双彩色图像水印和MPEG4视频水印算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数字水印是近十年来出现的一种有效的数字产品版权保护技术。它作为加密技术的补充,克服了传统密码学技术中加密的内容在解密之后不再安全的问题,因此它作为知识产权保护和数字多媒体防伪的有效手段而被广泛研究和应用。但作为一个新的研究领域,数字水印仍有许多理论和技术问题亟待解决。找到一种复杂度低,安全性强,不可见性和鲁棒性好的水印算法成为数字水印技术应用的关键。本文在图像水印和视频水印方面提出了一些新的算法。
     本文在查阅了大量国内外有关数字图像水印和数字视频水印文献的基础上,总结了数字水印技术的国内外研究现状之后提出了一种基于位纠错的DCT域双彩色图像水印算法和一种基于DCT域的MPEG4扩频数字视频盲水印算法,并在windows平台下实现了这两种算法,结合实验结果重点分析了算法的不可见性和鲁棒性。在基于位纠错的DCT域双彩色图像水印算法中,彩色水印图像首先借助了基于DCT的JPEG图像压缩编码算法的思想进行了压缩。在YCbCr彩色空间中每一分量分成8×8块后进行二维DCT,每一块再进行ZigZag排序后提取前15个系数,其他系数被赋值为0。逆ZigZag排序后再进行反离散余弦变换得到待嵌入的彩色水印图像。按块在分量中从行到列的顺序提取它们的前15个DCT系数转化为有符号的二进制数以后再采用扩频通信机制,得到的这个序列经过互不重叠周期延拓8次后与一个等长的伪随机序列进行异或操作产生待嵌入的水印序列。宿主彩色图像经过DCT后,低频部分包含主要能量,高频部分是图像的边缘信息。水印嵌入到低频部分会影响它的不可见性,而嵌入到高频部分水印的鲁棒性不够好,因此本文结合人类视觉系统模型把水印序列嵌入到宿主彩色图像纹理子块DCT后的中低频系数中,该算法简单易实现。在基于DCT域的MPEG4扩频盲数字视频水印算法中,二值水印图像首先经过Arnold置乱变换,得到的序列经过互不重叠周期延拓8次后再与一个等长的伪随机序列进行异或操作得到水印序列。MPEG4视频文件经过XVID解码得到的视频帧转换到YCbCr彩色空间中,Y分量经过DCT后再进行ZigZag排序,根据水印位修改Y分量的中低频DCT系数的大小,嵌入水印后再通过XVID编码得到含水印的MPEG4视频文件。提取水印时,不需要原始视频文件的参与,根据含水印视频帧的DCT系数除以嵌入强度得到的余数范围来提取水印。
     本文提出的两种水印算法均在C++Builder平台下编程实现并演示了嵌入和提取水印的全过程,实现结果表明它们都具有良好的不可见性和鲁棒性。
Digital Watermarking has become an effective method of copyright protection for digital products in the last ten years. As the complement of encryption, it has solved the problem of traditional cryptography that encrypted contents are not secure when have been decrypted. Therefore it has been studied and used widely as an effective method of knowledge copyright protection and preventing from sham for digital multimedia. However, there are still plenty of theoretical and practical difficulties to be solved in a new field of digital watermarking. The key point of applicable digital watermarking technique is to find out an algorithm which is low complexity, good security, invisibility and robustness. Some original algorithms in digital image and video watermarking field are proposed in this paper.
     Referring to a large number of domestic and foreign literature of digital image and video watermarking, a dual color images watermarking method based on error-correcting bits in discrete cosine translation domain and a blind MPEG4 video watermarking algorithm based on spread spectrum technology in discrete cosine translation domain are proposed after summing up those algorithm which have been proposed in previous authors’papers and they are implemented successfully in windows operating system, analyzing mainly their invisibility and robustness according to the experimental results. The color watermarking image is compressed in viewpoint of JPEG algorithm based on DCT in the dual color images watermarking method. Each component of the color watermarking image in the YCbCr color space is blocked 8×8 and done discrete cosine transform, and then extracting the former 15 DCT coefficients of each block after ordering of ZigZag, the other DCT coefficients assignment 0.The embedded color watermarking image is formed after ordering of inverse ZigZag and then IDCT. Extracting the former 15 DCT coefficients of each block from Row to Column in each component and then they are translated into symbols binary which they are Spread Spectrum to form a sequence, which is extended not overlap each other through 8 cycle to form another sequence. This sequence is XOR-ed with a pseudo random sequence with the same length as it. The host color image after DCT, the low-frequency is main energy of it and the high-frequency is the marginal information of it. The watermark information embedded in the low-frequency of DCT will affect the invisibility and it embedded in the high-frequency of DCT will affect the robustness. The watermark sequence is embedded in the middle-frequency and low-frequency of DCT in texture block of the host image combining human visual system. In the blind MPEG4 video watermarking algorithm based on spread spectrum technology in discrete cosine translation domain, a binary image transformed with Arnold scrambling is extended with not overlapping each other through 8 cycles to form another sequence, which is XOR-ed with a pseudo random sequence with the same length as it. The video frames are obtained from XVID codec and they are inverted to YCbCr color space, the video files are compressed by MPEG4. The Y components are DCT and then ordered by ZigZag, altering those DCT coefficients according to the watermark sequence and then the MPEG4 video embedded the watermark is obtained from the XVID codec. Extract the watermarking under their scope of the remainder which these DCT Coefficients of the MPEG4 video embedded the watermark divided the embedded strength and needn’t have the original MPEG4 video.
     The two digital watermarking algorithms proposed in this paper are programmed in the C++ Builder 6.0, the whole process of watermark embedded and the whole process of watermark extracted are demonstrated. Experimental results demonstrate that the watermarking is good invisibility and robustness.
引文
[1]A.Tirkel, G.A.Rankin and R.Van.Schyndel ." Electronic watermark ", Digital Image Computing,Technology and Application-DICTA 93, Macquarl University , 1993: 666~672.
    [2]Ingemar J. Cox, Joe Kiliany, Tom Leightonz and Talal Shamoony.“Secure spread spectrum watermarking for multimedia”, IEEE Trans, Image Processing ,1997.6 (12): 1673~1687.
    [3]M.H.M Costa. Writing on dirty paper.IEEE Transactions on Information Theory.1983,29(3):439~441.
    [4]Ingemar J.Cox, Matthew L. Miller and Andrew L, McKellips. Watermarking as communication with side information. In Proceedings of IEEE.1999,87(7):1127~1141.
    [5]S. Voloshynovskiy, F. Deguillaume, S. Pereira and Thierry Pun, Optimal adaptive diversity watermarking with channel state estimation. IS&T/SPIE’s 13th Annual Symposium, Electronic Imaging 2001:Security and Watermarking of Multimedia Content III, SPIE Proceedings. San Jose, California, USA.2001:23~27.
    [6]Deepa Kundur and Dimitrios Hatzinakos.Diversity and attack characterization for improved robust watermarking,IEEE Transactions on Signal Processing.2001:49(10)2383~2396P.
    [7]I.Pitas. A method for signature casting on digital images. Proceedings of ICIP’96(3),1996:215~218.
    [8] A. B.Watson and J.A. Solomon. A model of visual contrast gain control and pattern masking. Journal of the Optical Society of American,14,1997:2379~2391P.
    [9]T.Trinkaus.Perceptual coding of audio and diverse speech signals.ph.D. dissertation.Georgia Institute of Technology, Atlanda,1999.
    [10]黄凤岗,刘毅.基于分块DCT的盲水印算法的研究[J] .哈尔滨工程大学学报,2005,26(2):215~219.
    [11]朱岩,孙中伟,杨永田,冯登国.扩频CDMA水印性能分析及其多小波域内的应用研究[J] .计算机学报,2005,28(8):1376~1385.
    [12]Christian Rey, Jean Luc Dugelay. A survey of watermarking algorithms for image authentication. EURASIP Journal on Applied Signal Processing.2002,6:613~621.
    [13]Joseph J.K. O Ruanaidh,Thierry Pun. Rotation ,scale and translation invariant spread spectrum digital image watermarking. Signal Processing. 1998, 66(3): 303~317.
    [14]Ching-Yung Lin, Jeffrey A.Bloom,Ingemar J.cox.Rotation scale and translation resilient watermarking for images.IEEE Transaction on Image Processing. 2001,10(5):767~782.
    [15]刘瑞祯,谭铁牛.基于奇异值分解的数字图像水印方法[J] .电子学报,2001,29(2):168~171.
    [16]Fleet D J,Heger D J. Embedding invisible information in color images.In Proceedings of IEEE International Conference on Image Processing (ICIP.97).Santa Barbara, USA.1997,1:532~535.
    [17]M.Kutter,S.K.Bhattacharjee and TEbrhimi.Towards second generation watermarking schemes. ICIP’99.Kobe,Japan.1999,3:320~323.
    [18]Mehmet U.Celik,Eli Saber and G.aurav Sharma.Analysis of feature-based geometry invariant watermarking.In Proceedings of SPIE:Security and Watermarking of Multimedia Contents III.San Jose,USA.2001,4314:261~268.
    [19]Walton S. Image authentication for a slippery new age. Dr.Dobb’s Joutnal.1995,20(4):18~26.
    [20]吴金梅,林福宗.基于数字水印的图像认证技术[J] .计算机学报,2004,27(9):1153~1161.
    [21]Yeung M and Mintzer F.An invisible watermarking technique for image verification.In Proceedings of the IEEE International Conference on Image Processing. Santa Barbara,USA.1997.2:680~683.
    [22]Ping Wah Wong.A watermark for image integrity and ownership verification.In Proceedings of the IS&T PIC conference.Oregon,Portland,USA.1998:374~379.
    [23]Jiri Fridrich.Security of fragile authentication watermarks with localization. In Proceedings of the SPIE Security and Watermarking of Multimedia contents IV.San Jose,California,USA.2002,4675:691~700.
    [24]Bassali H,Chhugani J.Compression tolerant watermarking for image verification. In Proceedings of the IEEE International Conference on Image Processing. Vancouver,Canada.2000,1:430~433.
    [25] Ching-Yung Lin and Shih-Fu Chang.Semi-fragile watermarking for authentication Conference on security and watermarking of multimedia contents II.San Jose, USA,2000,3971:140~151.
    [26]Sun Qibin,Chang Shifu.Semi-fragile image authentication using generic wavelet domain features and ECC. Proceedings of the IEEE International conference on Image Processing.ROChester, USA,2002,2:901~904.
    [27]易开详.数字图像加密与数字水印技术研究[D] . [博士学位论文],浙江大学,2001.
    [28]Voyatzis G, Pitas I. The use of watermarks in protection of digital multimedia products,Proceedings of IEEE, 1999,87(7):1197~1207.
    [29]R.G. Schyndel , V. A.Z.Tirkel and C. Fosborne ,“A Digital Watermark in Proceedings”,IEEE International Conference Image Processing , Piscataway : IEEE Press,1994 ,2 :86~89.
    [30]W. Bender, D. Gruhl and N.Morimoto, Technique for Data Hiding, Proceedings of the SPIE 2420, storage and retrieval for image and video database, 1995,1:III:164~173.
    [31]N. Nikolaidis, l.Pitas, Robust image watermarking in the spatial domain, Signal Processing, vol. 66, no.3, pp. 1998,385~403.
    [32]J. J. K. O. Ruanaidh, W. J. Dowling and F. M. Boland, Watermarking of Digital Images, Proceedings of the 1996 International Conference on Image Processing (ICIP’96), Sept. 1996, Lausanne, Switzerland, 1996, 3: 239~242.
    [33]I. J. Cox, et al, A Secure Robust Watermark for Multimedia, Workshop on Information Hiding,Cambridge, UK, 1996, Number 1174 in Lecture Notes in Computer Science, Springer-Verlag: 185~206.
    [34]C. I. Podilchuk, W. Zeng, Image_adaptive watermarking using visual models,IEEE Journal on Special Areas in Communications, 1998, 16(4): 525~539.
    [35]C. I. Hsu and J. L. Wu, Multiresolution watermarking for digital image, IEEE Trans on Circuits and Systems II : Analog and Digital Signal Processing. 1998 : 67~78.
    [36]Liang J, Xu P, Tran TD, A universal robust low frequency watermarking scheme [J],Submitted to IEEE Transactions on Image Processing, May 2000.
    [37]Ohnishi J, Matsui K,A method of Watermarking with multiresolution analysis and pseudo noise sequences [J],Systems and Computers in Japan , 1998 , 29 ( 5 ) : 11~1.
    [38]Tzovaras D, Karagianllis N , Strintzis MG, Robust image watermarking in the subband or discrete cosine transform [A], Proceedings of the 9th European Signal Processing Conference EUSIPCO ' 98 [ C ] ,Island of Rhodes , USA , October 1997 , 2285~2288.
    [39]Watson AB , Yang GY , Solomon JA , et al , Visibility of wavelet quantization noise [ J ] ,IEEE Transaction in Image Processing6 ,1997,1 164~1175.
    [40]武栓虎,谈正.基于混沌序列的视频数字图像水印隐藏与多分辨检测[J] .西安交通大学学报,2000,34(6):35~39P.
    [41]Zou Xiaoxiang, Peng Cong, Li Jintao, et al .Video watermark technique [J]. Journal of Engneering Graphics, 2002.3(3): 1695~179.
    [42]T.Kalker, G. Deovere, J.Haitama and M. Maes ,A video watermarking system for Broadcase Monitoring Proceedings Of Is& T/SPIE/EI25,Security and watermarking of Multimedia content,1999,3657:1035~112.
    [43]T.Y.Chuang,M.S.Hong,Y.N.Oh,D.H.Shin and S.H. Park. Digital Watermarking for Copyright Protection of MPEG2 Compressed Video.IEEE Transaction on Consumer Electronics,1998,44(3):8955~901.
    [44]F.Hartung and B.Girod.Digital Watermarking of MPEG2 Coded Video in the Bitstream Domain.Proceedings of International Conference on Acoustics, Speech, and Signal Processing(ICASSP’97),1997,4:2621~2624.
    [45]张益贞,刘滔.Visual C++实现MPEG/JPEG编解码技术.北京:人民邮电出版社,2004,176.
    [46]胡家声.一种小波域数字彩色水印技术[J] .计算机技术与展,2006:16(6)-148-149.
    [47]孙圣和,陆哲明,牛夏牧等著.数字水印技术与应用[M] .北京:科学社,2004-509-512.
    [48]刘连山,李人厚,高崎.基于DWT的彩色图像绿色分量数字水印方案[J] .通信学报,2005,26(7):62~67.
    [49]杨雅丽,倪国强.利用奇偶量化的图像盲水印算法.光电工程[J],2005,32(9):83~86.
    [50]Kutter M,Jordan F,Ebrahimi T. Proposal of a watermarking technique for hiding/retrieving data in compressed and decompressedvideo[R]. Technical Report M2281,ISO/IEC Document, JTCI/SC29/WG11, Stockholm: MPEG4 Meeting,1997.
    [51]Zhang J, Li J G, Zhang L.Video watermarking technique in motion vector[A].XIV Brazilian Symposium on Computer Graphics and Image Processing,Florianopolis,Brazil.2001.179~182.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700