结合小波与奇异值分解的数字图像水印算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数字水印是信息安全、版权保护等的重要手段,研究安全、鲁棒的水印技术是一项具有挑战性的研究,有广泛的应用前景。
     本文重点研究水印的安全性和鲁棒性。提出用混沌加密方式研究水印的加密技术,详细分析了四个小波子带上奇异值性质,提出了两种在小波域子带中修改奇异值系数的水印算法。
     1)基于DWT-SVD(Discrete Wavelet Transform-Singular Value Decomposition)鲁棒的图像水印嵌入与提取算法。
     该方法通过把水印嵌入到图像经过一级小波变换后的四个子带上,通过原图像小波变换后四个奇异值子带与水印图像的最大奇异值系数关系,自适应地嵌入水印图像。实验表明,该算法能够抵抗各种常见攻击,尤其对复合攻击有很强的鲁棒性。
     2)基于DWT-SVD的鲁棒盲水印算法。
     该方法通过确定PSNR(Peak Signal to Noise Ratio)建立水印嵌入强度和图像质量的关系,使水印算法能确定水印的最优嵌入能量来量化变换域,以达到同时满足图像的不可察觉性和鲁棒性,并能够实现盲提取,最后对量化嵌入算法进行了误差分析。实验结果表明有很好的鲁棒性。
     在水印的安全性方面,本文在深入研究图像的置乱技术的基础上,提出了一种基于二值图像的混沌加密算法,给出了对二值图像的置乱度评价指标,实验表明,混沌加密/解密效率高、运算量不大、密钥量大,安全性好等优点。
     最后,对本文中建立的算法用Visual C++ 6.0编程设计了一个数字图像水印处理系统软件,主要用于进行数字图像的加密/解密、水印的嵌入、提取与鲁棒性检测实验等,测试验证本文算法的可行性与水印的鲁棒性。
The digital watermarking is an important means to provide the copyrightprotection、information security, therefore the research of secure and robust digitalwatermarking technique is still challenging research, also remains a popular applicationforeground.
     It is important to study more secure and robust watermark in this paper. Firstly,this paper put forwards an image encryption algorithm based on chaotic binarysequences, which has well effect to encrypt watermark picture. Secondly, we presenttwo hybrid scheme based on the Discrete Wavelet Transform(DWT) and Singular ValueDecomposition(SVD) by means of the analysis of features of wavelet sub-blockssingular value and influence degree between the commonly used image processingtechnique and noise interference.
     1) Based on the algorithm of DWT-SVD robust watermark image embedding andextracting.
     Decomposing the cover image into four bands, we apply the SVD to each band,and embed the same watermark data by modifying the singular values. Modification inall frequencies allows the development of a watermarking scheme that is robust to awide range of attacks. We observed that the scaling factor can be chosen from a fairlywide range of values for LL, and also for the other three bands, the scaling factor can bechosen according to the relation of maxim singular value coefficient betweensub-blocks and watermark. Experiment results show that the algorithm can resist allkinds of classical attacks, specially, the strong robustness for anti-compound attacks.
     2) Robust blind watermarking algorithm based on DWT-SVD
     DWT-SVD domain watermarking is put forward by the picture PSNR analysis andquantization watermark's error analysis, we can determine the best energy or capacity tobe added to the original image. Experiments and attacks test show that the algorithm hasgood robustness.
     In order to ensure the security of the watermark system, this paper gives an imageencryption algorithm based on chaotic binary sequences, also improves algorithm ofgray distance to evaluate the effect of binary image encryption. By experimenting onchaotic sequence sensitivity on their initial condition, the scrambling of distance pixels,and the encrypting and de-encrypting speed of images, the result shows that theencryption algorithm effect is good and low computational complexity and highsecurity.
     Finally, based on the proposed scheme and Microsoft Visual C++ 6.0 environment,we have designed a corresponding software system for watermark embedding,watermark extracting, image encryption, de-encrypting and watarmark robustness detecting, etc.
引文
[1] N F Johnson, S Jajodia. Exploring steganography: seeing the unseen. IEEE Computer, 1988, 31(2): 26-34.
    [2] R J Aderson, R M Needham, A Shamir. The steganographic file system Proc of Information Hiding'98. 1998: 73-82.
    [3] A. P. Fabien Petitcolas, Ross J. Anderson and Markus G. Kuhn. Information Hiding—A Survey. Proceedings of the IEEE, special issue on protection of multimedia content, July 1999, 87(7): 1062-1078.
    [4] http://www.kepu.com.cn/gb/technology/printing/evolve/ev1315_02.html
    [5] E. F. Hembrooke. Identification of Sound and Like Signals. United States Patent 3004104, 1996.
    [6] C. Walker. Personal Communication. Muzak Corporation, June 2001.
    [7] F.A.P.Petitcolas, R.J.Anderson, M.G.Kuhn. Information hiding-a survey. To appear in Proc. of the IEEE, special issue on protection of multimedia content, 1999.
    [8] Weili Tang and Yoshinao AOKI. A DCT-Based Coding of Images in Watermarking. Proc. Of International Conference on Information, Communications and Signal Processing, 1997:510-512.
    [9] Deepa Kundur and Dimitrios Hatzinakos. Digital Watermarking Using Multiresolution Wavelet Decomposition. In Proceedings of IEEE ICASSP'98, volume 5:2969-297.
    [10] Chiou-Ting Hsu and Ja-Ling Wu. Hidden Digital Watermarking in Images. IEEE Trans. On Image Processing, 1998 8,(1):58-68.
    [11] http://www.digimarc.com.
    [12] http://www.alpvision.com.
    [13] http://www.igd.fhg.de/igd-a8/index.html/projects/talisman/index.html
    [14] 2003年度科技型中小企业技术创新基金若干重点项目指南.科学技术部编制.
    [15] http://www.assuredigit.com.
    [16] Raymond B. Wolfgang and Edward H. Delp. A Watermark for Digital Images. Proc. Of IEEE, 1996: 219-222.
    [17] Gang Qu, Miodrag Potkonjak. Analysis of Watermarking Techniques for Graph Color Problem. Proc. Of the 1998 IEEE/ACM International Conference on Computer-aided Design, 1998:190-193.
    [18] Cao Hanqiang, Zhu Guangxi, Zhu Yaoting, and Zhang Zhenbing. Embedding a signature in an Image Based on Fractal Compress Transformations. Journal of China Institute of Communications, 1998.5: 69-74.
    [19] A.Z. Tirkel, G.A. Rankin, R.M. van Schyndel, W.J. Ho, N.R.A. Mee, C.F. Osborne. Electronic Water Mark. DICTA-93. Macquarie University, Sydney, Decmeber 1993:666-672.
    [20] D.Kundur, D.Hatzinakos. A Novel Blind Deconvolution Scheme for Image Restoration Using Recursive Filtering, IEEE TRANSACTIONS ON SIGNAL PROCESSING, 1998(46):145-147.
    [21] H Inou, M iyazakiA, TakashiA. Digitalwatermarkmethod using the wavelet transform for video data [A]. Proc 1999 IEEE Int Symp Circuits and Systems. Orlando FL, USA: IEEE Circuit and System Society, 1999, 10: 247-250.
    [22] L.Boney, A.H.Tewfik, K.N.Hamdy. Digital watermarks for audio signals. Japan, Proc. of ICMCS'96, 1996: 473-480.
    [23] J.R.Smith, B.O.Comiskey. Modulation and Information hiding in images, Proc. of Infomation Hiding'96, 1996: 207-226.
    [24] A.Herrigel, S.Voloshynovskiy. Copyright and content protection for digital images based on asymmetric cryptographic techniques. Proc. of Multimedia'98, 1998: 99-112.
    [25] J.Dittmann, M.Stabenau,R.Steinmetz. Robust MPEG Video Technologies. Proc. Of the 6th ACM International Conference on Multimedia, 1998: 71-80.
    [26] F.H.Hartung, B.Girod. Watermarking of MPEG-2 encoded video without decoding and reencoding. Proc. of SPIE, 1997 (3020): 264-274.
    [27] M.D.Swanson, B.Zhu, A.H.Tewfik. Multiresolution scene-based video watermarking using perceptual models. IEEE Journal on Selected Areas in Communications, 1998,16 (4): 540-550.
    [28]C.V. Serdean, M.A. Ambroze, M. Tomlinson, J.G. Wade. DWT-based high-capacity blind video watermarking, invariant to geometrical attacks. IEEE Proc. Vis.Image Signal Process, 2003, 150 (1): 51-58.
    [29] J. Brassil, S. Low, N. Maxemchuk, and L. O'Gorman. Electronic marking and identification techniques to discourage document copying. In Proc. Inforcom'94, 1994: 1278-1287.
    [30] J. Brassil, S. Low, N. Maxemchuk, and L. O'Gorman. Electornic marking and identification techniques to discourage document copying." IEEE J. Select. Areas Commmon. 1995(13): 1495-1504.
    [31] J. Brassil, S. Low, N. Maxemchuk, and L. O'Gorman. Copyright protection for the electronic distribution of text document. Proc. IEEE, No. 7, July 1999: 1181-1196.
    [32] E.Praun, H.Hoppe, Adam Finkelstein. Robust Mesh Watermarking. Proc. Of SigGraph'99, 1999:49-56.
    
    [33]张勇,赵东宁,李德毅.关系数据库数字水印技术.计算机工程与应用,2003,39(25):193-195.
    [34] R Van Schyndel, Tirkel A, Osborne C. A digital watermark. In: IEEE Proceeding on International Conference on Image Processing, Austin, Tex., IEEE Press, 1994: 86-90.
    [35] N F Maxemchuk. Electronic document distribution. AT&T Technical Journal, 1994.9, 73 (5): 73-80.
    [36] N Nikolaidis, Pitas I. Copyright protection of images using robust digital signatures. In: IEEE Proceeding on International Conference on Acoustics, Speech, and Signal Processing, Atlanta, IEEE Press, 1996: 2168-2171.
    [37] F Hartung, Girod B. Watermarking of MPEG-2 encoded video without decoding and re-encoding. In: SPIE Proceeding on Multimedia Computing and Networking, San Jose, 1997,3020:264-273.
    [38] Lintian Qiao, Klara Nahrsted. Non-invertible watermarking methods for MPEG encoded audio. In: SPIE Proceedings on Security and Watermarking of Multimedia Contents, San Jose, 1999, 3657:194-202.
    [39] Hui Xiang, et al. Digital Watermarking Systems with Chaotic Sequences. In: SPIE Proceeding on Security and Watermarking of Multimedia Contents, San Jose, 1999, 3657: 449-457.
    [40] Zhao J, Koch E. Embedding robust labels into images for copyright protection. In: Proceedings of the KnowRight'95 Conference on Intellectual Property Rights and New Technologies, Vienna, Austria, 1995: 241-251.
    [41] I J Cox, Kilian J, Leighton T, et al. A secure, robust watermark for multimedia. In: Proceedings of Info Hiding'96, Cambridge University, London, England, 1996: 185-206.
    [42] M Barni, F, Bartolini V Cappellini, et al. A DWT-based technique for spatial-frequency masking of digital signatures. In: SPIE Proceeding on Security and Watermarking of Multimedia Contents, 1999, 3657: 31-39.
    [43] I J Cox, Kilian J, et al. Secure spread spectrum watermarking for images, audio and video. In: IEEE Proceeding on International Conference on Image Processing, 1996, 3:243-246.
    [44] I J Cox, Kilian J, Leighton T, et al. Secure spread spectrum watermarking for multimedia. IEEE Trans, on Image Processing, 1997, 6 (12): 1673-1687.
    [45] I Christine Podilchuk, Wenjun Zeng. Digital image watermarking using visual models. In: SPIE Proceeding on Human Vision and Electronic Imaging, 1997, 3016: 100-111.
    [46] G.Voyatzis, I.Pitas, Digital image watermarking using mixing systems. Computers & Graphics, 1998, 22 (4): 405-416.
    [47] N.Nikolaidis, I.Pitas. Robust image watermarking in the spatial domain. Signal Processing, 1998, 66 (3): 385-403.
    
    [48] D.Kundur, D.Hatzinakos. A robust digital image watermarking method using wavelet-based fusion. Proc. ofICIP'97, Vol. 1, 1997. 544-547.
    [49] C. T. Hsu, J. L. Wu. Hidden digital watermarks in images. IEEE Trans. on Image Processing, 1999, 8 (1): 58-68.
    [50] C. T. Hsu, J. L. Wu. Multiresolution watermarking for digital images. IEEE Trans. on Circuits and Systems Ⅱ-Analog and Digital Signal Processing, 1998, 45 (8): 1097-1101.
    [51] M. J. B. Maes and C. W. Van Overveld. Digital Watermrking by Geometric Warping. Proc. Of IEEE International Conference on Image Processing, 1998, (1): 424-426.
    [52] J Puate. and F Jordan. Using Fractal Compression Scheme to Embedded a Digital Signature into An Image. Proc. Of SPIE, 1996.
    [53] G. Voyatzis and I. Pitas. Chaotic Watermarks for Embedding in the Spatial Digital Image Domain. Proc. Of the IEEE, 1998, 8: 432-436.
    [54] I. Pitas. A Method for Signature Casting on Digital Image. Proc. Of International Conference on Image processing, 1996, (3): 215-218.
    [55] 刘瑞祯,谭铁牛.基于奇异值分解的数字图像水印方法.电子学报,2001.2(29):168-171.
    [56] J. O Ruanaidh and T. Pun. Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Processing, 1998, 66(3): 303-317.
    [57] S. Pereira, J. J. K. O Ruanaidh, and T. Pun. Secure, robust digital image watermarking using the lapped orthogonal transform. In IS&T/SPIE Electronic Imageing'99, Session: Security and Watermarking of Multimedia Contents, San Jose, CA, USA, 1999, 9: 135-144.
    [58] S Boloshynobskiy, Pereira S, and Iquise V. Attack modeling: towards a second generation benchmark, original Processing, 2001, 8: 1177-1214.
    [59] I. J Cox. Secure Spectrum Watermarking for Images, Audio and Video. NJ: NEC Res Inst., Princeton, 95-10, 1995 107-111.
    [60] A Fabien. P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn. Attacks on Copyright Marking Systems. David Aucsmith, Ed., Second workshop on information hiding, in vol. 1525 of Lecture Notes in Computer Science, Portland, Oregon, USA, 14-17 4, 1998: 218-238.
    [61] 勒中鑫.数字图像信息处理.北京:国防工业出版社,2003.
    [62] 刘瑞祯.数字图像水印理论与算法研究.中科院自动化所,2001.
    [63] 荆晓远,郭跃飞,杨静宇.基于奇异值特征的图像预处理及人脸识别,Information and Control. 1999. April: 116-120.
    [64] Junying Gan, Youwei Zhang, A Study of singular value decomposition of face image matrix, IEEE Int. Conf. Neural Networks & Signal Processing. 2003. 10: 197-199.
    [65] 刘小军,王东峰,张丽飞,时永刚,邹谋炎.一种基于奇异值分解和隐马尔可夫模型的人脸识别方法.计算机学报,2003,3(26):340-344.
    [66] 任仙怡,张桂林,张天序,廖云涛.基于奇异值分解的图像匹配方法.红外与激光工程,2001,8,(30):200-202.
    [67] A,Boggess,小波与傅里叶分析基础.北京:电子工业出版社,2002.
    [68] Hui Xiang, et al. Digital Watermarking Systems with Chaotic Sequences. Electronic Imaging'99, Security and Watermarking of Multimedia Contents, SPIE, 1999, (3657): 449-457.
    [69] 李将云.基于形心的二值图像多尺度表示方法.浙江大学学报(理学版)2003.3:284-287
    [70] 周琳娜.基于二值图像的信息隐藏研究综述.中山大学学报(自然科学版) 2004,11:112-114.
    [71] 向德生,熊岳山.基于约瑟夫遍历的图像置乱算法.计算机工程与应用,2005,41(10):44-46.
    [72] 李国富.基于正交拉丁方的数字图像置乱方法.北方工业大学学报.2001,13(11):123-125.
    [73] 赵学峰.基于面包师变换的数字图像置乱.西北师范大学学报,2003,39(2):26-79
    [74] DR Huang, Liu JF, Huang JW. An embedding strategy and algorithm for image watermarking in DWT domain. Journal of Software, 2002, 13(7): 1290-1297.
    [75] CI Podichuk, Zeng W. Image-Adaptive watermarking using visual models. IEEE Journal on Special Areas in Communications, 1998, 16(4): 525-539.
    [76] Pan R, Gao YX. Image watermarking method based on wavelet transform. Journal of Image and Graphics, 2002, 7(7): 667-671.
    [77] Wang QS, Sun SH, Zheng WM. The fragile watermark embedding algorithm for digital audio signal. Chinese Journal of Computers, 2002, 25(5): 520-525.
    [78] CI Podichuk, Zeng W. watermarking using visual models. IEEE Journal on Special Areas in Communications, 1999, 18(4): 425-429.
    [79] R Pan, Gao YX. Image watermarking method based on DWT transform. Journal of Image and Graphics, 2004, 6 (6): 613-620.
    [80] CT Hsu, Wu JL. Multiresolution watermarking for digital images. IEEE Transactions on Circuits and Systems-Ⅱ: Analog and Digital Signal Processing, 1998, 45(8): 1097-1101.
    [81] J. G Cao, JE Fowler, Younan NH. An image adaptive watermark based on a redundant wavelet transform In: Pitas Ⅰ, ed. Proceedings of the IEEE International Conference on Image Processing. Thessaloniki, 2001: 77-280.
    [82] M Barni, Bartolini F, Piva A. Improved wavelet-based watermarking through pixel-wise masking. IEEE Transactions on Image Processing, 2001, 10(5): 783-791.
    [83] Niu XM, Lu ZM, Sun SH. Digital watermarking technique based on multiresolution decomposition. ACTA Electronica Sinica, 2000, 28(8): 1-4.
    [84] J Zhang, Wang NC, Cao K. A multiwavelet-based blind watermarking for digital image. Mini-Micro System, 2002, 23 (2): 148-152.
    [85] 张卓奎,陈慧禅.随机过程.西安:西安电子科技大学出版社,2003.9.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700