基于结构相似度和Contourlet的数字水印算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
信息技术与因特网的迅猛发展为多媒体信息的存取和交换提供了极大的便利,但同时数字化技术精确、廉价、大规模的复制功能和因特网在全球传播的巨大能力,为版权保护带来了极大的冲击。使数字产品很容易被篡改、非法传播、蓄意攻击。如何对版权进行保护已经引起了人们的极大关注。数字水印技术是进行版权保护的一种重要手段,成为信息安全领域的一个研究热点。
     本文主要研究了基于结构相似度的图像认证水印算法与基于Contourlet的数字水印算法。其中包括水印嵌入算法,水印的提取算法,以及水印的不可见性,和对含水印的图像做出的各种攻击,包括加噪声,剪切,从而对水印图像做出评价。
     1.HVS的主要功能是从视野中提取结构信息,结构相似性可以从高层次上模拟HVS的整体功能。本文利用对结构信息的度量可以作为图像感知的近似这一理论,结合人类视觉系统特点,提出了基于结构相似度的图像认证水印算法。该算法通过标出在原始图像中可修改的位置,对这些特定的位置加入水印。通过实验,验证了该算法更符合人类的视觉效果,水印信息不容易被察觉到。
     2.通过考虑到小波重要树的构成,利用Contourlet变换,根据Contourlet系数之间的父子关系,构造出Contourlet重要子树,将水印信息嵌入到Contourlet重要子树中。该算法通过设置阈值来选择重要系数。通过实验,验证了该算法的可行性。
With the rapid development of information technology and internet, they provided immense facilitating to multimedia information access and exchange, but the digital technology has some features, such as accurate, low-priced, it is possible for the large-scale duplication at the same. It had a negative impact on copyright protection, because Digital products can easily be tampered with, illegal dissemination and deliberate attacks. How to protect copyright has attracted people's great concern. The digital watermarking technique has been regarded as a promising way to protect the copyright of digital products. It becomes a hot spot in a research field of the information security.
     This paper proposes the digital watermarking algorithm based on SSIM and based Contourlet. They included the watermarking embedding and extraction algorithms, as well as the watermark invisibility and make a variety of attacks for the image after embedding watermarking, such as additive noise, filtering, shear and so on, thus give a result of the evaluation.
     The main function of HVS is highly adapted for extracting structural information from a scene; the structural similarity simulates the overall function of HVS from a high level, therefore this paper use that a measure of structural similarity can provide a good approximation to perceived image quality.According to this theory, and combined with human visual system features, in this paper, we proposed the digital watermarking algorithm for image authentication,which based on SSIM, this algorithm can embed watermarking in some particular locations by marked some palaces which can be changed in the original image. Experimental demonstrate the effectiveness of the proposed method.
     Trough considering the important wavelet tree structure, we use the Contourlet transform, and according to parent–child relationship in Contourlet coefficients, the important sub-tree based on controulet , which is formed .Embedding watermarking in the important sub-tree. This algorithm choose important coefficient through setting up threshold value. Experiment shows this algorithm of the feasibility.
引文
[1] Low, S., Maxemchuk, N. Lapone, A. Document identification for copyright protection using centroid detection [J]. IEEE Trans. on Communications, 1998, 46(3): 372-383.
    [2]候振华,陈生潭.脆弱性数字水印研究.计算机应用,2003,23(S2):106一108.
    [3]杨忠,李万社,刘掩等.数字水印技术综述.安康师专学报,2004,16(6):80一84.
    [4]王丽娜,郭迟,李鹏.信息隐藏技术试验教程[M].武汉大学出版社,2004,210.
    [5]夏宇.基于混沌的数字水印算法研究:[D].哈尔滨:哈尔滨工程大学,2007,l一5
    [6] J.P.M GLinnartz and M .va nD ijk.A nalysiso fth es en-sitivity attack against electronic watermarks in images. In Information伍ecture Notes in Com-puter Science) vol. 1525 Germany: Sp ringer-Verlag, 19 98: pp .25 8-272 Hiding: 2nd Int. Workshop.,D. Aucsmith, Ed. Berlin.
    [7]葛秀慧,田浩,郭立甫,韩缇文.信息隐藏原理及应用[M].2008, 17.
    [8] L.J.Cox, J.Kilian, F.Thomaon Leighton, T.Shomoon.Secure spread spectrum watermarking for Multimedia.IEEE Transaction on Image Processing.Vol.6, No.12:1673-1687.
    [9] L.J.Cox, J.Kilian, F.Thomaon Leighton, T.Shomoon.Secure Spread Spectrum Watermarking for Multimedia.NEC Research Institute Technical Report.1996:95-100.
    [10] L.J.Cox, J.Kilian, F.Thomaon Leighton, T.Shomoon.A Secure Robust Watermarking for Multimedia.Info Hiding.1996(2):185-206.
    [11] E.Koch and J.Zhao. Toward robust and hidden image copyright labeling. Nonlinear Signal Processing Workshop.Thessaloniki, Greece.1995:111-115.
    [12] Inoue H, Miyazaki A, Katsa T. Wavelet-based watermarking for tamper proofing of still images[C]. Proc. of the IEEE Int Conf on Image Processing, 2000, 2:88-91.
    [13]张帆.数字图像水印容量研究[D].北京:北京工业大学,2005
    [14]李健.抗几何攻击的数字图像水印技术的研究[D].南京:南京理工大学,2009
    [15]王颖,黄志蓓等译,Ingemar J.Cox,Matthew L.Miller and Jeffrey A.Bloom著,数字水印,电子工业出版社,2003年7月.
    [16]杨义先.数字水印基础教程[M].北京:人们邮电出版社.
    [17] J.Brassil, S.Low, N.Maxemchuk, and L.O’Gorman,”Electronic marking and identification techniques to discourage document copying”In proc.Inforcom’94, 1994, P.1278-1287
    [18] J.O Ruanaidh and T.Pun.Rotation scale and translation invariant spread spectrum digital image watermarking.Signal Processing, 1998, 66(3), P.303-317.
    [19] Ahmidi, N., Safabakhsh, R. A novel DCT based approach for secure color image watermarking[C]. Information Technology: Coding and Computing, 2004. Proceedings.ITCC 2004. International Conference on 2004 4: 709- 713.
    [20] Cox, I. J. Kilian, J. Leighton, F. T. Shamoon, Secure Spread Spectrum Watermarking for Multimedia [J]. IEEE Trans on Image Processing, 1997, 6(12) :1673-1687.
    [21] Jiwu Huang, Shi Y.Q, Yi Shi. Embedding image watermarks in dc components [C]. Circuits and Systems for Video Technology, IEEE Transactions on 2009, 10(6): 974-979.
    [22] Chu W.C.DCT-based image watermarking using subsampling[C]. Multimedia, IEEE Transactions 2003 March. 2003 5: 34- 38.
    [23] Suhail, M.A., Obaidat, M.S. Digital watermarking-based DCT and JPEG model[C]. Instrumentation and Measurement, IEEE Transactions on 2003 10: 1640-1647.
    [24] Wen-Nung Lie, Guo-Shiang Lin, Chih-Liang Wu, Ta-Chun Wang. Robust image watermarking on the DCT domain[C]. Circuits and Systems, 2000. Proceedings. ISCAS 2000 Geneva. The 2000 IEEE International Symposium on 2000: 228-231.
    [25] Chuan-Fu Wu, Wen-Shyong Hsieh. Digital watermarking using zerotree of DCT [J]. Consumer Electronics, IEEE Transactions on. 2000 46: 87-94.
    [26] Ahmidi, N., Safabakhsh, R. A novel DCT-based approach for secure color image watermarking[C]. Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. International Conference on 2004 4: 709- 713.
    [27] Quan Yuan, Hongxun Yao, Wen Gao, Sanghyun Joo. Blind watermarking method based on DWT middle frequency pair[C]. Multimedia and Expo, 2002. ICME '02. Proceedings. 2002 IEEE International Conference on 2002: 473- 476.
    [28]郭磊,郭宝龙,陈龙谭,陈生谭.基于小波零树结构的图像水印算法[J].西安电子科技大学学报(自然科学版)2003,30(5):677-681.
    [29] Wei Lu, Wei Sun, Hong tao Lu. Robust watermarking based on DWT and nonnegative matrix factorization. Computers and Electrical Engineering, 2009, 35:183-188.
    [30] Wei-Hung Lin,Yuh-Rau Wang, Shi-jinn Horng, Tzong-Wann Kao, Yi Pan. A blind watermarking method using maximum wavelet coefficient quantization.Expert Systems with Applications, 2009, 36:11509-11516.
    [31] D Kundur, D Hatzinakos. Towards a telltale watermark techniques for tamper-proofing[C]. Proc. of the IEEE Int Conf on Image Processing, Chicago, Illinois, 1982,2:427-431.
    [32] Inoue H, Miyazaki A, Katsa T. Wavelet-based watermarking for tamper proofing of still images[C]. Proc. of the IEEE Int Conf on Image Processing, 2000, 2:88-91.
    [33] Quan Yuan, Hongxun Yao, Wen Gao, Sanghyun Joo. Blind watermarking method based on DWT middle frequency pair[C]. Multimedia and Expo, 2002. ICME '02. Proceedings. 2002 IEEE International Conference on 2002: 473- 476.
    [34] Guzman, V.V.F. Miyatake, M.N. Meana, H.M.H. Analysis of a wavelet-based watermarking algorithm[C]. Electronics, Communications and Computers, 2004. CONIELECOMP 2004. 14th International Conference on 2004: 283- 287.
    [35] Ng, T.M. Garg, H.K. Maximum-likelihood detection in DWT domain image watermarking using Laplacian modeling [J]. Signal Processing Letters, 2004,12: 285- 288.
    [36]丁艺芳.基于小波变换和视觉系统的图像质量综合评价新算法[D]:[博士学位论文].上海:上海大学,2001.
    [37]汪孔桥, Jan A.Kongas.数字图像的质量评价[J].测控技术,2000,19(5):14~16.
    [38]张毓晋.图像工程[M].北京:清华大学出版社.
    [39]王湘晖,曾明.基于视觉感知的图像增强质量客观评价算法[J].光电子.激光,2008,19(2):254~262.
    [40]佟雨兵,张其善,常青,祁云平.基于NN与SVM的图像质量评价模型[J].北京航空航天大学学报,2006,32(9):1031~1034.
    [41]路文,高新波,王体胜.一种基于WBCT的自然图像质量评价方法[J].电子学报,2008,36(2):303~308.
    [42]王正友,黄隆华.基于对比敏感度的图像质量评价方法[J].计算机应用,2006,26(8).
    [43] J Fridrich. Applications of data hiding in digital images[C]. Tutorial for the ISSPA’99, Brosbane, Australia, 1999.
    [44] Liu Zhen hua and Yin ping. Information hiding technology and application. [M]. Beijing: Science Press, 2002.
    [45] Chih-Hsuan, Tzeng. A New Approach to Authentication of Binary Images for MultimediaCommunication with Distortion Reduction and Security Enhancement J. IEEE Communications letters, 2003, 7(9).
    [46]黄良永基于数字水印的图像认证技术研究[D].湖南:湖南大学.2008年12月.
    [47]刘培培.图像脆弱数字水印和数字隐写的几个关键技术研究[D].成都:西南交通大学.2008年9月.
    [48] YE Sheng Nan, SU Kai Na, XIAO Chuang bai and DUAN Juan. "Image Quality Assessment Based on Structural Information Extraction," ACTA ELECTRONICA SINICA, vol. 36, May.2008.
    [49] Zhou Wang, A C Bovik. A universal image quality index J. IEEE Signal Processing Letters, 2002, 9(3):81 - 84.
    [50] Zhou Wang, A C Bovik, H R Sheikh, E P Simoncelli. Image quality assessment from error visibility to structural similarity J. IEEE Transactions on Image processing, 2004, 13 (4).
    [51] Zhou Wang, A C Bovik. Why is image quality assessment so difficult? IEEE International Conference on Acoustics, Speech, & Signal Processing, May 2002.
    [52]杨威,赵剡,许东.基于人眼视觉的结构相似度图像质量评判方法[J].北京航空航天大学学报,2008,34(1):1~4.
    [53] Huiyan Qi, Dong Zheng, Jiying Zhao. Human visual system based adaptive digital image watermarking. Signal Processing 2008,88 174–188.
    [54]郭磊,郭宝龙.基于小波零树结构的图像水印算法[J].
    [55] Do M N, Vetterli M. The Contourlet transform: an efficient directional multiresolution image representation with bandlets, IEEE transactions on Image processing,2005,14(4):423-438.
    [56] in wei,Pan Ying-jun,Wei Biao,Feng Peng.An Image coding Algorithm Based on Contourlet ListlessZerotree coding, Joumal Of Electronics&Information Technoly,2006.28(11):2116-2120
    [57] Lou ou-jun,Wang xiang hai,Wang zheng xuan.Adaptive Image Watermarking Algorithm Based on the Characteristics of Important Coefficients on Contourlet Domain,Computer Science.2009,36(3):237-240.
    [58] Wang jianping, Lv shuwang.Image Watermarking Algorithm Based on Singular value Decomposition and Contourlet Transform. CHINESE JOURYAL OF SENSORS AND ACTUATORS.2009, 22(6).
    [59] Jian Hui, Zhang Han ling.A Watermarking Scheme for Medical Images Based on the Quadtree Structures.Journal of Computer Research and Development.2009.
    [60] Duncan D.-Y. Po and Minh N. Do.Directional Multiscale Modeling of Images Using the Contourlet Transform. IEEE TRANSACTIONS ON IMAGE PROCESSING.2006, 15(6).
    [61] Duncan D.:K Po and Minh N. Do. Directional multiscale modelings of images using the Contourlet transform. IEEE Transactions on Image Processing.2005,15(6).
    [62] Burt P.j., E.H.Adelson,”The Laplacian pyramid as a compact image code”,IEEE Trans.Commun.,vol.COM-31,no.4,Apr.1983,pp.532-540
    [63] Do M.N.Vetterli M.,”Contourlets”, Academic Press, 2002.
    [64] Do M.N.,”Directional multiresolution image representations”,Ph.D.dissertation,School Comput.Commun.Sci.,Swiss Fed.Inst.Technol.,Lausanne,Switzerland,2001.
    [65] Vetterli M.,”Multidimensional subband coding:Some theory and algorithms”,Signal Process.
    [66]李海峰,宋巍巍,王树勋.基于Contourlet变换的稳健性图像水印算法[J]通信学报.2006, 27(4):87-94.
    [67]吴一全,郭建军。基于Contourlet变换的自适应门限分形零树混合图像。光电子.激光。2008,19(12):1694-1697.
    [68]丁玮,闫伟齐,齐东旭.基于Arnold变换的数字图像置乱技术[J].计算机辅助设计与图形学学报.2001,13(4):338-341.
    [69]段贵多.针对版权保护和内容认证的图像数字水印研究[D].成都:电子科技大学.2009年6月.
    [70] M.Bami,F.Bartolini,A.Piva.Improved wavelet based watermarking through pixe—wise masking.IEEE Trans.Image Proc.,2001,l O(5):783-791.
    [71]孟晓锋.小波与Contourlet变换域数字图像水印技术研究[D].成都:西南交通大学.2008年3月.
    [72]周兵. Contourlet域数字图像水印算法研究[D].湖北:武汉科技大学.2009年4月.
    [73] Haohao Song, SongyuYu, Xiaokang Yang, Li Song, Chen Wang. Contourlet-based image adaptive watermarking. Signal Processing: Image Communication 23 (2008) 162–178.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700