基于内容的数字图像水印算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
由于数字作品极易被非法复制和篡改的特性,使得数字作品的信息安全和版权保护成为迫切需要解决的问题。数字水印技术为实现有效的知识产权保护提供了一条新的思路和手段,已成为多媒体信息安全领域的一个热点,具有广阔的应用前景。
     论文主要研究基于内容的数字图像鲁棒性水印技术,通过对现有算法的研究和分析发现,如何充分利用图像本身的固有特征是鲁棒性水印发展的新方向,为了提高水印算法的鲁棒性,本文提出了一种基于形态学的图像强纹理水印算法。算法根据图像强纹理的形态学特征,提取强纹理区域并分析验证了正确性和准确性;运用时频映射理论,将强纹理区域映射到小波树结构上,在相应的小波系数上嵌入水印;为了平衡透明性与鲁棒性,算法根据人的视觉掩蔽特性自适应调整水印嵌入强度。实验表明,算法对常见攻击具有良好的鲁棒性。算法提出的形态学强纹理区域提取方法,具有天然的并行实现结构,与经典的空域方法相比,简单快捷、效率高,自适应于各种图像。
     为了利用更多的图像特征提高算法鲁棒性,本文提出了一种基于经验模态分解(Empirical Mode Decomposition,EMD)的图像双水印算法。算法根据EMD分解对图像细节特征良好的筛分能力,准确提取了图像的强纹理区域,选择在与强纹理区域对应的Contourlet域能量最大的方向子带中频系数上嵌入水印;运用抗噪型多尺度形态学边缘检测算子提取图像的边缘特征构造零水印。本文的双水印算法充分利用了图像的纹理与边缘特征,使水印与图像内容紧密结合,提高了算法的鲁棒性与安全性。实验表明,算法对噪声、滤波、压缩等攻击均具有较强的鲁棒性;并且因为零水印固有的不改变宿主图像的优良特性,使得本算法在透明性上也获得了良好的表现。
     最后,对论文的研究内容作了简要的总结,并对未来的研究方向进行了展望。
With the rapid development of computer, network and communication, especially the popularization of the Internet, information security and copyright protection have been a key and attractive problem. Digital watermarking scheme has been a rising network information security technology. It provides a novel way for the protection of intellectual property rights. It becomes a hot spot in the research of multimedia data security, and holds wide application prospect in several domains.
     In this paper, the technology of robustness digital watermarking based on content for copyright protection of digital image is mainly discussed. By the research and analysis of the existing methods, the new robustness watermarking development direction is found, which is how to make full use of the inherent characteristics of the digital image. A digital image watermark algorithm with strong robustness is proposed in this paper. The algorithm extracts image strong texture regions according to the morphological features, analyzes and verifies the correctness and accuracy; The algorithm maps the image strong texture regions to the wavelet tree structures, and embeds watermark into the corresponding wavelet coefficients, by time-frequency mapping theory; the algorithm adaptively adjusts the watermark embedding intensity to balance transparency and robustness by HVS (Human Visual System). Experimental results show the algorithm is robust to common attacks. The image strong texture regions extraction method based on morphology in this algorithm has natural parallel structures,and is simple and effective compared with the classic spatial method, adaptive to various images.
     In order to improve the robustness by using of the image characteristics adequately, an image double watermark algorithm based on EMD (Empirical Mode Decomposition) is presented. The algorithm can accurately extract image strong texture regions by the favorable sifting ability of EMD to the image details characteristics, the watermark is embeded into the contourlet mid-frequency coefficients, which are on the direction-subbands with the largest energy corresponding image strong texture regions; Zero-watemark is constructed by extracting image edge characteristics using anti-noise multi-scale morphological edge detector. In this paper, the double watermark algorithm makes use of the image textrue and edge characteristics, closely connects the host image with the watermark, improves the robustness and security of the algorithm. Experimental results show this double watermark algorithm is robust to noise, filtering, compression, etc; and because of the inherent excellent feature that the zero watermark does not change the host image, the algorithm has a good performance in the transparency.
     Finally, the summary of this paper is given and the future direction of the research is presented.
引文
[1].孙圣和,陆哲明,牛夏牧.数字水印技术及应用.北京:科学出版社. 2004.
    [2].张焕国,郝彦军,王丽娜.数字水印、密码学比较研究.计算机工程与应用. 2003,9:63-67.
    [3].袁征,温巧燕,刁俊峰.基于水印和密码技术的数字版权保护模式.北京邮电大学学报. 2006,10,29(5):98-102.
    [4].夏煜,朗荣玲,戴冠中等,基于图像的信息隐藏分析技术综述.计算机工程. 2003,5,29(7):1-3.
    [5]. Van Schyndel R.G, Tirkel A.Z, Osborne C.F. A digital watermark. Image Processing, IEEE International Conference. 1994,11,2:86-90.
    [6]. Cox I.J, Kilian J, Leighton F.T,etc. Secure spread spectrum watermarking for multimedia. Image Processing, IEEE Transactions. 1997,12,6:1673-1687.
    [7]. Mauro Barni, Franco Bartolini, Vito Cappellini, etc. A DCT-domain system for robust image watermarking. Signal Processing. 1998,5,66(3):357-372.
    [8]. Hsu C.T, Wi J.L. Hiding digital watermarks in images. Image Processing, IEEE Transactions. 1999,1(8):58-68.
    [9]. Swanson M.D, Kobavashi M, Tewfik A.H. Multimedia data embedding and watermarking technologies. Proceedings of the IEEE. 1998,6,86(6):1064-1087.
    [10]. Kunder D, Hatzinlcos D. A robust digital image watermarking method using wavelet-based fusion. Image Processing, IEEE International Conference. 1997,3: 544-547.
    [11]. Ruanaidh J.K, Dowing J.W, Boland F.M. Phase watermarking of digital image. Image Processing, IEEE International Conference. 1996,3:239-242.
    [12].赵翔,郝林.数字水印综述.计算机工程与设计. 2006,6,27(11):1946-1950.
    [13]. Chu-Hsing Lin, Jung-Chun Liu, Chih-Hsiong Shih,etc. A Robust Watermark Scheme for Copyright Protection. Multimedia and Ubiquitous Engineering, IEEE International Conference. 2008,4:132-137.
    [14].尹浩,林闯,邱锋等.数字水印技术综述.计算机研究与发展. 2005, 47(7): 1093-1099.
    [15].秦臻,王新,杜江等.鲁棒数字图像水印综述.计算机应用与软件. 2007, 1, 24(1): 1-5.
    [16]. Steinberg Y. Watermarking identification for private and public users:the broadcast channel approach. Information Theory Workshop, Proceedings of IEEE. 2002, 10:5-7.
    [17]. Rongsheng Xie, Keshou Wu, Jiangbo Du,etc. Survey of Public Key Digital Watermarking Systems. Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. IEEE International Conference. 2007, 7(2): 439-443.
    [18].王振武,刘九芬,黄达人.一种有意义的图像水印算法.中山大学学报(自然科学版). 2003,42(1):1-4.
    [19].王道顺,梁敬弘,戴一奇等.图像水印系统有效性的评价框架.计算机学报. 2003,26(7):779-788.
    [20].张毅刚,焦玉华,牛夏牧等.基于指纹特征数字水印算法的身份认证技术研究.电子学报. 2003,31:2131-2134.
    [21]. Swanson M.D, Zhu B, Chau B,etc. Object-based transparent video watermarking. Multimedia Signal Processing, IEEE Workshop. 1999,6:369-374.
    [22]. Yun-feng Chen, Tao Li, Dong-ni Gao,etc. A secure mobile communication approach based on information hiding. Mobile Technology,Applications and Systems,IEEE International Conference. 2005,11,5.
    [23]. Petrovic R, Tehranchi B, Winograd J.M. Security of Copy-Control Watermarks. Telecommunications in Modern Satellite,Cable and Broadcasting Services, IEEE International Conference. 2007,9:117-126.
    [24]. Ping Dong, Galatsanos N.P. Affine transformation resistant watermarking based on image normalization. Image Processing, IEEE International Conference. 2002, 6(3):489-492.
    [25].周惠,徐涛,武小川.一种抵抗共谋攻击的数字视频水印算法.计算机应用. 2006,26(4):812-817.
    [26].伍宏涛,胡云,钮心忻等.抗JPEG压缩和图像合并的水印算法.电子与信息学报. 2005,27(6):914-918.
    [27]. Xiao-shi Zheng, Yan-ling Zhao. Research of Synchronization Robustness in Video Digital Watermarking. Computing,Communication,Control and Management, IEEE International Colloquium. 2008,1:276-279.
    [28]. Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom. Digital Watermarking,北京:电子工业出版社. 2002
    [29]. Kun Wang, Liqun Gao, Zhengang Shi,etc. An Edge Detection Algorithm Based on Multi-scale Morphology. Industrial Electronics and Applications, IEEE Conference.2007,5:2210-2213.
    [30]. Zheng Li, Bin Dai, Hangen He. A Novel Fast Segmentation Method of Unstructured Roads. Vehicular Electronics and Safety, IEEE International Conference. 2006, 12: 53-56.
    [31]. Iwanowski M. Morphological Boundary Pixel Classification. The International Conference on“Computer as Tool”. 2007,9:146-150.
    [32]. Zhuoyi Lv, Kebin Jia. A Novel Algorithm of Fast Detection and Segmentation of Moving Object. Intelligent Information Hiding and Multimedia Signal Processing, The International Conference. 2008,8:425-428.
    [33]. Sedaaghi M.H, Yousefi S. Morphological watermarking. IEEE Electronics Letters, 2005,41(10):587-589.
    [34]. Akihiro Okamoto, Akio Miyazaki. A digital watermark technique using morphological signal processing. Electronics and Communications in Japan (PartШ: Fundamental Electronic Science), 2003, 86(6):67-75.
    [35]. Rizk M.R.M, Youssef A.E, EI-Kharny S.E. Adaptive Watermarking Techniques Based On Multi-Scale Morphological Image Segmentation. Electrotechnical Conference, IEEE International Conference, 2006:820-823.
    [36]. Sepsirisuk K, Atsuta K, Kondo S. An Improved Wavelet-based Watermarking Method Using the Mathematical Morphology. Image Analysis for Multimedia Interactive Service, IEEE Eighth International Workshop. 2007:62-62.
    [37]. Maragos P. Differential morphology and image processing. Image Processing, IEEE Transactions. 1996,6,5(6):922-937.
    [38]. Van Sint Jan S.L, Clapworthy G.J, Rooze M. Morphology-based data elimination from medical image data. Computer Graphics and Application, IEEE. 2000, 20(2):46-52.
    [39]. Cui F, Zou L, Bei Song. Edge feature extraction based on digital image processing techniques. Automation and Logistics. IEEE International Conference. 2008,9:2320-2324.
    [40]. Benediktsson J.A, Palmason J.A, Sveinsson J.R. Classification of hyperspectral data from urban areas based on extended morphological profiles. Geoscience and Remote Sensing. IEEE Transactions. 2005,43(3):480-491.
    [41]. Sun-Gu Sun, Dong-Min Kwak, Won Bum Jang,etc. Small target detection using center-surround difference with locally adaptive threshold. Image and Signal Processing an Analysis. The International Symposium. 2005,9:402-407.
    [42].戴青云,余英林.数学形态学在图像处理中的应用.控制理论与应用. 2001,18(4): 478-482.
    [43].邓廷权,戴琼海.关于灰度数学形态学的表示定理.计算机工程. 2005, 31(15):1-3.
    [44].吴樊,王超,张红等.基于知识的中高分辨率光学卫星遥感影像桥梁目标识别研究.电子与信息学报. 2006,28(4):587-591.
    [45]. Delaigle J.F, Devleeschouwer C, Macq B,etc. Human visual system features enabling watermarking. Multimedia and Expo, IEEE International Conference. 2002,2:489-492.
    [46]. Khelifi F, Bouridane A, Kurugollu F,etc. An Improved Wavelet-Based Image Watermarking Technique. Advanced Video and Signal Based Surveillance, IEEE International Conference, 2005:588-592.
    [47]. Gui Xie, Hong Shen. Toward Improved Wavelet-based Watermarking Using the Pixel-wise Masking Model. Image Processing, IEEE International Conference, 2005:1-689-92.
    [48]. Tay R, Havlicek J.P. Image watermarking using wavelets. Circuits and Systems,IEEE Symposium. 2002,3:258-261.
    [49]. Min-Jen Tsai, Chang-Hsing Shen. Wavelet Tree Group Modulation for Digital Image Watermarking. Acoustics,Speech and Signal Processing, IEEE International Conference. 2007,2:173-176.
    [50]. Autrusseau F, Le Callet P, Ninassi A. A Study of Content based Watermarking using an Advanced HVS Model. Intelligent Information Hiding and Multimedia Signal Processing. 2007,2:485-488.
    [51]. Sepsirisuk K, Atsuta K, Kondo S. An Improved Wavelet-based Watermarking Method Using the Mathematical Morphology. Image Analysis for Multimedia Interactive Service, IEEE Eighth International Workshop, 2007:62-62.
    [52]. Huang N.E,etc. The empirical mode decomposition and the Hilbert spectrum for non-linear and non-stationary time series analysis. Proceedings of Royal Society. 1998,903-995.
    [53]. Nimunkar A.J, Tompkins W.J. R-peak Detection and Signal Averaging for Simulated Stress ECG using EMD. Engineering in Medicine and Biology Society, IEEE International Conference, 2007:1261-1264.
    [54]. Hadjileontiadis L.J. A Novel Technique for Denoising Exposive Lung Sounds Empirical Mode Decomposition and Fractal Dimension Foilter. Engineering in Medicine and Biology Magazine, IEEE, 2007, 26(1):30-39.
    [55]. Zuo Ziqiang, Puthusserypady S. Analysis of Schizophrenic EEG Synchrony usingEmpirical Mode Decomposition. Digital Signal Processing, IEEE International Conference, 2007:131-134.
    [56]. Khaldi K, Boudraa A.O, Bouchikhi A. Speech signal noise reduction by EMD. Communications, Control and Signal Processing, IEEE International Symposium, 2008:1155-1158.
    [57]. Molla K.I, Hirose K, Minematsu N. Voiced/Unvoiced Detection of Speech Signals Using Empirical Mode Decomposition Model. Information and Communication Technology, IEEE International Conference, 2007:311-314.
    [58]. Chatlani N, Soraghan J.J. Adaptive Empirical Mode Decomposition for Signal Enhancement with Application to Speech. Systems, Signals and Image Processing, IEEE International Conference, 2008:101-104.
    [59]. Zhang, J.Z, Price, B.T, Adams, R.D. Detection of Involuntary Human Hand Motions using Empirical Mode Decomposition and Hilbert-Huang Transform. Circuits and Systems, IEEE International Conference, 2008:157-160.
    [60]. Lihong Qiao, Lizhong Peng, Wei Guo. A Novel Image Fusion Algorithm based on 2D EMD and HIS. Machine Learning and Cybernetics, IEEE International Conference, 2008:4040-4044.
    [61]. Looney, D, Mandic, D.P. Fusion of Visual and Thermal Images using Complex Extension of EMD. Distributed Smart Cameras, IEEE International Conference, 2008:1-8.
    [62].赵春晖,安怀志,万建.一维经验模态分解在二维图像细节提取中的应用.应用科技. 2008,35(8):1-4.
    [63]. Li-Hong Qiao, Li-Zhong Peng, Wei Guo. A novel image fusion algorithm based on 2D EMD and HIS. Machine Learning and Cybernetics, IEEE International Conference. 2008,7:4040-4044.
    [64]. Kang Jian, Zhang Jie, Song Pingjian,etc. The Application of Two-Dimensional EMD to Extracting Internal Waves in SAR Images. Computer Science and Software Engineering, IEEE International Conference. 2008,1:953-956.
    [65]. Jen-Chun Lee, Ping S. Huang, Chung-Shi Chiang,etc. An Empirical Mode Decomposition Approach for Iris Recognition. Image Processing, IEEE International Conference. 2006, 10:289-292.
    [66]. Miao Qiguang,Wang Baoshu. A Novel Image Fusion Method Using Contourlet Transform. Communications,Circuits and Systems Proceedings,IEEE International Conference. 2006,6,1:548-552.
    [67]. Lian Xueqiang, Ding Xinghao, Guo Donghui. Digital Watermarking based onNon-Sampled Contourlet Transform. Anti-counterfeiting, Security, Identification, IEEE International Workshop. 2007,4:138-141.
    [68]. Po D.D.Y, Do M.N. Directional multiscale modeling of image using the contourlet transform. Image Processing,IEEE Transactions. 2006,15(6):1610-1620.
    [69]. Zhiling Long, Younan N.H. Contourlet Image Modeling with Contextual Hidden Markow Models. Image Analysis and Interpretation, IEEE Southwest Symposium. 2006:173-177.
    [70]. Ru Guanying, Yang Shouyi, Mu Xiaomin,etc. A zero-watermark system based on combined spatial and wavelet domains. Communications and Networking, IEEE International Conference. 2008,8:954-957.
    [71]. Van der Heijden F. Edge and line feature extraction based on covariance models. Pattern Analysis and Machine Intelligence, IEEE Transactions. 1995,17(1):16-33.
    [72]. Ying-Tung Hsiao, Cheng-Long Chuang, Shwu-Huey Yen,etc. A mathematical morphological method to thin edge detection in dark region. Signal Processing and Information Technology, IEEE International Symposium. 2004,12:310-313.
    [73]. Zeng Pingping, Zeng Binyang. A New Algorithm Based on Multi-scale Order Morphology for Gray Image Detection. Electronic Measurement and Instruments. IEEE International Conference.2007,8:2982-2985.
    [74]. Zhenhua Li, Yingping Yang, Wei Jiang. Multi-scale Morphologic Tracking Approach for Edge Detection. Image and Graphics, IEEE International Conference. 2007,8:358-362.