用于图像认证的半脆弱双水印方案
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数字水印技术是一种全新的信息安全技术,是多媒体版权保护和多媒体认证的强有力的手段,涉及到通信与信息理论、图像处理技术、网络安全等多种学科知识,极具学术价值和经济价值。半脆弱水印技术是数字水印技术的一个重要分支,它能容忍一定程度的常见信号处理操作,能检测出对多媒体数据是否有恶意篡改,可以定位篡改区域,甚至判断篡改方式以及恢复出被篡改的数据。
     本文比较系统地研究了半脆弱数字水印的发展情况,论述了认证水印(脆弱数字水印和半脆弱数字水印)的提出背景及概念原理和研究动态,重点分析了认证水印按空间域和变换域分类的各种算法,比较了它们的优缺点,总结了认证水印有可能受到的攻击行为。
     本文结合两种半脆弱水印算法,在同一图像中的小波域内进行多重嵌入,而又互不干扰,从而实现对图像组合目的或者多重目的的保护。通过大量实验,总结规律,得出特定攻击对图像的特征图表,从而更精确的分析分辨攻击类型并度量其篡改能力。
Digital watermarking technique is a whole new mean to guard information security.It has been a strong method for copyright protection and authentication on multimedia.And it involves the theory on communication and information,digital image processing,network security and so on.It is of high academic value and economic value.Semi-fragile watermarking technique is an important branch of digital watermarking.It can tolerate general signal processing,detect any spiteful tamper on marked multimedia data,locate spatial regions within an altered image,and even can estimate what kind of modification had occurred and recover the tampered data.
     In this paper,the background,the concept,the general framework and the research trend of authentication watermarking(known as fragile watermarking and semi-fragile watermarking) technology is roughly described,the emphasis is on the analysis of authentication watermarking classified by the spatial and the transform domain,also their advantages and disadvantages are analyzed,in addition,common attacks applied to authentication watermarking are summarized
     In this paper,two kinds of semi-fragile watermark are embedded in a image in wavelet domain,which achieve the purpose of image composition authentication or multi-purpose protection.Through numerous experiments, the rules are summer up,so that there is a image charts about the attacks on the specific characteristics.In the same way,we can have a more accurate analysis distinguish types of attacks and distortion measure of its capacity.
引文
[1]Cox I.J.,Killian J.,and Leighton T,et al.Secure spread spectrum watermarking formultimedia.IEEE Trans.on Image Processing,1997,(12):1673-1687.
    [2]M.Barni,F.Bartolini,V.Cappellini,and A.Piva.A DCT-domain system for robust imagewatermarking.in Processing[J],1998,Vol.66:357-372.
    [3]Hongmei Liu,Jiufen Liu,Jiwu Huang,Daren Huang,Y.Q.Shi.A robust DWT-based blinddata hiding algorithm.IEEE International Symposium on Circuits and Systems,vol.2,2002:672-675.
    [4]Kutter M,Petitcolas F.A.P.A fair benchmark for image watermarking systems[J].inProceeding of SPIE,Jan.1999:308-311.
    [5]Han Ho Ko,Sang Ju Park.Semi-Fragile Watermarking for Telltale Tamper Proofing andAuthenticating.ITC-CSCC 2002,July:623-626
    [6]Seungwon Shin,Oanjin Kim,Jongweon Kim,Jonguk Choil.A robust audio watermarkingalgorithm using pitch scaling.2002 14~(th) International Conference on Digital SignalProcessing,2002,Vol.2:701-704
    [7]S.-J.Lee,S.-H.Jung.A survey of watermarking techniques applied to multimedia.In:ISIE2001,Pusan,Korea,2001.272-277.
    [8]T.S.Liang and J.J.Rodriguez.Robust watermarking using robust coefficients.In:Proceedings of SPIE-Vol.3971.Security and Watermarking of Multimedia Contents Ⅱ,Ping W.Wong,Edward J.Delp Ⅲ,Editors,May 2000,326-335.
    [9]E.T.Lin and E.J.Delp.A Review of Fragile Image Watermarks.In:Proc.of the Multimedia and Security Workshop at ACM Multimedia'99,Orlando,1999.25-29.
    [10]E.T.Lin,C.I.Podilchuk,and E.J.Delp.Detection of Image Alterations Using Semi-Fragile Watermarks.In:Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents Ⅱ,Vol.3971,San Jose,CA,2000:152-163.
    [11]S.Craver,N.Memon,B.-L.Yeo,et al.Resolving rightful ownership with invisible watermarking techniques:limitations,attacks and implications.IEEE Journal on Special Areas in Communications,1998,16(4):573-586
    [12]J.Dittmann,P.Schmitt,E.Saar et al.Combining digital watermarks and collusion55 secure fingerprints for digital images.Journal of Electronic Imaging,October 2000,9(4):456-467.
    [13]J.A.Bloom, I.J.Cox, T.Kalker et al.Copy Protection for DVD Video.In: Proceedings of the IEEE, 87(7), Jul.1999: 1267-1276.
    [14]Q.Sun, S.-F.Chang, M.Kurato et al.A quantitative semi-fragile JPEG2000 image authentication system.In: 2002 International Conference on Image Processing, Vol.: 2, 22-25 Sept.2002: 921-924.
    [15]R.GSchyndel, A.Tirkel, and C.Osborne.A digital watermark.In Proc.IEEE Int.Conf.Image Processing(ICIP), 1994: 86-90.
    [16]W.Bender, D.Gruhl, and N.Morimoto.Techniques for Data Hiding.In: Proceedings of the SPIE Conference on Storage and Retrieval for Image and VideoDatabases III, vol.2420, San Jose, CA, February 1995: 164-173.
    [17]N.Nikolaidis and I.Pitas.Copyright protection of images using robust digitalsignatures.In: IEEE Proceeding on International Conference on Acoustics, Speech, and Signal Processing, Atlanta, IEEE Press, 1996: 2168-2171.
    [18]J.T.Brassil , S.Low and N.F.Maxemchuk et al.Electronic marking andidentification techniques to discourage document copying.IEEE Journal on Selected Areas in Communications. 13(8), Oct. 1995: 1495-1504.
    [19]F.Alturki and R.Mersereau.Secure fragile digital watermarking technique forimage authentication.In: 2001 International Conference on Image Processing, Vol.3, 2001: 1031-1034.
    [20]I.J.Cox, J.Kilian, F.T.Leighton et al.Secure spread spectrum watermarking formultimedia.IEEE Transactions on Image Processing, 6(12), Dec. 1997: 1673-1687.
    [21]C.-T.Hsu and J.-L.Wu.Multiresolution watermarking for digital images.IEEETrans.Circuits Syst.II, Aug.1998, 45(8): 1097-1101
    [22]C.I.Podilchuk and Zeng Wenjun.Image-adaptive watermarking using visual model. IEEE Journal on Selected Areas in Communications, 16(4), 1998, 525-539.
    [23]C.-Y.Lin and S.-F.Chang.Semi-fragile watermarking for authenticating JPEG visual content.In : Proceedings of SPIE-Vol.3971.Security and Watermarking ofMultimedia Contents II, Ping W.Wong, Edward J.Delp III, Editors, May 2000, 140-151.
    [24]J.Fridrich.Image watermarking for tamper detection.In: 1998 International Conference on Image Processing, ICIP 98.Vol.2, 4-7 Oct. 1998, 404-408.
    
    [25]I.J.Cox and J.-P.M.GLinnartz.Some General Methods for Tampering With Watermarks.IEEE Journal of Selected Areas in Communication, 1998-05; 16(4): 587-593.
    [26]S.Voloshynovskiy,S.Pereira,T.Pun et al..Attacks on digital watermarks:classification,estimation based attacks,and benchmarks.IEEE CommunicationsMagazine,2001-08;39(8):118-126.
    [27]M.Kutter,S.Voloshynovskiy and A.Herrigel.Watermark Copy Attack.In:Proceedings of SPIE-Vol.3971.Security and Watermarking of MultimediaContents Ⅱ,Ping W.Wong,Edward J.Delp Ⅲ,Editors,May2000,371-380.
    [28]J.Fridrich,M.Goljan and N.Memon.Further attacks on Yeung-Mintzer fragilewatermarking scheme.In:Proceedings of SPIE-Vol.3971.Security andWatermarking of Multimedia Contents Ⅱ,Ping W.Wong,Edward J.Delp Ⅲ,Editors,May 2000,428-437.
    [29]Rongsheng XIE,Keshuo Wu,Chunguang LI and Shunzhi Zhu.An Improved Semi-fragile Digital Watermarking Scheme for Image Authentication.IEEE,2007,07,262-265
    [30]李春,黄继武.一种抗JPEG压缩的半脆弱图像水印算法.软件学报,2006,NO2,315-323.
    [31]刘振华,尹萍著.信息隐蔽技术及其应用.第一版,北京:科学出版社,2002.
    [32]钮心忻著.信息隐藏与数字水印.第一版,北京邮电大学出版社,2004
    [33]孙圣和,陆哲明,牛夏牧著.数字水印技术及应用.第一版,科学出版社,2004
    [34]刘世栋,杨林,王建新.信息隐蔽原理及数字水印技术的若干问题和趋势[J].计算机工程及应用,2003,No.12:158-160.
    [35]汪保友,王俊杰,胡运发.数字水印与版权保护[J].计算机应用与软件,2004,Vol.21,No.1:30-32.
    [36]华先胜,石青云.易损数字水印若干问题的研究[J].中国图象图形学报,2001,Vol.6(A),No.11:1089-1095.
    [37]侯振华,陈生潭.脆弱性数字水印研究[J].计算机应用,2003,Vol.23:106-108.
    [38]王卫卫,杨波,宋国乡.基于图象特征的小波域水印算法.光子学报.30(7),2001:856-860.
    [39]李建平.小波分析与信号处理——理论、应用及软件实现.重庆:重庆出版社.1997年12月.
    [40]姚天任,孙洪.现代数字信号处理.武汉:华中理工大学出版社.1999.
    [41]华先胜,石青云.局部化数字水印算法.中国图象图形学报.6A(7),2001:642-647
    [42]侯振华,变换域图像半脆弱行水印研究.西安电子科技大学硕士学位论文

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700