盲数字水印算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着数字多媒体的广泛应用和网络技术的快速发展,对数字产品版权保护的需求日益迫切。数字水印技术为数字作品的版权保护提供了一种新的途径。它通过把版权标识隐藏在数字作品中,并能够从中提取出来以证明作品的真正所有者,从而达到保护版权的目的。但是,在数字媒体传输过程中会无意或有意受到攻击,对数字水印构成了很大威胁。为了能有效地保护数字作品,对各种攻击具有较好鲁棒性的数字水印技术的研究成为商业界和学术界共同关注的热点。
     本文的工作和贡献主要体现在以下几个方面:
     首先,系统分析了基于分块奇异值分解的数字水印算法,此算法对抵抗JPEG压缩、线性及非线性滤波具有很强的鲁棒性。但缺点非常突出,主要包括高强度水印条件下出现方块效应、对噪声敏感、对剪切攻击和旋转攻击及高JPEG压缩鲁棒性差。针对这些突出问题设计了基于平稳小波的数字水印算法。算法中结合人类视觉模型推导出了含水印图像质量度量PSNR与平稳小波域中水印嵌入强度的关系式,为实现不可见性与鲁棒性的均衡和自适应地嵌入最大强度水印提供了依据。并从加强剪切、旋转攻击的鲁棒性方面考虑,对水印系统加入预处理操作。实验结果显示该算法具有优良的鲁棒性和安全性。
     其次,为提高水印纠错性能,将纠错编码与盲水印系统结合提出了基于turbo码的盲数字水印算法。算法中充分利用了平稳小波冗余特性及空间平移不变性、图像矩阵最大奇异值抗扰动特性和人类视觉特性,并在平稳小波水印系统基础上对嵌入算法作了适当改进。实验结果显示,此算法对线性或非线性滤波、JPEG高压缩率和噪声攻击具有很好的鲁棒性能。
With the rapid development of networks and the wide application of digital multimedia technology, the copyright protection of digital products becomes increasingly important. The watermarking technology provides a new approach of digital copyright protection. By hiding the copyright identification in products and watermarks can be extracted to prove the true owner of the product, which can get the purpose of protecting the copyright. However, the watermarks may be attacked accidentally or intentionally, which threaten the security of digital watermarks seriously. In order to protect the digital product effectively, the research of watermarking technology with good robustness has already been focused in both academia and business field.
     The work of this paper can be concluded in the following aspects:
     Firstly, the digital watermark algorithm based on the block singular value decomposition (SVD) is analyzed detailedly. This algorithm has robustness in JPEG compression, liner and non-liner filter attacks. However, it has the following problems such as serious blocking effect at high embedding intensity and low robustness at the noise or the JPEG high-compression condition and so on. To solve these problems, a digital watermarking algorithm based on the stationary wavelet is proposed in this thesis. Combining the Human visual characteristics (HVS), the relation between PSNR and embedding intensity in stationary wavelet transform (SWT) domain is derived. Then the equalization between invisibility and robustness and embedding watermark with the maximum intensity adaptively is achieved. And some pretreatment is integrated into the watermarking system to enhance the robustness in cropping and rotating. The simulation shows this algorithm has good performance.
     Secondly, to enhance the error correction, a new blind digital watermarking algorithm based on turbo code is proposed, which integrates the error correction coding with blind watermarking. This algorithm makes full use of the redundancy and space translation invariance of stationary wavelet, the disturbance rejection of the maximum singular value and the characteristic of human visual system. And the embedding algorithm is also improved. The simulation results prove that this watermarking system has good performance of robustness against some attacks such as liner and non-liner filter, JPEG high-compression and noise, as illustrated in this thesis.
引文
[1] R.G Van Schyndel; A.Z.Tirkel and C.F.Osborne. A Digital Watermark. International Conference On Image Processing.1994,5(2):86-89.
    [2] Bruyndoncky O; Quisquaterm JJ; Marq B. Spatial method copyright labeling of digit- al images. Proc. IEEE Workshop on Nonliear Signal Processing.1995:456-459.
    [3] V Darmstaedter; J. F. Delaigle and J. Quisquater et al. Low cost spatial watermarking. Computer & Graphics.1998, 22(4):417-424.
    [4] Ganic,E.; Dexter,S.D.; Eskicioglu,A.M. Embedding multiple watermarks in the DFT domain using low- and high-frequency bands. Proceedings of the SPIE - The International Society for Optical Engineering. 2005,1(5681):175-184.
    [5] Haiping Lu; Xuxia Shi; Shi, Y.Q.; Kot, A.C.; Lihui Chen. Watermark embedding in DC components of DCT for binary images. Proceedings of 2002 IEEE Workshop on Multimedia Signal Processing.2002:300-303.
    [6] Ching-Tang Hsieh; Min-Yen Hsieh. A High Robust Blind Watermarking Algorithm in DCT Domain. KES 2005, LNAI 3681. 2005:1205-1211.
    [7] Chang, Chin-Chen; Tsai, Piyu; Lin, Chia-Chen. SVD-based digital image watermark -ing scheme. Pattern Recognition Letters. 2005,10(26):1577-1586.
    [8] Veysel Aslantas. A singular-value decomposition-based image watermarking using genetic algorithm. AEU - International Journal of Electronics and Communications . 2008,(62):386-394.
    [9] Ho Seok Moon; Myung Ho Sohn; Dong Sik Jang. DWT-based image watermarking for copyright protection. Artificial Intelligence and Simulation.2004,(3397):490-497.
    [10] I.J.Cox; J.Kilian;F.Thomaon;Leighton. T.Shomoon. Secure spread spectrum waterm -arking for multimedia. IEEE Transaction on Image Processing. 1997, 6(12):1673- 1687.
    [11] X.Xia;C.G.Boncelet and G.R.Arce. Wavelet Transform Based Watermark for Digital Images.Optics Express.1998,3 (12):497-511.
    [12] 黄达人;刘九芬;黄继武.小波变换域图像水印嵌入对策和算法.软件学报,2002, 13(7):1290-1297.
    [13] 李华;朱光喜;朱耀庭.基于视觉特性和小波分解的数字水印隐藏方法.通信学报,2000,21(6):37-41.
    [14] 杨恒伏.小波域鲁棒自适应公开水印技术.软件学报.2003,14(9):1652-1660.
    [15] 王丽娜;郭迟;李鹏.信息隐藏技术实验教程.武汉大学出版社.2004:265-277.
    [16] Xiaohui Zhang; Weisi Lin;Ping Xue. Just-noticeable difference estimation with pixels in images. Journal of Visual Communication and Image Representation,2007, 19(1):30-41.
    [17] 孙圣和,陆哲明,数字水印处理技术.电子学报.2000,28(8):85-90.
    [18] Voyatzis Cz and Pitas. The use of watermarks in the protection of digital multimedia products. Proc.IEEE,1999,87(7):1197-1207.
    [19] 陈明奇,钮心忻,杨义先.数字水印的研究进展和应用.通信学报.2001, 22(5):71-79
    [20] I.J.Cox,J.P. Linnartz. Some General Methods for Tampering with Watermarks. IEEE Journal on Selected Areas Communication (Special Issue on Copyright and Privacy Protection). 1998,16(5):587-593.
    [21] 刘瑞祯;谭铁牛.数字图像水印研究综述.通信学报.2000,21(8):39-48.
    [22] C. F. Wu,W S. Hsieh. Digital Watermarking Using Zerotree of DCT. IEEE Trans. On Consumer Electronics, 2000,46(l):87-94.
    [23] T.YChung; M. S. Hong; Y. N. Oh; D. H. Shin; S. H. Park. Digital Watermarking for Copyright Protection of MPEG2 Compressed Video.IEEE Trans. on Consumer Electronics,1998,44(3):895-901.
    [24] Craver S.; Yeo B.L. and Yeung M. Technical trials and legal tribulations. Commun ACM.1998, 16(4):587-593.
    [25] 李春茹;王保保.数字水印稳健性攻击及相应策略.计算机仿真.2005,22(4):82-85
    [26] 王志雄;王慧琴;李人厚.数字水印应用中的攻击和对策综述.通信学报.2002, 23(11):75-79.
    [27] 陈明奇;钮心忻;杨义先.数字水印的攻击方法.电子与信息学报.2001,23(7):705-711.
    [28] Cravers; Menmonn; Yeobl. Resolving Rightful Ownerships with Invisible Watermar -king Techniques: Limitations, Attacks, and Implications. IEEE Journal on Selected Areas in Communications. 1998,16(4):573-586.
    [29] 王丽娜;郭迟.信息隐藏技术实验教程.武汉大学出版社.2004.10:278-286.
    [30] 章毓晋.图像工程-图像处理.清华大学出版社.2006:347-355.
    [31] 刘瑞祯;谭铁牛.基于奇异值分解的数字图像水印方法.电子学报.2001,29(2): 168-171.
    [32] 杨明;刘先忠.矩阵论.华中科技大学出版社.2005:81-89.
    [33] 张小梅.基于奇异值分解和扩频技术的数字水印算法研究.武汉理工大学. 硕士论文.2005
    [34] Wenbin Luo; Heileman, G.L.; Pizano, C.E. JPEG domain watermarking. Proceedings of the SPIE-The International Society for Optical Engineering. 2002,(4684):980-985.
    [35] Li, Xudong. Blocked DCT and quantization based blind image watermark algorithm. jisuanji Gongcheng/Computer Engineering. 2006, 21(32):139-144.
    [36] Yoon-Hee, Choi. Block-based watermarking in the DCT domain. 2004 IEEE Internat -ional Symposium on Consumer Electronics .2004:7-10.
    [37] Mohammad Eyadat, Shantaram Vasikarla. Performance evaluation of an incorporated DCT block-based watermarking algorithm with human visual system model. Pattern Recognition Letters, 2005,(26):1405-1411.
    [38] Daubechies I. The wavelet transform, time-frequency localization and signal analysis. IEEE Transactionson Information Theory. 1990,5(36): 961-1005.
    [39] M Lang; H Guo; J E Odegend, et al. Nonlinear processing of a shift-invariant DWT for noise reduction. In SPIE Conference on wavelet applications.1995,(2491): 640-51
    [40] X.H.Wang; Robert S.H. Istepanian.Microarray Image Enhancement by Denoising Using Stationary Wavelet Transform. IEEE Transaction on NANOBIOSCIENCE. 2003,4(2):184-189.
    [41] Cao, J.; Younan, N.H. An adaptive image watermarking technique based on RDWT.Proceedings of the International Conference on Imaging Science, Systems and Tech- nology. 2000, (2):431-436.
    [42] Thai Duy Hien; Zensho Nakao;Yen Wei Chen.RDWT/ICA for Image Authentica- tion. 2005 IEEE International Symposium on Signal Processing and Information Technology. 2005:805-810.
    [43] 杨福生.小波变换的工程分析与应用.科学出版社.1999:115-118.
    [44] Thai Duy Hien; Zensho Nakao; Yen-Wei Chen.Robust multi-logo watermarking by RDWT and ICA. Signal Processing. 2006,10(86):2981-2993.
    [45] C.Shi and B. Bhargava. Light – Weight MPEG Video Encryption Algorithm. In Proc. of the Int’l Conf. on Multimedia’98, 1998:55-61.
    [46] 王丽娜;郭迟;李鹏.信息隐藏技术实验教程.武汉大学出版社.2004.10:42-52.
    [47] 凌聪;孙松庚.混沌扩频码序列产生器.电子科学学刊.1998,20(2): 235-240
    [48] 齐东旭.矩阵变换及其在图像信息隐藏中的应用研究.北方工业大学学报. 1999,11(1):24-28.
    [49] 丁玮;闫伟齐;齐东旭.基于置乱与融合的数字图象隐藏技术及应用.中国图像图形学报.2000,5(8):644-648.
    [50] 黎罗罗.Arnold置乱变换周期分析.中山大学学报.2005,44(2):1-4.
    [51] 林元烈;梁宗霞.随机数学引论.清华大学出版社.2003:190-192.
    [52] TSAI M J;YU K Y;CHEN Y Z. Joint wavelet and spatial transformation for digital watermarking. IEEE Trans on Consumer Electronics,2000,46(1):241-245.
    [53] Levicky, D; Foris, P. Human visual system models in digital image watermarking. Radio engineering.2004,2(13):38-43.
    [54] 章毓晋.图像工程-图像处理.清华大学出版社.2006:342-344.
    [55] C. E. SHANNON. A Mathematical Theory of Communication. The Bell System Technical Journal.1948,(27):379-423,623-656
    [56] Berrou C; Giaienux A; Thitimajshima P. Near Shannon Limit Error-Correcting Coding and Decoding Turbo-codes. Proc IEEE ICC. 1993,7(38):600-604.
    [57] 邹复好.鲁棒视频水印算法及相关技术研究.华中科技大学博士学位论文.2006
     [58] Qing Yang; Kefei Chen. Digital Image Authentication Based on Turbo Codes. MIPS 2004:276–285.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700