CUDA平台下数字图像认证方法的设计与实现
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着数字图像的广泛应用,对图像的真实性、权威性做出认证显得越来越重要。研究人员提出了许多有效的图像认证算法,但仍然面临许多挑战,其中一个问题是图像认证的处理效率日益成为应用中的主要瓶颈。当前常用的加速方案主要采用可编程芯片作为协处理器,但这些方法在通用性等方面的局限性使其得不到广泛的应用。CUDA平台的推出为GPU在通用计算领域发挥作用提供了良好的软硬件平台。本文针对数字图像认证方法及其加速方案,探讨了CUDA平台下图像认证方法的设计与实现,具体工作包括以下几个方面:
     首先,分析了当前图像认证的主要方法与特点,探讨了引入CUDA平台提高处理效率的可行性与优越性。当前许多认证算法往往需要引入图像变换、人类视觉系统等模型,其执行过程具有较大的计算量和较高的可并行性,因此将基于CUDA平台的并行技术用于图像认证中能够有效提高算法的执行效率。
     其次,设计了一种基于CUDA平台的并行化的DCT域图像认证方法。将图像的分块变换与认证处理任务分配到GPU中并行处理,通过合理的任务分割与程序优化,充分利用了GPU的并行计算能力,获得了较好的加速效果。
     再次,设计了一种基于CUDA平台的并行化的DWT域图像认证方法。分析了Haar小波变换的计算特点,采用稀疏矩阵相乘的策略对其进行并行化。认证处理中结合人类视觉系统,自适应地嵌入图像特征水印。通过计算任务的并行化使得算法的处理效率得到有效的提高。
     最后,给出了CPU-GPU异构多核平台下图像认证系统的基本实施框架。探讨了CPU-GPU异构多核平台与多GPU调度方法。
     本文将CUDA平台有效地应用于图像认证领域,提高了图像认证过程中的处理效率,为图像认证的算法研究与并行方案提供了新的思路,具有一定的参考价值。
Digital images are widely used in our life, and image authentication is becoming moreand more important. After years of research, researchers proposed many effiective image au-thentication algorithms, but there are still many challenges in this field. This paper presentsa new acceleration scheme for image authentication using CUDA, and the main researchworks are as follows:
     Firstly, the paper discusses the main image authentication method nowadays. Manyuseful concepts, such as signal transformation and HVS, are employed to improve the per-formance. Thus parallelizing these processes with CUDA will accelerate the performanceof the algorithm considerably.
     Secondly, the paper proposes a CUDA-based implementation of an image authentica-tion algorithm with GPU devices. The algorithm parallelizes the process of block-wise DCTand watermarking embedding. Experimental results show that the CUDA-based methodgains a good performance both in authentication results and operation speedup.
     Thirdly, a DWT-based image authentication algorithm and its parallel scheme are pre-sented, using sparse matrix multiplication strategy for the Haar wavelet transformation andimprove the efficiency of the process of image authentication.
     Finally, a basic framework for image authentication system is presented. Hybrid CPU-GPU platforms and multi-GPU are employed in the system.
     This paper applies CUDA platform to the field of image authentication and makes theprocess of image authentication more effiectively. The schemes provide new ideas to accel-eration of image processing, and have certain practical significance.
引文
[1]吴金海,林福宗.基于数字水印的图像认证技术[J].计算机学报, 2004, 27(9):1154–1161.
    [2] NVIDIA Corporation. CUDA Programming Guide Version 2.3[EB/OL], 2010.
    [3] S. Lahabar and P.J. Narayanan. Singular Value Decomposition on GPU UsingCUDA[C]. IEEE International Symposium on Parallel Distributed Processing, 2009:1–10.
    [4] Lei Pan, Lixu Gu and Jianrong Xu. Implementation of Medical Image Segmentation inCUDA[C]. International Conference on Information Technology and Applications inBiomedicine, 2008: 82–85.
    [5] Shifu Chen, Jing Qin, Yongming Xie, Wai-Man Pang and Pheng-Ann Heng. CUDA-based Acceleration and Algorithm Refinement for Volume Image Registration[C]. In-ternational Conference on Future BioMedical Information Engineering, 2009: 544–547.
    [6] Adil Haouzia and Rita Noumeir. Methods for Image Authentication: a survey[J]. Mul-timedia Tools and Applications, 2008, 39: 1–46.
    [7] M. Schneider and Shih-Fu Chang. A Robust Content Based Digital Signature for ImageAuthentication[C]. Proceedings of Image Processing, 1996: 227–230.
    [8] Der-Chyuan Lou and Jiang-Lung Liu. Fault Resilient and Compression Tolerant DigitalSignature for Image Authentication[J]. IEEE Transactions on Consumer Electronics,2000, 46(1): 31–39.
    [9] J. Dittmann, A. Steinmetz and R. Steinmetz. Content-based Digital Signature for Mo-tion Pictures Authentication and Content-fragile Watermarking[C]. IEEE InternationalConference on Multimedia Computing and Systems, 1999: 209–213.
    [10] Chun-Shien Lu and H.-Y.M. Liao. Structural Digital Signature for Image Authentica-tion: an Incidental Distortion Resistant Scheme[J]. IEEE Transactions on Multimedia,2003, 5(2): 161–173.
    [11] A. Tirkel, G. Rankin, R.G. Schyndel et al. Electronic watermark[C]. DICTA, 1993:666–672.
    [12]金聪.数字水印理论与技术[M].清华大学出版社, 2009.
    [13] S. Walton. Image Authentication for a Slippery New Age[J]. Dr. Dobb’s Journal, 1995,20(4): 18–26.
    [14] Yeung M and Mintzer F C. An Invisible Watermarking Technique for Image Verifica-tion[C]. In: Proceedings of the International Conference on Image Processing, 1997:680–683.
    [15] R. Swierczynski. Fragile Watermarking Using Subband Coding[C]. Porceedings ofInternational Conference on Computer Vision and Graphics, 2002: 748–753.
    [16]郑江滨,冯大淦,张艳宁,赵荣椿.可恢复的脆弱数字图像水印[J].计算机学报,2004, 27(3): 371–376.
    [17] Kostopoulos, Gilani and Skodras. Colour Image Authentication Based on A Self-embedding Technique[C]. 14th International Conference on Digital Signal Processing,2002: 733–736.
    [18] J. Dittmann. Content-fragile Watermarking for Image Authentication[C]. Proceedingsof SPIE Conference on Security and Watermarking of Multimedia Contents, 2001:175–184.
    [19] M.D. Swansom, B. Zhu and A.H. Tewfik. Robust Data Hiding for Images[C].In:Proceedings of the 7th IEEE Digital Signal Processing Workshop, 1996: 37–40.
    [20] B. Zhu, M.D. Swansom and A.H. Tewfik. Transparent Robust Authentication and Dis-tortion Measurement Technique for Images[C]. In:Proceedings of the 7th IEEE DigitalSignal Processing Workshop, 1996: 45–48.
    [21] MF Mansour and AH Tewfik. Robust High Capacity Data Embedding[C]. Proceedingsof IEEE ICASSP, 2001: 1–7.
    [22] Ching-Yung Lin and Shih-Fu Chang. A Robust Image Authentication Method Distin-guishing JPEG Compression from Malicious Manipulation[J]. IEEE Transactions onCircuits and Systems for Video Technology, 2001, 11(2): 153–168.
    [23] Ching-Yung Lin and Shih-Fu Chang. SARI: Self Authentication and Recovery ImageWatermarking System[C]. Proceedings of the ninth ACM International Conference onMultimedia, 2001: 628–629.
    [24] Chi Kin Ho and Chang-Tsun Li. Semi-fragile Watermarking Scheme for Authenticationof JPEG Images[C]. Information Technology: Coding and Computing, 2004: 7–11.
    [25] Chih hung Lin, Tung shih Su and Wen shyong Hsieh. Semi-Fragile WatermarkingScheme for Authentication of JPEG Images[J]. Tamkang Journal of Science and Engi-neering, 2007, 10(1): 57–66.
    [26]一种半脆弱性图像数字水印算法.董刚,张良,张春田[J].通信学报, 2003, 24(1):33–38.
    [27] Sun Qibin, Chang Shih-Fu, Kurato Maeno and Suto Masayuki. A Quantitative Semi-fragile JPEG2000 Image Authentication System[C]. In: Proceedings of the IEEE In-ternational Conference on Image Processing, 2002: 921–924.
    [28] C.S. Lu and H.Y. Liao. Semi-Fragile Watermarking Scheme for Authentication ofJPEG Images[J]. IEEE Transactions on Image Processing, 2001, 10(10): 1579–1592.
    [29] M. Schlauweg and E. Muller. Content-adaptive Semi-fragile Image AuthenticationBased on JPEG2000 Compression[C]. 16th International Conference on Digital SignalProcessing, 2009: 1–8.
    [30] Min-Jen Tsai and Chih-Cheng Chien. A Wavelet-based Semi-fragile Watermarkingwith Recovery Mechanism[C]. IEEE International Symposium on Circuits and Sys-tems, 2008: 3033–3036.
    [31]王向阳,杨红颖,邬俊.一种基于自适应量化的半脆弱图像水印算法[J].小型微型计算机系统,2006,27(5): 896–900.
    [32]王向阳,杨红颖,侯丽敏.一种新的半脆弱彩色图像数字水印算法[J].自动化学报,2007,33(6): 561–566.
    [33]沃焱,韩国强,张波.一种新的基于特征的图像内容认证方法[J].计算机学报,2005, 28(1): 105–112.
    [34]沃焱,韩国强,张见威,张波.基于小波变换和形态学的图像内容认证方法[J].电子学报,2005,26(8): 9–15.
    [35] Elias Kougianos, Saraju P. Mohanty and Rabi N. Mahapatra. Hardware Assisted Water-marking for Multimedia[J]. Computers Electrical Engineering, 2009, 35(2): 339–358.
    [36] T.H. Tsai and C.Y. Lu. A Systems Level Design for Embedded Watermark TechniqueUsing DSC Systems[C]. Proceedings of the IEEE International Workshop on Intelli-gent Signal Processing and Communication Systems, 2001.
    [37] A. Garimella, M.V.V. Satyanarayana and R. Satish Kumar. VLSI Implementation ofOnline Digital Watermarking Technique with Di?erence Encoding for 8-bit Gray ScaleImages[C]. 16th International Conference on VLSI Design, 2003: 283–288.
    [38] Young-Ho Seo and Dong-Wook Kim. Real-Time Blind Watermarking Algorithm andits Hardware Implementation for Motion JPEG2000 Image Codec[C]. ESTImedia,2003: 88–93.
    [39] S.P. Mohanty, N. Pati and E. Kougianos. A Watermarking Co-Processor for New Gen-eration Graphics Processing Units[C]. International Conference on Consumer Elec-tronics, 2007. Digest of Technical Papers, 2007: 1–2.
    [40] A. Piva, M. Barni, F. Bartolini and V. Cappellini. DCT-based Watermark Recoveringwithout Resorting to the Uncorrupted Original Image[C]. International Conference onImage Processing, 1997: 520–523.
    [41] A. Brunton and Jiying Zhao. Real-time video Watermarking on Programmable Graph-ics Hardware[C]. Canadian Conference on Electrical and Computer Engineering, 2005:1312–1315.
    [42] Ping Wah Wong. A Public Key Watermark for Image Verification and Authentica-tion[C]. International Conference on Image Processing, 1998: 455–459.
    [43] A. Garimella, M.V.V. Satyanarayana, P.S. Murugesh and U.C. Niranjan. ASIC forDigital Color Image Watermarking[C]. Digital Signal Processing Workshop, 2004 andthe 3rd IEEE Signal Processing Education Workshop, 2004: 292–296.
    [44] S.P. Mohanty, E. Kougianos and N. Ranganathan. VLSI Architecture and Chip forCombined Invisible Robust and Fragile Watermarking[J]. Computers Digital Tech-niques, IET, 2007, 1(5): 600–611.
    [45] G.R. Nelson, G.A. Jullien and O. Yadid-Pecht. CMOS Image Sensor with Watermark-ing Capabilities[C]. IEEE International Symposium on Circuits and Systems, 2005:5326–5329.
    [46] S.P. Mohanty, N. Ranganathan and K. Balakrishnan. Design of A Low Power ImageWatermarking Encoder Using Dual Voltage and Frequency[C]. 18th International Con-ference on VLSI Design, 2005: 153–158.
    [47] Shen-Fu Hsiao, Yor-Chin Tai and Kai-Hsiang Chang. VLSI Design of an E?cientEmbedded Zerotree Wavelet Coder with Function of Digital Watermarking[J]. IEEETransactions on Consumer Electronics, 2000, 46(3): 628–636.
    [48] YH Seo and DW Kim. Real-time Blind Watermarking Algorithm and its HardwareImplementation for Motion JPEG2000 Image Codec[C]. In Proceedings of the 1stworkshop on embedded systems for real-time multimedia, 2003: 88–93.
    [49]张舒,褚艳利. GPU高性能运算之CUDA[M].中国水利水电出版社, 2009.
    [50] Seung-Hun Yoo, Jin-Hyung Park and Chang-Sung Jeong. Accelerating Multi-scale Im-age Fusion Algorithms Using CUDA[C]. International Conference of Soft Computingand Pattern Recognition, 2009: 278–282.
    [51] S. Datla and N.S. Gidijala. Parallelizing Motion JPEG2000 with CUDA[C]. SecondInternational Conference on Computer and Electrical Engineering, 2009: 630–634.
    [52] N.P. Karunadasa and D.N. Ranasinghe. Accelerating High Performance Applicationswith CUDA and MPI[C]. International Conference on Industrial and Information Sys-tems, 2009: 331–336.
    [53]孙圣和,陆哲明,牛夏牧.数字水印技术及应用[M].科学出版社, 2004.
    [54]王丽娜,郭迟,李鹏.信息隐藏技术实验教程[M].武汉大学出版社, 2004.
    [55] A. Obukhov and A. Kharlamov. Discrete Cosine Transform for 8×8 Blocks withCUDA[R]. NVIDIA white paper, 2008.
    [56] Dwitht F. Mix and Kraig J. Olejniczak.小波基础及应用教程[M].机械工业出版社,2006.
    [57]刘九芬,黄达人,胡军全.数字水印中的正交小波基[J].电子与信息学报, 2003,25(4): 453–459.
    [58] Min-Jen Tsai, Kuang-Yao Yu and Yi-Zhang Chen. Joint Wavelet and Spatial Trans-formation for Digital Watermarking[J]. IEEE Transactions on Consumer Electronics,2000, 46: 237–242.
    [59]林福宗.多媒体技术基础[M].清华大学出版社, 2002.
    [60] Michael J. Quinn. MPI与OpenMP并行程序设计[M].清华大学出版社, 2004.
    [61] Peter Benner and Pablo Ezzatti. Using Hybrid CPU-GPU Platforms to Accelerate theComputation of the Matrix Sign Function[C]. Euro-Par 2009-Parallel Processing Work-shops, 2010: 132–139.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700