结合汉明码和图像矫正的彩色图像盲水印
Blind color image watermarking method combining Hamming code with image correction
- 2021年26卷第5期 页码:1138-1146
收稿:2020-07-24,
修回:2020-8-7,
录用:2020-8-14,
纸质出版:2021-05-16
DOI: 10.11834/jig.200384
移动端阅览

浏览全部资源
扫码关注微信
收稿:2020-07-24,
修回:2020-8-7,
录用:2020-8-14,
纸质出版:2021-05-16
移动端阅览
目的
2
随着互联网技术的飞速发展,彩色数字图像带来极大便利的同时,也产生了一些篡改、剽窃等侵权行为;同时,几何处理对含水印载体的破坏使水印盲检测的难度增加,因此,本文提出一种基于汉明码和图像矫正的彩色图像盲水印方法,旨在解决当前图像版权保护的难点问题。
方法
2
嵌入水印时,使用仿射变换加密彩色水印,并将已加密的信息编为汉明码,然后利用特征值分解计算出像素块的全部特征值,并通过对特征值绝对值的和进行量化来完成水印的嵌入;提取水印时,利用图像的几何属性对多种几何攻击后的图像进行判断、矫正,并借助量化技术提取水印。
结果
2
基于彩色图像标准数据库,将本文方法与7种相关方法进行了对比实验:在不可见性方面,与LU分解的水印方法相比,本文算法峰值信噪比(peak signal-to-noise ratio,PSNR)提高了4 dB;在常规攻击鲁棒性方面,与Schur分解的最新方法相比,本文算法平均归一化互相关(normalized cross-correlation,NC)的值稍有提高;在几何攻击鲁棒性方面,本文算法NC值具有一定的优势;同时,本文算法的水印容量达到了0.25 bit/像素,密钥空间达到了2
432
,运行时间仅需3 s左右。
结论
2
所提方法不仅具有较好的水印不可见性和较强的鲁棒性,而且具有较大的水印容量、较高的安全性和实时性。
Objective
2
With the rapid development of internet technology
color digital image
the carrier of large amounts of information
not only brings great convenience to people
but also brings some infringements such as tampering and plagiarism. Thus
digital watermarking technology was proposed in the last century. Digital watermarking technology can effectively protect copyrights. However
at present
most of the studies on copyright protection of color digital images use non-blind watermarking methods
while blind watermarking methods mainly focus on binary watermarking techniques and gray-scale watermarking ones
which are difficult to meet the needs of copyright protection of color digital images. In addition
in terms of the robustness of color digital image copyright protection methods
most methods can only resist traditional image attacks
while the resistance to geometric attacks is very weak; that is
most algorithms cannot extract the watermark
or the effect of the extracted watermark is poor after some geometric attacks. At the same time
image geometric processing destroys the color watermarked carrier image
which complicates the blind detection of the color digital watermark image. Thus
a blind color image digital watermarking algorithm with a large watermark capacity
high concealment security
and strong robustness needs to be designed. This study proposes a blind color image watermarking method based on Hamming code and image correction
which can effectively solve the above-mentioned problems.
Method
2
This algorithm uses the eigenvalue decomposition to obtain all eigenvalues of the pixel block of the host image and quantizes the sum of the absolute values of the eigenvalues to complete the hiding and blind detection of color watermark information. To improve the robustness of the algorithm
the attacks on watermarked images are judged by analyzing the geometric information of the image before extracting the watermark
so as to obtain the attack type of the color watermarked image and correct and restore them accordingly. In detail
when embedding the color watermark
affine transform based on private keys is used to encrypt the color watermark information in order to improve the security of the watermarking algorithm. Each encrypted watermark pixel is converted into an 8-bit binary information bit
and then it is encoded into more robust Hamming codes with the help of Hamming coding theory. Then
eigenvalue decomposition is used to calculate all the eigenvalues of the pixel block in the color carrier image
and the sum of the absolute value of all eigenvalues is quantified to embed the color watermark information. When extracting the color watermark information
the geometric attributes of the color watermarked image are used to judge and correct the watermarked image after various geometric attacks. In the process of judgment
the vertexes of the effective image inside the attacked color watermarked image are first obtained
and then the side and corner information of the effective image is calculated. According to the side and corner information of the effective image
the attack type of the attacked color watermarked image can be obtained. In the process of correction
the parameters of image transformation can be obtained according to the side and corner information of the effective image. Finally
the attacked color watermarked image can be corrected according to the parameters of image transformation and the attack type of the attacked color watermarked image. The extraction process of watermark is the inverse process of watermark embedding process. All the eigenvalues of the pixel block in the color corrected watermarked image are calculated
and the color watermark information is extracted by the proposed quantitative technique. In the recovery process
the extracted watermark information is reconstructed after the processing of the inverse affine transform based on private keys and inverse Hamming coding.
Result
2
To accurately and effectively compare the performance of the algorithm
the experiments are compared with seven different methods based on the color standard image database. The simulation results show that the proposed algorithm has better performance in visual imperceptibility
robustness
algorithm security
efficiency
and embedding capacity than other methods. In detail
in terms of invisibility
the peak signal-to-noise ratio (PSNR) is 4 dB higher compared with the watermarking method using LU decomposition. In terms of the conventional robustness
the average normalized cross-correlation (NC) is slightly improved compared with the latest Schur decomposition method. In terms of geometric robustness
such as scaling
rotation
and shearing
the NC has certain advantages. At the same time
the extracted watermarks have good visual effect. In the aspect of watermark capacity
the watermark capacity is greatly improved (up to 0.25 bpp) compared with other anti-geometric attack methods. In terms of security
the watermarking algorithm has strong security; the key space of the proposed method reaches 2
432
. In terms of algorithm efficiency
the running time is greatly improved
which only takes about 3
compared with some watermarking methods that resist geometric attacks.
Conclusion
2
Therefore
the experimental data show that the proposed method not only has better watermark invisibility and stronger robustness
but also has larger watermark capacity
higher security
and better real-time performance
which is suitable for the copyright protection of high-security large-capacity color digital images. Future work will focus on the reduction of time complexity of this watermarking algorithm and consider how to apply it in the copyright protection of color digital image in cloud storage.
Chen H, Du X P, Liu Z J and Yang C W. 2013. Color image encryption based on the affine transform and gyrator transform. Optics and Lasers in Engineering, 51(6): 768-775[DOI:10.1016/j.optlaseng.2013.01.016]
Chen Y, Li Z, Zhang J and Wang G M. 2019. Robust watermarking algorithm for diffusion weighted images. Journal of Image and Graphics, 24(9): 1434-1449
陈怡, 李智, 张健, 王国美. 2019. 弥散加权图像的鲁棒水印算法研究. 中国图象图形学报, 24(9): 1434-1449 [DOI:10.11834/jig.180672]
Guo J T, Zheng P J and Huang J W. 2015. Secure watermarking scheme against watermark attacks in the encrypted domain. Journal of Visual Communication and Image Representation, 30: 125-135[DOI:10.1016/j.jvcir.2015.03.009]
Hall P, Marshall D and Martin R. 2002. Adding and subtracting eigenspaces with eigenvalue decomposition and singular value decomposition. Image and Vision Computing, 20(13/14): 1009-1016[DOI:10.1016/S0262-8856(02)00114-2]
Jiang C, Peng J, Xiang L Y and Li F. 2016. Research on text reversible digital watermarking based on Hamming code. Computer Engineering and Applications, 52(11): 84-87, 118
蒋策, 彭建, 向凌云, 李峰. 2016. 基于汉明码的文本可逆数字水印研究. 计算机工程与应用, 52(11): 84-87, 118 [DOI:10.3778/j.issn.1002-8331.1407-0116]
Li J, Wang J, Ma W, Chen H and Peng J. 2008. Geometric attack resistant face watermarking using Zernike moments//Proceedings of the 11th IEEE International Conference on Communication Technology. Hangzhou, China: IEEE: 753-756[ DOI: 10.1109/ICCT.2008.4716236 http://dx.doi.org/10.1109/ICCT.2008.4716236 ]
Li R and Li X Y. 2017. Pixel value ordering reversible data hiding algorithm based on image block selection. Journal of Image and Graphics, 22(12): 1664-1676
李蓉, 李向阳. 2017. 图像分区选择的像素值排序可逆数据隐藏. 中国图象图形学报, 22(12): 1664-1676 [DOI:10.11834/jig.170101]
Liu D C, Yuan Z H and Su Q T. 2020. A blind color image watermarking scheme with variable steps based on Schur decomposition. Multimedia Tools and Applications, 79(11-12): 7491-7513[DOI:10.1007/s11042-019-08423-1]
Moosazadeh M and Ekbatanifard G. 2017. An improved robust image watermarking method using DCT and YCoCg-R color space. Optik, 140: 975-988[DOI:10.1016/j.ijleo.2017.05.011]
Ni J Q, Zhang R Y, Huang J W, Wang C T and Li Q B. 2006. A rotation-invariant secure image watermarking algorithm incorporating steerable pyramid transform//Proceedings of the 5th International Conference on Digital Watermarking. Berlin, Germany: Springer: 446-460[ DOI: 10.1007/11922841_36 http://dx.doi.org/10.1007/11922841_36 ]
Roy R, Ahmed T and Changder S. 2018. Watermarking through image geometry change tracking. Visual Informatics, 2(2): 125-135[DOI:10.1016/j.visinf.2018.03.001]
Singh S P and Bhatnagar G. 2018. A new robust watermarking system in integer DCT domain. Journal of Visual Communication and Image Representation, 53: 86-101[DOI:10.1016/j.jvcir.2018.03.006]
Su Q T. 2016. Novel blind colour image watermarking technique using Hessenberg decomposition. IET Image Processing, 10(11): 817-829[DOI:10.1049/iet-ipr.2016.0048]
Su Q T, Wang G, Zhang X F, Lyu G H and Chen B J. 2018. A new algorithm of blind color image watermarking based on LU decomposition. Multidimensional Systems and Signal Processing, 29(3): 1055-1074[DOI:10.1007/s11045-017-0487-7]
Su Q T, Zhang X F and Wang G. 2020. An improved watermarking algorithm for color image using Schur decomposition. Soft Computing, 24(1): 445-460[DOI:10.1007/s00500-019-03924-5]
Tian H W, Zhao Y, Ni R R, Qin L M and Li X L. 2013. LDFT-based watermarking resilient to local desynchronization attacks. IEEE Transactions on Cybernetics, 43(6): 2190-2201[DOI:10.1109/TCYB.2013.2245415]
University of Granada, Computer Vision Group. 2020. CVG-UGR Image Database[DB/OL]. [2020-07-14] . http://decsai.ugr.es/cvg/dbimagenes/c512.php http://decsai.ugr.es/cvg/dbimagenes/c512.php
Wang H, Hu Y K, Yu L J and Sun W J. 2018. The research of blind watermarking based on zigzag and affine transformation//Proceedings of the 37th Chinese Control Conference. Wuhan, China: IEEE: 9250-9254[ DOI: 10.23919/ChiCC.2018.8484184 http://dx.doi.org/10.23919/ChiCC.2018.8484184 ]
Xiao Z J, Jiang D, Zhang H, Tang X L and Chen H. 2019. Adaptive zero-watermarking algorithm based on boost normed singular value decomposition. Journal of Image and Graphics, 24(1): 1-12
肖振久, 姜东, 张晗, 唐晓亮, 陈虹. 2019. 增强奇异值分解的自适应零水印. 中国图象图形学报, 24(1): 1-12 [DOI:10.11834/jig.180443]
Xiao Z J, Zhang H, Chen H and Gao T. 2017. Zero-watermarking based on boost normed singular value decomposition and cellular neural network. Journal of Image and Graphics, 22(3): 288-296
肖振久, 张晗, 陈虹, 高婷. 2017. 增强奇异值分解和细胞神经网络的零水印. 中国图象图形学报, 22(3): 288-296 [DOI:10.11834/jig.20170302]
Yuan Y, He H J and Chen F. 2019. Reduction of the redundancy of adjacent bit planes for reversible data hiding in encrypted images. Journal of Image and Graphics, 24(1): 13-22
袁源, 和红杰, 陈帆. 2019. 减少相邻位平面间冗余度的加密图像可逆信息隐藏. 中国图象图形学报, 24(1): 13-22 [DOI:10.11834/jig.180305]
相关作者
相关机构
京公网安备11010802024621