视频信息隐藏研究及其在生物认证中的应用
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着计算机网络的应用推广以及数字多媒体技术的迅速发展,视频在传输过程中遭到攻击或侵权的问题越来越严重。目前,视频信息隐藏作为信息安全的重要手段之一,已经成为信息隐藏方向研究的一个重点问题。
     本文首先简单介绍了视频信息隐藏的研究现状和发展趋势,然后简要介绍了视频信息隐藏的基础知识,包括视频信息隐藏的分类、特点和攻击类型以及本文用到的相关数学理论和方法,最后提出了两种视频信息隐藏方法。一种是基于帧间差分和离散小波变换的视频水印方法,该方法结合人类视觉系统(HVS)的特性,使用基于块的帧间差分运动分析方法对经过小波变换后的视频序列进行运动分析,将Arnold变换后的二值水印图像嵌入到得到的运动活跃区域。另外一种是在研究视频水印的基础上,提出的一种基于生物认证图像集的视频密写方法,该方法将生物认证技术与信息隐藏技术相结合,首先对视频序列和生物认证图像集进行相关性分析,降低秘密信息的能量,将得到的残差秘密图像集作为待嵌入的秘密信息;然后采用基于帧的和基于块的帧间差分方法对视频做运动情况分析;最后将秘密信息嵌入到运动比较活跃的区域。
     本文使用MATLAB作为实验平台,针对提出的视频水印和视频密写方法进行了大量实验,得到了精确的实验数据并进行了分析。实验结果表明,本文提出的两种视频信息隐藏方法都具有很好的不可见性、鲁棒性和安全性。另外,本文提出的视频密写方法充分利用了视频序列的冗余信息,实现了大容量秘密图像集的嵌入,提高了生物认证的识别率,为进一步的研究奠定了基础。
In recent years, with the wide applications of Internet and the rapid development of digital multimedia technology, the problems of suffering from attacks and the infringement of copyright in the transmission of videos are become more serious. At the moment, as one of the most powerful tools for information security, the video information hiding has been an important problem for the research of information hiding.
     In this paper, firstly we give an outline of the situation of study and the development of information hiding. Secondly, we summarize the rudimentary knowledge, including the category, characteristics of video information hiding and types of attack. And we briefly introduce the related mathematical theories and methods. At last, we propose two video information hiding schemes. One is a video watermarking approach based on temporal difference and discrete wavelet transform. It combines with human visual system(HVS) characteristics, uses block-based temporal difference to analyze the motion information of approximate bands after discrete wavelet transform decomposition of video frames and finally embeds a binary watermark scrambled by Arnold transform to obtained motion activity regions. And the other is a video steganography approach based on biometric image set on the basis of video watermarking research. This method tries to combine biometric identification technology with information hiding technology. Firstly it analyses the correlation between the biometric image set and the video sequence for reducing the power of secret images and takes the obtained residual images as secret information which will be used to embed. And then it adopts frame-based and block-based temporal difference to analyze the motion activity of video sequences. Finally we embed the secret information to motion regions which have higher activity.
     For the proposed video watermarking approach and video steganography approach, we take MATLAB as the platform to conduct many tests, gain many exact experimental results and analyze them. Extensive experimental results demonstrate that the proposed methods have good invisibility, perfect robustness, and high security. Besides, the proposed video steganography approach makes good use of the redundancy information, implements the high capacity embedding of secret image sets, improves the biometric recognition rate, and lays the foundation of further research.
引文
[1]汪小帆,戴跃伟,茅耀斌.信息隐藏技术方法与应用[M].北京:机械工业出版社,2001.
    [2]王育民,等著.《信息隐藏:理论与技术》[M].北京:清华大学出版社,2006年3月.
    [3] Van Schyndel R G, Tirkel A Z, Mee N and Osboren C F. A Digital Watermark[J]. Proceedings of IEEE International Conference on Image Processing, Austin, November 1994.
    [4] Kim K S, Lee M J, Lee H Y, Lee H K. Reversible data hiding exploiting spatial correlation between sub-sampled images[J]. Pattern Recognition, 2009, 42 (11): 3083-3096.
    [5] Hernandez J R, Amado M, and Perez-Gonzalez F. DCT-domain Watermarking Techniques for Still Images: Detector Performance Analysis and A New Structure[J]. IEEE Transactions on Image Processing, 2000, 9 (1): 55-68.
    [6]孙圣和,王秋生.基于离散余弦变换系数分解的数字水印嵌入算法[J].哈尔滨工业大学学报,2001,33(5):700-705.
    [7] Piva A, Barni M, Bartoloni E and Cappellini V. DCT-based watermark recovering without resorting to the uncorrupted original images[C]. in Proc.IEEE Int. Conf. Image Processing (ICIP), 1997, 1: 520-523.
    [8] Tsekeridou S and Pitas I. Embedding Self-similar Watermarks in the Wavelet Domain[J]. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP’00), June, 2000: 5-9.
    [9]李养胜,李俊.基于小波分解的图像数字水印算法[J].计算机技术与发展,2006,16(3):127- 128.
    [10] Ruanaidh J J K O and Pun T. Rotation. Scale and Translation Invariant Spread Spectrum Digital Image Watermarking[J]. Signal Processing, 1998, 66 (3): 303-317.
    [11] Mauro Barni, Franco Bartolini, and Alessandro Piva. Improved Wavelet-Based Watermarking Through Pixel-Wise Masking[J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10(5).
    [12] Liu Kuocheng. Wavelet-based watermarking for color images through visual masking[J].Int.J. Electron. Commun. (AEU)64, 2010: 112-124.
    [13]傅德胜,孙文静.一种基于人眼视觉特性和小波变换域的图像数字水印技术[J].计算机科学,2008,35(11):203-206.
    [14]胡影,周付根.一种基于HVS和DCT的数字水印算法[J].中国体现学与图像分析,2004年第9卷第4期:228-232.
    [15] Cetin O, Ozcerit A T. A new steganography algorithm based on color histograms for data embedding into raw video streams[J]. Computers & Security, vol. 28, 2009: 670-682.
    [16] Choi D, Do H, Choi H, Kim T. A blind MPEG-2 video watermarking robust to camcorder recording[J]. Signal Processing, 2010, 90(4): 1327-1332.
    [17] Essaouabi, Rabat M, Ibnelhaj E. A 3D wavalet-based method for digital video watermarking[J]. IEEE, 2009: 429-434.
    [18] Maher E, Amar C, Nicolas H. Video Watermarking Based on Neural Networks[J]. Proc. IEEE International Conference on Multimedia and Expo, ICME'06, 2006: 1577-1580.
    [19] Ratha N K, Connell J H, Bolle R M. Secure data hiding in wavelet compressed fingerprint images[J]. in: International Multimedia Conference, Proceedings of the 2000ACM Workshop on Multimedia, 2000: 127–130.
    [20] Jain A K, Uludag U, and Hsu R L. Hiding a face in a fingerprint image[J]. in Proceeding of the International Conference on Pattern Recognition, vol.3, 2002: 756-759.
    [21] Gunsel B, Umut U, and Tekalp A M. Robust watermarking of fingerprint images[J]. Pattern Recognition, vol. 35, 2002: 2739-2747.
    [22] Vatsa M, Singh R, Mitra P, and Noore A. Comparing robustness of watermarking algorithms on biometrics data[J]. in Proceedings of the Workshop on Biometric Challenges from Theory to Practice-ICPR Workshop, 2004: 5-8.
    [23] Vatsa M, Singh R, Noore A, and Houck M M. Robust biometric image watermarking for fingerprint and face template protection[J]. IEICE Electronics Express, 2006, 3(2): 23-28.
    [24] Vatsa M, Singh R, and Noore A. Feature based RDWT watermarking for multimodal biometric system[J]. Image and Vision Computing, vol.27, 2009: 293-304.
    [25] Noore A, Singh R, Vatsa M, and Houck M M. Enhancing security of fingerprints through contextual biometric watermarking[J]. Forensic Science International, vol.169, 2007: 188-194.
    [26] Kim W Y and Lee H K. Multimodal biometric image watermarking using two-stage integrity verifi-cation[J]. Signal Processing, vol.89, 2009: 2385-2399.
    [27] Ratha N K. Hiding Biometric Data[J]. IEEE transaction on pattern analysis and machine intelligence, 2003, 25(11): 1494-1498.
    [28] Khan M K, Zhang J S and Tian L. Chaotic secure content-based hidden transmission of biometric templates[J]. Chaos, Solitons and Fractal, vol.32,2007: 1749-1759.
    [29] Jung S, Lee D, Lee S and Paik J. Biometric Data-based Robust Watermarking Scheme of Video Streams[J]. Proceeding of the International Conference on Information, Communications & Signal Processing, 2007: 1-5.
    [30]王朔中,张新鹏,张开文.数字密写和密写分析[M].北京:清华大学出版社,2005.10-11.
    [31]孙圣和,陆哲明,牛夏牧.数字水印技术及应用[M].北京:科学技术出版社,2004.17-18、579-586.
    [32] Potdar V M, Han S, Chang E. A survey of digital image watermarking techniques[J]. Proc. IEEE, 3th International Conference on Industrial Informatics, 2005: 709-716.
    [33] Zou Xiaoxiang, Peng Cong, Li Jintao, et al. Video watermark technique[J]. Journal of Engneering Graphics. 2002, 3(3): 169-179.
    [34]张永华,冯文.视频水印的关键技术研究[J].计算机与数字工程,2009,37(2):112-116.
    [35]梁华庆,王磊,双凯,杨义先.一种在原始视频帧中嵌入的鲁棒的数字水印[J].电子与信息学报,2003(25)9:1281-1284.
    [36] Hanjalic A, Langelaar G C, Biemond J, van Roosmalen P M B, Lagendijk R L. Image and Video Database: Restoration, Watermarking and Retrieval[C]. Elsevier Science, 2000.
    [37] Hartung F and Girod B. Digital watermarking of raw and compressed video[J]. Proc. SPIE: Digital compression Technologies and systems for Video Communication, 1996, 2952: 205-213.
    [38] Wei Z Y and Ngan K N. Spatio-Temporal Just Noticeable Distortion Profile for Grey Scale Image/ Video in DCT Domain[J]. Proc. IEEE Transactions on circuits and systems for video technology, 2009, 19(3): 337-346.
    [39] Liu Y and Zhao J Y. A new video watermarking algorithm based on 1D DFT and Radon Transform [J]. Signal Processing, 2010, 90(2): 626-639.
    [40] Mallat S. A Compact Multiresolution Representation: The Wavelet Model[J]. Proc. IEEE Computer Society Workshop on Computer Vision, IEEE Computer Society Press, Washington, D.C., pp. 2-7.
    [41] [美]Rafael C Gonzalez, Richard E Woods, Steven L Eddins等著,阮秋琦等译.数字图像处理(第二版)[M].北京:电子工业出版社,2003.
    [42] [美]Rafael C Gonzalez, Richard E Woods, Steven L Eddins等著,阮秋琦等译.数字图像处理(MATLAB版)[M].北京:电子工业出版社,2008.
    [43]黄达人,刘九芬,黄继武.小波变换域图像水印嵌入对策和算法[J].软件学报,2002,13:1290- 1296.
    [44]潘蓉,高有行.基于小波变换的图像水印嵌入方法[J].中国图像图形学报,2002,7:667-671.
    [45]章毓晋.图像处理和分析[M].北京:清华大学出版社,2002.
    [46]郝文化,田蕾.MATLAB图形图像处理应用教程[M].中国水利水电出版社.
    [47] [英]Petrou,等著,赖剑煌,等译,数字图像处理疑难解析》[M].机械工业出版社,2005年.
    [48]陈武凡.小波分析及其在图像处理中的应用[M].科学出版社.
    [49] Voyatzis G and Pitas I. Chaotic mixing of digital images and applications to watermarking[J]. Proceedings of European Conference on Multimedia Applications, Services and Techniques, 2 (1996): 687- 694.
    [50] Zhang Lijing, Li Aihua. A Study on Video Watermark Based-on Discrete Wavelet Transform and Genetic Algorithm[J]. 2009 First International Workshop on Education Technology and Computer Science, 2009: 374-377.
    [51] Anderson C H, Burt P J, Van Der Wal G S. Change detection and tracking using pyramid transfor- mation techniques[J]. Proc. SPIE-Intelligent Robots and Computer Vision, vol. 579, 1985: 72-78.
    [52] Wold H. Partial least squares[J]. In S. Kotz and N. L. Johnson, editors, Encyclopedia of the statistical Sciences, Vol. 6 (1985): 581-591.
    [53] Qi M, Lu YH, Du N, Zhang YN, Wang CX and Kong J. A Novel Image Hiding Approach Based on Correlation Analysis for Secure Multimodal Biometrics[J]. Journal of Network and Computer Applications, 2010, in press.
    [54] Shi Y. Particle swarm optimization[J]. IEEE Neural Netw. Soc. Mag. (2004): 8–13.
    [55] Kennedy J, Eberhart R. Particle Swarm Optimization[J]. Proceeding of the 1995 IEEE International Conference on Neural Network ,1995: 1942-1948.
    [56] Lu Zheming, Ge Qingming, Niu Xiamu. Robust adaptive video watermarking in the spatial domain[J]. in: The 5th international symposium on test and measurement (ISTM’2003), Shenzhen, China, June 1–5, 2003: 1875–1880.
    [57] Ye D P, Zou C F, Dai Y W and Wang Z Q. A new adaptive watermarking for real-time MPEG videos[J]. Applied Mathematics and Computation, 2007, 185(2): 907-918.
    [58]陈光喜,成彦.基于HVS的自适应鲁棒性视频水印算法[J].计算机科学,2008,35(11):214-216.
    [59] Tao P N and Eskicioglu A M. A robust multiple watermarking scheme in the Discrete Wavelet Transform domain[J]. Proc. SPIE, vol. 5601, 2004: 133-144.
    [60] Bender W, Gruhl D, Morimoto N and Lu A. Techniques for data hiding[J]. IBM Systems Journal, 1996, 35(3-4): 313-336.
    [61] Vatsa M, Singh R, Noore A. Improving biometric recognition accuracy and robustness using DWT and SVM watermarking[J]. IEICE Electron. 2005, 12: 362–367.
    [62] Arandjelovic O, Shakhnarovich G, Fisher J, Cipolla R andDarrell T. Face Recognition with Image Sets Using Manifold Density Divergence[J]. Proceedings of IEEE Computer Society Conference on Com- puter Vision and Pattern Recognition, 2005, 1: 581-588.
    [63] Kim T K, Kittler J, Cipolla R. On-line Learning of Mutually Orthogonal Subspaces for Face Recog- nition by Image Sets[J]. IEEE transactions on image processing, 2009, 99: 1-8.
    [64] Li B, Zheng C H and Huang D S. Locally linear discriminant embedding: An efficient method for face recognition[J]. Pattern Recognition, 2008, 41(12): 3813-3821.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700