基于图像的脆弱数字水印算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着计算机网络技术和多媒体信息技术的飞速发展,信息安全问题也随之而来。如何保证多媒体信息的真实性和完整性是急需解决的问题。数字水印技术作为信息隐藏技术的重要分支,在解决版权保护、媒体内容真实性和完整性认证方面有着良好的效果。在图像信息安全领域,脆弱数字水印技术在图像内容的真实性和完整性认证方面有着巨大的优势。
     本文介绍了数字水印算法的数学模型、特点和水印性能的评价标准,以及图像置乱技术在数字水印中的应用和可用于图像置乱的亚仿射变换,着重分析了亚放射变换的特点及其在图像置乱中的应用,研究提出了一种基于图像置乱的LSB脆弱水印算法,对原始图像和水印图像都进行了亚仿射置乱变换,能够较好的隐藏图像特征信息,同时把变换次数作为密钥保存。算法易于实现,安全性高。
     研究了离散余弦变换(DCT)在图像处理中的应用以及Hash函数和RSA加密算法,提出了一种将图像的特征信息作为水印信号的脆弱水印算法。图像进行分块之后,对图像块进行离散余弦变换,将变换系数作为图像的特征信息,利用Hash函数和RSA加密算法加密得到图像块的水印信号。由于每幅图像的水印信息都是从原图的特征中提取的,所以不同的图像嵌入的水印都是不同的,同时也不需要为水印信息开辟存储空间。水印信息的特定来源和加密过程提高了算法的安全性,图像的分块为篡改定位提供了良好的条件。
     研究了小波变换的提升算法和混沌序列在密钥中的应用,提出了一种基于整数小波变换和混沌序列的脆弱水印算法。图像变换使用了整数到整数映射的小波提升算法,在重构时能够实现图像的无失真变换。水印信息嵌入到小波系数的高频系数中,嵌入位置由混沌序列和小波系数的四叉树结构决定,保证了算法的复杂性和安全性。本算法具有较高的脆弱性,能够使用到要求较高的医学图像和法庭举证中。
The rapid development of computer network technology and digital multi-media technology has brought about a slew of issues with regard to information security. The fact that digital products can be easily altered, pirated and illicitly distributed has confronted us with a new set of challenges. The verification of the integrity and authenticity of digital products is a problem that must be solved and it must be solved now. As an important branch of information hiding, digital watermarking technology has played an irreplaceable role in resolving IPR disputes and verifying the integrity and authenticity of digital products. Fragile watermarking, as part of the digital watermarking technology, is an academic hotspot for researchers and scholars around the world. An in-depth analysis of fragile watermarking technology is presented in this document.
     After briefly exploring the existing theories and algorithms about digital watermarking, image scrambling techniques are introduced in this thesis. The advantages and disadvantages of Asia affine transform are analyzed and a fragile watermarking algorithm based on LSB and image scrambling is presented in this paper. Since both the original image and watermark image in the algorithm were scrambled, a high level of invisibility of the watermark image is achieved. Furthermore, the number of Asia affine transforms applied to both watermark image and original image is regarded as the private key, which has improved the security of the whole algorithm.
     The second fragile watermarking algorithm proposed in this paper based on DCT and RSA, in which the features extracted from the original image is used as the watermark signal. First the original image is divided into blocks of predetermined size and DCT is applied to each and every block. DCT coefficients are viewed as the image feature and watermark signal can be obtained by applying Hash function and RSA cryptographic technique to the extracted feature, namely the DCT coefficients. Since the watermark signal is obtained from the original image, the proposed algorithm is self-adaptive and no extra memory is required for watermark information. The source of watermark signal and the encrypting processing have significantly enhanced the security of the algorithm and the dividing of the original image is very effective for tampering localization.
     After exploring the foundmentals of wavelet transform, lifting technique of wavelet transform and chaotic sequence, a novel fragile watermarking technique based on integer wavelet transform and chaotic sequence was presented in this document. The watermarking embedding process was determined by chaotic sequence and coefficients of integer wavelet transform. By so doing, the complexity and security of the proposed scheme have been substantially improved. Theoretical analysis and experimental results both show that the proposed scheme is highly fragile to changes to the watermarked image. Moreover, the medical and forensic applications of the proposed algorithm are also explored in this thesis.
引文
[1]G Voyatzis. Embedding Robust Watermarks by Chaotic Mixing[C].13thInternational Conference on Digital Signal Processing (DSP'97), Santorini,Greece,1997,1:213-216.
    [2]江雪梅.数字作品版权保护与认证的若干基本理论及关键技术研究[D].武汉:武汉理工大学,2007.
    [3]赵玉霞.数字水印关键技术研究及应用[D].西安:西北大学,2008.
    [4]徐茂智,游林.信息安全与密码学[M].北京:清华大学出版社,2007.
    [5]李赵红.基于数字水印的图像认证技术及其关键问题研究[D].北京:北京交通大学,2008.
    [6]Seok Jongwon, Malik Hafiz. Audio watermark detection using undetermined [J].8th International Conference on Independent Component Analysis and Signal Separation, ICA 2009, March 2009:637-645.
    [7]Rathore, Shujaat Ali, Gilani, S.A.M. Enhancing invisibility and robustness of DWT based video watermarking scheme for copyright protection [J].2007 International Conference on Information and Emerging Technologies, ICIET, July 2007:116-120.
    [8]Kourkchi H, Ghaemmaghami S. Improvement to a Semi-fragile Watermarking Scheme against a Proposed Counterfeiting Attack[C]. Proceedings of 11th International Conference on Advanced Communication Technology. Phoenix Park:2009:1928-1932.
    [9]Xinmin Zhou, Weidong Zhao. A Semi-fragile Watermarking Scheme for Content Authentication of Chinese Text Documents[C]. Proceedings of 2nd IEEE International Conference on Computer Science and Information Technology. Beijing:2009:439-443.
    [10]Lin S D, Chinfeng Chen. A robust DCT-based watermarking for copyright protection [J]. Consumer Electronics IEEE Transactions, Aug.2000,146 (3):415-420.
    [11]R. S. Alomari, A. Al-Jaber. A fragile watermarking algorithm for content authentication. Int[J]. Journal of Computing & Information Sciences, April 2004,2, (1):27-37.
    [12]李东勤.用于图像认证的脆弱数字水印算法研究[D].哈尔滨:哈尔滨理工大学,2007.
    [13]苏勇.多重水印算法研究[D].武汉:武汉理工大学,2009.
    [14]于鸿越.基于小波变换的数字图像水印技术研究[D].哈尔滨:哈尔滨工程大学,2009.
    [15]Retsas, I. DCT-Based Watermarking Algorithm Robust To Cropping and Compression[D]. Performer:Naval Postgraduate School, Monterey, CA. Mar 2002:137.
    [16]Dapena, Adriana, Ahalt, Stanley. A hybrid DCT-SVD image-coding algorithm[J]. IEEE TRANS CIRCUITS SYST VIDEO TECHNOL.2002,12 (2):114-121.
    [17]Imran Khanl, Syed Wajahat Razal, Dimitrios A. Karras, et al. A Second Order Spread Spectrum Watermarking Scheme Using Multi-Threshold Wavelet Codec[C].IST 2006 International Workshop on Imaging Systems and Techniques Minori, Italy 29 April 2006: 174-179.
    [18]L.A.Elrefaey, M.E.Allam, H.A.Kader, et al. Robust blind image-adaptive watermarking[C]. National Radio Science Conference,2008(3):1-13.
    [19]Ibrahim Kamel, Qutaiba Albluwi. A robust software watermarking for copyright protection[J]. Computers & Security,2009,28:395-409.
    [20]A Nikolaidis, I Pitas. A Region-based Technique for Chaotic Image Watermarking[C]. EURASIP European Signal Processing Conference (EUSIPCO2000), Tampere, Finland, 2000:5-8.
    [21]张弘.图像脆弱性数字水印技术研究[D].北京:中国科学院研究所院,2007.
    [22]李伟君.基于图像认证的脆弱与半脆弱水印技术研究[D].大连:大连理工大学,2007.
    [23]Al-Gindy, Ahmed N,Ahmad, et al. A new blind image watermarking of handwritten signatures using low-frequency band DCT coefficients [J]. ICSPC 2007 Proceedings 2007 IEEE International Conference on Signal Processing and Communications, November 2007: 1367-1370.
    [24]张宪海,杨永田.一种双重变换域图像半脆弱水印算法[J].计算机工程与应用,2007,43(9):59-62.
    [25]田岩,彭复员.数字图像处理与分析[M].武汉:华中科技大学出版社,2009:188-208.
    [26]段贵多.针对版权保护和内容认证的图像数字水印研究[D].成都:电子科技大学,2005.
    [27]Ghouti.L, Bouridane.A, Ibrahim.M.K, et al. Digital Image Watermarking Using Balanced Multiwavelets[J]. IEEE Transactions on Signal Processing,2006.54 (4):1519-1536.
    [28]H. H. Tsai, D. W. Sun. Color Image Watermark Extraction Based on Support Vector Machines[J]. Information Sciences,2007,177:550-569.
    [29]李斌.基于小波的数字水印算法设计与实现[D].成都:电子科技大学,2007.
    [30]刘芳,贾成.图像置乱在数字水印中的应用研究[J].通信技术,2008,41(09):165-167.
    [31]柏森,曹长修.亚仿射变换的性质及其应用[J].计算机辅助设计及图形学学报,2003,15:205-208.
    [32]邹玮刚,洪春勇.一种亚仿射变换的快速构造法及其性质与应用[C].第十二届全国图象图形学学术会议,2005.
    [33]张弘.数字图像处理[M].北京:机械工业出版社,2007:26-49.
    [34]Chu W.C. DCT-based image watermarking using sub-sampling [J]. Multimedia IEEE Transactions,March 2003,15 (1):34-38.
    [35]Chin-Chen Chang,and Henry Chou. A New Public-key Oblivious Fragile Watermarking for Image Authentication Using Discrete Cosine Transform[C].2008 Second International Conference on Future Generation Communication and Networking Symposia.Hainan 2008: 11-14.
    [36]R. L.Rivest, A.Shamir, L. Adleman. A Method for Obtaining Digital Signatures and Public-key Cryptosystems[J]. Communications of the ACM,1978,21 (2):120-126.
    [37]陈佰林.基于小波变换的音频数字水印研究[D].苏州:苏州大学,2007.
    [38]S.G. Mallat. A Theory for Multiresolution Signal Decomposition:The Wavelet Representation[J]. IEEE Transaction On Pattern Analyse And Machine Intelligence,1989, 11, (7):674-693.
    [39]Zhang Jiahe,Zeng Wenhua,Li Chenling. A Fragile Watermarking Scheme Based on Integer Wavelet Transform[C]. Proceedings of 2008 IEEE International Symposium on IT in Medicine and Education.Xiamen:2008:1028-1033.
    [40]L.B. Zhang, K.Wang. An Image Compression Algorithm Based on Integer wavelet Transform[J]. Journal of Software,2003,Vol.14, No.5.
    [41]冯前进,陈凌剑,杨丰.基于整数小波变换的医学图像易碎水印方法[J].中国图象图形学报,2006,11(5):736-741.
    [42]Li Jian, Li Shenghong. A semi-fragile watermark scheme based on the logistic chaos sequence and singular value decomposition [J]. Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University,2009,43:1144-1148.
    [43]李东勤,林克正.基于混沌映射的半脆弱图像水印算法[J].计算机技术与发展,2008,18(11): 156-158.
    [44]刘伟.基于混沌与小波变换的图像数字水印研究与应用[D].山东:山东理工大学,2007.
    [45]Chen L.J. A Noval Fragile Watermarking Method For Medical Images Using Quadtree Structure[C]. Proceeding of the 2005 IEEE, Shanghai, China, Sep 2005:6258-6261.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700