数字水印技术的研究和应用
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着计算机技术的发展和相关信息技术的进步,特别是Internet用户的急剧增加和多媒体技术的飞速发展,数字化产品越来越普及。由于数字化产品的传播、复制、篡改和窃取比较容易,所以如何有效的保护数字产品的版权和防止数字产品的盗版就变得越来越紧迫。作为一种新型的有效的版权保护手段,数字水印技术倍受人们的关注。本文通过对数字水印技术的研究和讨论,设计并实现了基于小波变换基础上的静止图像数字水印系统。
     论文首先系统地研究了数字水印的基本概念和定义、数字水印技术的基本属性、数字水印技术的基本原理、数字水印技术的分类、数字水印技术的评价标准,并讨论了传统的保密技术的缺陷及与数字水印技术的区别。
     针对小波分析理论,论文介绍了小波和小波理论的基本定义、正交小波与多分辨率分析、尺度方程和构造方程和Mallat算法及在图像处理中的应用。在此基础之上,详细讨论了小波理论在数字水印中的应用,重点讨论了二维离散小波对静止图像的分解和重构原理。
     对于静止图像的水印技术,论文首先介绍了静止图像的格式,然后重点讨论了水印的选取、水印变换方法的选择以及水印的嵌入位置和嵌入、抽取算法及其相关技术。在保证水印不可见和鲁棒性的前提下,论文基于小波变换提出一种图像自适应的数字水印方案。这种方案以图像为水印,基于扩频原理,充分利用小波变换的优良特点和人眼视觉特性,结合图像自身特性,使嵌入的水印既有良好的鲁棒性又有良好的容量。
     基于图像自适应的数字水印方案之上,论文利用小波变换在YUV颜色模式空间以视觉上直观可见的图像作为水印,设计了灰度图像自适应数字
    
     哈尔滨工程大学硕士学位论文
     一
     水印系统和彩色图像数字水印系统,并进行一系列鲁棒性试验。实验结果
     硼。本文所设汁的两个数字水印手钩中的水口具有电好的不可m付#
     能抵抗有损压缩、剪切、平滑和放缩等常见的图像操作,具有良好的鲁棒
     性。
Wth the advancement of computer technology and the progresses of
    iriformation technology, especially the sharp increase of the Intemet users and
    fast development of the multimedia technology digitalized products have
    become more and more popular It is much easer for transmitting, copying,
    tampering and pilfering of digital data. Thus, it is increasingly urgent that how to
    protect the copyright of digital data effectively and prevent the pirate of digita1
    data. As a new tyPe and effective means fOr the protection of digital dat4 much
    attention fOcuses on digital watermarks. On the basis of the discussion and
    investigation of digital watermarks, the design and realization of the still image
    digital watermarking systems on the wavelet transform are presented in this
    dissertaion.
    The fundamentals, such as basic concepts, definition, main feature. basic
    principle, classification and the evaluation standard of digital watermarking, are
    systematically stUdied in this dissertation. The difference is discussed between
    conventional cryptographic systems and digital watermarking systems also.
    Besides, the basic definition, orthogonal wavelet and multi-resolution anaIysis,
    scaling equation and construction equation and the aPplication of Mallat
    arithInetic in the image processing are introduced in the dissertation as well. And
    detail discussion of the aPplication of the theory of wavelet in the digital
    watermarking, especially, the discussion centered on the theory of the two-
    dimension wavelet decomposition and reconstruction for the still images, are
    given in this dissertation.
    Fol1owing the introduction of the format of still images, the selection of
    watermark and the choice of the transform, embedding position of the watermark,
    
    
    embedding and extYacting arithInetic of the watermark are discussed. At last a
    new image-adaPtive Waermarking scheme is brought forward, which takes full
    advatage of the good characters of wavelet bof Orm and human visual system
    based on spread spectri theory And the algorithrn has good robusiness and
    caPacity
    Both the gray - l ev e l - im ag e - adapti ve watermarking system and c o lor- image
    watermarking system based on the image-adaptive watermarking scheme in the
    YUV color-mode space are implemented. The results of compuler simulation
    show that the proposed watermarking methods satisfy the requirements of
    robustness and transparency. This scheme can resist the conunon image
    processing operations, such as lossy compression, cropping, filtering and scaling.
引文
[1]张春田,苏育挺等.多媒体数字水印技术.通信学报.2000,21(9):46-52页
    [2]Friderrich J. BaiDoIA AC. SIMARD RJ. Robust digital watermark based on key dependent basis function. [J]. Proc of Information Hiding' 98. [C] 1998: 143-157P
    [3]R. J. Anderson and F. A. P. Petitcolas, On the limits of steganography. IEEE J. Select. Areas Commun. vol. 16, May 1998: 474-481P
    [4]刘瑞祯,谭铁牛.数字图像水印研究综述.通信学报.2000,21(8):39-48页
    [5]HERRGEL. A,VOLOSHYNOVSKIYS. Copyright and content protection for digital images based on asymnettric cryphographic techniques. [A] Proc of multimedia' 98[C],1998: 99-112P
    [6]胡俊,刘振华等.单向数字水印[J].密码与信息.1998,(2):42-49页
    [7]TURNER LF. Digital data security system[P]. Patent IPN W089/08915, 1989
    [8]Van SCHYNDEL H G. TIRKEL. Al, OSBORNE CF. A digital watermark. [A] Internatinal conference on Images Processing. [C] 1994,(2): 86-90P
    [9]HSU C, WU JL. Hidden watermarks in images[J]. IEEE Trans on Image Processing. 1999,8(1): 58-68P
    [10]M. Holliman, N. Memon, B. -L. Yeo, and M. Yeung. Adaptive public watermarking of DCT-based compressed images. Proc. SPIE Int. Conf. Storage and Retrieval for Image and Video Databases—VI, vol. 3312, San Jose, CA, Jan. 28-30, 1998: 284-295P
    
    
    [11]A. Tacticus. How to survive under siege/aineias the tactician(clarendon cncient history series). Oxford, U. K Clarendon, 1990: 84-90P, 183-193P
    [12]R.J. Anderson, Ed. Information hiding: 1st Int. Workshop (lec-ture notes in computer science), vol. 1174. Berlin, Germany: Springer-Verlag, 1996
    [13]L. Miller, I. J. Cox, and J. A. Bloom. Watermarking in the real world: an application to DVD. Multimedia and Security—Workshop at ACM Multimedia'98 (GMD Report), vol. 41, J. Dittmann, P. Wohlmacher, P. Horster, and R. Stein-metz, Eds. Bristol, U. K. ACM, GMD— Forschungszentrum Informationstechnik GmbH, 1998: 71-76P
    [14]韦志辉,肖亮.数字图像中的数字水印隐藏技术及其应用.电子计算机.2000,(4):28-31页
    [15]刘瑞祯,谭铁牛.水印能量估计的一般性框架.计算机学报.2001,24(3):242-246页
    [16]丁玮,齐东旭.基于置乱与融合的数字图象隐藏技术及其应用.中国图象图形学报.2000,5A(8):644-649页
    [17]周利军,周源华.数字图像水印的扩频实现.红外与激光工程.2000,29(5):27-31页
    [18]孟兵 周良柱.基于小波变换的静态图像数字水印算法.计算机辅助设计与图形学学报.2000,12(10):751-755页
    [19]马希俊,钟伟.基于小波变换的图像水印算法.上海交通大学学报.2000,34(7):910-912页
    [20]李华,朱光喜.基于视觉特性和小波分解的数字水印隐藏方法.通信学报.2000,21(6):3741页
    [21]牛夏牧,陆哲明.基于多分瓣率分解的数字水印技术.电子学报.2000,28(8):1-4页
    
    
    [22]施鹏飞,赵立初.数字水印技术的研究.信息与控制.2000,29(1):40-46页
    [23]钱思进.数字信息的保护技术——数字水印.今日电子.1999,(7):17-19页
    [24]丁玮,齐东旭等.数字图像水印的 Cox 方法和 Pitas 方法综述.北方工业大学学报.2000,12(3):1-12页
    [25]黄继武,SHI YunQ.一种自适应图象水印算法.自动化学报.1999,25(4):476-482页
    [26]韦志辉,富煜清.基于小波域中视觉门限模型的数字水印技术.东南大学学报.1998,28(5):44-48页
    [27]李建平,唐远炎著.小波分析方法的应用.重庆:重庆出版社,2000:l-94页
    [28]彭玉华著.小波变换与工程应用.北京:科学出版社,1999:36-59页
    [29]李振辉,李仁和编著.探索图像文件的奥秘.北京:清华大学出版社,1996:48-54页
    [30]赵荣椿等编著.数字图像处理导论.西安:西北工业大学出版社.1999:1-165页
    [31]程正兴著.小波分析算法与应用.西安:西安交通大学出版社.1998:1-154页
    [32]I.J. Cox and M. L. Miller. A review of watermarking and the importance of perceptual modeling,in Human Vision and Electronic Imaging Ⅱ, vol. 3016B, E. Rogowitz and T. N. Pappas, Eds. San Jose, CA:IS&T and SPIE, 1997
    [33]A. Herrigel, J. J. K. O'Ruanaidh, H. Petersen, S. Pereira, and T. Pun. Secure copyright protection techniques for digital images. Information Hiding: Second Int. Workshop (Lecture Notes in Computer Science), vol. 1525, D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag, 1998: 169-190P
    
    
    [34]Andrew B. Watson, Gloria Y. Yang, Joshua A. Solomon, and John Villasenor. Visibility of wavelet quantization noise. IEEE Trans on Image Processing. 1997,6(8): 1164-1175P
    [35]J.J.K. O'Ruanaidh and T. Pun. Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Processing, vol. 66, no. 3, May 1998: 303-317P
    [36]M. Kutter. Watermarking resisting to translation, rotation, and scaling. Proc. SPIE Multimedia Systems and Applications, vol. 3528, Boston, MA, Nov. 1998: 423-431P
    [37]M. Kutter and F. A. P. Petitcolas. A fair benchmark for image watermarking systems,in 11th Int. Symp. Electronic Imaging, vol. 3657. San Jose, CA: IS&T and SPIE, Jan. 25-27, 1999
    [38]Russel and G. Gangemi. Computer Security Basics. Se-bastopol, CA: O'Reilly & Associates, 1991: ch. 10
    [39]J. -P. M. G. Linnartz and M. van DijK. Anaiysis of the sen-sitivity attack against electronic watermarks in images. Information Hiding: 2nd Int. Workshop (Lecture Notes in Com-puter Science), vol. 1525, D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag, 1998: 258-272P
    [40]M. Maes. Twin peaks: The histogram attack on fixed depth image watermarks,in Information Hiding: 2nd Int. Workshop (Lecture Notes in Computer Science), vol. 1525, D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag, 1998: 290-305P
    
    
    [41]F.A.P. Petitcolas, R. J. Anderson, and M. G. Kuhn. Attacks on copyright marking systems,in Information Hiding: 2nd Int. Workshop (Lecture Notes in Computer Science), vol. 1525, D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag, 1998: 218-238P
    [42]G. C. Langelaar, R. L. Lagendijk, and J. Biemond. Removing spatial spread spectrum watermarks by nonlinear filtering. 9th European Signal Processing Conference (EUSIPCO'98), Rhodes, Greece, Sept. 8-11 1998: 2281-2284P
    [43]R. Barnett and D. E. Pearson. Frequency mode LR attack operator for digitally watermarked images. Electron. Lett. vol. 34, no. 19, Sept. 1998: 1837-1839P
    [44]A. Herrigel, J. J. K. O'Ruanaidh, H. Petersen, S. Pereira, and T. Pun. Secure copyright protection techniques for digital images. Information Hiding: Second Int. Workshop (Lecture Notes in Computer Science), vol. 1525, D. Aucsmith, Ed. Berlin, Germany: Springer-Verlag, 1998:169-190P
    [45]D. Tzovaras, N. Karagiannis, and M. G. Strintzis. Robust image watermarking in the subband or discrete cosine transform domain. Proc. 9th European Signal Processing Conf. (EU-SIPCO'98 Rhodes, Greece, Sept. 8-11, 1998: 2285-2288P
    [46]R. B. Wolfgang and E. J. Delp. A watermarking technique for digital imagery: Further studies. Proc. IEEE Int. Conf. Imag-ing, Systems, and Technology, Las Vegas, NV, June 30-July 3, 1997: 279-287P
    [47]D. Kahn, The Codebreakers—The Story of Secret Writing. New York: Scribner, 1996
    [48]Zhao and E. Koch. Embedding robust labels into images for copyright protection. Int. Congr. Intellectual Property Rights for Specialised Information, Knowledge and New Technologies, Vienna, Austri Aug. 1995
    
    
    [49]G.C. Langelaar, J. C. A. van der Lubbe, and R. L. Lagendijk. Robust labeling methods for copy protection of images. Storage and Retrieval for Image and Video Database V, vol. 3022, I. K. Sethin and R. C. Jain, Eds. San Jose, CA: IS&T and SPIE, 298-309P
    [50]M. D. Swanson, B. Zu, and A. H. Tewfik. Robust data hiding for images. Proc. IEEE 7th Digital Signal Processing Workshop (DSP 96), Loen, Norway, Sept. 1996: 37-40P
    [51]R. J. Anderson and C. Manifavas. Charmeleon—A new kind of stream cipher. Fast Software Encryption—4th Int. Workshop (FSE'97) (Lecture Notes in Computer Science), vol. 1267, E. Biham, Ed. Berlin, Germany: Springer-Verlag, 1997: 107-113P
    [52]J.R. Smith and B. O. Comiskey. Modulation and information hiding in images. Information Hiding: 1st Int. Workshop (Lecture Notes in Computer Science), vol. 1174, R. J. Anderson, Ed. Berlin, Germany: Springer-Verlag 1996: 207-226P
    [53]W. Bender, D. Gruhl, N. Morimoto, and A. Lu. Techniques for data hiding. IBM Syst. J. vol. 35, nos. 3,4, 1996: 313-336P
    [54]I. Pita. A method for signature casting on digital Images. Proc. Int. Conf. Image Processing, vol. 3, Sept. 1996: 215-218P
    [55]G.C. Langelaar, J. C. van der Lubbe, and J. Biemond. Copy protection for multimedia data based on labeling techniques. Proc. 17th Symp. Information Theory in the Benelux, Enschede, The Netherlands, May 1996
    
    
    [56]R.C. Dixon. Spread spectrum systems with commercial applications, 3rd ed. New York: Wiley, 1994
    [57]R.A. Scholtz. The origins of spread spectrum communi-cations. IEEE Trans. Commun. vol. 30, May 1982: 822-853P
    [58]Z. Tirkel, G. A. Rankin, R. M. van Schyndel, W. J. Ho, N. R. A. Mee, and C. F. Osborne. Electronic watermark. Digital image computing, technology and applications (DICTA'93), Macquarie University, Sydney, Australia, 1993: 666-473P
    [59]Lc Boney, A. H. Tewfik, and K. N. Hamdy. Digital Watermarks for Audio Multimedia Computing and Systems June 17-23,Signals. 1996 IEEE Int. Conf. on Hiroshima, Japan, 1996: 473-480P
    [60]D. Kundur and D. Hatzinakos. Digital watermarking using multiresolution wavelet decomposition,Proc. IEEE Int. Conf. on Acoustics, Speech and Signal Processing, Seattle, Washington, vol. 5, May 1998: 2969-2972P
    [61]D. Kundur and D. Hatzinakos. A Robust Digital Image Watermarking Scheme using Wavelet-Based Fusion. Proc. IEEE Int. Conf. on Image Processing, Santa Barbara, California, vol. 1, Octoberl997: 544-547P
    [62]Blinn, Janes F. NTSC: Nice technology, superior color. IEEE Computer Graphic & Applications, March1993: 17-23P
    [63]Blinn, James F. The world of digital video. IEEE Computer Graphic & Applications, September 1992: 106-112P
    [64]Won H. Lee, and Jong U. Choi. Combination of DCT and WT for Enhancing Robustness of Digital Watermarking. working paper, Sangmyung University, 1999
    [65]A. G. Bors and I. Pitas. Image watermarking using DCT domain constraints. Proc. IEEE Int. Conf. Image Processing, vol. 3, Lausanne,Switzerland, Sept. 16-19, 1996: 231-234P
    
    
    [66]A. Gersho and R. M. Gray, Vector Quantization and Signal Compression. Boston, MA: Kluwer, 1992
    [67]D. Benham, N. Memon, B. -L. Yeo, and M. Yeung. Fast watermarking of DCT-based compressed images. Proc. Int Conf. Imaging Science, Systems, and Technology, vol. 1, Las Vegas, NV, June 30-July 3, 1997: 243-252P
    [68]J. J. K. O. Ruanaidh, W. J. Dowling, and F. M. Boland. Phase watermarking of digital images. Proc. IEEE Int. Conf. Image Processing, vol. 3, Lausanne, Switzerland, Sept. 16-19, 1996: 239-242P
    [69]C. I. Podilchuk and W. Zeng. Perceptual watermarking of still images. Proc. IEEE Workshop Multimedia Signal Processing CD ROM, Princeton, NJ, June 1997.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700