基于小波域的对称和非对称混合水印模型
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着计算机网络的迅速发展,通过因特网传输的数字产品非常容易受到非法拷贝和窜改。数字水印技术的诞生正是为了解决这个问题。而公钥数字图像水印是数字水印技术的一个分支,具有极大的应用前景,是当前研究的一个热点。
     本文首先分析了数字水印技术与传统加密技术的关系,总结了水印技术的优势领域和加密技术可应用到水印中的相关技术,同时,总结了水印系统的分类、鲁棒性水印的特性、水印的攻击方法。然后,本文总结了非对称数字水印(公钥数字水印)系统的当前研究方法,指出其中的不足。同时,提出了一种混合水印的方案,通过使用嵌入的公钥和私钥水印实现对称和非对称的水印提取。非对称水印允许任何人使用公钥提取公钥水印来验证一些信息。假如公钥水印被破坏,版权人可以使用对称水印提取秘密信息来证明他的版权。同时,为了解决公钥水印健壮性不高的问题,混合水印算法采用Hash函数、纠错码、小波域的临界可见误差门限等多种手段,增强了水印的鲁棒性;为了抵御解释攻击,混合水印算法引入了时间戳服务,并将混合水印算法拓展到彩色图像领域。
     借助Stirmark和Matlab等多种软件工具,仿真实现水印的嵌入、提取以及各种类型的攻击。使用随机选取的格式、大小相同的图像组,测试混合水印算法的虚检率。仿真实验将证实我们提出的这种方案的有效性。
     通过研究本水印系统的设计目标,以及实验结果,可以得出结论:在设定的工作范围下,水印系统可以基本完成目标。
With the development of network technology, the digital products transmitted though the internet is easier to be modified or copied by attackers without authorization by the actual owner. The digital watermarking technology was presented to resolve this problem several years ago. Asymmetric digital watermarking technology is one of the investigation hotspots in the digital watermarking field.
     Firstly, this paper analyzes the relationship between the digital watermarking technology and the traditional encrypting technology, and then summarizes the advantages of the digital watermarking technology and the encrypting technology which can be used in our hybrid-watermarking scheme. Secondly, a hybrid-watermarking scheme is proposed that enables both asymmetric and symmetric watermark extraction by embedding public and private watermarks. Using the asymmetric extraction, anyone with the public-watermark key can extract the public watermark to verify some information. If the public watermark is destroyed by some attack, the symmetric watermark extraction allows the actual seller to extract the hidden private watermark to prove his ownership claim. Finally, it makes full use of the Hash function, error correcting code, HVS in the algorithm to strengthen the robust of the watermarking. It also uses the digital time stamp service to resist the IBM attack and expands to multicolor image area.
     Watermarking serial is implanted into the original image and detected by using the special tools, such as Stirmark and Matlab. We present experimental results to show the effectiveness of our proposed scheme.
     We can conclude that this hybrid-watermarking scheme can achieve our design goal because of the research and experiments' results as former concerned.
引文
[1]Douglas R.Stinson.Cryptography Theory and Practice[M].Publishing House of Electronics Industry.2002:5-21.
    [2]杨烩荣.信息技术[J].BMP图像文件的信息隐藏技术及其实现.2001,221(8):39-48.
    [3]蔡闻怡,丁友东.计算机应用技术[J].数字水印技术的发展与应用.2005,24(2):86-90.
    [4]郝彦军,张焕国,王丽娜.非对称水印[J].计算机工程与应用.2003:62-65.
    [5]Hartung F,Griod B.Fast Public-key Watermarking of Compressed video[C].Proc.IEEE Int.Conf.on Image Processing.1997,10(1):528-531.
    [6]Van Schyndel,Tirkel A,Svalbe I.Key Independent Watermarking Detection[C].Proc.IEEE Int.Conf.on Multimedia Computing and Systems.1999,06(1).
    [7]Eggers J J,Su J K,Griod B.Public Key Watermarking by Eigenvectors of Liner Transforms[C].Proc.European Signal Processing Conf.2000.
    [8]杨树国,鲁棒图像数字水印技术的研究.哈尔滨工程大学博士论文,2003:33-37.
    [9]杨恒伏,陈孝威.小波域鲁棒自适应公开水印技术.软件学报,2003,14(9):1652-1660.
    [10]宋淇,等.一种基于HVS的利用零树编码的水印算法[J].华中科技大学学报(自然科学版),2004,32(5):41-54.
    [11]钟桦,张小华,焦李成.数字水印与图像认证—算法及应用[M].西安电子科技大学出版社.2006:71-83.
    [12]M Kutter.Watermarking Resisting to Translation,Rotation and Scaling.In Proceedings of SPIE Multimedia Systems and Applications,Boston,Massachusetts,1998:44-45.
    [13]N.Nikolaidis and I.Pitas,"Robust Watermarking of Facial Images based on Salient Geometric Pattern Matching," IEEE Trans.Multimedia,2000 2:172-184.
    [14]S.Voloshynovskiy,S.Pereira,VIquise,et al.Attack modeling.Towards a Second Generation Watermarking Benchmark,Signal Processing,2001,81:1177-1214.
    [15]Cox I J,Kallan J,Leighton F T.Secure Spread Spectrum Watermarking for Multimedia IEEE Trans on Image Processing.1997,6(12):673-1687.
    [16]Craver S,Memon N,Yeo B.Can Invisible Watermark Resolve Rightful Ownerships?[J].Storage and Retrieval for Image and Video Databases,1997,12(2):310-321.
    [17]Craver S,Memon N,et al.Resolving Rightful Ownerships with Invisible Watermarking Techniques:Limitations,Attacks,and Implications [J].IEEE Journal of Selected Areas in Communications,1998,16(4):573-586.
    [18]Zeng W,Liu B.A Statistical Watermark Detection Technique without Using Original Image for Resolving Rightful Ownership of Digital Images[J].IEEE Trans.on Image Processing,1999,8(11):1534-1548.
    [19]Qiao L,Nahrstedt.Watermarking Schemes and Protocols for Protecting Rightful Owner-ship and Customer's Rights[J].Visual Comm.and Image Representation,1998,9(23):194-210.
    [20]Lin PL.Digital Watermarking Models for Resolving Rightful Ownership and Authenticating Legitimate Customer.Journal of Systems and Software,2001,55(3):261-271.
    [21]胡东,一种基于购买行为的非对称数字水印.电子科技大学硕士学位论文,2007:12-17.
    22]Preneel B.The State of Cryptographic Hash Functions.Lectures on Data Security:Modern Cryptology in Theory and Practice.LNCS 1561. Berlin:Springer-Verlag,1999:158-182.
    [23]Stuart Haber and W.Scott Stornetta,"How to Time-stamp a Digital Document." Journal of Cryptology 3,1991:99-111.
    [24]Huang JW,Elmasry GF,Shi YQ.Power Constrained Multiple Signaling in Digital Image Watermarking.In:Proc.of the IEEE Workshop on Multimedia Signal Processing.Piscaterway:IEEE Press,1998:388-393.
    [25]Zinger S,Jin Z,Maitre H,Sankur B.Optimization of Watermarking Performances using Error Correcting Codes and Repetition.In:Proc.of the Communications and Multimedia Security.Kluwer,2001:229-240.
    [26]Baudry S,Delaigle JF,Sankur B,Macq B,Maitre H.Analysis of Error Correction Strategies for Typical Communication Channels in Watermarking.Signal Processing,2001,81(6):1239-1250.
    [27]Balado F,Perez-Gonzalez F,Scalise S.Turbo Coding for Sample-level Watermarking in the DCT Domain.In:Proc.of the IEEE Int'l Conf.on Image Processing.Piscaterway:IEEE Press,2001(3):1003-1006.
    [28]Desset C,Macq B,Vandendorpe L.Block Error-correcting Codes for Systems with a Very High BER:Theoretical Analysis and Application to the Protection of Watermarks.Signal Processing:Image Communication,2002,17(5):409-421.
    [29]Mallat S.Theory for Multi-resolution Signal Decomposition:The Wavelet Representation[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,1989,11(7):674-693
    [30]唐远炎,王玲,小波分析与文本文字识别,北京,科学出版社,2004:77-91.
    [31]成礼智,王红霞,罗永.小波的理论与应用[M].北京:科学出版社,2004:201-210.
    [32]Levis A S Knowles G Image Compression Using the 2-D Wavelet Transforms[J].IEEE.Image Trans Proc April,1992,1(2):244-250.
    [33]Kutter M,Petitcolas F A P.A Fair Benchmark for Image Watermarking Systems,1999,1:311-314.
    [34]Watson A B Yang Gloria Y,Sodom On J aet al.Visibility of Wavelet Quantization Noise[J].IEEE Transactions on Image Processing.1997,6(8):1165-1175.
    [35]谷利民,黄继武.数字水印信道中的分组码编码策略分析.软件学报,2004,15(9).
    [36]Xia,C.G.Boncelet and G R.Arce.Wavelet Transform Based Watermark for Digital Images.Optics Express,1998,3(12):497-511.
    [37]黄达人,刘九芬,黄继武.小波变换域图像水印嵌入对策和算法[J].软件学报,2002,13(7):1290-1297.
    [38]Tsekeridou S,Pitas I.Embedding Self-similar Watermarks in Wavelet Domain.In:Proc.of[J].IEEE international Conference on Acoustics,Systems and Signal Processing,2000,6:1967-1970.
    [39]Kundur D.Improved Digital Watermarking through Diversity and Attack Characterization.In:Proc.of Workshop on Multimedia Security at ACM Multimedia'99,1999:53-58.
    [40]Davoine F.Comparison of Wavelet Based Image Watermarking Schemes.In:Proc.of[J]IEEE international Conference on image processing,2000,3:682-685.
    [41]Kim J R,Moon Y S.A Robust Wavelet-based Digital Watermark using Level Adaptive Threshold.In:Proc.Of IEEE international Conference on mage Processing,Japan,1999:226-230.
    [42]Barni M,Bartolini F,Piva A.Improved Wavelet-Based Watermarking Through Pixel-Wise Masking.[J]IEEE Trans.on Image Processing,May 2001,10(5):783-791.
    [43]Kundur D and Atsidakos D.A Robust Digital Image Watermarking Method using Wavelet Based Fucsion[J].IEEE International Conference on Image Processing,Santa Barbara,CA,and October 1997.vol.1:544-547.
    [44]Kundur D.Multiresotion Digital Watermarking:Algorithms and Implications for Multimedia Signal[J].Ph.D.Ttans.Dept.of Electrical &Computer Engineering,University of Toronto.August 1999.17(8).
    [45]刘九芬,黄达人,胡军全.数字水印中的正交小波基[J].电子与信息学报,vol.25,no.4,2003:453-459.
    [46]Barni M.,Bartolini F,De Rosa A.and Piva A.,A New Recovery of No Additive Watermarks,IEEE Trans.on 10(5):755-766.decoder for the optimum Image Processing,2001.
    [47]李华,朱光喜,朱耀庭.基于视觉特性和小波分解的数字水印隐藏方法.通信学报,2000,21(6):37-41.
    [48]D.Kindred.Hatzinakos.A Robust Digital Image Watermarking Method Using Wavelet-based Fusion.Proc.IEEE Int.Conf.on Image Processing,Piscataway:IEEE Press,1997.15(1):544-547.
    [49]M.D.Swanaon,B.Zhu and A.H.Tewfik.Multi-resolution Scene-based Video Watermarking Using Perceptual Models.IEEE J.Select.Areas Commun.1998,16(4):540-550.
    [50]Wang Houng-Jyh,Jay-Kuo C.-C.,High Fidelity Image Compression with Multi-threshold Wavelet Coding(MTWC).In:Proctor SPIE's Annual Meeting on Application of Digital Image Processing XX-San Diego,CA,USA,1997,3164:383-392.
    [51]马仲华,余松烃.一种基于双正交小波分解的自适应数字水印技术[J].上海交通大学学报,2002,36(6):792-795.
    [52]杨义先,等.数字水印理论与技术[M].北京,高等教育出版社,2006.3.
    [53]钟桦,数字图像信息隐藏与认证算法研究.西安电子科技大学博士学位论文,2003.
    [54]Voyatzis G and Pitas L,The Use of Watermarks in the Protection of Digital Multimedia Products,Proc.IEEE,1999,87(7):1197-1207.
    [55]Lu C-S,Huang S-K,Sze C-J and Liao Digital Image Protection,IEEE Trans.On-Y M.,Cocktail Watermarking for Multimedia,2000,2(4): 209-224.
    [56]Xia M.and Liu B.Effect of JPEG detection,IEEE International Conference Processing,Salt Lake City,UT,May 2001.Compression on Image Watermark.
    [57]Pitas L,A Method for Eatermark Casting in Digital Images,IEEE Trans.on Circuits and Systems on Video Technology,1998,8(6):775-780.
    [58]汪小帆,戴跃伟,茅耀斌,信息隐藏技术-法与应用,机械工业出版社,2001.
    [59]张春田,苏育挺.信息产品的版权保护-字水印.电信科学,1998,14(12):15-17.
    [60]孙圣和,陆哲明.数字水印处理技术.电子学报,2000 28(8):85-90.
    [61]李忠源,付震中.印刷图像中的信息隐含.第二届信息隐藏学术研讨会论文集,北京,2000:34-36.
    [62]S.Voloshynovskiy,T.Pun,J.K.Su et al.,and Attacks on Digital Watermarks:Classification,Estimation-based Attacks,and Benchmarks,IEEE Communication Magazine,Aug.2001,39(8):118-126.
    [63]M.Wu,B.Liu,Attacks on Digital Watermarks,Conf.Record of the 33Asilomar Conf.on Signals,Systems,and Computers,1999,2:1508-1512.
    [64]陈明奇,钮心忻,杨义先,数字水印的攻击方法,电子与信息学报,2001,23(7):705-711.
    [65]尹康,向辉,石教英,多媒体数据数字水印系统及其攻击分析,计算机科学,1999,26(10):44-48.
    [66]Ram Kumar M,Akansu AN N,Alatan A.On the Choice of Transforms for Data Hiding in Compressed Video.In:Proc.c ICASSP'99.1999:3049-3052.
    [67]Kundur D,Hatzinakos D.Mismatching Perceptual Models for Effective Watermarking in the Presence of Compression.In:Proc.of SPIE Conference on Multimedia Systems and Applications Ⅱ.999,3845:29-42.
    [68]Wolf gang R B,Podilchuk C I,Delp E J.The Effect of Matching Watermark and Compression Transforms in Compressed Color Images.Conference on Image Processing,Chicago,IL,USA,1998,1:1440-444.
    [69]刘九芬,黄人达,胡军全.数字水印中的正交小波基[J].电子与信息学报,2003,25(4):453-459.
    [70]李智,陈孝威.小波和余弦变换相结合的灰度图像水印算法[J].中国图象图形学报,2006,21(6):834-839.
    [71]Shapiro JM.Embedded Image Coding Using Zero Trees of Wavelet Coefficients[J].IEEE Tran on Signal Processing.1993.41(12):3445-3462.
    [72]A Said arid WA Pearlman.A New Fast and Efficient Image Code Based on Set Partitioning In Hierarchical Trees,IEEE Transactions on Circuits and Systems for Video Technology,1996,6(3):243-250.
    [73]Piva A,Barni M,Baolini F,Capellini V.DCT_based Watermark Recovering without Resorting to the Uncorrupted Original Image.Proc.of ICIP.1997,3:520-523.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700