抗打印扫描数字水印技术及其应用研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
抗打印扫描数字水印技术又称为印刷水印,指嵌入数字图像的水印信息经过打印设备输出并经扫描设备重新获取后,仍能够正确检测的数字水印技术。打印扫描过程复杂,多次的数模变换、模数变换以及人工操作对数字图像产生较大影响,已知的攻击类型包括灰度转换攻击、低通滤波攻击和几何攻击。抗打印扫描数字水印技术具有较高的实用价值,可应用于解决印刷品的版权保护、来源认证、防止伪造等问题。
     本文针对抗打印扫描数字水印技术的算法和应用进行深入研究,设计并实现能够抵抗打印扫描攻击的强鲁棒性数字水印算法。主要工作包括基于DFT的抗打印扫描数字水印算法的研究、抗打印扫描的文本数字水印技术的研究以及面向实用的纸质文档泄密追踪管理系统的设计和实现。具体的研究成果如下:
     1.提出了抗打印扫描数字水印算法设计框架。根据设计框架,提出基于离散傅里叶变换的彩色图像抗打印扫描数字水印算法,该算法利用DFT变换中频幅度谱的鲁棒性,将水印嵌入图像红色通道数据的DFT中频幅度域中,同时利用人类视觉系统的掩蔽特性,通过计算图像复杂度选择嵌入位置。水印提取过程不需要原始载体图像,实验数据表明水印算法具有强鲁棒性并取得较好的不可见效果。
     2.提出了一个大容量的文本水印算法,该算法以打印扫描不变量为基础,通过设计量化函数建立字符像素翻转量与水印信息之间的映射关系,实现翻转单个字符像素嵌入多比特水印信息,同时降低整体的字符翻转量,减小了文本图像的失真程度。实验表明,该算法有效地提升了水印嵌入容量,并且能够抵抗打印扫描攻击,实现了在纸质文本中嵌入水印信息。
     3.提出了基于汉字数学表达式的印刷文本认证算法,该算法利用汉字字形结构的特殊性,将随机选取的汉字的数学表达式和汉字结构关系统计值作为生成零水印的依据,并将零水印存储在版权信息数据库中。当印刷出版后该文本发生版权纠纷时,按相同策略提取零水印与数据库中的水印信息进行匹配计算,从而确定版权归属。零水印技术不对载体图像进行任何改动,保证了数字作品的无失真,本算法抵抗打印扫描攻击,可应用于印刷出版物的版权认证。
     4.设计和实现了面向实用的纸质文档泄漏追踪管理系统,系统水印算法设计中包括强鲁棒性水印算法本身,此外从实用系统角度出发增加了差错控制、噪声去除、文档偏转校正等设计,均为系统的稳定和准确提供了保障。系统通过虚拟打印服务,在打印的纸质文档中以不可见的形式嵌入具有个人身份等信息的文本水印,由于该水印可以抵抗扫描及至少一次复印的攻击,因而,当非法传播的纸质泄密文件被截获时,通过该系统的水印提取可以分析出与泄密者相关的身份信息,有效地追踪到文件的泄密源头。在真实环境下测试,系统准确性和处理速度均达到实用要求。
The print-scan resistant watermarking technology is that the watermarking embedded in the digital image can be extracted correctly when the image is reproduced by print and scan operation. The impact to the image given by the process of print and scan is complex, because of the two times conversion of types from D/A to A/D, and the manual operation miss. Print-scan attack summarized as grayscale conversion attack, geometric attack and lowpass filter attack is a challenge for most of digital watermarks. The print-scan resistant watermarking technology can be used in several fields such as copyright protection, origin certification and preventing forgery for printed publication.
     In this thesis, we focus on the research of the print-scan resistant watermarking algorithms, and also design and implement the robustness watermarking system which can resist the print-and-scan. The content of the thesis mainly includes:Print-scan resistant watermarking algorithm based on the DFT; The text watermarking algorithm resistant to print-scan; The design and implement of the leak-tracking management system for the paper document. The specific research contents and research results are as follows:
     1. Based on the design framework of print-scan resistant watermarking algorithm, we propose a algorithm which combines the methods of image complexity and discrete Fourier transform (DFT). We determine which block can be used to embed watermark by computing the local image complexity of the block, considering the masking of the human visual system. The red component of the block is transformed with DFT and one bit is embedded in the amplitude of DFT coefficients. The hidden data can be extracted without using the original image to verify the copyright of the reproduced image. Experimental results suggest that the proposed method is robust after high-quality printing and scanning.
     2. A high-capacity text watermarking scheme resistant to print-and-scan processes is proposed. The binary document image is first segmented into individual characters. A multi-bit watermark is then embedded by flipping the boundary pixels of each character based on a print-scan invariant quantity and complexity of the character. A quantitative model is established to achieve the character pixel quantization, which can minimize visual distortion. Experimental results show that the proposed scheme can increase embedding capacity. It can effectively resist print-scan attacks so that watermark hardcopy documents can be put into practice.
     3. A printed text authentication algorithm is proposed based on the mathematical expression of the Chinese character which is used to describe the component of the Chinese character. Zero-watermark as fundation for the copyright is derived by the mathematical expression of the selected Chinese character randomly and the operators of whole text. The final judgement is determined by the comparison between the extracted bits and zero-watermark bits. The zero-watermark technology guarantee no distortion for no change to the text. This algorithm can be used for the copyright protection of printed publication because it resist to pint-and-scan.
     4. A paper document management system to detect information leaks is implemented, Besides the watermark embedding and extracting, we design the error-control, denosing and document skew detection for the utility system, which guarantee the stability and veracity. The system embeds the invisible watermark bearing personal identity information into the paper document through virtual printing technology. It can be used to detect the source of leaks by extracting the print-scan resistant watermarking. The performance of system has reached the practical requirements by the real environment testing.
引文
[1]王颖,肖俊,王蕴红.数字水印原理与技术.北京:科学出版社,2007.
    [2]孙圣和,陆哲明,牛夏牧.数字水印技术及应用.北京:科学出版社,2004.
    [3]杨义先,钮心忻.数字水印理论与技术.北京:高等教育出版社,2006.
    [4]张静,张春田—能抗打印扫描过程的数字图像水印算法[C].全国第三届信息隐藏学术研讨会论文集.2001,PP.151-157.
    [5]J.T.Brassil, S.H.Low, N.F.Maxemchuk. Copyright Protection for the Electronic Distribution of Text Documents[J]. Proceedings of the IEEE.1999,87(7): 1181-1196.
    [6]J.T.Brassil, S.H.Low, N.F.Maxemchuk. Electronic Marking and Identification Techniques to Discourage Document Copying[J], IEEE Journal on Selected Areas in Common,1995,13(8):1495-1504.
    [7]S.H.Low, N.F.Maxemchuk, A.M.Lapone. Document Identification for Copyright Protection Using Centroid Detection[J], IEEE Transactions on Communications,1998,46(3):372-381.
    [8]X.M. Sun, G. Luo, H.J. Huang. Component-Based Digital Watermarking of Chinese Texts[J], In:Proc. of the Third International Conference on Information Security, Shanghai,2004, pp.76-81.
    [9]Zhi-Hui Wang, Chin-Chen Chang, Chia-Chen Lin etc. A reversible information hiding scheme using left-right and up-down Chinese character representation[J], Journal of Systems and Software,2009,82(8):1362-1369.
    [10]李庆诚,张振华,张金,基于汉字结构的自然型文本水印算法[J],计算机应用研究,2009,26(4):1520-1522
    [11]WU M, LIU.B, Data Hiding in Binary Image for Authentication and Annotation[J], IEEE Transactions on Multimedia,2004,6(4):528-538.
    [12]Yang Huijuan, Kot, Alex C. Pattern-based data hiding for binary image authentication by connectivity-preserving[J], IEEE TRANSACTIONS ON MULTIMEDIA,2007,9(3):475-486.
    [13]亓文法,李晓龙,杨斌等.用于信息追踪的文本水印算法[J]通信学报,2008,29(10):183-190.
    [14]李刚,杨杰.一种基于二值印刷图像的数字水印方办案[J].上海交通大学学 报.2005,04:66-69.
    [15]Lin C.Y, Chang S.F. Distortion modeling and invariant extraction for digital image print-and-scan process[C], Proceedings of International Symposium on Multimedia Information Processing, Taipei, Taiwan, China,1999
    [16]Lin Y C. Public Watermarking Surviving General Scaling and Cropping:An Application for Print-and-Scan Process[C],Multimedia and Security Workshop at ACM Multimedia 99, Orlando, FL, Oct,1999.
    [17]K.Solanki, U.Madhow, B.S.Manjunath etc. Estimating and undoing rotation for print-scan resilient data hiding[C]. ICIP, Singapore, Oct,2004.39-42.
    [18]K. Solanki, U. Madhow, B.S. Manjunath, S. Chandrasekaran, I.El-Khalil, Print-scan resilient data hiding in image[J], Information Forensics and Security, IEEE Transactions on, vol.1, pp.464-478,2006.
    [19]K. Solanki, O. Dabeer, U. Madhow etc. Robust Image-Adaptive Data Hiding: Modeling, Source Coding and Channel Coding[J]. IN 42ED ANNUAL ALLERTON CONF. ON COMMUNICATIONS, CONTROL, AND COMPUTING.
    [20]Yen-Chung Chiu, Wen-Hsiang Tsai. Copyright Protection against Print-and-Scan Operations by Watermarking for Color Images Using Coding and Synchronization of Peak Locations in Frequency Domain[J], Journal of Information Science and En-gineering,2006. pp.483-496.
    [21]Pereira, S., Pun, T. Fast robust template matching for affine resistant image watermarking[J], International Workshop on Information Hiding. Lecture Notes in Computer Science, Vol. LNCS 1768. Berlin, Germany:Springer-Verlag,1999, pp.200-210.
    [22]戴跃伟,施燕,王执铨.一种用于证件防伪的鲁棒图像水印算法[J].机器人技术与应用,2002,(6):41-46.
    [23]梁华庆,钮心忻,杨义先.基于数字水印的证件防伪技术[J].信号处理,2000(2):143-145.
    [24]宋玉杰,刘端祯,谭铁牛等.数半水印技技术在印刷品防伪中的应用[J].t 中国图像图形学报,2001,6(5):450-454.
    [25]牛少彰,伍宏涛,谢正程等.抗打印扫描数字水印算法的鲁棒性[J].中山大学学报(自然科学版),2004,(43):1-4.
    [26]Keskinarkaus Anja, Pramila Anu, Seppanen Tapio etc. Wavelet domain print-scan and JPEG resilient data hiding method[C], Digital Watermarking, Volume 4283/2006,2006, pp.82-95.
    [27]康显桂,黄继武,林彦等.抗仿射变换的扩频图像水印算法[J],电子学报,2004,32(01):8-12.
    [28]http://www.digimarc.com
    [29]http://www.alpvision.com
    [30]http://www.yufei.cc
    [31]舒南飞,牛少彰.印刷水印研究的新进展及应用,中国电子商情:通信市场,2008,2:27-32.
    [32]Voyatzis G, Pitas I. Embedding robust logo watermarks in digital images[C]. Proc of DSP'97,1997. pp.213-216.
    [33]曾高荣,裘正定.数字水印的鲁棒性评测模型[J],物理学报,2010,59(8):5870-5879.
    [34]I.J.Cox, M.L.Miller, J.A.Bloom. Digital watermarking, Morgan Kaufmann, 2002.
    [35]A.B.Watson. DCT Quantization Matrices Optimized for Individual Images[J], Human Vision, Visual Processing and Digital Display IV,1993, SPIE-1913, pp.202-216
    [36]Haiping Lu, Jian Wang, Alex C. Kot etc. An Objective Distortion Measure for Binary Document Images Based on Human Visual Perception[C],16th International Conference on Pattern Recognition,2002,4:239-242.
    [37]H. Lu, A. C. Kot, Y. Q. Shi. Distance-reciprocal distortion measurefor binary document images[J], IEEE Signal Process. Lett., vol.11,no.2, pp.228-231, Feb. 2004.
    [38]J. Cheng, A.C. Kot, Objective Distortion Measure for Binary Images[J], in Proc. IEEE TENCON, Nov.2004, pp.355-358.
    [39]J. Cheng, A.C. Kot. Objective distortion measure for binary text image based on edge line segment similarity[J], IEEE Transactions on Image Processing 16(6) (2007) 1691-1695.
    [40]P.Moulin, J.A.O'Sullivan. Information-Theoretic Analysis of Information Hiding[J]. IEEE Transactions on Information Theory,2003,49(3):563-593.
    [41]J.A.O'Sullivan, P.Moulin, J.M.Ettinger. Information-Theoretic Analysis of Stegganography[J]. IEEE Transactions on Information Theory,2003,1:297-299
    [42]M.Costa. Writing on Dirty Paper[J]. IEEE Transactions on Information Theory, 1983,29(3):439-441
    [43]Brian Chen, Gregory W. Wornell. Quantization Index Modulation:A Class of Provably Good Methods for Digital Watermarking and Information Embedding[J], IEEE TRANSACTION ON INFORMATION THEORY Vol.47, No.4, MAY2001, pp.1423-1443.
    [44]Brian Chen, Gregory W. Provably Robust Digital Watermarking. Proceeding of the 1999 Multimedia Systems and Applications. Bellingham:Society of Photo-Optical Instrumentation Engineers,1999,3945:43-54.
    [45]J Q Ruanaidh, T Pun. Rotation Scale and Invariant Image Watermarking[J]. Signal Processing,1998,66(3):303-317.
    [46]Bas, P., Chassery, J.M., Marq, B. Geometrically invariant watermarking using feature points[J]. IEEE Transactions Image Processing 2002,11, pp.1014 1028.
    [47]Chen, P., Zhao, Y., Pan, J.S. Image watermarking robust to print and generation copy[J]. In:1st International Conference on Innovative Computing, Information and Control, ICICIC, vol.1,2006, pp.496-500.
    [48]Kutter, M. Watermarking resistant to translation, rotation and scaling[J]. In: Proceedings of SPIE, Multimedia Systems and Applications, vol.3528, Boston, MA,1998, pp.423-431.
    [49]牛少彰,钮心忻,杨义先等.半色调图像中数据隐藏方法[J].电子学报,2004.32(7):1180-1183.
    [50]M.K.Kundu, A.K.Maiti. An Inexpensive Digital Watermarking Scheme for Printed Document[J], Visual Information Engineering,2006.VIE2006. IET International Conference on Volume,2006, pp.378-383.
    [51]葛云露,年桂君,王树勋.基于Walsh编码调制的抗打印扫描数字水印算法.东南大学学报(自然科学版)vol.37Sup(Ⅰ),2007,9:197-200.
    [52]I J Cox, J Kilian, T Leighton etc. Secure Spread Spectrum Watermarking for Images, Audio and Video[C]. Proceedings of the 1996 IEEE International Conference in Image Processing. CA:IEEE, Los Alamitos,1996,3, pp.243-246.
    [53]I J Cox, J Kilian, T Leighton etc. Secure Spread Spectrum Watermarking for Multimedia. IEEE Transaction on Image Processing,1997,6(12):1673-1687.
    [54]Li Junhong, Pan Quan, Zhang Hongcai. Image recognition using Radon transform[C]. The IEEE 6th International Conference on Intelligent Transportation Systems-IV:Image Analysis, Shanghai, China:IEEE Computer Society,2003,4, pp.741-744.
    [55]S.R.Deans. Applications of the Radon Transform. Wiley Interscience Publication, New York,1983.
    [56]W. Osberger, A.J. Maeder. Automatic identification of perceptually important regions in an image[C],11th International Conference on Pattern Recognition, vol. 1,1998,pp.701-704.
    [57]Yaghmaee, F.Jamzad, M. Introducing a New Method for Estimation Image Complexity according to Calculate Watermark Capacity[J], Intelligent Information Hiding and Multimedia Signal Processing, vol.1,2008, pp.981-984.
    [58]Voloshynovsky, A Herrigel, N.Baum gartner. A Stochastic Approach to content adaptive digital image watermarking, Lecture Notes in Computer Science, Third International Workshop on Information Hiding, Vol.1768,1999.
    [59]Zhang, Fan, Zhang Hongbin. Wavelet domain watermarking capacity analysis[J], Electronic Imaging and Multimedia Technology Ⅳ, SPIE, Volume 5637,2005.
    [60]F.Yaghmaee, M.Jamzad. Computing Watermark Capacity in Images according to Their Quad Tree[C], IEEE ISSPIT, Athens, Greece.21 Dec.2005, pp.823-826.
    [61]J.Rigau, M.Feixas, M. Sbert. An Information-Theoretic Framework for Image Complexity [J], Computational Aesthetics in Graphics, Visualization and Imaging Journal,2005.
    [62]M.Jamzad, F.Yaghmaee. Achieving higher stability in watermarking according to image complexity[J], Scientia Iranica Journal, Vol 13, Fall 2006,7.
    [63]王欣,张旭东.一种针对汉字文本图像的数字水印技术[J],计算机工程与应用,2005,41(25):57-60.
    [64]Atallah MJ, McDonough CJ, Raskin V etc.2001 Natural Language Processing for Information Assurance and Security:An Overview and Implementations[C]. Proceedings of the 2000 Workshop on New Security Paradigms,2000, pp.51-65.
    [65]Atallah MJ, Raskin V, Crogan M.2001 Natural Language Watermarking: Design, Analysis, and a Proof-of-concept Implementation[J], Lecture Notes in Computer Science,2001, pp.185-199.
    [66]Atallah MJ, Raskin V, Hempelmann CF..Natural language watermarking and tamper proofing[J].Lecture Notes in Computer Science,2003, pp.196-212.
    [67]Hasan Mesut Meral, Bülent Sankur, A. Sumru Ozsoy. Natural language watermarking via morphosynatctic alterations [J], Computer Speech & Language, 2009,23(1):107-125.
    [68]He Lu, Lin Jianbin, Li Tianzhi, Fang Dingyi. An anti-attack watermarking based on synonym substitution for Chinese text[C], Information Assurance and Security, Xi'an, China,2009,1(1):356-359.
    [69]M.Wu, E.Tang, B.Liu. Data Hiding in Digital Binary Image. IEEE International Conference on Multimedia of Expo(ICME'2000), July 30-Aug.2,2000, 1:393-396.
    [70]H.P.Lu, A.C.Kot, J.Cheng. Secure Data Hiding in Binary Document Image for Authentication[C], Proceedings of the 2003 International Symposium on Circuits and Systems(ISCAS'2003), May 25-28,2003,3:Ⅲ806-809.
    [71]Cai Dengchuan, Chi Chia-Fen, You Manlai. The legibility threshold of Chinese characters in three-type styles[J]. International Journal of Industrial Ergonomics, 2001,27(1):9-17.
    [72]陈传锋,黄希庭.结构对称性汉字视觉识别特点的实验研究[J].心理学报,1999,31(2):154-161.
    [73]赵家佑,汉字字形复杂度与其改形舒缓准则之研究,硕士论文,台湾,国立成功大学,2005.
    [74]温泉,孙锬锋,王树勋.零水印的概念与应用[J].电子学报,2003,31(2):214-216.
    [75]叶天语,马兆丰,钮心忻等.强鲁棒零水印技术[J].北京邮电大学学报,2010,33(3):126-129.
    [76]孙星明,殷建平,陈火旺.汉字的数学表达式研究[J].计算机研究与发展,2002,39(6):707-711.
    [77]Sun Xing-ming, Chen Huo-wang, Mathematical Representation of a Chinese Character and its Applications[J], International Journal of Pattern Recognition and Artificial Intelligence,2002,16(8):735-747.
    [78]张问银,孙星明,曾振柄,吴尽昭.汉字数学表达式的自动生成[J]计算机研究与发展,2004,41(05):848-852.
    [79]罗纲.基于汉字数学表达式的文本数字水印方法研究,硕士论文,湖南,湖南大学,2005.
    [80]Yuling Liu, Xingming Sun, Ingemar J.Cox etc. Natural Language Information Hiding based on Chinese Mathematical Expression. International Journal of Network Security,2009,8(1):10-15.
    [81]孙羽菲.低质量文本图像OCR技术的研究,博士论文,北京,中国科学院研究生院,2005.
    [82]刘玉玲,孙星明,辛国江.基于移位变换的句子层自然语言信息隐藏算法控制与决策,2009,24(12):1861-1864.
    [83]C.Berrou, A.Glavirux, P.Thitimajshima etc. Limit Error-correcting Coding and Decoding:Turbo-Codes. Pro ICC'93,1993:1064-1070.
    [84]C.T.Yang, L.W. Chang. Image Authentication by Watermarking with Error Correction Based on Wavelet Transform. IEEE International Conference on Multimedia and Expo(ICIME'2001), Aug.22-25,2001:305-308.
    [85]Ranjan Bose. Information Theory, Coding and Cryptography.北京:机械工业出版社,2005.
    [86]Akiyama T., Hagita N., Automatic entry system for printed documents[J], Pattern Recognition 1990.23 (11), pp.1141-1154.
    [87]Amin A, Fischer S. A document detection method using the Hough Transform. Pattern Anal. Appl.3,2000, pp.243-253.
    [88]Amin A, Wu S. Robust skew detection in mixed text/graphics documents[J], In: International Conference on Document Analysis and Recognition,2005.vol.1, pp.247-251.
    [89]Cao Y, Wang S, Li H. Skew detection and correction in document imagesbased on straight-line fitting[J], Pattern Recognition Lett.2003.24, pp.1871-1879.
    [90]Chaudhuri, B.B., Pal, U., Skew angle detection of digitized indian scriptdocuments. IEEE Trans. Pattern Anal. Mach. Intell.1997.19,182-186.
    [91]Chen M, Ding X.Q. A robust skew detection algorithm for grayscaledocument image[J], In:Proceedings of 5th international conference on documentanalysis and recognition,1999. pp.617-620.
    [92]Das A.K., Chanda B., A fast algorithm for skew detection of document imagesusing morphology. Int. J. Document Anal. Recognition,2001.109-114.
    [93]Dhandra B.V., Malemath V.S., Mallikarjun etc. Skew detection in binary image documents based on image dilation and regionlabeling approach. ICPR 2006. (2), pp.954-957.
    [94]Hashizume A., Yeh P.S., Rosenfeld A. A method of detecting the orientation of aligned components[J]. Pattern Recognition Lett.1986.4, pp.125-132.
    [95]Hinds S.C., Fisher J.L., D Amato. A document skew detection methodusing run-length encoding and Hough Transform[J], In:Proceedings of 10thInternational Conference on Pattern Recognition,1990.pp.464-468.
    [96]Ishitani, Y., Document skew detection based on local region complexity[J], In:Proceedings of 2nd International Conference on Document Analysis andRecognition,1993.pp.49-52.
    [97]Le D.S., Thoma G.R., Wechsler H. Automatic page orientation and skew angle detection for binary document images[J]. Pattern Recognition,1994, pp.1325-1344.
    [98]Lu Y., Tan C.L. A nearest-neighbor chain based approach to skew estimationin document images[J]. Pattern Recognition Lett.2003.24,2315-2323.
    [99]O'Gorman, L. The document spectrum for page layout analysis[J]. IEEE Trans.Pattern Anal. Mach. Intell.1993.15 (11), pp.1162-1173.
    [100]Safabakhsh R., Khadivi S. Document skew detection using minimum-areabounding rectangle[C], In:Proceedings of International Conference on InformationTechnology,2000.pp.253-258.
    [101]Shi, Z.X., Govindaraju, V., Skew detection forcomplex document images usingfuzzy run length[C], In:Proceedings of 7th International Conference on DocumentAnalysis and Recognition,2003.pp.715-719.
    [102]Shivakumar, P., Kumar, G.H., Guru, D.S., Nagabhushan, P., A new boundarygrowing and Hough Transform based approach for accurate skew detection inbinary document images[C], In:International Conference on Intelligent Sensingand Information Processing,2005.pp.140-146.
    [103]Yan, H., Skew correction of document images using interline crosscorrelation.Computer Vision Graph. Image Process.1993.55 (6), pp.538-543.
    [104]曹锐,陈钢.开发式虚拟打印系统设计与实现[J],计算机应用研究,2004(01):194-196.
    [105]易云.基于组件模型的虚拟打印系统的研究与实现[J].现代电了技术2008.8,Vol.271:171-172.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700