抗打印扫描数字水印算法设计与研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着网络的快速发展和多媒体数字作品的广泛使用,数字作品易于传播、分发和高质量复制等特点,使得获取数字作品的高质量拷贝越发的容易。致力于数字作品版权保护的数字水印技术作为一种数字权益保护的强有力手段的同时,也迎来了不断的挑战。能够抵抗打印扫描的数字水印算法,应用于打印扫描环境中,将能用于解决印刷作品的版权保护问题。
     本文主要研究了数字图像作为原始作品,在经历打印过程后,如何对其印刷作品进行版权保护的问题。设计能够抵抗打印和扫描的数字水印算法,在数字作品印刷前进行嵌入水印信息,通过扫描其打印后的印刷作品,从中提取水印信息,可以实现数字作品在印刷过程中的权益保护。
     本文在介绍了数字水印研究的相关基础知识后,给出了本文研究的理论意义和实际价值。在分析了数字图像在打印和扫描过程中经历的非线性失真和几何失真的主要攻击后,以寻找图像打印扫描前后不变的数字特征为指导思想实现水印信息的嵌入。
     通过分析图像分块DCT域系数在打印扫描前后的变化,得到了图像分块DCT系数的正负号关系的不变量。基于这个不变的数字特征,本文提出了种基于图像DCT域的鲁棒性水印和脆弱性水印共存的双水印算法。该双水印算法中的鲁棒性水印是通过修改同类DCT域系数的正负系数数量的差值关系实现信息的嵌入。实验证实,该鲁棒性水印具有较强的抵抗打印扫描攻击的性能。双水印算法中脆弱性水印的嵌入,丰富了该水印算法的职能,使其可以用于对鲁棒性要求较高和需要确定篡改定位的数字图像的网络传播中。
     基于数字图像在打印扫描后其语义信息不变的事实,通过在其D岍域的低频部分中提取该特征的数字表示,消弱了打印扫描过程中几何攻击对数字图像的影响。针对该不变的数字特征,提出了一种基于图像特征的抗打印扫描数字水印方案,通过对图像的DWT域低频系数进行分块聚类,再根据相邻块的类别差异,获得能够表示图像特征的极性表。对于待嵌入的水印信息,将其置乱后与图像的极性表异或得到密钥图像,实现水印信息的嵌入。嵌入过程中水印:的置乱参数和密钥图像等秘密参数决定了该水印方案的安全性。实验结果表明,在保证一定嵌入量,已知嵌入过程的秘密参数的情况下,嵌入的水印能够准确提取,且方案性能在安全性方面上优于相似方案,能够实现对印刷作品的版权保护。
     就鲁棒性数字水印算法整体性能的提升,本文给出了数字水印算法的鲁棒性、不可感知性和水印容量三者之间性能最优化的解决思路,在满足一定的不可感知性和水印容量要求的条件下,使数字水印具有更强的鲁棒性。
     最后,在总结本文的主要解决问题和取得成果后,整理了抗打印扫描数字水印研究中存在问题,并对其今后研究的方向和应用前景进行了展望。
With the rapid development of Internet and the widespread use of multimedia digital works, the easy-to-spread distribution and high-quality reproduction and other special features of digital works, making access to high-quality copies of digital works becomes increasing easy. The technology of Digital watermarking aiming at the protection of digital work is a powerful mean of digital right protection, also gets consistently challenge. Print-scan resistant digital watermarking algorithm, used in the environment of print and scan, will be able to solve the issue of copyright protection in the printed works.
     In this paper, the main target is that the digital images as the original works in the experience of printing process, how to protect the copyright of printed works. Design the print-scan resistant digital watermarking algorithm, embedding watermark before printing digital works, by scanning the printed works to extract the watermark information, so as to realize the rights protection of digital works in the printing process.
     After describing the basic knowledge of digital watermarking, the paper shows its theoretical significance and practical value. After analyzing the digital image in the printing and scanning process through the main attack of non-linear distortion and geometric distortion, gives the idea by modifying the invariant mathematical feature to achieve the embedding of watermark as the guiding ideology.
     The paper finds that the sign of the DCT coefficiences of image block is invariant by analyzing the change about the block DCT coefficiences before and after print-scan. Based on this, the paper proposes a double watermarking algorithm based on DCT domain that the coexistence of robust and fragile digital watermarking can be achieved. The robust watermark in the double watermarking algorithm use the invariant feature after print-scan, the relationship between the number of positive and negative coefficients of the same DCT efficiencies class, accomplishes the embedding of watermark by modifying the difference relationship. Experiments demonstrate that the robust watermark can resist the print-scan attack. The fragile watermark in the algorithm enriches the function of the algorithm, making it do well in the Internet environment that needs strong robustness and can determines the location of the digital image tampered with the network transmission.
     Based on the fact that the unchangeable semantic information after print-scan, the digital presentation of the feature extracted from the low-frequency part of the image's DWT domain, can reduce the effect of the geometrical attack during print-scan process. Accordding to this invariant feature, the paper proposes a digital watermarking scheme that based on image feature. It calculates the low-frequency wavelet coefficients of image, divides it by block and clusters, and according to the difference between the adjacent blocks, gets the polarity table of the image. After scrambling the watermark image to be embedded, combine the polarity table and scrambled watermark to get a key image by using XOR operator, accomplishing the embedded process. The security of the scheme is depended on the scrambling parameters and the key image, etc. Experiment result shows that, when certifying some amount of the bits embedded, the watermark can be extracted accurately, and better than other similar scheme, do implement the copyright protection of printed work.
     Then, the paper gives the solution idea of achieving the optimum performance among robustness, imperceptibility and capacity of digital watermarking algorithms. When meeting certain required conditions about perceptibility and watermark capacity, digital watermark can reach stronger robustness.
     Finally, after concluding the main solved problems and achievement, summaries the remained problem in the research of print-scan resistant digital watermarking, and prospects the direction for future research and application.
引文
[1]Cox. Ingemar J, Miller Matt L. The first 50 years of electronic watermarking. Journal of Applied Signal Processing.2002,2.126-132.
    [2]Fabien A. P. Petitcolas, Ross J. Anderson, etc. Information Hiding——A Survey. Proceedings of the IEEE, special issue on protection of multimedia content,87(7).July 1999.1062-1078.
    [3]Serge Vaudenay. A Classical Introduction to Cryptography applications for Communications Security. Springer.2006.2-8.
    [4]冀芊茜.抗打印扫描数字水印算法研究及其在证件防伪中的应用[学位论文].中国吉林,吉林大学,2007.
    [5]Wikipedia. Digital watermarking. [online]http://en.wikipedia.org/wiki/Digital_watermark.
    [6]M. Kutter, F. A. P. Petitcolas. A fair benchmark for image watermarking systems. Electronic Imaging'99. Security and Watermarking of Multimedia Contents, vol.3657.Sans Jose, CA, USA, 25~27 January 1999. The International Society for Optical Engineering.226-239.
    [7]Moulin,P. and M.K.Mihcak, A Framework for Evaluating the Data-Hiding Capacity of Image Sources. IEEE Transactions on Image Processing,2002. 11(9).1029-1043.
    [8]Kalker T. Considerations on watermarking security. IEEE International Workshop on Multimedia Signal Processing, MMSPp01.Cannes, France,2001.201-206.
    [9]牛少彰,舒南飞.数字水印的安全性研究综述.东南大学学报(自然科学版),第37卷增刊(Ⅰ),2007年9月,220-224.
    [10]Saraju P Mohanty. Digital watermarking:A tutorial. [online].http://www.cse.unt.edu/-smohanty/research/OtherPublications/MohantyWatermarkingSurveyl999.pdf.
    [11]Van Schyndel R. G., Tirkel A. Z., Osborne C. F. A digital watermark. Proc. IEEE Int'l Conference on Image Processing. IEEE CS Press, Los Alamitos, California, USA,1994.2.86-90.
    [12]Cox I. J. Secure spread spectrum watermarking for multimedia. IEEE Transaction on Image Processing,1997.6(12).1673-1687.
    [13]Xie Liehua, GR Arce. Joint wavelet compression and authentication watermarking. Proceedings of the IEEE International Conference on Image Processing. October 1998.427-431.
    [14]葛云露.抗打印扫描数字水印系统分析与算法研究[学位论文].中国吉林,吉林大学,2007.
    [15]年桂君.抗同步攻击鲁棒性数字水印技术研究[学位论文].中国吉林,吉林大学,2008.
    [16]K.Solanki, U.Madhow, B.S.Manjunath, Shiv Chandrasekaran, and Ibrahim El-Khalil,'Print and Scan'Resilient Data Hiding in Images. IEEE Transactions on Information Forensics and Security, VOL.1.No.4.2006,12.464-478.
    [17]He Dajun, Sun Qibin, A practical print-scan resilient watermarking scheme. Image Processing,2005. ICIP 2005. IEEE International Conference on Volume 1, Issue,11-14 Sept. 2005 Page(s).1-257-60.
    [18]P. Bas, J.M. Chassery, and B. Macq, Geometrically invariant watermarking using feature points, IEEE Trans. Image Process., vol.11, no 9.2002,9.1014-1028
    [19]Zheng, D., Liu, Y, Zhao, J., and El Saddik, A.2007. A survey of RST invariant image watermarking algorithms. ACM Comput. Surv.39,2, Article 5 (June 2007),91 pages.
    [20]F. Hartung, J. K. Su, and B. Girod, Spread spectrum watermarking:Malicious attacks and counter-attacks, Proc. SPIE, vol.3657.1999,1.147-158.
    [21]M. Kutter, Watermarking resisting to translation, rotation and scaling, Proc. SPIE, vol.3528, 1998,11.423-431
    [22]S. Pereira, T. Pun, "Fast robust template matching for affine resistant image watermarking," in International Workshop on Information Hiding, ser. Lecture Notes in Computer Science. Berlin, Germany:Springer-Verlag, Sept.29-Oct.1,1999, vol. LNCS 1768.200-210.
    [23]R.Vikas, Kishor Kumar Barman. A Report on Print-Scan Resilient Information Hiding In Images. A Practice School Station of Birla Institute Of Technology and Science, Pilani, India. June 15,2005
    [24]J. J. K.O Ruanaidh and T. Pun, "Rotation, scale and translation invariant spread spectrum digital image watermarking," Signal Process., vol.66, no.3, May 1998.303-317.
    [25]Kang Xiangui, Zhong Xiong, Huang Jiwu, Zeng Wenjun. An Efficient Print-scanning Resilient Data Hiding Scheme Based on a Novel LPM. ICIP 2008.2080-2083
    [26]Lin Ching-Yung. Public Watermarking Surviving General Scaling and Cropping:An Application for Print-and-Scan Process. Multimedia and Security Workshop at ACM Multimedia 99, Orlando, FL, USA, Oct 1999.41-46.
    [27]K.Solanki, U.Madhow, B.S.Manjunath, and S.Chandrasekaran. Estimating and undoing rotation for print-scan resilient data hiding. ICIP, Singapore, Oct.2004.39-42.
    [28]M.K.Kundu, and A.K.Maiti. An Inexpensive Digital Watermarking Scheme for Printed Document Visual Information Engineering,2006. VIE 2006. IET International Conference on Volume, Issue,26-28.2006,9.378-383.
    [29]Huang Yupeng, Pan Wei. A Watermark Scheme for Presswork.2007 IEEE Xiamen International Workshop on Anti-counterfeiting, Security, Identification Proceedings,16-18. 2007,4.130-133
    [30]葛云露,年桂君,王树勋. 基于Walsh编码调制的抗打印扫描数字水印算法.东南大学学报(自然科学版)Vol.37 Sup(Ⅰ)Sept 2007.197-200.
    [31]Zhang Yongping, Kang Xiangui and Zhang Philipp. A Practical Print-and-scan Resilient Watermarking for High Resolution Images.IWDW 2008,lncs 5450,2009.103-112.
    [32]Yu Longjiang, Niu Xiamu, Sun Shenghe. Print-and-scan model and the watermarking countermeasure. Image and Vision Computing 23 (2005):807-814.
    [33]Lin Ching-Yung and Chang Shih-Fu. Distortion Modeling and Invariant Extraction for Digital Image Print-and-Scan Process. International Symposium on Multimedia Information Processing (ISMIP 99), Taipei, Taiwan, Dec.1999.
    [34]S.Hamid Amiri and Mansour Jamzad. An Algorithm for Modeling Print and Scan Operations Used for Watermarking. IWDW 2008, lncs 5450,2009.254-265
    [35]牛少彰,伍宏涛,谢正程等.抗打印扫描数字水印算法的鲁棒性.中山大学学报(自然科学版).第43卷增刊(2)2004年11月.1-4.
    [36]Cheng Daofang, Li Xiaolong,Qi Wenfa,etc. A Statistics-Based Watermarking Scheme Robust to Print-and-Scan.2008 International Symposium on Electronic Commerce and Security. August 03-August 05.894-898.
    [37]贺岚,孔祥维,尤新刚.印刷作品版权保护中的数字图像水印技术.信息安全与通信保密.2008.1.55-58.
    [38]SHI Dongcheng, WANG Qi, LIANG Chao.Digital Watermarking Algorithm for Print-and-Scan Process used for Printed matter Anti-Counterfeit.2008 Congress on Image and Signal Processing.697-701.
    [39]Chiu Yen-Chung, and Tsai Wen-Hsiang. Copyright Protection against Print-and-Scan Operations by Watermarking for Color Images Using Coding and Synchronization of Peak Locations in Frequency Domain. Journal of Information Science and Engineering 22,2006. 483-496.
    [40]牛少彰,舒南飞,朱艳玲.基于DCT域的数字图像双水印算法.计算机研究与发展.2009年3月第46卷增刊Ⅰ:6-10
    [41]Wang Hung Jen, Chang Chuan-Yu, and Pan Sheng-Wen. A DWT-based Robust Watermarking Scheme with Fuzzy ART.2006 International Joint Conference on Neural Networks. IEEE. July 16-21,2006.1750-1757.
    [42]Chen Tzung-Her, Horng Gwoboa and Lee Wei-Bin. A Publicly Verifiable Copyright-Proving Scheme Resistant to Malicious Attacks. IEEE Transactions on Industrial Electronics, VOL.52, NO.1,2005,2.327-334.
    [43]王丽娜,郭迟,李鹏.信息隐藏技术实验教程.武汉大学出版社.2004年10月.
    [44]Wang Z., Bovik A.C., Sheikh H.R., etc. Image quality assessment:From error visibility to structural similarity. IEEE Trans. Image Processing, vol.13, no.4.600-612.
    [45]Andrew B.Watson. DCT quantization matrices visually optimized for individual images. Human Vision, Visual Processing, and Digital Display Ⅳ, Bernice E.Rogowitz, Editor, Proc.SPIE, (1993).1913-1914.
    [46]Patrick Le Callet, Florent Autrusseau, Patrizio Campisi. Visibility Control and Quality Assessment of Watermarking and Data Hiding Algorithms. Multimedia Forensics and Security.2009.163-192
    [47]宋玉杰,刘瑞祯,谭铁牛,等.数字水印技术在印刷品防伪中的应用上[J].中国图像图形学报.2001,6(5):44-48,105.
    [48]王玲,王晓建,彭启琮.半脆弱印刷数字有意义水印算法研究.电子科技大学学报,第37卷增刊.71~74.
    [49]Anu Pramila, Anja Keskinarkaus and Tapio Seppanen. Watermark Robustness in the Print-cam Process. Signal Processing, Pattern Recognition, and Applications-2008. [online] http://www.mediateam.oulu.fi/publications/pdf/1129.pdf.
    [50]Anthony T. S. Ho and Feng Shu. A Print-and-scan Resilient Digital Watermark for Card Authentication. ICICS-PCM 2003 Singapore.1149-1152.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700