基于标点符号的中文文本数字水印的设计与研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着因特网的迅猛发展和多媒体技术的广泛应用,越来越多的数字作品通过网路的形式传输、发表,使得这些作品的版权保护技术显得尤为重要。数字水印是一种有效的数字产品版权保护技术。
     对数字水印的研究目前主要集中在以图像、声音等载体来进行信息的隐藏,以文本为载体的水印技术方面的研究成果较少。而事实上,人们的很多创意都以文本的方式储存和传输,文本作为信息传递的一种手段,其应用大大地超过了图像、视频和音频的范围。同时随着高性能打印机和扫描仪的不断出现,对于印刷出版物的制假、造假、盗版等行为日益猖獗,而传统的印刷品防伪技术又存在着高成本、技术复杂、应用面窄等缺点,假冒伪劣产品严重侵害了图书出版作者的利益。与其他印刷品防伪技术相比,将数字水印技术应用于图书等印刷出版物防伪方面成本低、实现简单,是一项对传统印刷品防伪技术的发展和改进。
     本文针对传统文本水印方法存在的不足和中文汉字本身的复杂度,提出了一种新的基于文本中的标点符号的水印算法。该方法基于对中文文档中的标点符号的分析和比较,在不影响文本字体格式和内容的情况下,利用人类视觉过程对标点符号的形状不敏感、阅读文章时不会把视线过多地停留在标点符号上的特点,将相关的版权信息嵌入到文本之中,并利用密码学中的多表代换方式和信息处理中的纠错编码,对水印信息进行预处理,实现了对水印信息的加密和保护。
     为了说明本文所提出方法的可行性,本文选取了以Windows XP操作系统为工作平台,基于Visual C++/MFC和MATLAB7.0环境对文本数字水印算法做了仿真实验。结果表明,本文所提出的文本水印的研究成果突破了现有的水印方法,尤其是对中文文本嵌入水印的难题进行了有益的尝试,对于图书等印刷品领域的版权保护的研究和发展有着重要意义。
With the rapid developing of Internet and the wide using of multimedia technique,more and more digital products have been conveyed and published through the net.It is urgent to protect the copyright of these products.Digital Watermarking is an effective technology for copyright protection in recent years.
     Currently,Watermarking researchs are mostly focused on image and audio for hiding information.Meanwhile,the researchs of text as a cover-object are relatively fewer.
     But in fact,lots of people's originality can be saved and transfered by the way of text.As an important way of information transferring,the application of text exceeds consumedly image,video,audio,etc.With the inventing of the high performance printer and scanner,faking and pirating on the presswork publication are rampant.And the traditional techniques of the presswork publication have some shortcomings,such as high cost, complex techniques,and small cover.Therefore,the benefits of the authors have been strictly losed by faking and pirating pressworks.Compared to the other techniques,it is a significative try and development to combine the digital watermarking with the protection of publication because of its lower cost and simply implement.
     Based on analysis of disadvantages of the present algorithms and the complexity of the Chinese text,this paper presents a new text-watermarking using the interpunctions as cover-object in the text.Meanwhile,according to the similarity on interpunctions in different modes and low sensitivity of the human's visual systems,when the readers take a look of the articles,they don't pay much attention on the interpunctions.Using these characteristics, the informations which are protected can be embedded into the text.Before embedding the informations,we use the algorithms in cryptology and the different encoding methods in communication-progress as a pre-progress, which can make full use of the watermarking informations and protect them.
     In order to show the feasibility of the text-watermarking algorithm presented by this paper,a text-watermarking program based on the Windows XP is designed and developed using Visual C++、MFC and MATLAB 7.0. The experimental results can prove that this mothed break through the traditional text-watermarking,especially for the Chinese text and this algorithm has an important signification for researches and developments for the publication.
引文
[1]宋玉杰,刘瑞祯等.数字水印在印刷品防伪中的应用[J].中国图像图形学报,2001,5(6):450-454
    [2]张华熊.信息隐藏数字水印技术研究[D].浙江:浙江大学,2003
    [3]Van Schyndel R.G.,Tirkel A.Z.,Osbme C.F.A digital watermark[C],IEEE International Conference on Image Processing,Austin,Texas,USA,1994
    [4]孙圣和,陆哲明.数字水印处理技术[J].电子学报.2000,28(8):85-90
    [5]Ingemar J.Cox and Jean-Paul M.G.Linnartz.Public watermarks and resistance to tampering[C].International Conference on Image Processing(ICIP'97).Santa Barbara,California,USA.October 1997,26-29
    [6]黄华,齐春,李俊,朱伟芳.文本数字水印[J].西安交通大学图像处理与识别研究所,中文信息学报2002,15(5):52-57
    [7]C.Y.Lin.Public watermarking surviving general scaling and cropping:An application for print-and-scan process[J][J/OL].Muftimedia and Security Workshop at ACM Multimedia 99,Orlando,FL,USA,Oct.1999.http://citeseer.ist.pus.edu/lin99public.html
    [8]李忠源,付震中.印刷图像中的信息隐含[C].全国第二届信息隐藏学术研讨会论文集.北京,2000:65-70
    [9]戴跃伟,旌燕,王执铨.一种用于证件防伪的稳健图像水印算法[J].机器人技术与应用,2002(6):41-46
    [10]梁华庆,钮心忻,杨义先.基于数字水印的证件防伪技术[J].信号处理,2004,20(2):143-146
    [11]张静,张春田.能抗打印-扫描过程的数字图像图像水印算法[C],第三届信息隐藏学术会议论文集,西安,2001:151-157
    [12]PODILCHUK CI ZENG.W.Image-adaptive watermarking using visual models[J].IEEE Journal on Special Areas in Communications,Eletronic Imaging.1998,16(4):525-539
    [13]陈秀新.数字水印技术研究进展[J].北京工商大学学报,2006,24(5):37-40
    [14]刘胜利.信息隐藏技术的军事应用[J].现代通信,2004,9:28-29
    [15]苏育挺.数字视频水印技术研究[D].天津:天津大学,2001
    [16]王丽娜,张焕国.信息隐藏技术与应用[M].武汉大学出版社,2003
    [17]汪小帆,戴跃伟,茅耀斌.信息隐藏技术—方法与应用[M].机械工业出版社,2001
    [18]Chen B.Design and analysis of digital watermarking,information embedding,and data hiding sustems[D].Massachusets Institute ofTechnology,Cambridge,MA,2000
    [19]Bender W.,Gruhl D.,Morimoto N.,etc.Techniques for data hiding[J].IBM Syst.J,1996,35(3):313-336
    [20]王炳锡,陈琦,邓峰等.数字水印技术[M].西安电子科技大学出版社,2003
    [21]汪国有,杨永祥.数字水印技术研究进展[J].网络安全,2004,11:45-48
    [22]曹卫兵,戴冠中,夏煌,等.基于文本的信息隐藏技术[J].计算机应用研究,2003,10:39-41
    [23]胡志远,祈婷,苏鹏.基于文本文档的版权保护技术研究[J].计算机应用研究,2002,28(1):42-43
    [24]张小华,刘芳,焦李成.一种有效的文档水印技术[J].通信学报,2003,24(5):21-28
    [25]胡岚,尤新刚.现有的超文本(HTML)信息隐藏技术分析[C].全国地三届信息隐藏学术研讨会,2001:62-67
    [26]白金茹,胡铁.基于文本文档的信息隐藏技术[C].全国第四届信息隐藏学术研讨 会,2002,10-16
    [27]J.T.Brassil,S.Low,N.F.Maxemchuk.Copyright protection for the electronic distribution of text documents[J].Proceedings of IEEE,1999,87(7):1181-1196
    [28]S.H.Low,J.T.Brassil,N.F.Maxemchuk.Document Marking and Identification using Both Line and Word Shifting[J].Proceedings of IEEE,1995,853-860
    [29]D.Huang,H.Yan.Interword distance changes represented by sine waves for watermarking text images[J].IEEE Transactions on Circuits and Systems for Video Technology,2001,11(21):1237-1245
    [30]S.H.Low,N.EMaxemchuk,A.M.Lapone.Document identification for copyright protection using centroid detection[J].IEEE Transactions on Communications,1998,46(3):372-383
    [31]Brassil.J.L.O'Gorman.Watermarking document images with bounding box expansion[C].lnformation Hiding of Lecture Notes in Computer Science.Springer-Verlag,1996,1174:227-235
    [32]J.T.Brassil,S.Low,N.F.Maxemchuk.Electronic Marking and Identification Techniques to Discourage Document Copying[J].IEEE Journal on Sel.,1995,13(8):1495-1504
    [33]Deepa Kundru,Dimitrios Hatzinakos.Digital Watermarking Using Multiresolution Decomposition[C].Proceedings of IEEE CASSP'98,USA,Seattle,1998,3969-3972
    [34]肖湘蓉.基于内容的英文文本数字水印研究[D].湖南:湖南大学软件学院,2004
    [35]钮心忻.信息隐藏与数字水印[M].北京那个邮电大学出版社,2004
    [36]钮心忻,杨义先.文本伪装算法研究[J].电子学报,2003,31(3):402-405
    [37]傅瑜,王保保.文本水印附加空格编码方法的实现及其性能[J].长安大学学报,2002,22(3):85-87
    [38]Shingo Inoue,Kyoko Makino,Ichiro Murase.A Proposal on Information Hiding Methods using XML[N][DB/OL].www.hal2001.itakura.toyo.ac.jp/~chiekon/nlpxml/inoue/pdf
    [39]鲁芳.多重文本数字水印技术研究[D].湖南:湖南大学软件学院,2005
    [40]Daly.人类视觉系统简介[N][DB/OL].http://bolg.csdn.net/daly888/archive/1479675.aSpx
    [41]Cox I J,Kilian,J,Leighton T.A secure,robust watermark for multimedia[C].Proceedings of Info Hiding'96,Cambridge University,London,England,1996:185-206
    [42]Ingermar J.Cox,Matthew L.Miller,Jeffrey A.Bloom.数字水印,第一版[M].王颖,黄志蓓译.北京:电子工业出版社,2003
    [43]樊昌信,张甫种等.通信原理[M].北京:国防工业出版社2004
    [44]Mark Michaelis.COM编程指南,第一版[M].宋丽红,李二勇,杨超峰译.北京:机械工业出版社,2002
    [45]刘春雷,吴重光.用VC实现Word自动化操作的研究与应用[J].计算机工程与设计,2004,25(9):1594-1596
    [46]晶辰工作室.Word 2000中文版VBA开发实例指南[M].北京:电子工业出版社,2000
    [47]Ash Rofail,Yasser Chohoud.邱仲潘等泽.COM与COM+从入门剑精通[M].北京:电子工业出版社,2000,351-355
    [48]罗运模等.文书处理与中文WORD[M].上海:上海交通大学出版社,1996

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700