抗几何攻击图像数字水印技术研究及其应用
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
因特网技术的盛行带来了数字多媒体应用的迅速增长。数字媒体与模拟媒体相比,有着不可比拟的优点,但是这些优点也使与数字媒体相关的版权盗用问题显著增加。传统的技术无法进一步满足防止盗版的要求,因此,二十世纪九十年代初,一种新技术“数字水印”出现了。在短短十多年内,数字水印技术飞速发展,并被迅速地应用到信息隐藏、版权保护等各个方面。
     把数字水印技术应用到防伪技术中是二十一世纪的新发展。我们紧跟时代发展脚步,选择这样一个新颖课题“数字水印技术在印刷证件防伪系统中的应用”来研究,目的是为了研究出一种能够应用于印刷证件防伪系统的数字水印算法。论文的第一部分对数字水印技术作了整体的介绍,提出了今后数字水印技术发展的方向,第二部分介绍了防伪技术并给出了一套数字水印证件防伪系统设计方案。
     论文第三和第四部分分别对研究中的难题进行了深入的研究。在第三部分主要针对图像抗几何攻击问题给出了一种有针对性的算法,并通过仿真实验证明该算法有较好的鲁棒性。第四部分针对扫描打印过程给图像带来的像素值失真问题做了研究,并对前一章的算法做了改进和进一步的实验,实验结果也证明了该算法有较好的鲁棒性。文章的最后给出了研究结论并提出了今后进一步工作的方向。
With the great development of Internet, the application of digital media spreads quickly. Digital media has many advantages while analog media has not. But these virtues also result in the critical problem of piracy. The traditional protecting technique can't satisfy the request of protecting authority. So in the early 1990's a new technique, digital watermarking, comes up. Because of its startling merits the academic pays more attention to it. Within a short decade, this technique has been applied into lots of aspects with its rapid development.
    In twenty-first century, there is a new evolution with digital watermarking of applying it into certificate's forgery detection. We follow close behind the times and choose this subject to do some research. The object is to bring out a new algorithm used in the certificate' forgery detecting system.
    In the first part of this paper, a review of digital watermarking technique is given and some developing orientations are rendered. Then we discuss about the forgery defending technique and design a certificate' forgery detecting system. In the next two parts two important and difficult problems in practice are discussed and one algorithm is given. We also use specific tests to testify the robustness of this algorithm. At last the conclusion of this paper and the future research orientations are pointed out.
引文
[1]Fabien A. P.Petitcolas, "Information Hiding--A Survey", Proceedings of IEEE, vol.87, No.7, July 1999
    [2]Swanson M.D, Kobayashi M, Tewfik A.H, Multimedia date embedding and watermarking technologies. Proc. IEEE, 1998,86(6): 1064-1087
    [3]Ingemar J. Cox, Joe Kilian, Tom Leghton, and Talal Shamoon. "Secure spread spectrum watermarking for multimedia", IEEE Trans. On Image Processing, 6, 12, 1673-1687, 1997.
    [4]Kutter, S. K. Bhattacharjee, T. Ebrahimi, "Towards Second Generation Watermarking Schemes", Proceedings 6th International Conference on Image Processing (ICIP'99), vol. 1, pp.320-323, Kobe, Japan, October 24-28, 1999.
    [5]R. G. Van Schyndel, A. Z. Tirkel, C. F. Osborne, "A Digital Watermark", IEEE International Conference on Image Processing, vol 2, pp. 86-90, 1994
    [6]G. Caronni, Assuring Ownership Rights of Digital Images, "Processing of Reliable IT Systems", VIS-95, Vieweg Publishing Company, 1995.
    [7]W. Bender, D. Gruhl, N. Morimoto and A. Lu. "Techniques for data hiding", IBM Systems Journal, vol. 35, NOS 384, 1996.
    [8]N. Nikolaidis and I. Pitas . Copyright protection of images using robust digital signatures. Proc. IEEE Int. Conf. On Acoustics. Speech and Signal Processing. May 1996. vol.4.2168--2171
    [9]J.F.Delaigle, C.De Vleeschouwer and B.Macq. Low cost perceptive digital picture watermarking method. Proc.ECMAST'97.May 1997.153-167
    [10]B.Macq, J.F.Delaigle and C.De Vleeschouwer. Digital watermarking. SPIE. Mar.1996. vol.2659.99-110
    [11]Ingemar J. Cox, Joe Kilian, Tom Leghton, and Talal Shamoon. "Secure spread spectrum watermarking for images, audio and video", Proc. 1996 International Conference on Image Processing, ICIP'96, Vol Ⅲ, pp. 243-246.
    [12]J.J.K.O Ruanaidh, W.J.Dowling and F.M. Boland. Watermarking digital images for copyright protection, in IEE Proc. Vision. Image and Signal Processing. Aug. 1996. vol. 143.250-256
    [13]E.Koch, J.Rindfrey and J.Zhao .Copyright protection for multimedia data. Digital Media and Electronic Publishing. Academic Press. London. 1996. 203-213
    
    
    [14]M.D.Swanson, B.zhu and A.H.Tewfik. Robust data hading for images. Proc.IEEE Digital Signal Processing Workshop. Sept. 1996.37-40.
    [15]C.I.Podilchuk and W.Zeng. Perceptual watermarking of still images. Proc. Electronic Imaging. Feb.1996. vol. 3016. San Jose. CA. USA
    [16]X.G.Xia, C.G.Boncelet and G.R.Arce .A Multiresolution Watermark for Digital Images. Proc ICIP. 1997. 548-51
    [17]R.Dugad, K.Ratakenda, and N.Ahuja . A new waveletbased scheme for watermarking images. Proc. IEEE Int. Conf. on Image Processing. Oct.1998. vol.Ⅱ TA10.07
    [18]D.Kundur and D.Hatzinakos. Mismatching perceptual models for effective watermarking in the presence of compression. Proc. SPIE, Multimedia Systems and Application Ⅱ. September 1999. vol.3845.29-42
    [19]J.O'Ruanaidh, W.J.Dowling and KM.Boland, "Phase watermarking of digital images",
    [20]J.O'Ruanaidh and T. Pun, "Rotation, translation and scale invariant digital image watermarking," Proceedings 1997 IEEE International Conference on Image Processing, (1997), Vol.Ⅰ, pp.536-539
    [21]邱学信,“证件防伪技术”,《技术专论》,2000.9
    [22]Ching-Yung Lin, Shih-Fu Chang, "Distortion Modeling and Invariant Extraction for Digital Image Pring-and-Scan Process, Multimedia and Security Workshop at ACM Multimedia 99, Orlando,FL, USA, Oct1999
    [23]Ching-Yang Lin. Public Watermarking Surviving General Scaling and Cropping: An Application for Print-and-Scan Process. Multimedia and Security Workshop at ACM Multimedia 99. Olando, FL, USA. Oct. 1999
    [24]宋玉杰,刘瑞祯,谭铁牛,王蕴红,“数字水印技术在印刷品防为中的应用”,《中国图象图形学报》,2001.3
    [25]张静,张春田,“能抗打印——扫描过程的数字图像水印算法”,《电子学报》,2002.4
    [26]S.Volshynovskiy, S.Pereira, A.Herrigel, N.Baumgartner and T.Pu .A Generalized watermark attack based on stochastic watermark estimation and perceptual remodulation. SPIE. January 2000.vol.3971.23-28,
    [27]G. C. Langelaar, R. L. Lagendijk, and J. Biemond . Removing spatial spread spectrum watermarks by non-linear filtering . in 9th European Signal Processing Conference (EUSIPCO'98). 8-11 Sep. 1998. 2281-2284
    
    
    [28]J.K.Su, J.J.Eggers and B.Girod. Capacity of digital watermarks subject to an optimal collusion attack. European Signal Processing Conference (EUSIPCO 2000). September 2000
    [29]D.Boneh and J.Shaw . Collusion-secure fingerprinting for digital data. in Advances in Cryptology Proc. CRYPTO'95. vol.963. 452-465
    [30]F.Deguillaume, G.Csurka and T.Pun . Countermeasures for unintentional and intentional video watermarking attack. SPIE. 2000.vol.3971.346-357
    [31]F.Hartung, J.K.Su and B.Girod . Spread spectrum watermarking: malicious attacks and counterattacks. SPIE. Jan. 1999. col.3657. 147-158
    [32]M.Alghoniemy and Ahmed H.Tewfik. Geometric distortions correction in image watermarking. SPIE.2000. vol.3971. 82-89
    [33]Jean-Luc Dugelay and Fabien A.P. Petitcolas. Possible counter-attacks against random geometric distortions. SPIE.2000. vol.3971.338-345
    [34]S.Voloshynovskiy, S.Pereira, V.Iquise and T.pun, "Attack modeling: towards a second generation watermarking benchmark", http://cuiwww.unige.ch/~vision/
    [35]http ://www.cl.cam.ac.uk/~fapp2/watermarking/stirmark/
    [36]Fabien A. P. Petitcolas. Weakness of existing watermarking schemes. http://www.cl.cam.ac.uk/~fapp2/watermarking/image_watermarking/. Oct. 1997
    [37]F.A.P. Petitcolas, R.J. Anderson and M.G. Kuhn. Attacks on copyright marking systems, in Second International Workshop on Information Hiding. Portland. USA. Apr. 1998.219--239
    [38]Alexander Herrigel, Adrian Perrig and Joseph J. K. O Ruanaidh. A copyright protection environment for digital images. In Verlaliche IT-Systeme '97. AlbertLudwigs Universitat. Freiburg. Germany. October 1997
    [39]I.J.Cox, J.P.Linnartz .Some general methods for tampering with watermarks. IEEE J.Select.Areas Commun. May 1998. vol. 16.587-593
    [40]I.J. Cox and J.-P. M. G. Linnartz. Public watermarks and resistance to tampering. In Proceedings of the IEEE International Conference on Image Processing. CDRom. 1997
    [41]M. Kutter, S. Voloshynovskiy and A. Herrigel. Watermark copy attack. SPIE.Jan.2000. vol. 3971
    [42]M. Kutter, F. Jordan and F. Bossen . Digital signature of color images using amplitude modulation. Proc. SPIE Storage and Retrieval for Image and Video Databases. San Jose. USA. 1997(3022-5). 518-526
    
    
    [43]潘刚 基于二维DCT的双图像数字水印算法 工程图学学报 2000.3
    [44]刘兵 基于空间视觉掩蔽效应的图像数字水印频域技术 云南大学学报 1999.21.(5) 399~402
    [45]Vinicius Licks "Image Watermarking in Fourier Domai", Dept.of Electrical&Coumpter Engineering, The University of New Mexico, December 17,1999
    [46]J.O'Ruanaidh and T. Pun, "Rotation, translation and scale invariant digital image watermarking," Proceedings 1997 IEEE International Conference on Image Processing, (1997), Vol.Ⅰ,pp.536-539
    [47]A. Herrigal,J.O.Ruanidh, W, Peterson, S.Pereira, and T.Pun, Secure copyright protection techniques for digital images", Preliminary proceedings of the Second International Information Hiding Workshop, (1998)
    [48]M.Kutter. Watermarking resisting to translation, rotation and scaling, Proc. SPIE Int. Symp. on Voice, Video and Data Communication. Nov. 1998
    [49]V.Solachidis, I.Pitas. Circularly symmetric watermark embedding in 2D DFT domain. Department of Informatics University of Thessaloniki

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700