用户名: 密码: 验证码:
数字水印健壮性研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着计算机技术和网络应用的迅猛发展,人们的日常生活与工作越来越趋于数字化和网络化。大量私有数据在网络上的传播、网络交易的日益风行,都使传统的版权保护手段和数据安全技术面临极大的挑战和某些难以克服的困难。数字水印技术正是在这样一种背景下产生并发展起来的。数字水印技术是通过一定的算法将一些标志性信息嵌入到多媒体内容当中,但不影响原媒体的使用价值,通过专用的检测器或阅读器可以提取这些嵌入的信息,从而实现版权保护,篡改检测等应用。本文在前人工作的基础上,针对当前数字水印的发展状况,完成了以下工作:
     1.设计了一种将串谋安全码与小波域嵌入技术相结合的数字水印方法。该方法除了具有一般数字水印技术所具备的健壮性与不可见性外,还对串谋攻击具有一定抵御能力,可以作为数字媒体拷贝跟踪的一种手段。此外详细分析了抵御串谋攻击所需具备的条件,以及他们之间的关系。
     2.利用组合设计理论中的均衡关联区组设计,构造出非线性均衡关联区组设计码作为数字媒体(图像、视频等)指纹码字,该码字具有抵御串谋攻击的特性。利用码字本身的冗余度,使水印信息具有一定的纠错性能,进一步提高了系统的健壮性。根据码字的特点,设计了一整套水印嵌入、提取与追踪串谋用户的方案,可以作为数字媒体版权保护的潜在解决技术。实验显示改方案比其它同类水印算法具有更好的抵御串谋攻击的能力。
     3.设计出一种用于检测信息篡改的数字水印技术,是网络环境下对多媒体信息进行认证和防伪的新型技术。
With the rapid development of computer and network, the daily life and work of human beings are becoming digitalized and networked. A large number of private data are transformed in the Internet, and electrical commerce is more and more popular. All these challenge the traditional method of copyright protection and technology of data security. In this background, digital watermarking is developed gradually. Digital watermarking technique is an available protection technique, which embeds an invisible structure into multimedia products in order to authenticate the ownership or transmit other available information. Based on the research and work of pre-scholars, regarding the situation of nowadays digital watermarking, some innovative work is done in this dissertation and is listed as follows.
    (1) Designed a method which combines the watermarking scheme and secure-fingerprint. The technique not only has the robustness and imperceptions ability of watermarking, but also can anti collusion attack. So it can be one method to track the transaction.
    (2) Uses combinatorial theory and constructs nonlinear DBBD (Differential Balanced Block Design) code as fingerprint for digital media (image, video, etc). The code can anti-collusion and has the capability of error correct. Based on the special characteristic of the code, designed the embedding, extracting and tracking scheme for the copyright protection.
    (3) Designed one innovative watermarking technique for tamper detection, which is a new technique for authentication and anti- counterfeit.
引文
[1] I. Cox, J. Kilian, F. T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Trans. on Image Processing, 6(12): 1673-1687, 1997.
    [2] Christine Podilchuk, Wenjun Zeng. Image adaptive watermarking using visual models[J]. IEEE J. Select. Areas Commun. Vol. 16, pp. 525-540, May 1998.
    [3] 杨义先,钮心忻,任金强.信息安全新技术[m].北京:北京邮电大学出版社,2001.12.(52~53).
    [4] 易开祥,石教英,孙鑫.数字水印技术研究进展.中国图象图形学报,2001年2月,P111~117.
    [5] 江铭炎,王凤兰,李浩.数字水印技术及其发展方向.山东电子,2001年第四期,P9~10.
    [6] 王焕伟,陈向东,陈显治,数字水印技术与图像版权保护.解放军理工大学学报,2001年2月,P32~36.
    [7] 孙圣和,陆哲明.数字水印处理技术。电子学报,Vol.28 No.8 2000年8月,P1~6.
    [8] 周利军,周源华,支争.高技术通讯,2001年01月,P104~107.
    [9] 陈青 王延平,数字水印——知识产权保护的新技术,中国图像图形学报,第9期,第四卷,P800~804.
    [10] Jiri Fridrich. Applications of data hiding in digital images. In: the ISPAC'98 Conference in Melbourne, Australia, 1998.11.
    [11] Cox I J, Matt L Miller. A review of watermarking and the importance of perceptual modeling. In: SPIE Proceeding on Human Vision and Electronic Imaging, 1997, 3016: 92~99.
    [12] Bender, W.,D.Gruhl,and N.Morimoto. Techniques for Data Hiding. In Proceedings of the SPIE 2420, Storage and Retrieval for Image and Video Databases Ⅲ, 1995, pp. 164-173.
    [13] M. Wu, M. L. Miller, J. A. Bloom, and I. J Cox. A rotation, scale, and translation
    
    resilient public watermark. In Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing 1999(ICASSP'99), Phoenix, AZ, 1999.
    [14] Christine I.Podilehuk,Wenjun Zeng. Image-Adaptive Watermarking Using Visual Models. IEEE Journal on selected areas in communications, Vol.16, NO.4, MAY 1998.
    [15] Andrew B.Watson. DCT quantization matrices visually optimized for individual images. Proc. SPIE 1913, pp. 202-216, 1993.
    [16] Heidi A.Peterson,Albert J. Ahumada,Jr. and Andrew B.Watson "An Improved Detection Model for DCT Coefficient Quantization"SPIE Vol. 1913/191~201.
    [17] Andrew B. Watson,Gloria Y.Yang,Joshua A.Solomon,and John Villasenor. Visual Thresholds For Wavelet Quantization Error. SPIE Proceedings Vol. 2657, 1996.
    [18] Hartung, F., and B.Girod. Digital watermarking of MPEG-2 Coded Video in the Bitstream Domain. In Proceeding of the IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol.4, Munich, Germany, Apr. 1997, PP.2621-2624.
    [19] Swanson,M.D.,B.Zhu, and A.H.Tewfik. Data Hiding for Video-in-Video. In Proceedings of the International Conference on Image Processing, Vol.1, Santa Barbara, CA, 1997, PP. 676-679.
    [20] Riley, M.J.,and I. E. G. Richardson, Digital Video Communications, Artech House, 1997.
    [21] M. Kutter, S.K.Bhattacharjee, T. Ebrahimi. Towards Second Generation Watermarking Schemes. 6th International Conference on Image Processing(ICIP'99), Kobe, Japan. Vol 1 October 25-28 1999.
    [22] Patrick Bas, Jean-Marc Chassery, and Benoit Macq, Geometrically Invariant Watermarking Using Feature Points. IEEE Transactions on image processing, Vol. 11, No.9, September 2002, P1014-P1028.
    [23] 华先胜,石青云.局部化数字水印算法.中国图像图形学报.第六卷(A版),第七期,2001年7月.
    [24] http: //info.broadcast.sinobnet.com/HTML/O01/002/009/003/38564.htm
    [25] http://www.broadtechs.com/chinese/tech/sp001.htm
    
    
    [26] 泰克公司宣布在校正数字视频传输中的声像延迟误差方面取得突破性解决方案.[J]中国有线电视 2000年19期:71.
    [27] 张勇,赵东宁,李德毅.数字水印技术及进展[J].解放军理工大学学报(自然科学版).2003.64(3):1-5.
    [28] 张勇,赵东宁,李德毅.关系数据库数字水印技术[J].计算机工程与应用.2003.9 39(25):193-195.
    [29] 赵东宁,张勇,李德毅.基于云模型的文本数字水印技术[J].计算机应用.2003年增刊.
    [30] 杨义先等编著.网络信息安全与保密[M].北京.北京邮电大学出版社.1999.11.P87.
    [31] Ingemar J. Cox, Matt L. Miller and Jeffrey A. Bloom. Watermarking applications and their properties. In Proc. of Int. Conf. on Information Technology: Coding and Computing 2000, 2729 March 2000, pp. 6-10.
    [32] Benny Chor, Amos Fiat, Moni Naor, Benny Pinkas. Tracing traitors[J]. Advances in Cryptology-Crypto'94, Proceedings(Lecture Notes in Computer Science 839), pp. 257-270. Springer-Verlag, 1994. Santa Barbara, California, August 22-25.
    [33] Dan Boneh, James Shaw. Collusion-secure fingerprinting for digital data[J]. IEEE Trans. Inform. Theory, vol. 44, pp. 1897-1905, Sept. 1998.
    [34] Jana Dittmann, Peter Schmitt, Saar, Jorg Schwenk, Johannes Ueberberg. Combining digital watermarks and collusion secure fingerprints for digital images[C]. SPIE J. Electron. Image. Vol. 9, pp. 456-467, 2000.
    [35] Sebe, Josep Domingo-Ferrer. Scattering codes to implement short 3-secure fingerprinting for copyright protection[J]. Electronics letters 15tn August 2002 Vol.38 No.17.
    [36] Wade Trappe, Min Wu, Jane Wang, Ray Liu. Anti-collusion Fingerprinting for Multimedia[J]. IEEE Transactions on signal processing, Vol.51, NO.4, April 2003.
    [37] 汪小帆,戴跃伟,茅耀斌.信息隐藏技术——方法与应用[M].北京:机械工业出版社,2001.5.
    [38] Deepa kunder, Dimitrios Hatzinakos. Digital Watermarking Using Multiresolution Wavelet Decomposition. Proceedings of the International Conference
    
    on Acoustics, Speech and Signal Processing. 1998(6): 2969~2972.
    [39] 靳蕃.组合设计与编码[M].四川:西南交通大学出版社,1990.5.
    [40] Jiri Fridrich, Image Watermarking for Tamper Detection, Proc. ICIP '98, Chicago, Oct 1998.
    [41] Jiri Fridrich, Methods for Tamper Detection in Digital Images, Proc. ACM Workshop on Multimedia and Security, Orlando, FL, October 30-31, 1999, pp. 19-23.
    [42] Juan R.Hernandez, Associate Member and Fernando Perez-Gonzalez. DCT-Domain Watermarking Techniques for Still Images: Detector Performance Analysis and a New Structure. Proc.IEEE, Vol.9 No. 1, January 2000.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700