基于变换域的数字水印方法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着当今社会计算机网络技术的迅猛发展,电子产品越来越多的出现在人们的生活当中。这一方面给人们的生活带来了极大的方便,但随之而来的也带来了如何保护知识产权的问题。由于数字产品极易被篡改和复制,这给数字产品的安全性带来了极大的威胁。而数字水印的出现可以说是为保护知识产权提供了一个很有效的解决办法。数字水印技术,就是在不影响产品内容的前提下,在载体中嵌入不易被察觉的信息,从而达到保护数字产品的目的。目前许多公司已经成功开发了数字签名系统并且已经将其应用在电子商务活动中。同时数字水印技术也广泛应用在数字产品电子交易系统、票据防伪系统和影视处理系统中.数字水印技术在隐蔽通信领域中也具有非常重要的用途。在医学、制图、数字成像,数字图像监控,多媒体索引和基于内容的检索等领域,数字水印是被当做隐藏标识来使用的。
     与以往相比,现在的数字水印主要是在变换域中进行的,主要包括了,小波变换,余弦变换,有限Radon变换、脊波变换域水印等等。以前的研究主要是集中在小波变换域来进行的。但是由于小波只适合于表征零维(点)奇异性,而图像中广泛存在一维奇异性,即线性奇异的,例如光滑的曲线构成的物体边缘。为了更有效表示图像的特征,我们应该探寻新的方法,由此人们提出了有限脊波变换方法。自从有限脊波变换被提出以来,其就逐渐的成为了人们研究的热点,各种脊波域水印也相继被提出。
     本文研究的是有限脊波域的数字水印。首先详细的介绍了数字水印技术和有限脊波变换理论。然后我们将介绍集中脊波域的数字水印。我们详细的介绍了这三种数字水印方法的每一个步骤:水印的生成、水印的嵌入、水印的检测和实验结果。第一种方法是基于能量最大方向的数字水印,该方法就是要将数字水印嵌入到能量最大方向的系数当中,这里嵌入的是中频系数。第二种方法基于最大后验概率准则的数字水印方法,其基本思路就是要根据变换后的有限脊波系数的分布特点来进行估计。观察发现,变换后系数的特点符合拉普拉斯分布。我们就根据这一特性,使用最大后验准则来估计,最终得到适合嵌入水印点的系数。第三种方法是根据奇异性来选择嵌入水印的点的,我们知道小波在处理点奇异时是最优的,而Radon变换在处理线性奇异的点时是最有效的,因此我们可以通过有限Radon变换,将原始图像的线的奇异性转化为Radon域点的奇异性。再根据奇异性来嵌入水印。三种方法的效果均比较理想。本文的最后就是总结和对未来的展望,主要是对前面所提出的三种方法进行总结,并找出其中的不足然后对未来的研究方向进行安排。
Now, as the rapid development of computer and network, there are more and more electronics around us. It brought great convenience, but also a problem, how to protect intellectual property rights. As digital products can easily be altered and replicated, it is very dangerous. We can say that the watermarking is a very effective method to protect intellectual property rights. Digital watermark is a new and effective way to protect digital products and to maintain the data security.
     It is a very practical information hiding technique. Watermarks can testify the ownership of the above. What more,watermarks can be the evidence in front of the court. In a word. Digital watermark can be an effective method to protect knowledge property and multimedia data.
     Digital watermarking is mainly carried out in the transform domain, including the, DWT, DCT, FRAT, FRIT and so on. Previous studies mainly concentrated on the wavelet transform domain. However, wavelet is suitable for zero degree(point singularities, Images, with its contours and borders have 1-D singularities, which wavelet is not a optimal method to process. So, we should find some new and effective method. Since the FRIT is proposed, it becomes the focus.
     This paper also studies the watermarking based on FRIT. First, we introduce the watermark and the FRIT. Then we detail introduce every steps:watermark generation, watermark embedding, watermark detection and experimental results.
     The first watermarking is based on the maximum energy direction, and our purpose is embedding coefficients to these direction. The second method is based on the MAP(Maximum A Posterior)criterion. The distribution of the FRIT coefficients is Laplace distribution.from these we choose the coefficients that embeds watermarking. The third method is based on the singularity. This method selects the coefficients by the singularity. It is more excellent for FRAT (finite Radon transform) to deal with linear singular image. However, since edges in images are typically curved, in order to obtain an effective image representation through the FRAT, the image is partitioned into blocks of side-length such that an edge appears as a straight line. By block FRAT, linear singularity is transformed into point singularity. Using the multi-scale wavelet transform to calculate the singularity of each point. Finally, the FRAT is performed for each block, the most singular coefficients are selected, and eventually the watermark is embedded.
     At last we summarize these three methods and propose the study direction for future.
引文
[1]Pen Youju Zhou Zili, "Research on Architecture and Key Technology of Information Security Emergency Response" Information Engineering and Computer Science,2009. ICIECS 2009. International Conference on, no.10,p1~4,2009.
    [2]Wade h.Baker;Linda wallace; "Is Information Security Under Control?:Investigating Quality in Information Security Management" Security&Privacy IEEE[j],vol 5,p36-44,2007.
    [3]Lawrence A.gordon,Martin p,lod," Budgeting process for information security expenditures ",
    Communications of the ACM[j],vol49,no.1 p121-125,2006.
    [4]Coelho, F.B. Barbar, J.S. do Carmo, G.S.B. The Use of Watermark and Hash Function for the Authentication of Digital Images Mapped through the use of the Wavelet Transform, Internet and Web Applications and Services,2007. ICIW'07. Second International Conference on, Vol4,p48,2007;
    [5]R. G. Van Schyndel, A. Z. Trikel, N. Mee, C. EOsbome. A Digital Watermark. Proceedings of IEEEInternational Conference on Image Processing,1994,2:86-90
    [6]Zhao Ruimei,Lianhua," A Watermarking Algorithm by Modifying AC Coefficies in DCT Domain "Proceedings of the 2008 International Symposium on Information Science and Engieering[j] vol20,p159-162,2008.
    [7]刘俊景,蒋华.一种基于离散余旋变化与奇异值分解的数字图像水印算法[J].微电子学与计算机,2007,24(10):111-114.
    [8]张志禹,于海燕,张九龙,等.一种基于脊波域的盲检数字水印算法[J].电子学报,2007,35(9):1804-1808.
    [9]Campisi P, Kundur D, Neri A. Robust Digital Watermarking in the Ridgelet Domain [J]. IEEE Signal Processing Letters,2004,11(10):826-830.
    [10]Sang-Heun Oh; Sung-Wook Park; Byung-Jun Kim;" DWT (discrete wavelet transform) based watermark system" Consumer Electronics,2002. ICCE.2002 Digest of Technical Papers. International Conference on 192-193 2002.
    [11]Moulin, P. O'Sullivan, J.A "Information-theoretic analysis of information hiding "Information Theory, IEEE Transactions on[j];vol 49 563-593,2003.
    [12]Mohamed G El-Tarhuni "Application of Adaptive Filtering to Direct-Sequence Spread-Spectrum Code Acquisition ", Wireless Personal Communications[J];vol 8,185-204,1998.
    [13]孙圣和,陆哲明,牛夏牧.数字水印技术与应用.北京:科学出版社,2004,1-4
    [14]Hyun Wook Kim Hae Kyung Jung "Optimal selective correlation detector for spread-spectrum watermarking systems" Signal Processing and Its Applications,2007. ISSPA 2007.9th International Symposium on,1-4,12,2007.
    [15]E. J. Candes, D. L. Donoho. Ridgelets:A key to higher-dimensional intermittency?Phil. Trans, 1999,2495-2595
    [16]Minh. N. Do, Martin Vetterli. The Finite Ridgelet Transform for Image Representation. IEEETransactions on Image Processing.2003.12(1):16-28
    [17]袁修贵,张安.Ridgelet变换及其在图像降噪中的应用.计算机工程与应用.2004,1:83.85
    [18]M N Do,M Vetterli. Orthonormal finite ridgelet transform forimage compression[A]. IEEE Image Processing (ICIP) [C].Vancouver,Canada,2000.
    [19]侯彪,刘芳,焦李成.基于脊波变换的直线特征检测.中国科学E辑).2003,33(1):65-73.
    [20]D L Donoho. Fast Ridgelet Transforms in Dimension 2 [R] USA:Stanford Univ,Dept Statist,Stanford,CA,1997.
    [21]刘雪霞,彭玉华,“一种基于角度的正交FRIT变换及其在图像去噪中的应用”电子学报[J]vol5 Nol,2007.
    [22]Liu.F,Gao.s," Segmentation of MR image based on maximum a posterior" Engineering in Medicine and Biology Society,2001. Proceedings of the 23rd Annual International Conference of the IEEE 2681-2684 vol.3 2003
    [23]Mahony, R.E.; Brushe, G.D.; Moore, J.B.; Hybrid Algorithms For Maximum Likelihood And Maximum A Posterior Sequence Estimation.Signal Processing and Its Applications,1996. ISSPA 96., Fourth International Symposium on 451-454,2002,8
    [24]Barni M, Bartolini F, Piva A. Improved Wavelet-Based Watermarking Through Pixel-Wise Masking [J]. IEEE Transactions on Image Processing,2001,10 (5):783-791.
    [25]Andrews, K. Putz, W. Nussbaumer, A. The Hierarchical Visualisation System (HVS), Information Visualization,2007. IV'07.11 th International Conference 257-262 2007.
    [26]Sang Ho Kim Allebach, J.P. Impact of HVS models on model-based halftoning Image Processing, IEEE Transactions on Volume:11, Issue:3 258-269 2002
    [27]Do N, Vetterli M. The Finite Ridgelet Transform for Image Representation [J]. IEEE Transactions on Image Processing,2003,12(1):16-28.
    [28]崔锦泰,小波分析导论,西安交通大学出版社,1995.7第一版
    [29]彭玉华,小波变换与工程应用,科学出版社,1999.6第一版
    [30]程正兴,小波分析算法与应用,西安交通大学出版社,1998.5第一版
    [31]李世雄,小波变换及其应用,高等教育出版社,1997.10第一版
    [32]Stephane Mallat, Sifen Zhong Characterization of Simals from Multiscale Edges[J] IEEE Transactions on patiern analysis and machine intelligence,1992,14(7),710-730.
    [33]Junmei Zhong, Ruola Ning Image Denoising Based on Wavelets and Multifractals for Singularity Detection [J]. IEEE Transactions on image processing,2005,14(10),1435-1447
    [34]Ki-Cheol Park Pyung-Hun Chang Sukhan Lee, A new kind of singularity in redundant manipulation:semi algorithmic singularity, Robotics and Automation,2002. Proceedings. ICRA '02. IEEE International Conference on 1979-1984 vol.2 2002
    [35]Langi, A. Kinsner, W.'Singularity processing of nonstationary signals 'Electrical and Computer Engineering,1996. Canadian Conference on 687-691 vol.2,1992
    [36]Liu, G.F. Cheng, H. Xiong, Z.H. "Distribution of singularity and optimal control of redundant parallel manipulators"Intelligent Robots and Systems,2001. Proceedings.2001 IEEE/RSJ International Conference on 177-182 vol.1 2001
    [37]Guerrero, J." Image Processing and Analysis with Matlab", Electrical, Communications, and Computers,2009. CONIELECOMP 2009. International Conference on 26-28 Feb.2009
    [38]Eddins, S.L. Orchard, M.T. "Using MATLAB and C in an image processing lab course", Image Processing,1994. Proceedings. ICIP-94., IEEE International Conference 515-519 vol.1 1994
    [39]Zuria, C.S. Ramirez, J.M. Baez-Lopez, D. Flores-Verdad, G.E. "MATLAB based image processing lab experiments" Frontiers in Education Conference,1998. FIE'98.28th Annual, 1255-1258 vol.3,1993
    [40]郝文化。2004图形图像处理应用教程。北京:中国水利水电出版社,2004
    [41]孙祥,徐流美,吴清。Matlab 7.0基础教程。北京:清华大学出版社,2005
    [42]Raj, J.S.K. Kabilan, A.P. "Teaching and Designing Antenna Arrays Using Signal and Image-Processing Toolboxes of MATLAB", Antennas and Propagation Magazine, IEEE, Volume:49,184-190,2007
    [43]Simitopoulos, D. Koutsonanos, D. Strintzis, "Image watermarking resistant to geometric attacks using generalized Radon transformations", Digital Signal Processing,2002. DSP 2002.2002 14th International Conference on,85-88 vol.1 2002
    [44]Deng Minghui Zhen Jingbo, "Robust Image Watermarking Algorithm against Geometric Attack Based on BEMD", Computer and Communications Security,2009. ICCCS'09. International Conference on 36-39,5-6 Dec.2009
    [45]Suhail, M.A. Obaidat, M.S, "A watermarking technique for geometric manipulation attacks", Electronics, Circuits and Systems,2005. ICECS 2005.12th IEEE International Conference on, 11-14 Dec.2006
    [46]Sangeetha, A. Gomathy, B. Anusudha, K."A Watermarking Approach to Combat Geometric Attacks", Digital Image Processing,2009 International Conference on381-3852009,3,7
    [47]宋江山,徐建强,司书春,“改进的曲波变换图像融合方法“, 中国光学与应用光学,Vol2,NO2 2009
    [48]Zhang Zhiyu Zhang Xiaodan Zhang Jiulong, "SAR Image Processing Based on Fast Discrete Curvelet Transform", Information Technology and Applications,2009. IFITA'09. International Forum on, Vol 1, p28-31,15-17 May 2009
    [49]Yi-Feng Niu Lin-Cheng Shen," A novel approach to image denoising using the Pareto optimal curvelet thresholds, Wavelet Analysis and Pattern Recognition,2007. ICWAPR'07. International Conference on, Volume:2,p 630-635,2-4 Nov.2007
    [50]Jean-Luc Starck Candes, E.J. Donoho, D.L," The curvelet transform for image denoising", Image Processing, IEEE Transactions on, Vol 11, Issue:6,670-684,2002.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700