基于二维条形码的数字图像水印算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数字水印作为一种将特殊信息嵌入媒体数据的技术,近年来已成为国内外研究的热点,并有着广泛的应用前景。通常数字水印应用于数字图像、音频、视频以及其他媒体产品中以进行版权保护和验证多媒体数据的完整性。
     针对数字水印研究的基础——数字图像水印技术,研究者提出了各种不同的算法。目前通用的做法是将水印嵌入到图像的小波变换域,并结合人类视觉系统特性来优化算法。
     通过对数字水印理论的广泛研究,本文提出了一种基于编码和二维条形码的数字水印算法。采用二维条形码作为水印信息,通过编码和按特殊顺序排列实现对水印信息的预处理。水印嵌入策略上,采用离散小波变换,结合人眼视觉特性将水印嵌入到载体图像小波变换的低频域。Matlab7.1的仿真结果表明该算法具有较好的鲁棒性和不可见性。
     本文的研究课题的创新点在于:
     1.通过对二维条形码图像矩阵的编码实现对水印图像的置乱,其优点是算法简单,处理速度快,易于实现。
     2.通过对置乱后的图像矩阵的特殊排列,提高嵌入水印图像的内在关联性,使该算法对剪切等几何攻击的鲁棒性增强。
     3.本文实现了固定阈值的水印检测,克服了一些水印算法检测阈值不固定,需要通过反复实验来确定的弊端。
Digital watermarking, the technology of embedding special information into multimedia data, is a topic that has gained increasing attention all over the world recently. In general, the watermark of digital image, audio, video, and other media products has been proposed for resolving copyright ownership and verifying the integrity of content.
     On the digital image watermarking technology which is the basis of digital watermarking, the researchers propose a variety of algorithms. At present general practice is to embed watermarks into the images’wavelet transform domain, and to combine characteristics of human vision system to optimize the algorithm.
     Based on the widely study of the theory of digital watermarking, we introduce an algorithm of digital watermarking based on encoding and 2D barcode in this paper. We use the 2D barcode as the watermarking information and realize the pro-process of the watermarking information through encoding and forming it according to the specific arrangement. On the watermarking strategy, we use discrete wavelet transform, combining the human eye visual characteristic; embed the watermarking in the low frequency domain of the cover image’s DWT result. Matlab7.1 artificial experiment indicates that this method has a better robustness and invisibility.
     The innovative contributions are presented as follows:
     1.Realize disorder of watermarking image through encoding the 2D barcode image’matrix. The merits of this method are simple, having a good speed, easy to realize.
     2.Improve the internal relevancy of the watermarking image through arranging the disorder image’matrix according to the specific order. So this algorithm has good robustness to cut etc. geometry attacks.
     3.In this paper, we realize fixed threshold watermarking detection , conquers the disadvantage that in some watermarking detection algorithms there are no fixed thresholds, and should make certain of them though repeat experiments.
引文
[1]王育民,张彤,黄继武.信息隐藏——理论与技术[M].北京:清华大学出版社,2006:189.
    [2] Voyatzis G,Pitas I. The use of watermarks in the protection of digital multimedia products [J]. Proceedings of the IEEE.1999, 87 (7):1197~1207.
    [3]张春田,苏育挺,管晓康.多媒体数字水印技术[J].通信学报.2000, 21 (9):46~52.
    [4]Kundur D, Hatzinakos D. Digital watermarking for telltale tamper-proofing and authentication [J]. Proceedings of the I EEE.1999, 87 (7):1167~1180.
    [5]Bender W ,Gruhl D ,Morimoto N ,et al .Technology for data hiding. IBM Systems Journals[J] .1996,35(3&4):313~336.
    [6]Boney L, Tewfik A, Hamdy K. Digital watermarks for audio signals [J]. IEEE Intenrational Conference on Multimedia Computing and System. 1996: 473~480.
    [7]王炳锡,陈琦,邓峰森.数字水印技术[M]西安:西安电子科技大学出版社,2003.
    [8]Tirkel A Z, Rankin G A, Van Schyndel R G, et al. Electronic watermark.[J]. Digital Image Computing,Technology and Applications.1993,1: 666~673.
    [9]Van Schyndel R G, Tirkel A Z, Osborne C F. A digital watermark. First IEEE International Image Processing Conference.1994,2 :86~90.
    [10]王育民,张彤,黄继武等.信息隐藏——理论与技术[M].北京:清华大学出版社,2006:198~199.
    [11]Boneh, D, J. Shaw, Collusion-Secure Fingerprinting for Digital Data [J]. in Advances in Cryptology, Proceeding of CRYPTO’95, vol. 963 of Lecture Notes in Computer Science, Springer, 1995:452~456.
    [12]R. J. Anderson and F. A. P. Petitcolas, On the limits of steganography[J], IEEE Journal on Selected Areas in Communications, vol. 16, pp. 474~481, May 1998.
    [13]I. J. Cox, M. L. Miller and J. A. Bloom. Watermarking applications and their properties [J], in the Int. Conf. on Information Technology’00, Las Vegas, 2000.
    [14]Fridrich J, Baldoza A C, Simard R J. Robust digital watermark based on key-dependent basis function[J]. Proc of Information Hiding'98[C].1998,143~157.
    [15]Hsu C T, Wu J L, Hidden digital watermarks in images [J].IEEE Trans on image Processing, 1999,8(1):58~68.
    [16]Craver S, On public-key steganography in the presence of an active warden [J].Proc of Information Hiding'98[C]. 1998,355~368.
    [17] Herrigle A, Voloshynovskiy S. Copyright and content protection for digital images based on asymmetric cryptographic techniques [J].Proc of Multimedia'98[C].1998,99~112.
    [18]吴亚丽,张敏瑞.数字图像水印技术综述[J].现代电子技术.2007年第21期:81~84
    [19] Cayre F , Macq B1. Data hiding on 3D triangle meshes [J ].IEEE Transactions on Signal Processing , 2003 , 51 (4) : 939~949.
    [20]杜鹏超,唐通林.数字水印研究中常用的测试指标[J].测试技术与应用. 2002年第7期:7~10.
    [21]Jana Dittmann,Petra Wohlmacher,Klara Nahrstedt. Using Cryptography And watermarking Algorithm[J].IEEE Multimedia No.4 2001:54~65.
    [22]VANS,TIRKEL A,OSBORNE C.A digital watermark[C].in International Conference on Image Processing, Austin Tex, IEEE Press,1994.
    [23]VOYATZIS G, PITAS I. Chaotic mixing of digital images and applications to watermarking[C]. in European Conference on Multimedia Applications, Services and Techniques(ECMAST,96),Louvain-La-Neuve,Belgium,1996.
    [24]VOYATZIS G,PITAS I. Chaotic watermarks for embedding in the spatial digital image domain[C]. in Conference on Image Processing(ICIP.98), Chicago,Illinois,USA, Accepted for Publication,1998.
    [25]NIKOLAIDIS A,PITAS I, A region-based technique for chaotic image watermarking[C]. in European Signal Processing Conference(EUSIPCO2000), Tampere, Finland,2000.
    [26]J.Zhao,E.Koch, Embedding Robust Labels into Images for Copyright Protection[J],Proceedings of the Know Rightˊ 95 Conference on intellectual property Rights and New Technologies (Vienna,Austria,Aug),1995:241~251.
    [27]RUANAIDH J, DOWLING W, BOLAND F. Phase Watermarking of digital image[C]. in Processing of IEEE International Conference on Image Processing, 1999.
    [28]KUDUR D, HATZINAKOS D. A robust digital image watermarking method using wavelet-based fusion[J]. in Proceedings of IEEE ICIPˊ 97,1997:544~547.
    [29]RUANAIDH J, PUM T. Rotation, translation and scale invariant digital image watermarking [J]. in Proceedings of IEEE ICIPˊ 97,1997:536~539.
    [30]Puate J,Jordan F,Using fractal compression scheme to embed a digital signature into an image,Proc. of SPIE Photonics Eastˊ 96 Symposium,1996:103~124.
    [31]Davis K J,Najarian K,Maximizing strength of digital watermarks using neural networks[J],Proc. of the International Joint Conference on Neural Network,2001,4:2893~2898.
    [32] Petttcolas F,Anderson R J,Kun M G. Attacks on copyright marking system [A].proc of information Hidingˊ 98[C].1998,213~238.
    [33] S. Craver, N. Memon, B. Yeo, M. Yeung,. Can Invisible Watermarks Resolve Rightful Ownerships?. IBM Research Report RC 20509, July 25, 1996.
    [34]喻正东,何敏.二维条形码应用中的问题与思考[J].档案科技.2006年第9期:52~53.
    [35]曹玉琳.二维条形码的发展及应用[J].中国防伪.2000年10期:62~63.
    [36]二维条形码[EB].http://baike.baidu.com/view/886309.htm. 2007年.
    [37]二维条码的应用[EB].http://www.h3s.cn/barcode/2006831102108.html.2007年.
    [38]杨军,刘艳,杜彦蕊.关于二维码的研究和应用[J].应用科技.2002年第11期:11~13.
    [39]林金莺,曾庆孝.可追溯体系在食品中的应用[J].现代食品科技.2006年第4期:189~192.
    [40]王毅.二维条码技术应用及标准化状况介绍[J].中国标准化.2006年第5期:24~28.
    [41]涂丹,甘亚莉,徐宗琦.一种快速的QR码图像去模糊方法[J].计算机科学与工程.2007年第3期:43~45.
    [42]杨秋英;陈立潮. QR Code码在地理信息系统中的应用[J].电脑开发与应用.2003年第10期:12~13.
    [43]吴正国,夏立,尹为民.现代信号处理技术——高阶谱、时频分析与小波变换[M].武汉:武汉大学出版社,2003年.243.
    [44]赵大为.小波域数字水印算法与应用研究[D].南京:南京航空航天大学,2005.
    [45]王晓艳.基于小波变换的数字水印算法研究[D].兰州:兰州大学,2004.
    [46] Zhao Yuan-Yuan, Zhao Yao. Improved Quantization Watermarking with an Adaptive Quantization Step Size and HVS [J]. KES,2005; LNAI 3681;1212~1218.
    [47]李明建,赖惠成.基于编码和二维条形码的数字水印[J].计算机工程与应用.2008年第2期:67~69.
    [48]陈纯.计算机图像处理技术与算法[M].北京:清华大学出版社,2003.
    [49]张齐.彩色图像水印算法研究[D].哈尔滨:哈尔滨工程大学,2005.
    [50]海涛.城市交通地图道路网络识别与提取[D].合肥:中国科学技术大学,2005.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700