图像块的自适应均衡水印算法
Watermarking algorithm for adaptive equalization based on image block
- 2018年23卷第4期 页码:467-477
收稿:2017-07-27,
修回:2017-10-17,
纸质出版:2018-04-16
DOI: 10.11834/jig.170423
移动端阅览

浏览全部资源
扫码关注微信
收稿:2017-07-27,
修回:2017-10-17,
纸质出版:2018-04-16
移动端阅览
目的
2
针对水印算法通常利用实验确定强度参数,实验工作量大并且具有随机性,得到的参数无法较好地均衡水印不可见性和鲁棒性,提出一种基于图像块的自适应均衡水印算法。
方法
2
利用尺度不变特征变换(SIFT)提取原始图像中鲁棒性强的特征点作为水印嵌入区域,将提取的嵌入区域分成4个大小相等且互不重叠的图像块,并对各图像块进行奇异值分解(SVD),得到与各块相应的奇异值矩阵,各块与水印做一级离散小波变换后产生的各子带相叠加,生成嵌入加密水印块,重组得到水印矩阵,降维后将特征点还原到原始图像。根据果蝇优化算法(FOA)中适应度函数迭代确定加密水印强度参数,构造水印图像的自适应嵌入,来均衡水印的不可见性和鲁棒性,水印检测可直接作用在受攻击后的图像上,无需校正恢复。
结果
2
对标准灰度图像进行多组实验,得到含水印图像峰值信噪比均达到43dB以上;对水印载体图像分别进行噪声、压缩、剪切、旋转仿真攻击实验,提取水印图像与原始水印图像的归一化相关系数都达到0.94以上。
结论
2
SIFT算法实现图像块局部嵌入,提取特征点稳定性强,结合SVD算法使水印嵌入性能良好,利用FOA算法自适应确定最优参数,使水印图像嵌入效果达到最佳状态,最终均衡了水印的不可见性和鲁棒性。
Objective
2
Watermarking algorithm experiments are usually used as a standard to determine intensity parameters. However
the experimental workload is considerable and stochastic. A watermark is embedded in the original image to coordinate invisibility and robustness. The watermarked image has good invisibility but reduces the watermark robustness. A good watermark hiding technology must consider both the invisibility of the watermarked image and the robustness of the watermark and can resist various common attacks at the same time. An adaptive watermarking algorithm based on image block is proposed to balance invisibility and robustness.
Method
2
Scale-invariant feature transform (SIFT) is utilized to extract the original image with a robustness feature as good that of the watermark-embedded area. Before the embedding operation
feature points are filtered to eliminate the points with low contrast and edge point
and the resulting feature points have high stability. Two watermarking experiments with different watermark sizes are conducted. The extraction of the number of feature points is positively correlated with watermark size. When the watermark is extracted
the points are used again to locate the watermark. The feature points of the original carrier image are extracted to form a matrix with the same size as that of the watermarked image. The extracted embedded region is divided into four equal and non-overlapping image blocks. Each image block is decomposed by singular value decomposition (SVD) to obtain two orthogonal matrices
U
and
V
and a diagonal matrix
S
. Matrix
S
is superimposed by the subband of the first-class discrete wavelet transform of the watermark
which is embedded in the encrypted watermark. The watermark matrix is reorganized
and then the feature points are restored to the original image. The size of the embedded strength affects the performance of the extracted watermark. If the embedding intensity is defined as a constant
then it cannot be applied to each experiment type. Random values are also affected by the embedding effect of the watermark. The fitness function of the fruit
$${\rm fly} $$
optimization algorithm (FOA) is used in adaptive embedding of a watermark image. The senses of smell and sight of fruit flies are superior to those of other species. When flies recognize the smell of food
they
$${\rm fly} $$
in the direction of a target or partner. The FOA simulates this behavior. Two sets of watermarks with different sizes are embedded in this study. Two groups of objective function are selected through several experiments to determine the watermark embedding strength and to achieve a good embedding effect. The FOA is used to balance the invisibility and robustness of the watermark. The watermark detection can directly affect images after attacks without correction.
Result
2
Multi-standard experiments are conducted on standard gray images. Standard gray images of Lena
Baboon
and Plane are selected as the original images
and two binary images of "word" and "Liaoning Technical University" are used as watermark images. Peak signal-to-noise ratio (
$${\rm PSNR}$$
) is used to measure the imperceptibility of the watermark. A high
$${\rm PSNR}$$
indicates high imperceptibility. Normalized correlation coefficient (
$${\rm NC}$$
) is adopted to evaluate the similarity between the original and extracted watermarks. A large
$${\rm NC}$$
value means high robustness of the watermark. For a 16×16 watermark image
the optimal embedding intensities of the three gray images
Lena
Baboon
and Plane
are 0.302 7
0.349 6
and 0.377 3
respectively. The
$${\rm PSNR}$$
of the watermarked image is above 45 dB. For a 32×32 watermark image
the optimal embedding intensities of the three gray images
Lena
Baboon
and Plane
are 0.240 1
0.251 1
and 0.217 6
respectively. The
$${\rm PSNR}$$
of the watermarked image is above 43 dB. These values show that the algorithm achieves good invisibility. When the algorithm is not attacked
the extracted watermark images have
$${\rm NC}$$
values above 0.99
and the watermark robustness is high. External attacks should be resisted. The three gray images with watermark are simulated by applying noise
compression
shear
and rotation. The 16×16 watermark image under different attacks presents watermark
$${\rm NC}$$
values above 0.94. The attacks exert minimal influences on the quality of watermark extraction. The rotation
translation
and other geometric attacks on the 16×16 watermark image lead to
$${\rm NC}$$
values below 1. The watermark image loses some pixels in the rotation and translation processes. Therefore
in the process of watermark extraction
all pixels cannot be extracted
thereby resulting in an incomplete watermark. For compression attacks
the resulting
$${\rm NC}$$
values increase as the attack parameters increase. In the noise attack
the
$${\rm NC}$$
values of watermark obtained under different intensity attacks can reach more than 0.98
which shows that the algorithm has a great advantage in resisting noise attack. The embedding of the 32×32 watermark image exhibits a similar watermark effect when attacked by the same attacks
and the general trend of
$${\rm NC}$$
values under attacks is the same. The two groups of attack experiments show watermark
$${\rm NC}$$
values greater than 0.94
which indicates that the algorithm can effectively resist some bad attacks.
Conclusion
2
The feature points extracted by SIFT have a certain stability
and the local characteristics of watermarked images are affected by various geometric attacks
such as rotation and shear. The location of a watermark embedded in the algorithm is a part of the feature points extracted from the original image and is scattered. As a result
the watermark is not visually significant. SIFT is adopted to realize locally embedded image blocks. The SVD algorithm optimizes the watermarkembedding performance to extract stable feature points. The FOA allows each experiment group to yield adaptive intensity parameters and achieve the best embedding effect without the need to compare the parameters. This algorithm intelligently searches for optimal solutions that balance the invisibility and robustness of watermarks.
Ye T Y. Perfectly blind self-embedding robust quantization-based watermarking scheme in DWT-SVD domain[J]. Journal of Image and Graphics, 2012, 17(6):644-650.
叶天语. DWT-SVD域全盲自嵌入鲁棒量化水印算法[J].中国图象图形学报, 2012, 17(6):644-650. [DOI:10.11834/jig.20120605]
Zhang F Y, Quan H L, Lin L Y, et al. Robust digital watermark algorithm in Contourlet domain based on singular value decomposition[J]. Application Research of Computers, 2012, 29(4):1402-1404, 1408.
张飞艳, 全桓立, 林立宇, 等.基于奇异值分解的Contourlet域稳健性数字水印算法[J].计算机应用研究, 2012, 29(4):1402-1404, 1408. [DOI:10.3969/j.issn.1001-3695.2012.04.056]
Chen N, Ma H J. Robust dual-watermarking algorithm based on Contourlet and SVD[J]. Application Research of Computers, 2012, 29(7):2700-2702.
陈宁, 马会杰.基于Contourlet和SVD的鲁棒双水印算法[J].计算机应用研究, 2012, 29(7):2700-2702. [DOI:10.3969/j.issn.1001-3695.2012.07.082]
Zhang Z, Wang C Y, Zhou X. Image watermarking scheme based on DWT-DCT and SSVD[J]. International Journal of Security and its Applications, 2016, 10(10):191-206.[DOI:10.14257/ijsia.2016.10.10.18]
Zeng F J, Zhou A M. Image zero-watermarking algorithm based on Contourlet transform and singular value decomposition[J]. Journal of Computer Applications, 2008, 28(8):2033-2035.
曾凡娟, 周安民.基于Contourlet变换和奇异值分解的图像零水印算法[J].计算机应用, 2008, 28(8):2033-2035. [DOI:10.3724/SP.J.1087.2008.02033]
Liu P L, Tan Y H, Hu Z Z. Zero-watermarking algorithm based on hybrid transform domain and SVD[J]. Computer Applications and Software, 2013, 30(11):206-209.
刘培利, 谭月辉, 胡祖治.基于混合变换域和奇异值分解的零水印算法[J].计算机应用与软件, 2013, 30(11):206-209. [DOI:10.3969/j.issn.1000-386x.2013.11.057]
Chen W Q, Li Q. A DWT-SVD based double-zero-watermarking algorithm[J]. Computer Engineering and Science, 2014, 36(10):1991-1996.
陈伟琦, 李倩.基于DWT-SVD的图像双零水印算法[J].计算机工程与科学, 2014, 36(10):1991-1996. [DOI:10.3969/j.issn.1007-130X.2014.10.024]
Rao Y R, Nagabhooshanam E. A novel image zero-watermarking scheme based on DWT-BN-SVD[C]//Proceedings of 2014 International Conference on Information Communication and Embedded Systems. Chennai: IEEE, 2015: 1-6. [ DOI:10.1109/ICICES.2014.7034073 http://dx.doi.org/10.1109/ICICES.2014.7034073 ]
Xiao Z J, Sun J, Wang Y B, et al. Wavelet domain digital watermarking method based on fruit fly optimization algorithm[J]. Journal of Computer Applications, 2015, 35(9):2527-2530.
肖振久, 孙健, 王永滨, 等.基于果蝇优化算法的小波域数字水印算法[J].计算机应用, 2015, 35(9):2527-2530. [DOI:10.11772/j.issn.1001-9081.2015.09.2527]
Zeng Q, Ma M, Zhou T, et al. Cuckoo-search-algorithm-based watermarking method in wavelet domain[J]. Journal of Chinese Computer Systems, 2014, 35(5):1155-1159.
曾晴, 马苗, 周涛, 等.基于布谷鸟搜索算法的小波域数字水印方法[J].小型微型计算机系统, 2014, 35(5):1155-1159. [DOI:10.3969/j.issn.1000-1220.2014.05.043]
Takore T T, Kumar P R, Devi G L. A modified blind image watermarking scheme based on DWT, DCT and SVD domain using GA to optimize robustness[C]//Proceedings of IEEE International Conference on Electrical, Electronics, and optimization Techniques(ICEEOT). Chennai: IEEE, 2016: 2725-2729. [ DOI:10.1109/ICEEOT.2016.7755190 http://dx.doi.org/10.1109/ICEEOT.2016.7755190 ]
Zhang H L, Liu J. Robust image watermarking using local invariant featuresand independent component analysis[J]. Wuhan University Journal of Natural Sciences, 2006, 11(6):1931-1934.[DOI:10.1007/BF02831910]
Lyu W L, Chang C C, Nguyen T S, et al. Image watermarking scheme based on scale-invariant feature transform[J]. KSII Transactions on Internet and Information Systems, 2014, 8(10):3591-3606.
Pham V Q, Miyaki T, Yamasaki T, et al. Geometrically invariant object-based watermarking using SIFT feature[C]//Proceedings of IEEE International Conference on Image Processing. San Antonio, TX: IEEE, 2007: V-473-V-476. [ DOI:10.1109/ICIP.2007.4379868 http://dx.doi.org/10.1109/ICIP.2007.4379868 ]
Zhang L, Tang B. A combination of feature-points-based and SVD-based image watermarking algorithm[C]//Proceedings of 2012 International Conference on Industrial Control and Electronics Engineering. Xi'an: IEEE, 2012: 1092-1095. [ DOI:10.1109/ICICEE.2012.289 http://dx.doi.org/10.1109/ICICEE.2012.289 ]
Lowe D G. Distinctive image features from scale-invariant keypoints[J]. International Journal of Computer Vision, 2004, 60(2):91-110.[DOI:10.1023/B:VISI.0000029664.99615.94]
Lindeberg T. Scale-space theory:a basic tool for analyzing structures at different scales[J]. Journal of Applied Statistics, 2011, 21(1-2):225-270.[DOI:10.1080/757582976]
Zhang Y P, Wang C Y, Wang X L, et al. Feature-based image watermarking algorithm using SVD and APBT for copyright protection[J]. Future Internet, 2017, 9(2):#13.[DOI:10.3390/fi9020013]
Zhang J L, Li M, He Y J. Image watermarking algorithm against attacks based on SIFT feature point and cross-ratio value[J]. Journal on Communications, 2014, 35(11):170-181.
张金利, 李敏, 何玉杰.基于SIFT特征点和交比值的水印图像抗攻击算法[J].通信学报, 2014, 35(11):170-181. [DOI:10.3969/j.issn.1000-436x.2014.11.020]
相关作者
相关机构
京公网安备11010802024621