基于混合域及分形理论的抗几何攻击数字水印算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数字水印技术是近十几年来提出的一种有效的数字产品版权保护技术。但目前每一种水印算法是不可能,也根本做不到抵抗所有的攻击。研究的目标往往是针对某一类的攻击而设计算法,并尽量考虑兼容其它种类的攻击。同样水印产品应用的领域往往也各不相同;不同的水印应用环境往往青睐于具有抵抗某一类攻击的算法。因此研究针对某一类攻击的水印算法也具有极其重要的意义。
     本文重点针对剪切、行列去除、旋转三种类型的几何攻击,分别设计了三种算法。同时,设计算法时还考虑了其它的攻击,应用相应的理论使算法尽可能的抵抗更多的攻击,进而使算法的应用领域得到扩展。
     1.提出了一种双重变换域和水印划分策略的水印算法。算法首先将水印加密置乱,然后将水印和载体图像分为两部分,将一部分水印自适应嵌入到DCT域视觉容量大的DC系数上,另一部分自适应嵌入到DWT域的中频子带中,实现了嵌入强度与区域特征的自适应。有效的解决了水印的容量问题,并提高了水印的鲁棒性和不可见性;实验表明,算法对JEPG压缩、几何剪切等攻击均达到了预期的指标。
     2.以图像归一化技术能够良好的抵抗全局几何攻击和分形局部化水印为基础,提出了一种基于图像归一化的分形水印算法。算法首先利用基于矩的归一化技术将载体图像映射到具有几何不变性的空间内;然后再结合不变质心理论在归一化图像中提取重要区域;最后利用分形,通过调整DCT中频系数,将水印自适应地嵌入到重要区域的自相似块中。实验表明,算法不仅具有较好的透明性,而且对常规信号处理攻击和行列去除等几何攻击均具有较好的鲁棒性。
     3.结合图像归一化、分形理论及伪Zernike矩,提出了一种可以抵抗不同角度的旋转攻击和组合攻击的水印算法。针对归一化图像大小不一致,利用伪Zernike矩良好的旋转不变性来弥补其不足。同时结合分形局部化水印来抵抗剪切攻击,通过对伪Zernike矩的二次测试,将水印嵌入到最鲁棒的自相似块的伪Zernike矩中。实验表明,算法不仅具有较好的透明性,而且对常规信号处理和不同角度的旋转等攻击均具有较好的鲁棒性。
Digital watermarking is a potent method for multimedia content protection such as protection of copyright, and becomes significant disquisitive field in the information hiding.But,at present,not every watermarking algorithm is rubust to all the attacks.The aim to designing watermarking algorithm is to against a particular type of attacks,and try to take other types of attacks into account. As the watermarking product application areas are often varying,and different watermarking application environments tend to a certain algorithm against a type of attacks.Therefore,the research for a certain type of attacks watermarking algorithm is also of critical importance.
     This article is focusing on cutting,removal of rows and columns and rotatation geometric attack, three kinds of algorithms were designed.
     1.A meaningful digital watermarking algorithm is proposed based on combination of DCT and DWT.Firstly,making watermarking chaos using arnold transform;Secondly, cutting the choas into two pieces. Second, embeding one piece into DCT's DC coefficie-nt coefficient by adaptive quantization,and embeding the other into DWT sub-band.
     2. A new fractal watermarking algorithm robust to removal is proposed based on image normalization and fractal.Firstly,the geometrically invariant space is built by using image normalization.Then,a significant region is gained from the normalized image by using invariant centroid principle.Finally, the watermark is embedded into the self-similar blocks DCT transformed of the significant region by fractal.
     3. A new image watermarking algorithm robust to different angle rotation is proposed.Firstly,significant region is extracted by using normalization and invariant centroid principle.Then,significant region is divided into two groups:self-similarity and non-self-similarity blocks by fractal coding and pre-set threshold,the robustest pseudo-Zernike moments is picked up among the pseudo-Zernike moments of the self-similarity blocks.Finally,the watermark is embedded in the robustest pseudo-Zernike moments by quantization.
引文
[1]I. J. Cox, M. L. Miller,J. A. Bloom著.王颖,黄志蓓译.数字水印[M].北京:电子工业出版社,2003.
    [2]孙圣和,陆哲明,牛夏牧等著.数字水印技术及应用[M].北京:科学出版社,2004.
    [3]王向阳.多媒体信息处理技术[M].北京:科学出版社,2005.
    [4]M. Bami, I. J. Cox, T. Kalker. Digital watermarking[J]. In:Lecture Notes in Computer Science(LNCS), USA (New York):Springer-Verlag,2005,15-17.
    [5]X. Y. Wang, H. Zhao. A novel synchronization invariant digital watermarking scheme based on DWT and DCT[J]. IEEE Transactions on Signal Processing,2006,54(12):4835-4840.
    [6]I. Kotsia, I. Pitas. Facial Expression Recognition in Image Sequences Using Geometric Deformation Features and Support Vector Machines[J]. IEEE Transactions on Image Processing,2007,16(1):172-187.
    [7]Q.Li, G. Doerr, I. J. Cox. Spread Transform Dither Modulationusing a Perceptual Model[C]. In:IEEE 8th Workshop on Multimedia Signal Processing, Canada(Victoria): Institute of Electrical&Electronics Engineers (IEEE),2006,98-102.
    [8]L. Lin, G. Doerr, I. J. Cox, M. L. Miller. An efficient algorithm for informed embedding of dirty-paper trellis codes forwatermarking[C]. In:IEEE International Conference on Image Processing. UK (London):Institute of Electrical&Electronics Engineers (IEEE), 2005,697-700.
    [9]李弼程,罗建书,小波分析及其应用[M].北京:电子工业出版社,2003.
    [10]王炳锡,陈琪,邓峰森,数字水印技术[M].西安:西安电子科技大学出版社,2003:11-12.
    [11]R.G. Van Schyndel, A. Tirkel, C. Osborne. A digital watermark[J]. IEEE Int. Conf. on Image Processing,1994,2:86-90
    [12]Bender W, Gruhl D, Morimoto N. Techniques for date hiding[J]. IBM System Journal, 1996,35(3):313-335.
    [13]毛万欣,卢正鼎.一种基于DCT的自适应图像水印算法[J].计算机工程与科学,2005,27(7):43-51.
    [14]孙中伟,玛升.DCT变换域乘嵌入图像水印的检测算法[J].软件学报,2005,16(10):1798-1804.
    [15]Gu Fan,Lu Zhe-Ming,Pan Jeng-Shang. Multipurpose image Watermarking in DCTdomain using sub sampling [J]. IEEE Int. Symposium on Circuits and Systems,2005,5:4417-4420.
    [16]COX I J, KILIAN J, LEIGHTONFT, etal. Secure spread spectrum watermarking for multimedia[J]. IEEE Trans Image Processing,1997,6 (12):1673-1687.
    [17]Huang Fang-jun, Guan Zhi-hong, Wu Xian-yong. Blind watermarking algorithm based on DCT[J]. Journal of Huazhong University of Science and Technology(Nature Science), 2006,34(2):121-126.
    [18]王树梅,赵卫东,王志成,温法慧.基于离散余弦变换的盲水印算法研究[J].计算机工程与设计,2007,28(21):5170-5173.
    [19]杨恒伏,伍雁鹏,田祖伟.利用HVS特性与混沌映射的图像水印算法[J].计算机工程与应用,2009,45(13):133-135.
    [20]王向阳,陈利科,赵红.一种新的DCT域图像水印嵌入算法[J].辽宁师范大学学报(自然科学版),2005,28(1):52-55.
    [21]李旭东.基于分块DCT和量化的图像盲水印[J].计算机工程,2006,32(21):139-144.
    [22]刘方,杨峰.改进的基于DCT的加密盲水印算法[J].计算机工程与应用,2009,45(13):124-126.
    [23]崔东峰,王相海.基于DCT的自适应图像盲水印算法[J].计算机工程与设计,2007,28(06):1355-1357.
    [24]程颖,张明生,王林平,郑芳,邓霞.基于DCT域的自适应图像水印算法[J].计算机应用研究,2005,12:147-149.
    [25]韩强,马洪.DCT域上基于HVS的盲水印添加方法[J].四川大学学报(自然科学版)2005,42(03):444-449.
    [26]冯茂岩,冯波,沈春林.基于分块DCT变换和Arnold置乱的自适应图像水印算法[J].计算机应用,2008,28(01):171-173.
    [27]卢洵,徐振启,罗少鹏.基于DCT和DWT的图像水印算法[J].信息工程大学学报,2006,7(3):287-292.
    [28]闫晓涛,刘宏伟,谢维信,喻建平.基于DWT和DCT域的二值图像数字水印算法[J].计算机与数字工程,2007,35(03):25-28.
    [29]张专成,张殿富,闫小萍.一种鲁棒的基于DWT域自适应量化步长的图像盲水印算法[J].中国图象图形学报,2006,11(06):840-847.
    [30]刘畅.一种基于小波变化和空域的综合数字水印技术[J].计算机应用研究,2006,(7):258-260.
    [31]楼偶俊,王相海.提升方案小波和HVS下的自适应视频水印算法研究[J].小型微型计算机系统,2008,29(04):734-740.
    [32]杨恒伏,陈孝威.小波域鲁棒自适应公开水印技[J].软件学报,2002,14(09):1653-1660.
    [33]Kundur D,Hatzinakos D. A robust digital image watermarking method using wavelet-based fusion[C]. Proc. of the IEEE Int.Conf.on Image Processing, ICIP'97,1997-10,1:544-547.
    [34]吴健珍,谢剑英.基于模糊聚类和HVS的DWT自适应盲水印算法研究[J].计算机工程与应用,2004,17:109-111.
    [35]毛秉毅,基于HVS模型的JPEG2000数字图像水印算法[J].计算机工程与应用,2005,35:71-72,78.
    [36]王向阳,杨红颖,侯丽敏.一种用于版权保护的混合域数字图像水印算法[J].测绘学报,2006,35(08):240-244.
    [37]卢洵,徐振启,罗少鹏.基于DCT和DWT的图像水印算法[J].信息工程大学学报,2006,07(03):287-300.
    [38]P. Dong, N. P. Galatsanos, AffineTransformation Resistant Watermarking Based on Image Normalization[J]. IEEE Trans. on image processing, Vol.8,2002, pp.865-882.
    [39]P. Dong, J. G. Brankov, N. P. Galatsanos, Y. Yang, and F. Davoine, Digital Watermarking Robust to Geometric Distortions[J]. IEEE Trans.Image Processing, Vol. 14, No.12,2005,pp.2140-2150.
    [40]牛盼盼,杨红颖,邬俊,王向阳.基于归一化图像重要区域的数字水印方法[J].中国图象图形学报,2007,12(10):1774-1777.
    [41]孟岚,杨红颖,王向阳.基于图像归一化的DFT域数字水印嵌入算法[J].小型微型计算机系统,2008,29(11):2153-2156.
    [42]Zheng Dong, Zhao Jiying, Saddik Abdulmotaleb. RST-invariant digital image watermarking based on log-polar mapping and phase correlation[J]. IEEE Transactions Circuits Systems Video Technology,2003,13 (8):753-765
    [43]CHEN Qing,YANG Xiao-li, ZHAO Ji-ying. Robust image watermarking with Zernike moments[A]. CCECE 2005[C]. Canada:IEEE,2005.1340-1343.
    [44]LI Lei-da, GUO Bao-long, SHAO Kai.Geometrically robust image watermarking using scale-invariant feature transform and Zernike moments[J], Chinese Optics Letters,2007, 5 (6):332-335.
    [45]李雷达,郭宝龙,刘雅.基于伪Zernike矩的抗几何攻击图像水印[J].光电子·激光,2007,18(2):231-235.
    [46]XIN Yong-qing,LIAO S,PAWLAK M. A multibit geometrically robust image watermark based on zernike moments[C]. Proceedings of the 17th International Conference on PatternRecognition(ICPR'2004). IEEE Press,2004:861-864.
    [47]Xian-gui Kang and Ji-wu Huang et al.,A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression[J]. IEEE Trans. on Circuits and Systems for Video Technology,2003,13(8):776-786.
    [48]JIN S S,CHANG D Y.Image watermarking based on invariant regions of scale-space representation[J]. IEEE Trans. on Signal Processing,2006,54 (4):1537-1549.
    [49]王向阳,邬俊,侯丽敏.基于图像特征的数字水印算法研究[J].中国图象图形学报,2006,11(11):1562-1565.
    [50]王向阳,侯丽敏,邬俊.基于图像特征点的强鲁棒数字水印嵌入方案[J].自动化学报,2008,34(1):1-6.
    [51]王向阳,侯丽敏,杨红颖.基于图像特征点与伪Zernike矩的鲁棒水印算法研究[J].计算机研究发展,2008,45(05):772-778.
    [52]Faraoun Kamel Mohamed, Rabhi Abbes. RST Robust Watermarking Schema Based on Image Normalization and DCT Decomposition[J]. Malaysian Journal of Computer Science, 2007,20(1):77-90.
    [53]J. Paute and F. Jordan, Using Fractal compression scheme to embed a digital signature into an image[J]. Proc. SPIE Photonics East Symposium, Boston, USA,1996, pp. 18-22.
    [54]Zhen Yao. Fixed point in fractal image compression as watermarking[C]. Proceedings of International Conference on Image Processing[C] 2003, (2)475-478.
    [55]李冠华,赵耀.基于分形图像编码的数字水印技术的研究[J].铁道学报,2001,23(4):48-53.
    [56]Cheng-hao Li, Regular Member and shuenn-shyang WANG. Digital Waterjunking Using Fractal Image Coding[J]. IEICE TRANS. FUNDAMENTALS,2000,83 (6):1286-1288.
    [57]Chien-Cheng Tseng, Chi-Hang Yang and Wei-Rong Tseng. Digital Image Watermarking Based on Fractal Compression scheme[J].In:Proceedings of cvgip.2001,Taiwan.
    [58]S. Tsekeridou, N. Nikolaidis, N. Sidiropoulos and I. Pitas.Copyright Protection of Still Images Using Self-similar ChaoticWatermarking[C]ICIP'2000, (1):411-414.
    [59]胡臻平,葛孚华,李天牧.基于分形压缩编码的数字水印技术[J].计算机应用,2001,21(3):26-34.
    [60]Ping-Sung Liao, Chun-Chi Chen, Jeng-Shyang Pan,Robust Fractal Watermarking on Continue-tone Images[C].18th IPPR Conference on Computer Vision, Graphics and Image Processing,2005:1042-1407.
    [61]Pi M H, Li C H, Li H, A novel fractal image watermarking[J]. IEEE Trans. on Multimedia,2006,8(3):488-499.
    [62]Xie, RS,Yang, SG, A Digital Image Watermarking Method Based on Fractal Transform in DWT Domain[C].1st International Conference on Modelling and Simulation, naning, China,2008, (3):424-429.
    [63]Voloshynovskiy S, Pereira S, Iquise V, Pun T. Attack modelling:Towards a Second Generation Watermarking Benchmark[J]. Signal Processing,2001,81 (6):1177-1214
    [64]http://www.cl.cam.ac.uk/-fapy2/watermarking/stirmark/
    [65]Cox I J, Linnartz J P. Some General Methods for Tampering with Watermarks[J]. Journal on Selected Areas in Communications,1998,16(4):587-593
    [66]D. Simitopoulos, D. E. Kontsonanoe. Robust image watermarking based on generalized radonWarnform[J]. IEEE Transactions on Circuits and Systems for Video Technology,2003, 13(8):732-745.
    [67]王忠,管章岑.图像数字水印抗几何变换方法的研究[J].科学技术与工程,2007,7(9):1926-1930.
    [68]张力,肖薇薇,张基宏.旋转、平移及尺度不变性小波域第二代水印技术[J].深圳大学学报(理工版),2005,22(1):18-23.
    [69]张力,肖薇薇,张宏基.基于原始图像矩的放射不变性水印算法[J].深圳大学学报.2003.20(2):-21.
    [70]桑茂栋,赵耀.基于几何矩的抵抗RST攻击的数字图像水印[J].电子与信息学报.2007.29(1):76-80.
    [71]D. J. Fleet, D. J. Heger. Embedding invisible informationin color images[C]. In: Proceedings of IEEE International Conference on Image Processing(ICIP), USA (Santa Barbara):Institute of Electrical and Electronics Engineers (IEEE),1997,532-535.
    [72]王向阳,杨红颖.基于视觉掩蔽特性的小波域彩色图像数字水印技术[J].计算机辅助设计与图形学学报,2004.16(9):1240-1243.
    [73]康显桂,黄继武,林彦,杨群生.抗仿射变换的扩频图像水印算法[J].电子学报,2004,32(1):8-13.
    [74]]M. Kutter. S. K. Bhattacharjee, T. Ebrhimi. Towards second generation watermarking schemes[C].In:International Conference on Image Procession(iciF). Japan(Kobe): Institute of Electrical&Electronics Engineers(IEEE),1999:320-323.
    [75]金聪,叶俊民,许凯华,张清国.具有抗几何攻击能力的盲数字图像水印算法[J].计算机学报,2007,30(3):474-482.
    [76]王楠,王晅,赵杰.一种基于小波变换和DCT量化的彩色图像盲水印算法[J].沈阳大学学,2008,20(3):96-102.
    [77]李钢,应影,张仁斌.一种基于混合域自适应灰度水印算法[J].合肥工业大学学报(自然科学版),2007,30(12):1584-1588.
    [78]王向阳,杨红颖,陈利科.基于视觉掩蔽的半脆弱水印技术研究[J].中国图象图形学报,2005,10(12):1549-1553.
    [79]M Barni, I J Cox, T Kalker. Digital watermarking[C]. The 4th International Workshop on Digital Watermarking 2005 (IWDW2005),Siena,Italy, September 15-17,2005.
    [80]Sun Sheng-he,Lu Zhe-ming,Niu Xia-mu. Digital watermarking and its application[M].Beijing:Science Press,2004.
    [81]LicksV, JordanR.Geometric attacks on image watermarking system[J]. IEEE Multimedia,2005,1 (3):68-78.
    [82]F. K. Mohamed,R.Abbes,RST Robust Watermarking Schema Based on Image Normalization and DCT Decomposition[J]. Malaysian Journal of Computer Science,2007,20(1):77-90.
    [83]Jacquin. A Image Coding Based on a Fractal Theory of Iterated Contractive Image Transformations[J].IEEE Trans. ImageProcessing,1992,1 (1):18-30.
    [84]Javad Haddadnia, Majid Ahmadi, and Karim Faez. An efficient feature extraction method with pseudo-Zemike moment in RBF neural network-based human face recognition system[C].European Association for Signal Processing(EURASIP) Journal on Applied Signal Processing,2003,9(1):890-901.
    [85]H. Kim,H. K. Lee. Invariant image watermark using Zemike moments[J]. IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):766-775.
    [86]M. Farzam,S. Shahram Shirani. A Robust multimedia watermarking technique using Zemike transforms[C].In:Proceedings IEEE Intemational Workshop Multimedia Signal Processing, UK(London):Institute of Electrical&Electronics Engineers(IEEE),2001, 529-534.
    [87]J. Chen, H. Yao, W. Gao And S. Liu. A Robust watermarking method based on wavelet and Zernike transform[C].In:Proceedings of International Symposium on Circuits and Systems. North America(Vancouver):Institute of Electrical&Electronics Engineers (IEEE),2004,173-176.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700