基于环形自同构的半脆弱彩色图像数字水印算法
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数字水印的算法大多采用了空间域和变换域的实现方法。图像水印技术是目前研究最为成熟的水印技术。空间域算法是通过直接改变图像数据来加入水印的。它直接将数字水印按某种算法叠加到图像的空间域上。水印一般被嵌入到图像的亮度或色度信号的强度值中。空间域水印算法具有对宿主图像影响小、算法简单、运算速度快、嵌入的信息量大、能够有效地利用人类视觉系统特性等优点。本文提出的算法就属于空间域算法。
     本文提出了基于分块的彩色图像分层水印算法设计思路,并就水印信息的生成及嵌入部分采用了两个方案:一、基于Torus自同构的方案,二、基于斜角等距式的方案。该算法用于图像内容完整性认证、篡改定位和恢复。在预处理部分,对原始图像进行分块处理,并根据以上两种方案生成图像块映射序列。在嵌入时,通过之前得到的映射序列生成水印信息,将其嵌入到原始图像所有像素的2 bit LSB(最低有效位)。水印信息由认证水印比特、奇偶校验码及恢复水印组成,恢复水印为对应映射图像块子块色度平均值。在检测时,采用分层思想,分3层对水印进行篡改定位和恢复。篡改恢复时需要对被篡改图像进行预处理,得到图像块映射序列并据此进行恢复。实验结果表明,该算法对局部发生的篡改可以有效地检测,精确定位并进行内容恢复。两种方案中后者对通常情况下的图像篡改具有更好的恢复能力。
The rapid development of multimedia technology and popularization of Internet has brought a series of problems in the areas of politics, economy, military affairs and culture and yielded many research hotspots, such as safeguarding the intellectual property of numeral works, preventing bond counterfeit in trade, hiding marks and revising suggestion on sound-to-picture data, secret communication, etc. Among these issues, numeral watermark technology has achieved rapid progress and at the same time some typical algorithms have appeared.
     A complete watermarking system design includes three parts: the generation of the watermark, the embedding of the watermark and the extraction of the watermark. Its important features are transparency, robustness, capacity, security and so on. The initial purpose of designed digital watermarking technology is to protect static images and video. Now it is widely applied to other digital media, such as online music, DVD and digital television. The primary role of digital watermarking is copyright protection, anti-counterfeit, copy protection, distribution monitoring, data authentication, and information hiding. Along with the development of digital watermarking technology, the algorithms of digital watermarking have been continuously improved. It utilized the method of the space domain and transformation domain. Image watermarking technology is the most mature one among the present watermarking technology researches. In space domain algorithm watermarking is added through transforming the image data directly. It superimposed the digital watermarking on the image space domain through certain algorithms. Generally the watermark is embedded into the signal intensity value of the brightness or colorfulness of the watermark image. Space domain watermarking algorithm has the advantage of little impact on the host image, simple algorithm, fast computing, large information embedded, and the effective use of Human Visual System.
     As the development of technology, color image and video have boomed up in our daily life. The study on digital image should focus on color digital image. Meanwhile, the study on the color digital image watermark also is significant. The algorithm of this thesis is based on the color image as the carrier. RGB(Red, Green, Blue) is the common color space in computers. It generates other colors by additive mix of three primary colors, and it is applied broadly in computer graphics, image system and color television. While CMYK (Cyan, Magenta, Yellow, Black) is generates other colors by subtractive mix of three primary colors, which is applied broadly in print industry. This thesis adopts the RGB format.
     This thesis presents the design of hierarchical digital watermarking algorithm, and two schemes have been used for the formation and embedding of watermarking information: 1. The scheme based on Torus auto orphism mapping block. 2. The scheme based on bevel isometrics. This algorithm is used for the image content integrality authentication and the image tamper localization and recovery. In the pretreatment part, the original image is disposed by segmentation, and image mapped sequence is formed via the above mentioned two schemes. In the embedding, the original RGB image is decomposed to R,G and B vectors, which then are embedded into watermark separately. The watermark information is generated by the mapped sequence obtained previously, which then is embedded into the 2 bit (LSB) of the original image pixel. The watermark information is composed of authentication watermark bit, parity check code and watermark recovery. Watermark recovery is the chroma average value of subblocks of the corresponding mapping image. In the detection part, the hierarchical idea is used, and the watermark tamper localization and recovery are carried out through three hierarchy. When the tampered image is recovered, pretreatment of tampered image is needed to obtain mapped sequence of image blocks by which the tampered image is recovered. The experimental results show that this algorithm can be used to effective detection, precise locating and content recovery for the local tampering. Between the two schemes the latter generally is more effective for recovery of image tampering.
     The embedding algorithm adopted in the thesis is the spatial domain LSB algorithm, that is, watermarking information is embedded into the 2 bit (LSB) of the original image pixel, aiming at increase of the effect for the recovery of image tampering. The merits of the algorithm are that the principle is simple, location precision is high, and recovery of image tampering is effective. LSB is the first digital watermarking algorithm proposed by R.G..van Schyndel et al., which is a typical spatial domain information hiddenness algorithm. With this algorithm, information hiddenness is realized through adjusting the lowest digital of the original data, so that detection of information hiddenness is difficult for a common consumer via HVS. The Chinese meaning of LSB is the less important site, that is, watermark image is embedded into the less important site of the carrier image. In an image of 256 intensities, each pixel is composed of eight numbers of binary system, each of which has different action. The highest site represents 10 000 000(128),and the lowest site represents only 1.This gives watermark direct suggestion that data can be embedded through changing the lowest site of an image. The merits of LSB are that the capacity of information embedment is big, the embedment rapidity is rapid, the process of embedment and pick-up is simple. But the disadvantages are that it is fragile, bad robustness, and can not manage the disposal of sieve wave and adding noise.
引文
[1] Ingmar J.Cox, Matthew L.Miller ,Jeffrey A.Bloom.《Digital watermarking》,2002.
    [2] Van Schyndel R.G., Tirkel A.Z., Osbrne C.F.,“A digital watermark”, IEEE International Conference on Image Processing, Austin, Texas, USA, 1994, vol.2,pp: 86-90
    [3]王炳锡,陈琦,邓峰森,“数字水印技术”,西安电子科技大学出版社,2003
    [4]胡家声.一种小波域数字彩色水印技术[J].计算机技术与发展,2006,16(6):148-153.
    [5]陈明奇,钮心忻,杨义先,数字水印的研究进展和应用,通信学报,第22卷第5期,pp71-79, May2001.
    [6]向德生,杨格兰,熊岳山.数字水印技术研究[J].计算机工程与设计,2005,26(2):326-328.
    [7]赵翔,郝林.数字水印综述[J].计算机工程与设计,2006,27(11):1946-1950.
    [8] YEUNG M,MINTZER FC . An invisible watermarking technique for image verification[A] . Proc of the IEEE International Conference on Image Processing[C].1997.680-683.
    [9] WONG P W.A public key watermark for image verification and authentication [A].Proc of the IEEE International Conference on Image processing[C].Chicago,Illinois,USA,1998.455-459
    [10] HOLLIMAN M,MEMON N.Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes[J].IEEE Trans Image Processing,2000,9:432-441.
    [11] FRIDRICH,GOLJAN J,BALDOZA A C.New fragile authentication watermark for images[A] . Proc of the IEEE International Conference on Image Processing[C].Vancouver,BC,Canada,2000.10-13.
    [12] WONG P W MEMON N.Secret and public key authentication schemes that resist vector quantization attack[A].Proc of SPIE Security and Watermarking of Multimedia[C].San Jose,USA,2002.1593.1601.
    [13] CELIK M U. Hierarchical watermarking for secure image authentication with localization[J].IEEE Trans on Image Processing,2002,1 l(6):585-595.
    [14]黄继武,谭铁牛,图像隐形水印综述,自动化学报,vol. 26, No.5, Sep.,2000.
    [15] Bender W., Gruhl D., Morimoto N., etc. Techniques for data hiding. IBM Syst.J., vol. 35, nos. 3, 4, pp. 313-336, 1996.
    [16] Hernandez J.J, Perez-Gonzalez F., Rodriguez J.M. and NietoG,”Performance analysis of a 2-D multi pulse amplitude modulation scheme for data hiding andwatermarking still images”,IEEE Journal on Selected Areas of Communications,1998, 16 (4), pp :510-524.
    [17] Wolfgang R.B. and Delp E.J.,“A watermark for digital images”, Proc. IEEE Int. Conference on Image Processing, Lausanne, Switzerland, 1996, vol.3, pp: 219-222.
    [18] B M Macq, Jean-Jacques Quisquater. Cryptology for Digital TV Broadcasting.Proceedings of the IEEE, June 1995, 83(6): 944-957.
    [19] Delaigie J.F., De Vleeschouwer D. and Macq B.,“Low cost perceptive digital picture watermarking method”, Proc. ECMAST'97, Milan, Italy, 1997, pp:153-167.
    [20] Macq B., Delaigie J.F. De Vleeschouwer D.,“Digital watermarking”, Proc.SPIE 2659: Optical Security and Counterfeit Deterrence Technique, 1996, pp: 99-110.
    [21] Kutter M., Jordan F. and Bossen F.,“Digital signature of color images using amplitude modulation,”J. Electron. Imageing, 1998, 7(2), pp: 326-332.
    [22] Kutter M. and Winkler S.,“A vision-based masking model for spread spectrum image water marking,”IEEE trans. Image Processing, 2002, 11(1), pp:16 -25.
    [23] Chen B.,“Design and analysis of digital watermarking, information embeding,and data hiding sustems,”Ph .DThesis, Massachusets Institute of Technology,Cambridge, MA, June 2000.
    [24] Puate J., Jordan F., Using fractal compression scheme to embed a digital signature into an image. In: Proceedings of SPIE Photonics East’96 Symposium,Boston, Massachusetts, 1996.103-124.
    [25] ZhenYao. Fixed point in fractal image compression as waterJunking[A],Proceedings of International Conference on Image Processing[C]. Vol.2, pp:475-478, Sept. 14-17, 2003.
    [26]李冠华,赵耀.基于分形图像编码的数字水印技术的研究[J].铁道学报,2001, 23(4): 48-53.
    [27] Yao Zhao, Qiang Ma, Baozong Yuan. Digital waterJunk based on LIFS[A].In: Proceedings of ICSP2000[C]. Beijing, China, 2000: 1281-1284.
    [28] Li Guan hua, Zhao Yao and Yuan Baozong, Using the fractal code to water Junk images. In: ICSP’02 Proceedings: 829-832.
    [29]李冠华,赵耀.分形数字水印鲁棒性能的改进[J].数据采集与处理,2002, 17(1): 103-107.
    [30]陈少霞,王群生,王强.一种基于四叉树分形编码的数字水印算法[J].陕西工学院学报, 2003, (12)15-18.
    [31]马源,许晓彦,李海量.分形图像编码方法的研究及其改进[J].电气技术, 2007,(03) .
    [32]李冠华,赵耀,袁保宗.一种基于局部迭代函数系统的数字水印技术[J].北方交通大学学报, 2002年2月: 11-14.
    [33] S Tsekeridou, N Nikolaidis, N Sidiropoulos and I Pitas. Copyright Protection of Still Images Using Self-similar Chaotic WaterJunks[A]. ICIP’2000, Vol. 1:411-414, 10-13 Sept. 2000.
    [34] S Tsekeridou, I Pitas, Wavelet-based self-similar waterJunking for still images, Circuits and Systems, 2000. Proceedings. ISCAS 2000 Geneva. The 2000 IEEE International Symposium on, Volume: 1, 28-31 Jun 2000, Pages:220-223 vol. 1.
    [35] Koch E. and Zhao J., Towards robust and hidden image copyright labeling,IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras, Greece, June 1995, pp: 123-132.
    [36] Swanson M. D., Zu B. and Tewtik A. H., Robust data hiding for images,IEEE 7th Digital Signal Processing Workshop(DSP96), Loen, Norway, Sep, 1996,pp: 37-40.
    [37] Cox I. J. And Miller M. L., A review of watermarking and the importance of 84 perceptual modeling. Proc. SPIE 3016: Human Vision and Electronic Imaging II,San Jose, California, USA, Feb. 1997, pp: 92-99.
    [38] Podilchuk C. I., Image-adaptive watermarking using visual models[J], IEEE Journal on Selected Areas in Communications, 1998,16(4), pp: 525-539.
    [39] Bors A. G., Pitas I., Embedding Parametric Digital Signatures in Images, in Proc. Eur. Conf. Signal Processing, EUSIPCO 96, Trieste, Italy.
    [40] Hemandez J., Amado M. and Perez-Gonzalez F.DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure,IEEE Trans. on Image Processing, 2000, 9 (1), pp: 55-68.
    [41] Ruanaidh J. J. K. O., Thierry Pun, Rotation, Scale and Translation Invariant Digital Image Watermarking, ICIP-1997: 536-539.
    [42] Xiang-GenXia, Charles G Boncelet, Gonzalo r Arce, A Multire solution Watermark for Digital Images. ICIP-1997: 548-551.
    [43] Kundur D.,Hatzinakos D.,A Robust Digital Image Watermarking Method using Wavelet-based Fusion, ICIP-1997: 544-547.
    [44] Zeng W., Liu B., On Resolving Rightful Ownerships of Digital Images by Invisible Watermarks. ICIP-97: 552-555.
    [45] Hartung F, Girod B. Digital watermarking of MPEG-2 coded video in the bitstreamdomain. In: Proc. Int. Conf. on A coust., Speech, Signal Processing, Piscataway: IEEE Press, 1997, 4: 2621-2624
    [46] Jordan F, Kutter M, Ebrahimi T. Proposal of a watermarking technique for hiding/retrieving data in compressed and decompressed video[S]. ISO/IEC Doc.JTC1/SC29/WG11 MPEG97/M2281, July1997.
    [47] Langgelaar G C, Lagendijk R L, Biemond J. Real-time labeling methods for MPEG compressed video[A]. In: Proc. 18th Symp. Information The Ory in the Benelux[C], Veldhoen, The Netherlands, May 1997.
    [48] Wang H-J M, Kuo J-C J. An integrated approach to embedded image coding and watermarking. In: Proc. Int. Conf. on Acoust., Speech, Signal Processing, Piscataway: IEEE Press, 1998, 6: 3721-3725.
    [49] I.J.Cox, J.Kilian, T. Leighton, and T. Shamoon, Secure Spread Spectrum Watermarking for Images, Audio and Video, Proc. 1996 International Conference on Image Processing, ICIP'96, Vol. III, pp. 243-246, Jan. 1996.
    [50] Christine I. Podilchuk, Wenjun Zeng, Digital Image Watermarking using Visual Models, in Human Vision and Electronic Imaging II, SPIE 3016, San Jose,CA, USA, February 1997.
    [51] Craver S.,Memon N.,Yee B. L,et al. Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications [J]. IEEE Journalon Selected Areas in Communications, 1998,16(4): 573-586.
    [52]沈俊,葛燧和。“计算机系统中的YUV”.2000.
    [53]邵丹,韩家伟. YUV与RGB之间的转换[J].长春大学学报, 2004,(04)

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700