鲁棒性水印和易脆性水印技术的研究与应用
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
伴随着网络技术和多媒体技术的飞速发展,多媒体数据逐渐成为人们获取信息的重要来源,并因其方便快捷而成为人们生活的重要组成部分,多媒体信息的交流达到了前所未有的深度和广度。多媒体数据发布形式愈加丰富,其暴露出的问题也十分明显:作品侵权更加容易,篡改更加方便。因而,如何保护多媒体信息的安全成为国际上研究的热门课题。
     本论文主要探讨有关数字图像信息安全中的数字水印技术。数字水印技术作为版权保护的重要手段是数字信息安全中重要的一个分支,它通过在原始数据中嵌入秘密信息——水印来证实该数据的所有权或完整性,以此来抵制对数字作品的盗版或篡改等,其凭借优于数字加密技术的特点,得到广泛的研究和应用。。
     本文以静态的数字图像为例,在总结数字水印技术的发展背景及基本理论框架的基础之上,从不同侧重点提出两种基于频域的鲁棒性水印算法,并对数字(图像)水印算法和不同水印之间的结合应用进行了研究和讨论。主要工作有以下几个方面:
     首先,数字水印技术研究的一个重要内容就是鲁棒性数字水印算法的研究和设计,因此,对现有数字水印技术进行了概述,并重点分析了鲁棒水印和易脆水印的研究现状。
     其次,通过利用分块DCT技术,采用混沌加密技术对水印图像预处理,提高抗剪切能力,根据人眼视觉系统的掩蔽特性选择合适的分块,然后利用余数的周期特性在选择较好分块的中频系数上进行水印嵌入,在检测水印时实现了盲检测。经过仿真实验,该算法对剪切攻击,滤波攻击,JPEG压缩等有较强鲁棒性,但在旋转变换和强噪声攻击时尚待改进。
     最后,介绍了新的数字水印技术——零水印的应用,结合小波水印同时实现了鲁棒性和易脆性,这是其他多功能数字水印技术算法无法独立完成的,并针对传统的相关值检测盲水印方法嵌入容量小,鲁棒性较差的缺点,提出了实现鲁棒性和易脆性相结合的基于小波零树结构和奇异值分解的零水印算法。该方法具有实现简单,运算复杂度低的特点,并对常见的攻击具有鲁棒性。仿真实验结果表明该算法不仅具有较强的鲁棒性,而且能够达到易脆水印的图像篡改定位能力,即同时实现了水印的鲁棒性和易脆性。
With the rapid development of internet and multimedia technique, the multi-media data is becoming the important source that the people obtain information gradually, and it constitutes an important part of people's live because of its convenience and speediness. The exchange of the multi-media information has come to an unprecedented depth and wide degrees. The forms of multi-media data release are much abundant, but there are many obvious problems: it is much easier to infringe copyright; it is more convenient to sophisticate etc. As a consequence, how to protect the security of multi-media information turns into a popular topic all over the world.
     This paper mainly discusses the watermark technique applied in information security concerning digital image. The watermark technique is one of the important branches in digital information security which servers to protect copyright and it is researched and applied extensively because of its characteristics that are more excellent than digital encryption. It is used to confirm the ownership or integrities of the data by the watermark with secret information, which is imbed into the original data, to boycott the pirate edition or distort to the digital work.
     This paper discussed and researched thoroughly in the combination between image waterworks and other watermark based on summarizing the background and the theories frame of the digital watermark technical development. It takes the digital image of the static as an example, the main work contain followings:
     Firstly, an important content of the digital watermark technique research is the research and design of the robust watermark. This paper advances two robust watermark arithmetic base on frequency field from different particular emphasis, and stress to analyze the present conditions research of the robust watermark and fragile watermark.
     Secondly, pass to make use of to divide the DCT technique, adopt the Chaotic Encryption to do the pretreatment of the digital watermark image, raise the ability of resist cutting, choice the right block according to the human visual system, then imbed the watermark into the better block of the coefficient of intermediate frequency by the period characteristic of remainder, carrying out the blind detection while examine watermark. After the experimentation, the arithmetic has the stronger robust to the attacks of shear , filter and the JPEG compresses etc, but it needs the improvement on the attacks of revolve transformation and the strong yawp.
     Finally, it introduced the latest digital watermark technique--zero watermarks, andconcludes the stronger characteristic, which carries out the combining robust with frangibility, and which is other multi-function digital watermarks technique can't complete independently. It advances the zero watermark arithmetic, which is based on EZW and SVD and carrying out the combining robust with frangibility. This method has the characteristic which is simple and low complication, and has the robust to familiar image processing. The experimentation result indicate that method not only have the robust, but also can attain the orientation ability of fragile watermark, then carried out the robust and frangibility at the same time.
引文
[1]王炳锡,陈琦,邓峰森.数字水印技术.西安:西安电子科技大学出版社,2003.11.
    [2]I.J.Cox,M.L.Miller,J.A.Bloon.Digital watermarking.Publishing House of Electronics Industry,2003.7.
    [3]A.Z.Tirkel,G.A.Rankin,R.M.van Schyndel,W.J.Ho,N.R.A.Mee,C.E Osborne."Electronic Water Mark." DICTA-93.Macquarie University,Sydney,Decmeber 1993,pp.666-672.
    [4]张冠男,数字水印技术综述,http://jludm.jlu.edu.cn/lab/acd/20031005_zhangguan nan.doc
    [5]陈明奇,钮心忻,杨义先.基于小波变换及矢量量化的隐像术.计算机研究与发展,2001,38(2):199-203
    [6]Tirkel A.Z.,et al.Electronic watermark.Digital image computing,Technology and Applications,1993,Macquarie University,1:666-673
    [7]Schyndel R.G.van,Tirkel A.Z.,Osborne C F.A digital watermark.First IEEE International Image Processing Conference,1994,2:86-90
    [8]I.J.Cox,et al.Secure spread spectrum watermarking for multimedia.Technical Report 95-10,NEC Research Institute,Princeton,NJ,1995
    [9]Pitas I.,A method for signature casting on digital images.IEEE International Conference on Image Processing,1996,3:215-218
    [10]Voyatzis G,Pitas I.Embedding robust watermarks by chaotic mixing.13th Internaitonal Conference on Digital Signal Processing,1997,1:213-216
    [11]D.Kundur,D.Hatzinakos.Digital watermarking for telltale tamper-proofing and authentication.Proceedings of the IEEE Special Issue on Identification and Protection of Multimedia Information,1999,87(7):1167-1118
    [12]刘瑞祯,谭铁牛.数字图像水印研究综述.通信学报,2000,21(8),39-48
    [13]Stefan Katzenbeisser,Fabien A.P.Petitcolas(著),吴秋新,钮心忻,杨译先等(译).信息隐藏技术--隐写术与数字水印.北京:人民邮电出版社,2001
    [14]FRIDRICH J,BALDOZA A C,SIMARD R J.Robust digital watermark based on key-dependent basis functions[J].Proc of information Hiding' 98[C].1998,143-157
    [15]HARTUNG F,GIROD B.Fast pubic-key watermarking of compressed video[A].Proc of ICIP' 97[C].1997,1,538-531
    [16]CRAVER S.On public-key steganography in the presence of an active warden[A].Proc of Information Hiding98'[C].1998,355-368
    [17]HERRIGEL A,VOLOSHYNOVSKIY S.Copyright and content protection for digital images based on asymmetric cryptographic techniques[A].Proc of Multimedia'98[C].1998,99-112
    [18]S.J.Lee,S.H.Jung.A survey of watermarking techniques applied to multimedia.In:ISIE 2001,Pusan,Korea,2001.272-277.
    [19]T.S.Liang,J.J.Rodriguez.Robust watermarking using robust coefficients.In:Proceedings of SPIE - Vol.3971.Security and Watermarking of Multimedia Contents Ⅱ,Ping W.Wong, Edward J.Delp Ⅲ,Editors,May 2000,326-335.
    [20]E.T.Lin,E.J.Delp.A Review of Fragile Image Watermarks.In:Proc.of the Multimedia and Security Workshop at ACM Multimedia '99,Orlando,1999.25-29.
    [21]E.T.Lin,C.I.Podilchuk,and E.J.Delp.Detection of Image Alterations Using Semi-Fragile Watermarks.In:Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents Ⅱ,Vol.3971,San Jose,CA,2000:152-163.
    [22]Turner L.F."Digital data security system." Patent IPN WO89/08915,1989.
    [23]Bender W.,Gruhl D.,Morimoto N."Technique for Data Hiding[R]".Massachusetts Institute of Technology Media Lab,1994.
    [24]W.Bender,D.Gruhl,and N.Morimoto.Techniques for Data Hiding.In:Proceedings of the SPIE Conference on Storage and Retrieval for Image and Video Databases Ⅲ,vol.2420,San Jose,CA,February 1995:164-173.
    [25]N.Nikolaidis,I.Pitas.Copyright protection of images using robust digital signatures.In:IEEE Proceeding on International Conference on Acoustics,Speech,and Signal Processing,Atlanta,IEEE Press,1996:2168-2171
    [26]F.Alturki,R.Mersereau.Secure fragile digital watermarking technique for image authentication.In:2001 International Conference on Image Processing,Vol.3,2001:1031-1034.
    [27]Kenneth R.Castleman.Digital Image Processing(影印版).北京:清华大学出版社,2003.
    [28]I.J.Cox,J.Kilian,F.T.Leighton et al.Secure spread spectrum watermarking for multimedia.IEEE Transactions on Image Processing,6(12),Dec.1997:1673 - 1687
    [29]C.T.Hsu,J.L.Wu.Multiresolution watermarking for digital images.IEEE Trans.Circuits Syst.Ⅱ,Aug.1998,45(8):1097-1101
    [30]C.I.Podilchuk,Zeng Wenjun.Image-adaptive watermarking using visual model.IEEE Journal on Selected Areas in Communications,16(4),1998,525-539.
    [31]Andrew B Waston,Gloria Y Yang,Joshua A Solomon etal.Visibility of wavelet quantization noise.IEEE Trans on Image Processing,1997
    [32]J.Puate,F.Jordan."Using Fractal Compression Scheme to Embedded a Digital Signature into An Image." Proc.Of SPIE,1996.
    [33]G.Voyatzis,I.Pitas."Chaotic Watermarks for Embedding in the Spatial Digital Image Domain." Proc.Of the IEEE,1998,p.432-436.
    [34]Ming Sun Fu,Oscar C.Au."Data Hiding in Halftone Images using Stochastic Error Diffusion." Proc.Of IEEE Int.Conf.On Acoustics,Speech and Signal Processing,Vol.3.Salt Lake City.Utah.USA.May(2001)1965-1968.
    [35]刘瑞祯,谭铁牛.“基于奇异值分解的数字图像水印算法.”电子学报,2001年2月,Vol.29 No.2,p.168-171.
    [36]王志雄,王慧琴,李人厚.“数字水印应用中的攻击和对策综述”,通信学报,2002年11月,Vol.23 No.11,74-79
    [37]KUGN M.StirMark[EB/DL].http://www.lcama.cu.k/mgk25stirmark/1997-11
    [38]HOLLIMAN M,MEMON N.Counetrfetinig Attacks on Lniear Watermarking Schemes[R].Ausitn:proc IEEE Multimedai Sysetms '98,Workshop Securtiy Issues ni Multimedai Sysetms,June 1998
    [39]Can Invsibile Waetrmarks Resolve Rgihftu lOwnershpis[R].IBM Res Rep RC 20509,Juyl 1996.
    [40]Dgiimark Corporaiton[EBD/L]h.ttp/:w/ww.dgitimarkc.om./1997-01.
    [41]SCHNEIDER B.Appiled Crypotgraphy[M].New York:Whely,1996.
    [42]VOLOSHYNOVSKIY S,PEREIRA,S IQUISE V.Attack modeilng:otwards a second generaiton waetrmarknig benchmark[J].Sginal Processnig,2001,1177-1214
    [43]I.J.COX.Secure Spread Specrtum Waetrmarking for Images,Audoi and Vdieo[R]N.J:NEC Res Ins,t Prniceotn,95-10,1995.
    [44]MAES M.Twin Peaks:The Hisotgram Attack on Fxied Depht Image Watermarks[R].Berlin,Germany:Lecutre Notes ni Compuetr Sceince,19982.90-305.
    [45]Kuhn M.G.,Petitcolas F.A.P.StirMark:http://www.cl.cam.ac.uk/~fapp2/watermarking/stirmark/
    [46]侯振华,陈生潭,脆弱性数字水印研究,计算机应用,2003年,Vol.23,106-108
    [47]Walton S.Information authentication for a slippery new age[J].Dr Dobbs Journal,1995,20(4):18-26
    [48]Wong PW.A public key watermark for image verification and authentication[A].Proceedings of the IEEE International Conference On Image Proceeding[C].Chicago,Illinois,USA,1998,1.455-459
    [49]CelikM,Shanna G,Saber E,et al.Hierarchical watermarking for secure image authentication with localization[J].IEEE Transactions on Image Processing,2002,11(6):585-595
    [50]Li C-T,Yang FM,Lee CS.Oblivious Fragile Watermarking Scheme For Image Authentication[A].Proc IEEE International Conference on Acoustics,Speech,and Signal Processing[C].Orlando,FL,USA,2002,Ⅵ.3445-3448.
    [51]Fridrich J.Security of fragile authentication watermarks with localization[A].Proc SPIE[C],2002.
    [52]Fridrich J,Goljan M.Images with self-correcting capabilities[A].Proceedings of the IEEE International Conference on Image Processing[C].Kobe,Japan,1999,3.792-796.
    [53]Marvel LM,Hartwig G.Boncelet,Jr CG.Compression compatible fragile and semi-fragile tamper detection[A].Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents Ⅱ[C].San,Jose,CA,USA,2000.140-151.
    [54]Kundur D,Hatzinakos D.Digital Watermarking for Telltale Tamper Proofing and Authentication[A].Proceedings of the IEEE Special Issue on Identification and Protection of Multimedia Information[C],1999.1167-1180.
    [55]Yu GJ,Mark Liao HY,Lu CS.Mean Quantization based Fragile Watermarking for Image Authentication[J].Optical Engineering,2001,4 0(7):1396-1408.
    [56]Koch E,Zhao J.Towards robust and hidden image copyright labelling,In:Proc of IEEE Workshop on Nonlinear Signal Processing,1995,452-455
    [57]Barni M,et al.A DCT-domain system for robust image watermarking,Signal Processing,1998,66:352-372
    [58]黄继武,SHI Y Q.程卫东.DCT域图像水印:嵌入对策和算法.电子学报,2000,28(4):386-389
    [59]杨树国,李春霞,孙枫等,小波域内图像零水印技术的研究[J],中国图像图形学报,2003年6月第6期,664-669
    [60]温泉,孙锬峰,王树勋.基于零水印的数字水印技术研究[A].全国第三届信息隐藏学术研讨会(CIHW'2001),[C].西安:西安电子科技大学出版社,2001
    [61]I.J.Cox,Joe Kilian,F Thomson.Secure Spread Spectrum Watermarking for Multimedia[J].IEEE Transactions on Image Processing,1997,6(12):1673 - 1687
    [62]温泉,孙锬峰,王树勋.零水印的概念与应用[J],电子学报,2003年第2期,214-216
    [63]周波,陈健.一种基于奇异值分解的稳健数字水印算法[J].计算机工程,2004年8月第15期
    [64]周波,陈健.基于奇异值分解的、抗几何失真的数字水印算法.中国图像图形学报,2004.4,Vol.9,No.4,p.506-512.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700