图像信息隐藏容量的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
目前,数字水印和信息隐藏技术已经形成了一定的理论基础,众多学者提出了大量的数字水印算法,于此同时,数字水印的容量问题成为一个令人关注的课题。水印的嵌入量、不可见性以及鲁棒性互相影响和制约。如何在达到一定嵌入容量的情况下,提高算法的鲁棒性,使水印能在各种攻击下,保持较高的检出率而又不影响原始图像的质量,是数字水印技术研究中遇到的主要问题。
     本文着力于研究信息隐藏及数字水印的容量问题,并将容量与数字水印算法结合起来。本文的主要结果有以下三个方面:
     1.提出了一种基于JPEG量化的容量自适应数字图像水印算法,从JPEG量化出发,对可嵌入水印的位置进行选择。在此基础上,结合人眼视觉模型和图像的纹理特性,得出水印最大可嵌强度,并给出相应的容量估计。实验结果表明,该算法能够同时满足压缩和水印嵌入的要求,不仅具有较好的不可见性和鲁棒性,而且在保证这些性能的基础上实现了自适应容量,较好地协调了水印三要素间的关系。
     2.提出了一种彩色图像多通道多水印算法,根据彩色图像的RGB三个通道,嵌入不同强度的三个水印,该算法可以抵抗裁剪,加噪,模糊,压缩等攻击。在保证水印不可见性的同时,多种水印相互配合,使得每个水印针对一些特定的处理方法有比较好的检测性能,从而实现了算法的全面鲁棒性。该算法容量大,鲁棒性强,相比单一水印算法具有较好的版权保护优势。
     3.提出了一种彩色图像盲水印算法,在亮度空间中嵌入水印,并结合图像的纹理特征,对纹理复杂度不同的分块选取不同的隐藏位置以嵌入不同强度的水印,同时把图像相关纹理特征信息记录下来作为提取密钥。该算法鲁棒性强,并可对图像的隐藏容量进行估计。
At present, the digital watermarking and information hiding techniques have formed a theoretical basis, at the same time, a large number of digital watermarking algorithms had been proposed. The capacity of digital watermarking has become a major concern. The capacity, the invisibility, as well as the robustness of watermarking interact with one another. On condition of a certain capacity, it is the main point that how to improve the robustness of the watermarking, and maintain a higher detection rate without affecting the quality of the original image.
     This paper focuses on the capacity of information hiding and digital watermarking. There are three contributions in this thesis as follows:
     1. An algorithm of capacity adaptive digital image watermarking based on JPEG quantity was put forward. First, from the principle of JPEG quantity, the embedding positions could be selected. Then, the maximum watermark amplitude and watermark capacity were obtained by using the human vision system and image feature. At last, a simple amending polarity method was used to embed and extract the watermark. The simulation results show that this algorithm not only show good performance for embedding and compression requirements, but also have good invisibility and robustness. And this algorithm has realized the adaptive capacity. Thus, the relationship among the invisibility, robustness and capacity has been well balanced.
     2. Based on RGB color, a multi-channel image watermarking algorithm was proposed. The image could embed in three different watermarks, which were resilient to cropping, noising, bluring, compression and other attacks. Each watermark can afford specific attacks, so this algorithm has a more overall robustness. Compared to a single watermarking algorithm, this algorithm has larger capacity and robustness for copyright protection.
     3. A blind watermarking algorithm for color images was put forward, which used the brightness of the image to embed information. Combine with the texture characteristics of different images to select each sub-block's hiding positions. Then put down the image texture features as a key for extraction. With good invisibility and robustness, this algorithm has realized the adaptive capacity.
引文
[1]Petitcolas F,Anderson R,Kuhn M.Information hiding-a survey.Proc of the IEEE,1999,87(7):1062-1077
    [2]Bender W,Gruhi D,Morimoto N,etc.Techniques for data hiding.IBM System Journal.1996:313-336
    [3]I.Cox,Matthew L.Miller,Jeffrey A.Bloom.Digital watermarking.2002
    [4]刘瑞祯,谭铁牛.数字图像水印研究综述.通信学报.2000,21(8):39-48
    [5]易开详,石教英,孙鑫.数字水印技术研究进展.中国图像图形学报.2001,6A(2):111-117
    [6]Q Ruanaidh,W bowling,F Boland.Watermarking digital images for copyright protection.IEEE proc on Vision,Signal and Image Processing.1996,143(4):250-256
    [7]I Cox,Matthew L,Miller.A Review of Watermarking and the Importance of perceptual modeling.SPIE Proc on Human Vision and Electronic Imaging.1997,3016:92-99
    [8]Cox I,Miller M,Bloom J.Digital Watermarking.USA,Mordan Kaufmann Publishers,2002:chapter 1-2
    [9]吴秋新,钮心忻,杨义先等.信息隐藏技术一隐写术与数字水印[M].北京:人民邮电出版社,2001
    [10]王颖,李象霖.数字水印的信道容量研究描述.电子与信息学报.2006,28(5):955-960
    [11]Perez-Gonzalea F,Hernandes J,Balado F.Approaching the capacity limit in image watermarking:a perspective on coding tech for data hiding applications.Signal Proc 2001,86(6):1215-1238.
    [12]Su J,Eggers J,Girod B.Capacity of digital watermarks subjected to an optimal collusion attack,EUSIPCO,Tampere,Finland,September 2000.
    [13]Eggers J,Bauml R,Girod B.Digital watermarking facing attacks by amplitude scaling and additive white noise.The forth ITG Conference on Source and Channel Coding,Berlin,Jan.2002:28-30
    [14]Moulin P,O'Sullivan J.Information Theoretic Analysis of Info.Hiding.IEEE Trans.On Information Theory,2003,49(3):563-593.
    [15]Moulin P,O'sullivan J.Information-theoretic analysis of watermarking.Proc of the Int.Conference on Acoustics,2000,6:3630-3633.
    [16]O'SULLIVAN J,MOULIN P,ETTINGER J.Information theoretic analysis of steganography[C]Proc IEEE Int Symp on Information Theory,Boston,1998:297.
    [17]Eggers J,Bauml R,Girod B.A communications approach to image steganography.Proc of SPIE,Security and Watermark of Multi-media Contents 4,San Jose,Jan,2002.
    [18]Cachin C.An Information-Theoritic Model for Steganography[C].Proc of the Second Int.Workshop on Information Hiding,Portland,Oregon,USA,Lec.notes in CS,Springer-Verlag,1998.
    [19]Scott C,et al.Resolving rightful Ownerships with Invisible watermark tech.:Limitations,Attack,and Implications[J].IEEE journal,1998,16(4):573-586.
    [20]Craver etc.Technical Trials and Legal Tribulations[J].Communications of ACM,1998,41(7):45-54.
    [21]江渊.基于图像的数字水印技术研究:[硕士学位论文].西安:西北工业大学.2007.
    [22]I Cox,M Miller.The 1~(st) 50 Years of Electronic Watermarking[J].EURASIP Journal of ASP,2002:126-132.
    [23]R.Schyndel,A.Tirkel.A digital watermark.Int.Conference on Image Proc.,vol.2,1994.
    [24]B.Pfitzmann.Information hiding terminology.First Information hiding workingshop:347-350.
    [25]R.Anderson.Information Hiding.Vol.1174 of Lec.Notes in CS.Berlin,New York,1996.
    [26]P.Wong and E.Delp.Security and watermark of Multi-media Contents.Proc.of the Society of Photo-optical Instrumentation Engineers,vol.3657,1999.
    [27]A.Tirkel,G.Rankin,R.Schyndel,etc.Electronic watermark.Proc.DICTA 1993:666-672.
    [28]R.Schyndel,A.Tirkel,et al.A digital watermark.Int.Conference on Image Proc.,vol.2,1994:86-90,.
    [29]曾兴雯,刘乃安.通信中的扩展频谱技术,西安:电子科技大学出版社,1995.
    [30]A.Tirkel,R.Schyndel,C.Osborne.A two-dimensional watermarking.DICTA 1995.
    [31]I Cox,M.Miller.A ckellips Watermarking as Communications with Side Information[J].Proc.IEEE,1999,87(7):1127-1141.
    [32]I Cox,etc.Secure Spread Spedctrum Watermarking for Multi-media[R].Technical Report,Princeton,1995.
    [33]I Cox,etc.Secure Spread Spectrum Watermarking for Images,Audio and Video[C].ICIP'96,vol.3,1996:243-246.
    [34]柴亚琴,唐向宏.基于人眼视觉模型的数字图像水印容量.杭州:电子科技大学学报,2006,26(1):42-45.
    [35]邵亚非,吴国威,张利,林行刚.基于容量估计的数字水印算法.电子学报,2002(10):1441-1444.
    [36]H.Jingsha.The 8~(th) International Conference for Young Computer Scientists [C].Beijing:Beijing World Publishing Corporation,2005:489-495.
    [37]高海英,杨义先.信息隐藏的容量分析.计算机工程.2005,32(4):12-14.
    [38]Moulin P,Joseph A.Information theoretic Analysis of Information Hiding[J].IEEE Trans.2003,49(3):563
    [39]Sullivan J,Moulin P,Ettinger J.Information-Theoretic Analysis of Steganography[C].Proc.of IEEE Int.Symp.on IT,Boston,MA,1998-08:297.
    [40]Moulin P,Sullivan J.Information theoretic Analysis of Information Hiding[C].IEEE Int.Symp.on IT,Italy,2000-06:19.
    [41]Cohen A,Lapidoth A.Generalized Writing on Dirty Paper[C].Proc.of IEEE Int.Symp.on IT,Switzerland,2002-06:227.
    [42]Cohen A,Lapidoth A.The Gaussian Watermarking Game[J].IEEE Trans.IT,2002,48(6):1639-1667.
    [43]Somekh-Baruch,Merhav.On the Capacity Game of Public Watermarking System[J].IEEE Trans.IT,2004,50(3):511-524.
    [44]Merhav N.On Random Coding Error Exponents of Watermarking Codes[J].IEEE Trans.IT,2000,46(3):420-430.
    [45]Steinberg Y,Merhav N.Identification in the Presence of Side Information Weith Application to Watermarking[C].Proc.of IEEE Int.Symp,2000-06:45.
    [46]Chen B,Wornell G W.A Class of Provably Good Methods for Digital Watermarking and Information Embedding[J].IEEE Trans.2001,47(5):1423-1443.
    [47]Karakos D.Digital Watermarking,Fingerprinting and Compression:An Information-theoretic Perspective[D].http://tiger.technion.ac.il/users/merhav.
    [48]Karakos D.A Relationship Between Quantization and Watermarking Rates in the Presence of Additive Gaussian Attacks [J].IEEE Trans.,2003,49(8):1970-1982.
    [49]BARNI M,BARTOLINI F,DEROSAA,etc.Capacity of full frame DCT image watermarks [J].IEEETrans.IP,2000,9(8):1450-1455
    [50]MOULIN P,SULLIVAN J.Information theoretic analysis of watermarking[C].IEEE Int.Conf.on Acoustics,2000,6:3630-3633.
    [51]COHEN A,LAPIDOTH A.The Gaussian watermarking game [J].IEEE Trans.IT,2002,48(6):1639-1667.
    [52]SOMEKH-BARUCHA,MERHAVN.On the capacity game of public watermarking systems [C].IEEE Int.Symp.on IT,Lausanne,2002:223.
    [53]COHEN A,LAPIDOTH A.Generalized writing on dirty paper[C].IEEE Int.Symp.on IT,Lausanne,2002:227.
    [54]MOULIN P,MIHCAKMK.Aframework for evaluating the data-hiding capacity of image sources [J].IEEE Trans,on IP,2002,11 (9):1029-1042
    [55]MOULIN P,JOSEPHA.Sullivan J.Information Theoretic Analysis of Information Hiding [J].IEEE Trans,2003,49(3):563-593.
    [56]WONG PH W,AU OCA capacity estimation technique for jpeg-to-jpeg image watermarking [J].IEEE Trans.,2003,13(8):746-752.
    [57]WONG PH W,YEUNG G Y M,AU O C.Capacity for jpeg2000-to-jpeg2000 images watermarking[C].ICME'03.Proc.2003 Int.Conference on Multimedia and Expo,2003,2:485-488
    [58]SU J,EGGERS J,GIROD B.Analysis of digital watermarks subjected to optimum linear filtering and additive noise [C].IEEE Trans Signal Proc,2001,81(6):1141-1175.
    [59]SU J,EGGERS J,GIROD B.Optimum attack on digital watermarks and its defense[C].Conference Record of the 34th Asilomar Conference on Signals,Systems and Computers,2000,(2):1836-1840.
    [60]O'SULLIVAN J,MOULIN P,ETTINGER J.Information theoretic analysis of steganography[C].Proc IEEE Int Symp on IT Boston,MA,1998:297.
    [61]MOULIN P,MIHCAK M.Aframework for evaluating the data-hiding capacity of image sources[C].In IEEE Trans on IP,2002,11(9):1029-1042.
    [62]MOULIN P,MIHCAK M.The Parallel-Gaussian watermarking game[C].In IEEE Trans on IT,2004,50(2):272-289.
    [63]KALKER T,WILLEMS F.Capacity bounds and constructions for reversible data-hiding[C].the forteenth Int.Conference on Digital Signal Proc,2002,1:71-76.
    [64]BAUDRY S,NGUYEN P,MAITRE H.Some theoretical bounds on the capacity of watermarking channels with geometrical distortions[C].Int.Conference on IP,2001,3:995-998
    [65]伍宏涛,朱柏承,杨义先.数字水印的二进制对称信道容量理论[J].北京邮电大学学报,2005,28(增):26-30
    [66]伍宏涛,杨义先,钮心忻.改进的信息隐藏的信息论理论模型[J].计算机工程与应用,2004(6):34-36.
    [67]Costa M.Writing on Dirty Paper[J].IEEE Trans.On IT,1983,IT-29(3):439-441.
    [68]Moulin P,Joseph A.Information-theoretic Analysis of Information Hiding[J].IEEE Trans.,2003.
    [69]A Cohen,Lapidoth A.The Gaussian Watermarking Game[J].IEEE Trans.on IT,2002,48(6):1639-1667.
    [70]Somekh-Baruch A,Merhav N.On the Capacity Game of Public Watermarking System[J].IEEE Trans.On IT,2004,50(3):511-524.
    [71]T Liang,J Rodriguez.Robust image watermarking using inversely proportional embedding[A].Proc.of the forth IEEE SW Symposium on Image Analysis and Interpretatio[C].2000,Austin,Texas,USA:IEEE.
    [72]B Tao,B Dickinson.Adaptive watermarking in the DCT domain[A].Proc.of the int.conference on IP[C].ICIP 96,Lausanne,Switzerland.
    [73]刘琦.JPEG静态图像压缩标准[J].计算机科学技术与应用.1994,第1期:8-18.
    [74]ISO/IEC JTC 1 DIS 10918-1,Digital Compression and Coding of ContinuesTone Still Images[A],Part 1,Requirements and Guidelines,July 1992.
    [75]Voloshynovskiy S,et al.A stochastic approach to content adaptive digital image watermarking.In 3rd International Workshop on Information Hiding,Dresden,Germany,September 29-October 1st,1999,Vol.LNCS 1768 of Lecture Notes in Computer Science:270-285.
    [76]桑茂栋,赵耀.基于几何矩的抵抗RST攻击的数字图像水印[J].电子与信息学报.2007,第29卷第1期:76-80.
    [77]胡杨,柴亚琴.基于小波域量化的数字图像水印容量估计[J].交通与计算机.2007,第1期:136-138.
    [78]MS Kankanhalli,K Ramakrishnan.Adaptive visible watermarking of images [A].Proceedings of IEEE International Conference on Multimedia Computing and Systems.1999,Florence Italy:IEEE.
    [79]Kutter M,Jordan F,Bossen.Digital signature of color images using amplitude modulation,Storage and Retrieval for Image and Video Databases.SPIE.1997:518-526
    [80]Ingemar J Cox,etc.王颖,等译.数字水印.北京:电子工业出版社.2003
    [81]梅蕤蕤,卢宗庆,谢维信.一种彩色图像自适应数字水印算法.深圳大学学报,2001。18(3):19-27
    [82]鲍昀霞 1 何东健 基于DCT的彩色图像水印算法微电子学与计算机2007年第24卷第1期:91-93
    [83]Gonzalez R C,Woods R E.Digital image processing[M].Prentice Hall Press Upper Saddle River,N J,2002
    [84]马小虎、张明敏、严华明等,多媒体数据压缩标准及实现,清华大学出版社,1996
    [85]钟玉琢,多媒体技术(高级),清华大学出版社,1999.7:65-732
    [86]崔屹,数字图象处理技术与应用,电子工业出版社,1997.3

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700