您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(理学版)》

山东大学学报(理学版) ›› 2016, Vol. 51 ›› Issue (9): 68-75.doi: 10.6040/j.issn.1671-9352.3.2015.069

• • 上一篇    下一篇

基于MPUI模型的空域图像水印容量研究

毛家发1,2,3,黄艳红1,钮心忻2,肖刚1,3,朱李楠1,盛伟国1,3   

  1. 1. 浙江工业大学计算机科学与技术学院, 浙江 杭州 310023;2.北京邮电大学信息安全中心, 北京 100876;3. 浙江省可视媒体智能处理技术研究重点实验室, 浙江 杭州 310023
  • 收稿日期:2015-09-11 出版日期:2016-09-20 发布日期:2016-09-23
  • 作者简介:毛家发(1970— ), 男, 博士,副教授,研究方向为信息安全、信息隐藏与数字水印、数字内容安.E-mail:maojiafa@zjut.edu.cn
  • 基金资助:
    国家自然科学基金资助项目(61170271,61170272,61272310,61373131,61573316);浙江省自然科学基金资助项(LY12F02031,LQ12F02016,LQ15E050006)

Research on watermarking payload of the spatial images based on MPUI model

MAO Jia-fa1,2,3, HUANG Yan-hong1, NIU Xin-xin2, XIAO Gang1, 3, ZHU Li-nan1, SHENG Wei-guo1,3   

  1. 1. College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou 310023, Zhejiang, China;
    2. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China;
    3. Key Laboratory of Visual Media Intelligent Processing Technology of Zhejiang Province, Hangzhou 310023, Zhejiang, China
  • Received:2015-09-11 Online:2016-09-20 Published:2016-09-23

摘要: 在基于失真不可感知的控制模型(maximize payload under imperceptive, MPUI)下,研究了空域图像的最大水印容量。发现最大水印容量不仅与嵌入强度有关,而且与图像尺寸大小、复杂度、视觉敏感度等因素相关。在理论上推导了最大水印容量与图像大小、嵌入强度的关系,并采用多元回归分析方法研究了图像复杂度、视觉敏感度与嵌入率的关系模型。综合这些内外因素,借助于主客观评价体系,推算出水印嵌入容量的估算方法,并在实验中验证了该估算方法的有效性。

关键词: 水印容量, 复杂度, 视觉敏感度, MPUI模型, 嵌入强度

Abstract: Based on the MPUI model, we study the maximum watermarking payload of spatial domain image, which is not only related to embedding intensity but also to the factors such as the size of image, image complexity and visual sensitively, and so forth. We derived the relationship among maximum watermarking payload, size of image and embedding intensity, and adopt multivariate regression analysis method to research image complexity, visual sensitivity, and embedding rate model. Synthesize these internal and external factors, with the aid of subjective and objective evaluation system, we estimate the estimation method of watermark embedded payload and verify its effectiveness through experiments.

Key words: MPUI model, embedding intensity, complexity, watermarking payload, visual sensitivity

中图分类号: 

  • TP309
[1] 董秀则,张茹,钮心忻. MB隐写分析算法[J]. 北京邮电大学学报,2012,02:99-103. DONG Xiuze, ZHANG Ru, NIU Xinxin. A steganalysis algorithm on MB stegano-graphy[J].Journal of Beijing University of Posts and Telecommunications, 2012, 02:99-103.
[2] 高虎明,李凯捷,王英娟.基于SIFT 抗几何攻击的数字水印算法[J]. 计算机应用,2013,33(3):748-751. GAO Huming, LI Kaijie, WANG Yingjuan. A digital watermarking algorithm based on SIFT against geometric attacks [J]. Journal of Computer Applications, 2013, 33(3):748-751.
[3] 武嘉,张茹,钮心忻,等. 针对BPCS隐写的隐写分析法[J]. 北京邮电大学学报,2009,04:113-116. WU Jia, ZHANG Ru, NIU Xinxin, et al. Reliable detection of BPCS stega-nography [J]. Journal of Beijing University of Posts and Telecommunications, 2009, 04:113-116.
[4] 沈昌祥,张焕国,冯登国,等.信息安全综述[J].中国科学(E集:信息科学), 2007, 37(2):129-150. SHEN Changxiang, ZHANG Huanguo, FENG Dengguo, et al. Information security review [J]. Science in China(Series E: Information Sciences), 2007, 37(2):129-150.
[5] VORBRUGGEN J C, CAYRE F. The Certimark benchmark: architecture and future perspectives[C] //Proceeding of the IEEE International Conference on Multimedia and Expo(ICME2002).New York: IEEE, 2002:485-488.
[6] KIM H C, LIN E T, GUITART O, et al. Further progress in watermark evaluation testbed(WET)[C] //Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents(SPIE2005). USA: SPIE, 2005:236-247.
[7] SOLACHIDIS V, TEFAS A, NIKOLAIDIS N, et al. A benchmarking protocol for water-marking methods[C] //Proceedings of International Conference on Image Processing. New York: IEEE, 2001, 3:1023-1026.
[8] MOULIN P, OSULLIVAN J A. Information theoretic analysis of information hiding [J]. IEEE Transactions on Information Theory, 2003, 49(3):563-593.
[9] COHEN A, LAPIDOTH A. The Gaussian watermarking game[J]. IEEE Transactions on Information Theory, 2002, 48(6):1639-1667.
[10] SOMEKH-BARUCH A, MERHAV N. On the capacity game of public watermarking system[J]. IEEE Transactions on Infor-mation Theory, 2004, 50(3):511-524.
[11] SAJEDI H, JAMZAD M. Secure steganography based on embedding capacity[J]. International Journal of Information Security, 2009, 8(6):433-445.
[12] 高海英. 音频信息隐藏理论及应用[D]. 北京: 北京邮电大学,2006. GAO Haiying. The theory and application of audio information hiding [D]. Beijing: Beijing University of Posts and Telecommunicatons, 2006.
[13] COHEN A S, LAPIDOTH A. The capacity of the vector Gaussian watermarking game[C] //Proceeding of the IEEE International Symposium on Information Theory(ISIT2001). Piscataway: IEEE, 2001: 24-29.
[14] ZHANG X, WANG S. Steganography using multiple-base notational system and human vision sensitivity[J]. IEEE Signal Processing Letters, 2005, 12(1):67-70.
[15] MAO J F, NIU X X, YANG Y X, et al. JPEG2000 image maximum steganogra-phy payload based on MPUI model [J].Journal of Software, 2014, 25(7):1606-1620.
[16] FILLER T, JUDAS J, FRIDRICH J. Gibbs construction in steganography[J].IEEE Transactions on Information Forensics and Security, 2010, 5(4): 705-720.
[17] MOHAND S A. Wavelet modeling using finite mixtures of generalized Gaussian distribution: application to texture discrimination and retrieval[J]. IEEE Transactions on Image Processing, 2012, 21(4):1452-1464.
[18] PANYAVARAPORN J, HORKAEW P, WONGTRAIRAT W. QR code watermarking algorithm based on wavelet transform[C] // Proceedings of the 13th International Symposium on Communications and Information Technologies. Piscataway: IEEE, 2013:791-796.
[19] JAMZAD M, YAGHMAEE F. Achieving higher stability in watermarking according to image complexity[J]. Scientia Iranica, 2006, 13(4):404-412.
[20] HALLER R S. Complexity of real images evaluated by densitometric analysis and psychophysical scaling[D]. USA: University of Arizona, 1970.
[21] 王向阳,杨红颖,郑宏亮,等.基于视觉权值的分块颜色直方图图像检索算法[J].自动化学报,2010,36(10):1489-1492. WANG Xiangyang, YANG Hongying, ZHENG Hongliang, et al. A Color block-histogram image retrieval based on visual weight[J].Acta Automatica Sinica, 2010, 36(10):1489-1492.
[22] DELAIGLE J F, DEVLEESCHOUWER C, MACQ B, et al. Human visual system fea-tures enabling watermarking[C] //Proceedings of 2002 IEEE International Conference on Multimedia and Expo. New York: IEEE, 2002: 489-492.
[23] JAIN A K, 韩博, 徐枫. 数字图像处理基础[M]. 北京:清华大学出版社,2006. JAIN A K, HAN Bo, XU Feng. Foundation of digital image processing[M]. Beijing: Tsinghua University Press, 2006.
[24] WU Jianzhen, XIE Jianying, YANG Yupu. An adaptive blind watermarking scheme utilizing neural network for synch ronization[J]. Journal of Harbin Institute of Technology, 2007, 14(2):281-286.
[25] KER A D. A capacity result for batch steganography [J]. IEEE Signal Process Let, 2007, 14(8):525-528.
[1] 刘龙飞,杨晓元. 一类新的周期为p3的GF(l)上广义割圆序列的线性复杂度[J]. 山东大学学报(理学版), 2017, 52(3): 24-31.
[2] 王国辉, 杜小妮, 万韫琦, 李芝霞. 周期为pq的平衡四元广义分圆序列的线性复杂度[J]. 山东大学学报(理学版), 2016, 51(9): 145-150.
[3] 刘伍颖,易绵竹,张兴. 一种时空高效的多类别文本分类算法[J]. J4, 2013, 48(11): 99-104.
[4] 马云艳,栾贻会*. 基于局部LRS方法的稀疏信号片段检测[J]. J4, 2012, 47(12): 1-5.
[5] 郭文鹃,杨公平*,董晋利. 指纹图像分割方法综述[J]. J4, 2010, 45(7): 94-101.
[6] . 线性规划的宽邻域预估校正算法[J]. J4, 2009, 44(7): 66-70.
[7] 王锦玲 兰娟丽. GF(q)上一类新型的广义自缩序列[J]. J4, 2009, 44(10): 91-96.
[8] 王锦玲,刘宗成 . 主控生成器[J]. J4, 2008, 43(1): 81-87 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!