数字水印在包装防伪上的应用研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数字水印(Digital Watermarking)是目前防伪及信息安全技术领域的重要研究方向,具有安全性、鲁棒性、不可感知性、以及保真性。将数字水印技术应用到包装防伪与认证上,可以克服传统包装防伪技术的缺点,具有其他技术难以替代的优点,其主要表现为:技术独占性;防伪投资小、成本低;技术升级快;技术检测易分辨、易识别、检测提取容易;图像加入水印后,可以在供应链的节点上进行认证,辨别是否是原件的拷贝,防止伪造和产品替换;保密性高等。
     在已有的研究工作中,水印的嵌入和提取都是基于平面图像处理。对于商品包装图像,水印的检测是直接在商品上进行。由于商品都有各自不同的外形,贴在商品表面的包装图像也就随着商品外形而发生了改变,相对于初始图像,这种变化不再是某种几何变化(如旋转,平移,缩放等),而是一种既有尺度变换又有弯曲变形的不规则变形。这种变形会破坏图像与水印之间的数据同步性,从而影响水印的检测。
     本文研究内容围绕商品包装图像在水印检测过程中图像会发生变形的问题展开,研究了已有的鲁棒数字水印算法,提出了解决问题的方法。
     本文的主要工作包括以下几个方面:
     1.建立商品包装图像的几何模型,提出了包装图像防伪数字水印应满足的基本要求。按照产品设计理论,针对包装物品的外形确定包装图像扭曲的类型,建立相应的几何模型。在几何模型的基础上,构造了酒瓶模型作为研究对象。针对模型包装图像,应用已有的抗几何攻击的水印算法展开实验,提出了包装图像防伪数字水印应满足的要求。
     2.提出了基于小容量鲁棒性盲数字水印算法。在研究量化水印技术和基于图像内容的水印算法基础上,提出了基于离散小波变换和离散余弦变换的混合水印盲算法,解决了水印图像随商品外形发生变形后水印的提取问题。实验结果表明该算法具有较好的水印不可感知性,且提取效果好,是一种鲁棒性好的盲数字水印算法。
     3.提出了基于非均值量化系数特征不变的数字水印算法。算法同样适合解决水印图像随商品外形发生弯曲变形后水印的提取问题,同时解决了水印嵌入容量的问题。实验结果表明该算法具有较好的水印不可感知性,且提高了水印嵌入容量,在商品有较大角度偏转和位移的情况仍能正确提取,是一种具有较大容量的盲数字水印算法。
Digital Watermarking featuring security, robustness and high fidelity is a new approach to maintain the technique of anti-counterfeiting and information security.
     The application of Digital Watermarking to the anti-counterfeiting packaging and authentication can remove the flaws in the traditional packaging. It has the advantages of exclusiveness, low cost of investment, speedy upgrade and easy differentiation and check. When the trademark or logo is digitally watermarked, it can be authenticated at the point of the supply chain, where the checking of the authenticity of the product is done and its replacement is prevented, canceling the drawbacks in security.
     In recent years, Watermarking embedding and collecting are processed on the basis of the plane imaging while the watermark check is directly done on the product.
     The package image usually changes with that of the external shape of the product. Compared with the initial picture, such a change is no longer a geometrical one like revolution, movement, contraction or amplification, but an irregular one in dimension and shape, which may destroy the synchronism between the picture and the watermark, affecting the check of the watermark.
     The thesis begins with the distortion issue in watermark checking, investigates the robustness of the past digital watermark algorithm, and provides solutions to the problem of the distortion.
     The work includes the following:
     1. Based on the theory of the product package design, categories of the distortion that results from the change of the external shape of the products are established and their corresponding models are made. Among the various models, the model of a wine bottle is chosen as the object of study. Based on the expreiments taken with watermark's algorithems, the needs are given on contenting the scheme of watermark to anti-counterfeiting packaging.
     2. A mixed blind algorithm of watermarking based on small volume robustness is offered, which combines discrete wavelet transformation and discrete cosine transformation to solve the problem of the collection of watermark when the distortion occurs with the change of the external shape of the picture. The experimental findings indicate that the algorithm has the features of watermark imperceptibility, good collection and robustness.
     3. A new digital watermark algorithm based on the stable features of non-equal quantization is proposed, which can be used in solving the problem of collecting and embedding of the watermark when there is a distortion with the change in the picture. The experimental findings indicate that it is a big-volume watermark algorithm, which has a better imperceptibility in the watermark, larger volume in embedding, and is still valid when the product undergoes a big swerve in angle or shift in position.
引文
[1]泛滥成灾的假冒伪劣商品和地下工厂,http://jiaotong.sopu.net.cn/Html/10805.html
    [2]真知.捍卫企业品牌维护市场公平竞争秩序—国务院发展研究中心发表《制假售假对国民经济损害的调查研究》报告[J].上海质量 2003,10
    [3]中国货币当局将进一步提高人民币防伪性能,http://finance.sina.com.cn/g/20050518/21401600231.shtml
    [4]中国包装网,http://www.pack.net.cn
    [5]上海阿须数码技术有限公司,http://www.assuredigit.Com
    [6]我国防伪技术的应用与发展,http://www.bagbag.cn/html/plastic-news/2006/1210/68.html
    [7]宋玉杰,刘瑞祯,谭铁牛等.数字水印技术在印刷品防伪中的应用 中国图像图形学报,2001,6(5):450-454.
    [8]"Smart Images" Using Digimarc's Watermarking Technology,Adrian M.Alattar
    [9]AlpVision,http://www.alpvision.com,Switzerland,2000..
    [10]http://www.assuredigit.com
    [11]http://www.yufei.net
    [12]Gonzalez R.C.,Woods R.E.Digital image processing,Addision-Wesley Publishing Company,1992
    [13]盛骤,谢式千,潘承毅,概率论与数理统计,高等教育出版社,1995.
    [14]赵选民,徐伟等,数理统计,科学出版社,2002
    [15]Kankanhalli M.S.,Rajmohan R.K.R."Content based watermarking of images,"Proceedings of the 6th ACM International Conference on Multirnedia,1998,pp 61-70
    [16]Dempster A.P.,Laird N.M.,Rubin D.B."Maximum likelihood from incomplete data via the EM algorithm," Journal of the Royal Statistical Society.Series B,1977,39,pp.1-38
    [17]A.Z.Tirkel,G.A.Rankin.Electronic water mark.DICTA-93,Macquarie University,Sydney,Australia.1993:666-672
    [18]N.Nlkolaidis,I.Pitas,Copyright Protection of Images using Robust Digital Signatures,In Proceedings of the IEEE International Conference on Acoustics,Speech,and Signal Processing(ICASSP Atlanta,GA.,May).IEEE Press,1996,pp2168-2171
    [19]W.Bender,D.Gruhl,N.Morimoto,A.Lu,Techniques for Data Hiding,IBM System Journal, 1996. 35:21-25
    [20] Ingemar J.Cox,Joe Kiliany,Tom Leightonz and Talal Shamoony.Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processsing. 1997,6( 12): 1673-1687
    [21] M.H.M.Costa. Writing on dirty paper. IEEE Transactions on Information Theory. 1983,29(3):439-441
    [22] Ingemar J.Cox,Matthew L.Miller and Andrew L.McKellips. Watermarking as communications with side information. In Proceedings of IEEE. 1999,87(7): 1127-1141
    [23] S.Voloshynovskiy,F.Deuillaume,S.Pereira and Thierry Pun,Optimal adaptive diversity watermarking with channel state estimation.IS&T/SPIE's 13th Annual Symposium,Electronic Imaging 2001: Security and Watermarking of Multimedia Content III,SPIE Proceedings. San Jose,California,USA.2001:23-27
    [24] Deepa Kundur and Dimitrios Hatzinakos.Diversity and attack characterization for improved robust watermarking. IEEE Transactions on Signal Processing.2001,49(10):2383-2396
    [25] Joseph J.K. O'Ruanaidh, Thierry Pun.Rotation, Scale and Translation Invariant Spread Spectrum Digital Image Watermarking [J].Signal Processing,1998,66(3):303-317
    [26] J.J.K.O. Ruanaidh and T. Pun, "Rotation, scale and translation invariant spread spectrum digital image watermarking", Signal Processing, vol.66, no. 3,May 1998,303-318
    [27] V.Solachidis and I.Pitas, "Circularly symmetric watermark embedding in 2-D DFT domain", IEEE int. Conf. on Acoustics, Speech and Signal Processing (Icassp'99),Phoenix,1999,Vol.6,3469-3472
    [28] C.-Y.Lin, M.Wu,J.A.Bloom, I.J.Cox,M.L. Miller and Y.M.Lui, "Rotation Scale and Translation Resilient Watermarking for Images " ,IEEE Trans. On Image Proc. ,Vol.10,No.5,May 2001, 767-782
    
    [29] P Loo ,N Kingsbury. Motion Estimation Based Regist ration of Geomet rically Distorted Images for Watermark Recovery[A] . Proc of t he SPEE 2 Security and Watermarking of Multimedia Content s Ⅲ[C] .2001. 6062617
    [30] P Loo , N Kingsbury. Watermarking Using Complex Wavelets with Resistance to Geometric Distortion[A] . Proc of 10th European Signal Processing Conf [C] . 2000. 167721680
    [31] R Caldelli , M Barni , F Bartolini ,et al . Geometric-Invariant Robust Watermarking Through Constellation Matching in the Frequency Domain[A]. Int' l Conf on Image Processing (ICIP' 2000) [C]. 2000. 65268.
    [32] M Farzam , S Shirani. A Robust Multimedia Watermarking Technique Using Zernike Transform [ A ] . 2001 IEEE 4th Workshop on Multimedia Signal Processing[C]. 2001.529-534
    [33] H S Kim, H2K Lee. Invariant Image Watermark Using Zernike Moments [J]. IEEE Trans on Circuit s and Systems for Video Technology, 2003, 13 (8): 7662775
    [34] D J Fleet ,D J Heeger . Embedding Invisible Information in Color Images[A]. Proc of the Int'l Conf on Image Processing [C]. 1997. 532-535.
    [35] S Pereira , T Pun. Robust Template Matching for Affine Re2 sistant Image Watermarks [J ]. IEEE Trans on Image Pro2 cessing , 2000 , 9 (6): 112321129
    [36] S Pereira , T Pun. Iterative Template Matching Algorithm Using the Chirp-Z Transform for Digital Image Watermarking[J]. Pattern Recognition, 2000, 33 (1): 173-175
    [37] X Kang , J Huang , Y Q Shi. A DWT2DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression [J]. IEEE Trans on Circuit s and Systems for Video Technology, 2003, 13 (8): 776-786
    [38] D K Andrew. An Idea for a Blind Watermarking Scheme Resistant to StirMark [R].Technical Report RR-01-14, Programming Research Group , Oxford University Computing Laboratory, 2001
    [39] P Bas ,J2M Chassery , B Macq. Geomet rically Invariant Watermarking Using Feature Point s[J]. IEEE Trans on Image Processing, 2002, 11 (9): 1014-1028
    [40] C2W Tang , H2M Hang. A Feature2Based Robust Digital Image Watermarking Scheme [J]. IEEE Trans on Signal Processing , 2003, 51(4): 950-959
    [41] ZJi, L Jiang, J Jin. An Improved Second Generation Digital Image Watermarking Scheme[A]. Proc of Mat hematics of Data/ Image Coding, Compression , and Encryption VI[C].2004. 218-223
    [42] S.Voloshynovskiy,F.Deguillaume and T.Pun, "Multibit digital watermarking robust against local nonlinear geometrical distortions"in IEEE International Conference on Image Processing,ICIP2001,Thesaloniki,Greece,2001,999-1002
    [43]D.Delannay,B.Macq and M.Barlaud,Compensation of geometrical deformations for watermark extraction in the digital cinema application" in SPIE ELECTRONIC Imaging 2001,Security and watermarking of multimedia contents Ⅲ,San Jose,CA,January,2001
    [44]唐远炎,王玲.小波分析与文本文字识别,科学出版社,2002
    [45]侯迎坤,陶常利,陈涛.基于小波变换抗随机弯曲攻击的图像水印算法 计算机工程与应用 2004:40-42
    [46]李京兵,黄席樾 一种基于DWT抗几何攻击数字水印鲁棒算法[J]计算机仿真,2007,24(3):303-306
    [47]Kutter M.,Bhattacharjee S.K.,Ebrahimi T.,"Towards second generation watermarking schemes," International Conference on Image Processing,October 1999,1,pp.320-323.
    [48]FRIDRICH J,BALDOZA A C,SIMARD R J.Robust digital watermark based on key-dependent basis functions[J].Proc of information Hiding' 98[C].1998,143-157
    [49]HARTUNG F,GIROD B.Fast pubic-key watermarking of compressed video[A].Proc of ICIP' 97[C].1997,1,538-531
    [50]CRAVER S.On public-key steganography in the presence of an active warden[A].Proc of Information Hiding' 98'[C].1998,355-368
    [51]HERRIGEL A,VOLOSHYNOVSKIY S.Copyright and content protection for digital images based on asymmetric cryptographic techniques[A].Proc of Multimedia' 98[C].1998,99-112
    [52]V I Arnold,A Avez.Ergodic Problem s of Classical Mechanics Mathematical Physics Monograph Series.New York:W A Benjamin,Inc.,1968
    [53]Qi Dong-Xu.Fractal and Its Application.Beijing:Science Press,1994.143-145(in Ch inese)
    [54]孙伟.关于Arnold变换的周期性[J].北方工业大学学报,1999,11(1):29232.
    [55]Shen,Yun-shan.Spread Spectrum Technology.Beijing:Publishing House of Defense Industry,1995(in Chinese).
    [56]McWilliams,F.J.,Sloane,N.J.A.Pseudo-Random sequences and arrays.Proceedings of the IEEE,1976,64(12):1715-1729.
    [57]纪震,张基宏,蒋一峰.小波域的扩频数字图像水印算法.电子与信息学报,2001,23(8):809-813
    [58]Cox I J,Miller M L.The first 50 years of electronic watermarking.EURASIP J.OF Applied Signal Processing,2002,2:126-132
    [59]J.Cox,J.Killian,F.T.Leighton,etal.Secure Spread Spectrum Watermarking for Multimedia.IEEE Trans.On Image Processing,1997,6(12):1673-1687.
    [60]正兴 小波分析算法与应用.西安:西安交通大学出版社,1998,1-194页
    [61]包装设计的三个要素,http://www.sj33.cn/Article/sjll/200603/2912.html
    [63]赵征,徐涛,席鹏程.一种抵抗几何变换攻击的数字图像水印方法 南京航空航天大学学报[J],2005,37(1):70-74
    [62]康显桂,黄继武 抗仿射变换的扩频图像水印算法 电子学报[J]2004,32(1):8-12
    [64]B.Chen and G.W.Wornell.Dither modulation:A new approach to digital watermarking and information embedding.Proc.of SPIE,vol.3657 of Security and Watermarking of Multimedia Contents,(San Jos'e,USA),1999,PP:342-353.
    [65]B.Chen and G.W.Wornell.Quantization Index Modulation:A class of provably good methods for digital watermarking and information embedding[J].IEEE Trans on Information Theory,2001,47(4):1423-1443.
    [66].J.Tsai,K.Y.Yu,Y.Z.chen,Joint wavelet and spatial transformation for digital watermarking.IEEE Transactions on Consumer Electronics,2000,46(1),PP241-245
    [67]EGGERS J,BAUML R,TZSCHOOPE R,GIROD B.Scalar costa scheme for information embedding[J].IEEE Trans on Signal Processing,2003,51,1003-1019.
    [68]王宏霞,何晨,丁科.基于混沌映射的鲁棒性公开水印[J].软件学报,2004,15(08):1245-1250.
    [69]C.Y.Lin,M.Wu,J.A.Bloom et al.Rotation,scale and translation resilient watermarking for image.IEEE Trans.on Image Processing.2000,10(5),767-782
    [70]夏晓清,面向图像内容认证的数字水印技术研究,西北工业大学博士论文,2005:P122
    [71]TSAI M J,YU K Y,CHEN Y Z.Joint wavelet and spatial transformation for digital watermarking[J].IEEE Trans on Consumer Electronics,2000,46(1):241-245
    [72]FANG Y M,HUANG J W,WU S Q.CDMA-based watermarking resisting to cropping[A].ISCAS[C].2004.25-28.
    [73]GU L M,HUANG J W.Analysis of block coding strategies in watermarking channel[J].Journal of Software,2004,15(9):1413-1422.
    [74]KANG X G,HUANG J W,SHI Y Q.A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression[J].IEEE Trans on Circuits and Systems for Video Technology,2003,13(8):776-786.
    [75]许君一,熊昌镇,齐东旭,黄继武,量化水印算法分析,通信学报,2006,27(3):15-27
    [76]JPEG 2000 F INAL COMMITTEE DRAFT VERSION 1.0 EB/OL].http://jp ig.org/public/fed1544421.pdf,2000203216.
    [77]undurD,HatzinakosD.A robust digitalwatermarkingrnethod using wavelet2based fusion[A].In:IEEE Signal Processing Society 1997International Conference on Image Processing(ICIP'97)[C],Santa Barbara,California,1997:544-437.
    [78]TsaiM,Yuang K,Chen Y.Joint wavelet and spatial transformation for digital watermarking[J].IEEE Transactions on Consumer Electronics,2000,46(1):241-245.
    [79]Xia X G,Boncelet C G,Arce G R.Wavelet transform based watermark for digital images [J].Op tics Exp ress,1998,3(12):497-511.
    [80]Liu Hong-mei,Liu Jiu-fen,Huang Ji-wu,et al.A robust DWT2 based blind data hiding algorithm[J].Circuits and Systems,2002,3(2):672-675.
    [81]黄继武,SHI Y Q,程卫东.DCT域图像水印:嵌入对策和算法[J].电子学报,2000,28(4):57-60.
    [82]Huang J W,Shi Y Q.Embedding Image Watermarks in DC Components[J].IEEE Transactions on Circuits and Systems for Video Technology,2000,10(6):974-979.
    [83]传才,傅晓菲.DCT域中DC分量上嵌入水印的稳健性检验[J].计算机工程与应用,2001,37(21):13-15.
    [84]熊淑华,卜云,周激流,付媛媛,一种基于小波变换的非均匀量化索引调制水印算法.四川大学学报(工程科学版),2006,38(3),pp:140-143