⅡ嵌入式软核SOPC设计原理及应用.北京:北京航空航天大学出版社,2006,11
    [38]王刚.基于FPGA的SOPC嵌入式系统设计与典型实例.北京:电子工业出版社,2007年
    [39]Altera, Quartus Ⅱ Handbook Version 8 Volume 4:SOPC Builder,2008
    [40]Altera.uartus Ⅱ Handbook Version 8 Volumel:Design and Synthesis,2008
    [41]刘九芬,黄达人,黄继武.图像水印抗几何攻击研究综述[J].电子与信息学报,2004,9:1495-1501

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700