节点文献

数字图像水印算法的研究

Research of Digital Image Watermarking Algorithms

【作者】 孙文文

【导师】 王慧琴;

【作者基本信息】 西安建筑科技大学 , 计算机应用技术, 2010, 硕士

【摘要】 随着信息技术和网络应用的飞速发展,版权认证和网络安全技术面临着极大的挑战。数字水印技术是解决这一问题的有效手段和方法,得到广泛的研究与应用。本文介绍了国内外数字水印技术的研究背景、研究现状和发展趋势,分析了数字水印技术的原理、特征、分类、基本框架、典型算法、常见攻击和评价标准等。在此基础上,结合离散余弦变换、混沌理论、奇异值分解等理论提出了两种数字图像水印算法。(1)DCT域的条码印刷水印算法。针对印刷品防伪技术,提出了一种将二值条码作为水印信息的印刷防伪算法,使水印经过一次打印扫描后具有鲁棒性,二次打印扫描后具有脆弱性。算法首先对水印信息进行混沌加密处理,实现了信息的初步隐藏;然后根据水印图像的大小对原始载体图像进行分块DCT变换,选取中低频系数并对其进行分组,通过分组中每两个系数的绝对值大小和符号的同异性对系数进行修改实现水印信息的嵌入,修改的幅度和范围较小,水印的不可见性好。根据嵌入水印后图像的分块DCT系数的正负性来提取水印,实现了盲提取。大量的仿真实验结果表明该算法具有良好的不可见性,符合印刷品防伪技术的要求。(2)基于DCT与SVD的数字水印算法。首先在算法中引入了混沌技术,对原始水印图像进行加密,加密后的水印与原始水印的相似度很低,在不知道混沌初值的情况下,无法提取出水印。然后对载体图像进行分块DCT变换,将DCT系数按Zig-Zag排序并选取中低频系数组成系数矩阵,利用奇异值分解理论对系数矩阵进行变换,在其S分量上嵌入水印,有效地提高了水印的抗攻击能力。水印提取过程需要用到嵌入过程中奇异值分解的U和V分量。仿真实验验证了该算法不仅具有良好的不可见性,对于常见的攻击也具有较强的鲁棒性。

【Abstract】 With the rapid development of the information technology and the network applications, copyright authentication and network security technology is facing great challenge. Digital watermarking technology is an effective method to solve the problem described above, and the technology was researched deeply and applied widely.The research background, current situation and development trend of digital watermarking technology were described. The principles, characteristics, classification, basic framework, typical method, common assault and evaluation criteria of digital watermarking technology were analyzed. Based on the above basal theoretical research, combined with discrete cosine transform, chaos theory, singular value decomposition theory. Two digital image watermarking algorithms were proposed in this paper.(1)The barcode printing watermarking algorithm based on DCT domain. The printed counterfeiting algorithm based on the printed counterfeiting technology was proposed, the binary barcode was regarded as the watermarking information in this algorithm. The advantage of this algorithm is that the watermarking is robust to the first PS (print and scan) and fragile to the second PS. At first, encrypting the watermarking information with chaotic method and the information can be initial hidden initially. Then, implementing the blocked DCT transform of the embedded watermarking image according to the size of the watermarking image. Selecting the low frequency coefficient and embedding the watermark information by modifying the coefficient of amplitude and plus-minus sign. During the watermarking extraction process, implementing the blocked DCT transform of the watermarked image at first, and then extracting the watermarking information according to the plus-minus sign of the DCT coefficients. The modifying extent is smaller and the algorithm has good invisibility. The watermarking was extracted according to plus-minus sign of the DCT coefficients, and the process is blind extraction. The simulation experiment results show that the algorithm has good invisibility, and the design of the algorithm accords with the requirement of the printed counterfeiting technology.(2)The digital watermarking algorithm based on DCT and SVD. The chaos technology was pulled into the algorithm. Firstly, encrypting the original watermarking image with the chaos technology. The watermarking information can’t be extracted if the chaos initial value is unknown, because the similarity of the encrypted watermarking and the original watermarking is low. Then, transforming the carrier image for block DCT, sorting the DCT coefficients according to Zig-Zag order and selecting the low frequency coefficients to constitute a coefficient matrix. Transforming the coefficient matrix with the Singular Value Decomposition method and embedding watermarking to the S component. The resist ability is improved in this algorithm. The SVD’s U and V components produced during the embedding process should be used when extracting the watermarking. Simulation results show that the algorithm has good invisibility, while is better robust to the common attacks.

节点文献中: 

本文链接的文献网络图示:

本文的引文网络