印章域数字水印防伪系统研究与改进
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
印章域数字水印防伪系统是基于PKI/CA平台,结合印章域数字水印技术搭建的。它可实现电子文档和物理文档的双重防伪作用,将数字水印技术和PKI的应用领域从数字域拓展到了模拟域。因此,印章域数字水印防伪系统的研究很有实用意义。同时,该系统的便携化将让它更有市场实用价值。
     针对该印章域数字水印防伪系统,本文重点研究了系统中存在的问题,并提出解决思路,设计了解决算法,完善了系统功能。同时,为了系统市场应用的推广,提出了一个水印检测部分便携式开发的实用化方案。论文的主要贡献包括:
     1.分析了现有印章域数字水印防伪系统中存在的问题,即不能灵活针对多种印章图像进行水印嵌入和提取。提出了解决的思路,即在水印嵌入和提取之前先进行印章图像的分类和识别。设计了基于矩形度、圆形度和不变矩特征的印章图像自动分类和识别算法。最后进行了实验验证,并对实验结果进行了分析总结。
     2.为数字水印检测部分的便携式开发提供了一个实用化方案。设计并实现了基于NiosⅡ的嵌入式印章水印检测系统。同时使用了C2H硬件加速器对软件算法部分进行了优化,并用实验结果证明了经过加速后,整个执行速度得到了很大的提升,满足了系统期望的实时性要求。
Seal domain watermark security system combines PKI/CA platform with the seal domain watermark technology. The system expands the application fields of digital watermark and PKI technology from the digital domain to the analog domain to protect both digital documents and paper documents. Therefore, it has become a research hotspot for its practical utility. What's more, it would be widely used, if we could make the system completely portable.
     In this paper, we summarize the main weakness of the existing Seal domain watermark security system. We also find a perfect solution to solve the problem for the system. In the meantime, in order to popularize the Seal domain watermark security system, we raise a design scheme for Portable equipment, and implement the Portable Watermark Detector on FPGA. The valuable research fruits are as follows:
     1. After analyzing the existing Seal domain watermark security system, we find that it doesn't support various kinds of seals. According to the problems we have encountered, this paper presents the corresponding solution. Based on the knowledge of rectangular degree, circular degree and moment invariants, we design an algorithm of image classification for seal image. After a lot of experiments, the result proves that this algorithm can help us to solve the problem we have mentioned before.
     2. Based on our scheme, we implement the Portable Watermark Detector on FPGA. Meanwhile we used the C2H hardware accelerator in order to improve the performance of system. The result proves that the whole speed performance promotes a lot, and meets the real-time requirement.
引文
铩颷1].Cox I.J.,Miller M.,Bloom J.,Digital Watermarking,USA:Morgen Kaufmann Publishing,2001.
    [2].Piva A.,Bartolini F.,Barni M.,"Managing copyright in open networks",IEEE InternetComputing,May,June,2002,pp.18-26.
    [3].G.Carronni.Erimitteln unauthorisierter verteiler von maschinenlesbaren daten.Technicalreport,ETH Zurich,Switzerland,August 1993
    [4].Ring-shaped digital watermark for rotated and scaled images using random-phasesinusoidal function,Chotikakamthorn,N.;Pholsomboon,S.;Electrical and ElectronicTechnology,2001.TENCON.Proceedings of IEEE Region 10 International Conferenceon,Volume:1,19-22 Aug.2001 Pages:321 - 325 vol.1
    [5].Rotation,scale and translation invariant digital image watermarking,O'Ruanaidh,J.J.K.;Pun,T.;Image Processing,1997.Proceedings.,International Conference on,Volume:1,26-29 Oct.1997,Pages:536-539 vol.1
    [6].Affine transformation resistant watermarking based on image normalization,Ping Dong;Galatsanos,N.P.;Image Processing.2002.Proceedings.2002 International Conference on,Volume:3,24-28 June 2002,Pages:489 - 492 vol.3
    [7].A print-and-scan resilient digital watermark for card authentication,Ho,A.T.S.;Feng Shu;Information,Communications and Signal Processing,2003 and the Fourth Pacific RimConference on Multimedia.Proceedings of the 2003 Joint Conference of the FourthInternational Conference on,Volume:2,15-18 Dec.2003,Pages:1149-1152
    [8].A print and scan optimized watermarking scheme,Lefebvre,F.;Gueluy,A.;Delannay,D.;Macq,B.;Multimedia Signal Processing,2001 IEEE Fourth Workshop on,3-5 Oct.2001,Pages:511-516
    [9].An optical watermarking solution for authenticating printed documents,Sun,Q.B.;Feng,P.R.;Deng,R.;Information Technology:Coding and Computing,2001.Proceedings.International Conference on,2-4 April 2001,Pages:65-70
    [10].A new data hiding method in binary image,Jeanne Chen;Tung-Shou Chen;Meng-WenCheng;Multimedia Software Engineering,2003.Proceedings.Fifth InternationalSymposium on,10-12 Dec.2003,Pages:88-93
    [11].Secure data hiding in binary document images for authentcation,Haiping Lu;Kot,A.C.;Jun Cheng;Circuits and Systems,2003.ISCAS '03.Proceedings of the 2003 InternationalSymposium on,Volume:3,25-28 May 2003,Pages:Ⅲ-806-Ⅲ-809 vol.3
    [12].Data Hiding in Binary Image for Authentication and Annotation,Wu,M.;Liu,B.;Multimedia,IEEE Transactions on,Volume:6,Issue:4,Aug.2004,Pages:528-538
    [13].A secure data hiding scheme for binary images,Yu-Chee Tseng;Yu-Yuan Chen;Hsiang-Kuang Pan;Communications,IEEE Transactions on,Volume:50,Issue:8,Aug.2002,Pages:1227-1231
    [14].Secure authentication watermarking for binary images,Kim,H.Y.;Afif,A.;Computer Graphics and Image Processing,2003.SIBGRAPI 2003.ⅩⅥ Brazilian Symposium on,
    12-15 Oct.2003,Pages:199-206
    铩颷15].Watermark embedding in DC components of DCT for binary images,Haiping Lu;XuxiaShi;Shi,Y.Q.;Kot,A.C.;Lihui Chen;Multimedia Signal Processing,2002 IEEEWorkshop on,9-11 Dec.2002,Pages:300-303
    [16].尹传熊,刘寿强,基于PIG/CA身份认证体系的应用研究.计算机安全,2003,8:9-11.
    [17].阿须数码数字印章产品,www.axu.cn.
    [18].刘瑞祯,谭铁牛.数字图象水印理论与算法研究.中国科学院博士研究生学位论文,2001.
    [19].Herrigel A and Voloshynovskiy S.Copyright and content protection for digital imagesbased on asymmetric cryptographic techniques.Proc Of Multimedia'98,1998,pp:99-112.
    [20].Acken J M.How watermarking adds value to digital content.Communications of theACM,July 1998,vol.41,pp:75-77.
    [21].卢震宇,戴英侠,连一峰,建立于PKI之上的安全文件传输系统的分析和构建。计算机工程与应用,2002.11:146-148
    [22].郑连清,汪胜荣等,网络安全概论[M].清华大学出版社,2004:71-86
    [23].C.Ellison.PKI Requirements.RFC2692,Simple Public Key Infrastructure,September1999.http://www.ietforq/rfc/rfc2692.
    [24].L.C.Paulson.The inductive approach to verifying cryptographic protocols[J].Journal ofComputer Security,1998,(6):85-128.
    [25].NashA,PKI实现和管理电子安全[M]。清华大学出版社,2002.
    [26].RFC2527 Internet X.509 Public Key Infrastructure:Certificate Policy and CertificationPractices Framework 1999
    [27].RFC2459 Internet X.509 Public Key Infrastructure:Certificate and CRL Profile 1999
    [28].吴向君,章春娥,裘正定,”签章域的防伪数字水印”,北京电子科技学院学报,2005,pp.27-30.
    [29].张小绵,古元,邓检生,杨宝民.面向对象的印章排版和识别.中山大学学报论丛,2000(5)
    [30].杨新军,王肇忻,刘唯一,母国光.基于环投影模板匹配的印鉴鉴别法.光电子·激光.2001(11)
    [31].Yao Zhao,Baozong Yuan.Skeleton Extraction in Seal Identification System usingMorphology.International Conference on Signal Processing Proceedings,ICSP V2 1998
    [32].M.K.Hu.Visual pattern recognition by moment invariants.[J].IRE Trans IntTheory,1962(8):179-187
    [33].Michael Keating,Pierre Bricaud.片上系统--可重用设计方法学.第三版.电子工业出版社.2004.
    [34].王田苗.嵌入式系统设计与实例开发.清华大学出版社.2002.
    [35].潘松,黄继业,曾毓.SOPC技术实用教程.清华大学出版社.2005.
    [36].任爱琴,初秀琴,常存,孙肖子.基于FPGA的嵌入式系统设计.西安电子科技大学出版社.2004.
    [37].孙圣河,陆哲明,牛夏牧,数字水印技术及应用,科学出版社,2004
    [38].王海霞,徐欣锋,徐抒岩,一种基于不变矩的目标搜索与识别方法,光学精密工程, 2004.3
    铩颷39].王文惠,周良柱.基于内容的图像检索技术的研究和发展.计算机工程与应用,2001.5:54-56..
    [40].周琨,张大力.印章鉴定系统的图像处理研究.计算机工程与应用,2002,
    [41].杨峰,周洪利.印鉴自动识别系统中模式识别方法的研究.现代计算机,2003,
    [42].陈新燕,李卫东等.基于边缘和模板匹配的印鉴自动鉴别方法.上海交通大学学报,1998,32(4):44-45
    [43].边肇祺,张学工.模式识别.清华大学出版社,2000.
    [44].Nios Ⅱ C2H Compiler User Guido

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700