|
- 2016
基于MPUI模型的空域图像水印容量研究
|
Abstract:
摘要: 在基于失真不可感知的控制模型(maximize payload under imperceptive, MPUI)下,研究了空域图像的最大水印容量。发现最大水印容量不仅与嵌入强度有关,而且与图像尺寸大小、复杂度、视觉敏感度等因素相关。在理论上推导了最大水印容量与图像大小、嵌入强度的关系,并采用多元回归分析方法研究了图像复杂度、视觉敏感度与嵌入率的关系模型。综合这些内外因素,借助于主客观评价体系,推算出水印嵌入容量的估算方法,并在实验中验证了该估算方法的有效性。
Abstract: Based on the MPUI model, we study the maximum watermarking payload of spatial domain image, which is not only related to embedding intensity but also to the factors such as the size of image, image complexity and visual sensitively, and so forth. We derived the relationship among maximum watermarking payload, size of image and embedding intensity, and adopt multivariate regression analysis method to research image complexity, visual sensitivity, and embedding rate model. Synthesize these internal and external factors, with the aid of subjective and objective evaluation system, we estimate the estimation method of watermark embedded payload and verify its effectiveness through experiments
[1] | 董秀则,张茹,钮心忻. MB隐写分析算法[J]. 北京邮电大学学报,2012,02:99-103. DONG Xiuze, ZHANG Ru, NIU Xinxin. A steganalysis algorithm on MB stegano-graphy[J].Journal of Beijing University of Posts and Telecommunications, 2012, 02:99-103. |
[2] | 高虎明,李凯捷,王英娟.基于SIFT 抗几何攻击的数字水印算法[J]. 计算机应用,2013,33(3):748-751. GAO Huming, LI Kaijie, WANG Yingjuan. A digital watermarking algorithm based on SIFT against geometric attacks [J]. Journal of Computer Applications, 2013, 33(3):748-751. |
[3] | COHEN A S, LAPIDOTH A. The capacity of the vector Gaussian watermarking game[C] //Proceeding of the IEEE International Symposium on Information Theory(ISIT2001). Piscataway: IEEE, 2001: 24-29. |
[4] | HALLER R S. Complexity of real images evaluated by densitometric analysis and psychophysical scaling[D]. USA: University of Arizona, 1970. |
[5] | 王向阳,杨红颖,郑宏亮,等.基于视觉权值的分块颜色直方图图像检索算法[J].自动化学报,2010,36(10):1489-1492. WANG Xiangyang, YANG Hongying, ZHENG Hongliang, et al. A Color block-histogram image retrieval based on visual weight[J].Acta Automatica Sinica, 2010, 36(10):1489-1492. |
[6] | DELAIGLE J F, DEVLEESCHOUWER C, MACQ B, et al. Human visual system fea-tures enabling watermarking[C] //Proceedings of 2002 IEEE International Conference on Multimedia and Expo. New York: IEEE, 2002: 489-492. |
[7] | 沈昌祥,张焕国,冯登国,等.信息安全综述[J].中国科学(E集:信息科学), 2007, 37(2):129-150. SHEN Changxiang, ZHANG Huanguo, FENG Dengguo, et al. Information security review [J]. Science in China(Series E: Information Sciences), 2007, 37(2):129-150. |
[8] | SOLACHIDIS V, TEFAS A, NIKOLAIDIS N, et al. A benchmarking protocol for water-marking methods[C] //Proceedings of International Conference on Image Processing. New York: IEEE, 2001, 3:1023-1026. |
[9] | MOULIN P, OSULLIVAN J A. Information theoretic analysis of information hiding [J]. IEEE Transactions on Information Theory, 2003, 49(3):563-593. |
[10] | SOMEKH-BARUCH A, MERHAV N. On the capacity game of public watermarking system[J]. IEEE Transactions on Infor-mation Theory, 2004, 50(3):511-524. |
[11] | ZHANG X, WANG S. Steganography using multiple-base notational system and human vision sensitivity[J]. IEEE Signal Processing Letters, 2005, 12(1):67-70. |
[12] | PANYAVARAPORN J, HORKAEW P, WONGTRAIRAT W. QR code watermarking algorithm based on wavelet transform[C] // Proceedings of the 13th International Symposium on Communications and Information Technologies. Piscataway: IEEE, 2013:791-796. |
[13] | JAMZAD M, YAGHMAEE F. Achieving higher stability in watermarking according to image complexity[J]. Scientia Iranica, 2006, 13(4):404-412. |
[14] | SAJEDI H, JAMZAD M. Secure steganography based on embedding capacity[J]. International Journal of Information Security, 2009, 8(6):433-445. |
[15] | 高海英. 音频信息隐藏理论及应用[D]. 北京: 北京邮电大学,2006. GAO Haiying. The theory and application of audio information hiding [D]. Beijing: Beijing University of Posts and Telecommunicatons, 2006. |
[16] | MAO J F, NIU X X, YANG Y X, et al. JPEG2000 image maximum steganogra-phy payload based on MPUI model [J].Journal of Software, 2014, 25(7):1606-1620. |
[17] | MOHAND S A. Wavelet modeling using finite mixtures of generalized Gaussian distribution: application to texture discrimination and retrieval[J]. IEEE Transactions on Image Processing, 2012, 21(4):1452-1464. |
[18] | 武嘉,张茹,钮心忻,等. 针对BPCS隐写的隐写分析法[J]. 北京邮电大学学报,2009,04:113-116. WU Jia, ZHANG Ru, NIU Xinxin, et al. Reliable detection of BPCS stega-nography [J]. Journal of Beijing University of Posts and Telecommunications, 2009, 04:113-116. |
[19] | VORBRUGGEN J C, CAYRE F. The Certimark benchmark: architecture and future perspectives[C] //Proceeding of the IEEE International Conference on Multimedia and Expo(ICME2002).New York: IEEE, 2002:485-488. |
[20] | COHEN A, LAPIDOTH A. The Gaussian watermarking game[J]. IEEE Transactions on Information Theory, 2002, 48(6):1639-1667. |
[21] | FILLER T, JUDAS J, FRIDRICH J. Gibbs construction in steganography[J].IEEE Transactions on Information Forensics and Security, 2010, 5(4): 705-720. |
[22] | JAIN A K, 韩博, 徐枫. 数字图像处理基础[M]. 北京:清华大学出版社,2006. JAIN A K, HAN Bo, XU Feng. Foundation of digital image processing[M]. Beijing: Tsinghua University Press, 2006. |
[23] | WU Jianzhen, XIE Jianying, YANG Yupu. An adaptive blind watermarking scheme utilizing neural network for synch ronization[J]. Journal of Harbin Institute of Technology, 2007, 14(2):281-286. |
[24] | KER A D. A capacity result for batch steganography [J]. IEEE Signal Process Let, 2007, 14(8):525-528. |
[25] | KIM H C, LIN E T, GUITART O, et al. Further progress in watermark evaluation testbed(WET)[C] //Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents(SPIE2005). USA: SPIE, 2005:236-247. |