Current Issue Cover
小波域视觉密码零水印算法

曲长波1, 杨晓陶1, 袁铎宁2(1.辽宁工程技术大学软件学院, 葫芦岛 125105;2.辽宁工程技术大学工商管理学院, 葫芦岛 125105)

摘 要
目的 传统零水印算法需要构造包含图像特征的水印数据,这样构造的水印往往是无意义的。在已有视觉密码鲁棒水印算法基础上,结合零水印思想,提出小波域视觉密码零水印算法。方法 零水印不仅仅是由载体图像生成的,而是其与水印信息共同制造的视觉秘密图份。算法产生2幅图份:主图份(图像特征信息)和所有权图份(零水印)。首先,将载体图像通过合理置乱,去除像素相关性;其次,对置乱后的图像做小波变换,再将小波低频子带分块并对各块做奇异值分解,通过比较块特征值与块特征值均值生成过渡矩阵;然后,将生成的过渡矩阵结合2×2视觉秘密图份算法生成主图份;最后,结合主图份和秘密水印信息产生所有权图份,同时将其保存到认证中心。结果 针对零水印信息不够直观,在不对载体进行任何改动的情况下,将有意义二值图像作为零水印嵌入到载体图像中去。即使在很强的鲁棒干扰环境中,本文方法仍然比传统的零水印算法表现出色。结论 提出了一种可靠的图像版权认证零水印算法。实验结果表明,算法具有良好的安全性,同时对多种图像处理具有很好的鲁棒性。
关键词
Zero-watermarking visual cryptography algorithm in the wavelet domain

Qu Changbo1, Yang Xiaotao1, Yuan Duoning2(1.College of Software, Liaoning Technical University, Huludao 125105, China;2.College of Business Administration, Liaoning Technical University, Huludao 125105, China)

Abstract
Objective Traditional zero-watermarking algorithm requires characteristic image watermark data. Using these methods,it is often necessary to construct meaningless watermarks. Based on the existing visual cryptography robust watermarking algorithm,combined with zero-watermarking, we present a new visual cryptography zero wavelet domain zero watermarking algorithm. We need to embed the meaningful binary image into the original image,without changing the original image. Method A zero watermark is not only generated by the carrier image but it is co-produced with the visual watermark secret shares. The proposed algorithm generates two parts:one is the main map component(image feature information) and the other is the ownership chart parts(zero watermark). First of all, using the rational scrambling on the carrier image,it removes the pixel correlation. Second,doing the wavelet transform,the wavelet sub-bands are blocked and the singular value decomposition with each of the blocks is produced.After those steps, we compare each block's characteristic value and the mean value of each block. As a result of that, we can get the transition matrix. Third,the transition matrix is combined with a 2×2 visual secret sharing algorithm to generate the main sharing. Finally, by combining the main sharing with the secret watermarking information, we produce the proprietary sharing and save it to the certification center. Result Aiming at zero-watermarking information is not very intuitive,in the conditions of not making any changes to the carrier image, we could embed the meaningful binary image into the carrier image. Even in highly robust disturbance environment,this method also has a better performance than the traditional zero-watermarking algorithm. Conclusion The presented zero-watermarking algorithm of image copyright authentication is a very reliable way to achieve our goals. As shown by our experiment,this algorithm has a good security. In addition to this aspect,it is also more robust when confronted with many different types of image processing.
Keywords

订阅号|日报