抗几何攻击的数字图像水印研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着Internet技术和计算机技术的应用和迅猛发展,人们在日常生活和工作中越来越离不开数字技术和网络技术。数字化和网络化在给人们带来便捷和高效的同时,也引发了一些新的问题等待科学工作者去研究和解决。其中数字版权保护问题就是由此引发而来的一个棘手和富有挑战性的课题。数字版权保护除了使用常规的密码技术做加密处理之外,在很多领域和场合更需要一种称为数字水印的技术来发挥更广泛和有效的作用。而大多数数字水印算法在抗几何攻击方面都不具备鲁棒性,本文工作基于此而展开。
     本文主要介绍了数字图像水印技术的起源、发展历史、现状、常用的模型、分类方法、衡量标准。实现了一个结合SVD和DCT的能有效抵抗几何攻击(剪切、旋转、镜像、缩放、压缩等)的数字图像水印算法。
     本文重点研究基于变换域的抗几何攻击的数字图像水印算法,主要的工作有:
     (1)研究了离散余弦变换域内的常用水印嵌入算法,通过对其进行常见的几何变换攻击测试,找到了DCT域内的数字图像水印算法抗几何攻击鲁棒性差的根本原因是水印信息同步性差。在此基础上,研究了一种DCT域的第二代水印算法,该算法采用特征块来嵌入水印信息,较好的解决了水印信息同步的问题。在大量实验的基础上,对该特征块选择算法进行了改进;实验表明,改进后的算法提取到的特征块更利于嵌入水印信息。
     (2)重点研究了奇异值分解方法在抗几何攻击方面的特性和应用。通过实验,验证了基于块嵌入的SVD域内水印算法能有效的抵抗常见的几何攻击手段,并指出了其在抵抗滤波攻击等方面存在的不足。然后在此基础上设计并实现了一种结合DCT和SVD的数字图像水印算法,该算法结合了DCT的不可见性和SVD的抗扰动性。经过测试,该算法能有效的抵抗常见的几何攻击,并且具有较高的水印嵌入容量。
     (3)为了增强在抗几何攻击方面的精确性,研究了基于几何矩的图像几何变换特征参数提取算法。该算法计算量小,精度比较高,可以用于水印检测算法中对待检测图像的预处理。实验表明,经过有效的预处理,能提高水印检测的精度。
With the development and application of Internet and computer technology, digital media and network communication have become to a basic facility in our daily life and work. These technologies make our life more convenience and efficiency. But these technologies also bring some new problem in another side, such as digital copyright protection. Digital copyright protection is a challenging task, because the cryptology technology can only do protect the digital media on transform. The digital watermarking technology can protect the media even if the media has been decrypted. Almost of the watermarking method do not have robustness on geometric-attack, this thesis do some research work on resistant geometric-attack watermarking.
     An introduction of the digital watermarking’s origins, development history, current research status, communication models, classical algorithms, classification, and benchmark have been given. A new watermarking algorithm based on DCT and SVD have been designed and implemented, this algorithm has geometric-attack resistant and invisible-watermark advantages.
     This thesis focus on the anti-geometric-attack watermarking in transform domain, the main research works are below:
     (1) A research on the DCT domain watermarking algorithm. Most DCT domain watermarking algorithm can not have robustness on geometric-attack, and the root cause is: after some geometric-transform, the watermark synchronization is not work. A analysis of the second generation watermarking algorithm on DCT domain have been done, which uses the character block to embed the watermark information. At last an improvement of the block selection algorithm has been done, to make the insert-method more efficiently.
     (2) A research on the SVD transform domain watermarking, which has strong robustness on geometric-attack. Some experiments and verifications show this feather. A block-based watermarking system with the combination of SVD and DCT has been done. This system can combine the non-visibility of DCT and the anti-disturbance of SVD.
     (3) An enhancement of the accuracy of anti-geometric-attacks. The correction method of geometric-transform parameters was introduced. The method is based on the 0 and 1 level geometry moment, and can compute quickly and correctly.
引文
[1] Ingemar Cox, Matthew Miller, Jeffrey Bloom. Digital watermarking. Beijing:Publishing House of Electronics Industry, 2003, 5-6
    [2] A.Z.Tirkel, G.A.Rankin, R.M.van Schyndel et al. Electronic watermark. 1993 Digital Image Computing, Technology and Applications(DICTA’1993). Macquarie University:Sidney, 1993, 666-672
    [3] R.G.van Schyndel, A.Z.Tirkel, C.F.Osborne. A digital watermark. International Conference on Image Processing, Vol.2:86-90
    [4] Daniel Cotting, Tim Weyrich. Robust Watermarking of Point-Sampled Geometry. Proceedings of the Shape Modeling International IEEE, 2004, vol.8(4):1-11
    [5] Chih Wei Tang, Hsueh Ming Hang. Feature-Based Robust Digital Image Watermarking Scheme. IEEE Transactions on Signal Processing, 2003, vol.51(4):950-959
    [6] Zhang Li, Sam Kwong,Gang Wei. Geometric Moment In Image Watermarking. Circuits and Systems, 2003( ISCAS '03), vol.24:932-935
    [7] Tung Lam Le, Thi Hoang Lan Nguyen. Digital Image Watermarking With Geometric Distortion Corrections Using the Moment Image Theory. IEEE Transactions on Image Processing, 2004, vol.2:51-56
    [8] J.Abbate. Inventing the Web. Proceedings of the IEEE, 1999, vol.87(11)
    [9] E.F.Hembrooke. Identification of Sound and Like Signals. United States Patent. 3004104, 1961
    [10] Oliver Benedens. Geometry-based Watermarking of 3D Models. IEEE Computer Graphics and Applications, 1999, vol.19:46-55
    [11] Min Wu, Edward Tang, Bede Liu. Data Hiding in Digital Binary Images. IEEE International Conference on Multimedia and Expo, 2000, vol.1:393-396
    [12] Jack Brassil, Steven Low, Nicholas Maxemchuk et al. Electronic Marking and Identification Techniques on Discourage Document Copying. Proceedings of IEEE Inforcom’s94, 1994, vol.3:1278-1287
    [13] Jack Brassil, Steven Low, Nicholas Maxemchuk et al. Electronic Marking and Identification Techniques on Discourage Document Copying. IEEE Journal of Selected Areas in Communication, 1995,13:1495-1504
    [14] V.Solachidis, N.Nikolaidis, I.Pitas. Watermarking Polygonal Lines Using Fourier Descriptors. IEEE International Conference on Image Processing, 2000, 4:1955-1958
    [15] J.Stern, G.Hachez, F.Koeune et al. Robust Object Watermarking: Applicationto Code. Proceedings of Info Hiding’99, 1999, vol. 1768 of Lecture Notes in Computer Science:368-378
    [16] J.Lach, W.Smith, M.Potknojak. Fingerprinting Digital Circuits on Programmable Hardware. Proceeding of the Second International Information Hiding Workshop, 1998:16-31s
    [17] Eero Semoncelli. Statistical Models for Image: Compression, Restoration, and Synthesis. Thirty-Fiest Asilomar Conference on Signals, Systems, and Computers, 1997,:673-678
    [18] Martin Wainwright, Eero Semoncelli. Scale Mixtures of Gaussians and the Statistics of Natural Images. Advances in Neural Information Processing Systems, 2000, 12:855-861
    [19] Mauro Barni, Franco Bartolini, Alessia De Rosa et al. A New Decoder for the Optimum Recovery of Nonadditive Watermarks. IEEE Transactions on Image Processing, 2001, 10(5):755-766
    [20] Haiping Lu, Xuxia Shi, Alex Kot et al. Watermark Embedding in DC Components of DCT for Binary Image. International Workshop on Multimedia Signal Processing(MMSP’02), 2002, 9-11:300-303
    [21] Ingemar Cox, Joe Kilian, Thomson Leighton et al. Secure Spread Spectrum Watermarking for Multimedia. IEEE Transaction on Image Processing, 1997, 6(12):1673-1687
    [22]孙圣和,陆哲明,牛夏牧.数字水印技术及应用.北京:科学出版社,2004:57-60
    [23]王贤敏.机密空间信息隐藏与遥感影像授权使用: [博士学位论文].武汉:武汉大学,2005
    [24] W.N.Cheung. Digital Image Watermarking in Spatial and Transform Domains. Pcoceedings of TENCON’2000, 2000, 3:374-378
    [25]刘艳,李宏东.DCT域图象处理和特征提取技术.中国图象图形学报,2003, 8(A).
    [26]鲁业频,李凤亭,陈兆龙,朱仁义.离散余弦变换编码的现状与发展研究.通信学报,2004,25(2):110-118
    [27]易开祥,石教英,孙鑫.数字水印技术研究进展.中国图象图形学报. 2001, 6(2): 111-118.
    [28]施健.基于DCT域的数字图象水印研究:[吉林大学硕士学位论文].吉林:吉林大学,2004s
    [29]张春田,张静.基于混沌映射的鲁棒性图像水印算法.电子学报,2002,30(1):69- 72
    [30]易开祥.数字图像加密与数字水印技术研究[浙江大学博士学位论文].浙江:浙江大学,2001
    [31]陈武凡.小波分析及其在图像处理中的应用.北京:科学出版社,2002:10-40
    [32]崔锦泰著,程正兴译.小波分析导论.西安:西安电子科技大学出版社,1996
    [33] Upin Wang, Meijuan Chen, Poyuen Cheng. Robust Image Watermark with Wavelet Transform and Spread Spectrum Techniques. Conference Record of the Thirty-Fourth Asilomar Conference on Signals, Systems and Computers, 2000, 2:1846-1850
    [34] Monson Hayes. The Reconstruction of a Multidimensional Sequence from the Phrase or Magnitude of the FFT. IEEE Transaction on Acoustics, Speech and Signal Processing, 1992, 4:140-154
    [35] J.J.K.Ruanaidh, W.J.Dowling, F.M.Boland. Phrase Watermarking of Digital Images. Proceedings of the 1996 International Conference on Image Processing(ICIP’96), 1996, 3:239-242
    [36]段凤增.信号检测理论.哈尔滨:哈尔滨工业大学出版社, 2002
    [37] V.Fotopoulos, A.N.Skodras. Improved Watermark Detection based on Similarity Diagrams. Signal Processing: Image Communication, 2002, 17:337-345
    [38] Mauro Barni, Franco Bartolini, V.Cappellini et al. A DCT-domain System for Robust Image Watermarking. Signal Processing, 1998, 66:357-372
    [39] R.Chandramouli, Nasir Memon. On Sequential Watermark Detection. IEEE Transaction on Signal Processing, 2003, 51(4):1034-1044
    [40] S.H.Kwok, C.C.Yang, K.Y.Tam. Watermark design pattern for intellectual property protection in electronic commerce application. Proceedings of HAWAII International Conference on System and SCI, 2000, 4:151-156
    [41] Chenghao Li, Shuenn-Shyang Wang. Digital watermarking using fractal image coding. MICE Transactions on Fundamental of Electronics, 2000, (6):1286-1288
    [42] Yiwei Wang, John Doherty, Robert van Dyck. A Wavelet-based Watermarking Algorithm for Ownership Verification of Digital Images. IEEE Transactions on Image Processing, 2002, 11(2):77-78
    [43] Xiamu Niu, Shenghe Sun. Multiresolution digital watermarking for still image. Proceedings of Neural Networks Signal Process, 2000, 2:547-555
    [44] Hiroyuku Kii, Junji Onishi, Shinji Ozawa. The Digital Watermarking Method by Using both Patchwork and DCT. IEEE International Conference on Multimedia Computing and Systems, 1999, 1(6):07-11
    [45]李华,朱光喜,朱耀庭.基于视觉特性和小波分解的数字水印隐藏方法.通信学报, 2000, 21(6):36-41.
    [46] Mohammad Eyadat, Shantaram Vasikarla. Performance evaluation of an incorporated DCT block-based watermarking algorithm with human visual system mode. Pattern Recognition Letters, 2005, 26:1405-1411
    [47]欧珊珊,张珩.基于混沌特性和视觉模型的小波数字水印算法研究.中国图像图形学报, 2004, 9(3):345-351
    [48] Guangsheng Xia, Yunbo Feng, Mingqi Chen, et al. Image Hiding by Interpolation. Chinese Journal of Electronics, 2000, 9(10):475-478
    [49] Hsien-Chu Wu, Chin-Chen Chang. A novel digital image watermarking scheme based on the vector quantization technique. Computer and Security, 2005, 24:460-471
    [50] Martin Kutter, F.Peticolas. A Fair Benchmark for Image Watermarking System. Electronic Imaging’99, Security and Watermarking of Multimedia Contents, 1999:219-239
    [51] D.Kilburn. Dirty Linen, Dark Secrets. Adweek, 1997, vol.38(40):35-40
    [52] R.S.Broughton, W.C.Laumeister. Interactive Video Method and Apparatus. United States Patent, 4807031, 1989
    [53]钱莉、刘文予、张帆.一种基于DCT域特征块的抗几何攻击的视频水印.中国图像图形学报,vol12, No.5,2007年5月
    [54]李艳,李宏东. DCT域图像处理与特征提取技术.中国图像图形学报,2003, 8(2):121-128
    [55]雷荣,陶青川,蒲亦非等.一种基于分块DCT的数字图像水印算法.信息与电子工程, 2003, 1(1):20-25
    [56]张小梅.基于奇异值分解和扩频技术的数字水印算法研究, [武汉理工大学硕士学位论文].武汉:武汉理工大学, 2005
    [57] Zude Zhou, Bing Tang, Xinhua Liu. A Block-SVD based Image Watermarking Method. Proceedings of the 6th World Congress on Intelligent Control and Automation, 2006:10347-10351
    [58]刘俊景,蒋华,梁桂英.一种基于三重SVD分解的数字图像水印算法.第七届信息隐藏暨多媒体安全学术大会年会论文集, 2007:165-168
    [59]周波,陈健.基于奇异值分解的抗几何失真的数字水印算法.中国图像图形学报, 2004, 9(4):507-509
    [60]康显桂,黄继武.抗仿射变换的扩频图像水印算法.电子学报, 2004, 32(1):7-12
    [61] Zhang Li, Sam Kwong, Gang Wei. Geometric moment in image watermarking. Proceedings of th 2003 International Symposium on Circuits and Systems, 2003, 2:25-28
    [62] Latha Parameswaran, K. Anbumani. A robust image watermarking scheme using image moment normalization.
    [63]刘海慧.抗几何攻击的鲁棒数字水印研究, [南京理工大学硕士论文].南京:南京理工大学,2007年

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700