CN101308566B - Digital image watermarking method against geometric attack based on contourlet transform - Google Patents

Digital image watermarking method against geometric attack based on contourlet transform Download PDF

Info

Publication number
CN101308566B
CN101308566B CN2008100183558A CN200810018355A CN101308566B CN 101308566 B CN101308566 B CN 101308566B CN 2008100183558 A CN2008100183558 A CN 2008100183558A CN 200810018355 A CN200810018355 A CN 200810018355A CN 101308566 B CN101308566 B CN 101308566B
Authority
CN
China
Prior art keywords
watermark
prime
image
sigma
subband
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2008100183558A
Other languages
Chinese (zh)
Other versions
CN101308566A (en
Inventor
同鸣
冯玮
姬红兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN2008100183558A priority Critical patent/CN101308566B/en
Publication of CN101308566A publication Critical patent/CN101308566A/en
Application granted granted Critical
Publication of CN101308566B publication Critical patent/CN101308566B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention discloses a contourlet-transform-based anti-geometric attack digital image watermarking method, mainly solving the problem of poor robustness of the existing similar method. The invention is technically characterized in that the method completes watermark synchronization through a geometric moment method to realize watermark embedding and extraction in a contourlet transform domain,that is, to calculate a first-order origin moment containing a watermark image I when the watermark is embedded, and reserve the first-order origin moment for the estimation of the geometric attack parameters during extraction; during watermark extraction, to estimate the geometric transformation parameters through the attacked first-order origin moment and a second-order center moment containingwatermarks, and to recover the attacked watermarks through contourlet transform. The method described by the invention has the advantages of strong anti-geometric attack ability, good watermark extracting effect and self-positioning watermark embedded location, which can be used for safety protection of digital multimedia product copyright.

Description

基于contourlet变换抗几何攻击数字图像水印方法Digital image watermarking method against geometric attack based on contourlet transform

技术领域technical field

本发明属于图像信息处理领域,涉及数字图像水印方法,特别是涉及基于contourlet变换的抗几何攻击数字水印方法,可用于对数字多媒体产品版权的安全性提供技术保证。 The invention belongs to the field of image information processing, and relates to a digital image watermarking method, in particular to a geometric attack-resistant digital watermarking method based on contourlet transformation, which can be used to provide technical guarantee for the security of digital multimedia product copyright. the

背景技术Background technique

以图像为载体的数字水印技术是当前水印技术研究的重点之一。近年来,数字水印技术研究取得了很大的进步,尤其是针对图像数据的水印方法繁多,受到广泛的研究,但是水印系统的鲁棒性一直是制约其应用的障碍。其中,几何变换攻击下的水印同步成为水印技术能否走向商用的决定因素,因而也逐渐成为当前数字水印领域研究的重点。为了解决这一问题,众多学者对此进行了研究并提出了一些方法,例如:(1)将水印嵌入到几何不变域中,在图像的不变域进行水印嵌入。如把水印嵌在傅立叶变换域的幅值空间中,该空间具有旋转、缩放、平移不变性。但这种方法复杂度较高,且水印抗有损压缩、滤波等信号处理的能力也较差。(2)在图像中除嵌入水印外还嵌入一个模板用于抵抗几何攻击。模板可由DFT幅度谱中的极值点组成。但这类方法的不足是在图像嵌入容量一定的情况下,已知模板的嵌入在一定程度上会降低水印信息的鲁棒性;且模板一旦被攻击者破坏,水印的检测过程就无法进行。(3)将水印以一个可识别的结构体嵌入到载体数据中。该类方法的主要缺点是易受压缩的影响。 The digital watermarking technology based on image is one of the key research points of current watermarking technology. In recent years, the research of digital watermarking technology has made great progress, especially for image data, there are various watermarking methods, which have been widely studied, but the robustness of watermarking system has always been an obstacle restricting its application. Among them, the watermark synchronization under the geometric transformation attack becomes the decisive factor of whether the watermark technology can be commercialized, and thus gradually becomes the focus of current research in the field of digital watermarking. In order to solve this problem, many scholars have studied and proposed some methods, such as: (1) Embedding the watermark into the geometric invariant domain, and embedding the watermark in the invariant domain of the image. For example, the watermark is embedded in the magnitude space of the Fourier transform domain, which has rotation, scaling and translation invariance. However, this method has high complexity, and the ability of the watermark to resist lossy compression, filtering and other signal processing is also poor. (2) In addition to embedding the watermark, a template is embedded in the image to resist geometric attacks. A mask may consist of extreme points in the DFT magnitude spectrum. But the shortcoming of this kind of method is that in the case of a certain image embedding capacity, the embedding of the known template will reduce the robustness of the watermark information to a certain extent; and once the template is destroyed by the attacker, the watermark detection process cannot be carried out. (3) Embed the watermark into the carrier data with an identifiable structure. The main disadvantage of this class of methods is that they are susceptible to compression. the

综上所述,现有的能抵抗几何变换操作的数字水印方法其实现过程大都比较复杂,且鲁棒性差,为此人们提出了基于contourlet变换数字水印方法。 To sum up, most of the existing digital watermarking methods that can resist geometric transformation operations are more complex in their implementation process and have poor robustness. Therefore, people have proposed a digital watermarking method based on contourlet transformation. the

Contourlet变换是小波变换的一种新扩展,是一种多尺度、局部化、多方向的图像表示方法,已发展成为一种“真正”的能够捕捉几何结构的二维信号表示方法。由于contourlet变换具有细节捕捉效果好、抗噪声攻击、变换速度快等优点,目前国内外已经开始将其应用于水印技术并进行了一定的研究。目前发表的基于contourlet变换数字水印方法主要有: Contourlet transform is a new extension of wavelet transform. It is a multi-scale, localized and multi-directional image representation method, which has developed into a "true" two-dimensional signal representation method that can capture geometric structures. Because the contourlet transformation has the advantages of good detail capture effect, anti-noise attack, fast transformation speed, etc., it has been applied to watermarking technology at home and abroad and some researches have been carried out. The currently published digital watermarking methods based on contourlet transformation mainly include:

(1).李海峰[1]提出一种将水印直接叠加在contourlet域大系数上并采用盲信号分离技术实现水印提取的方法,该方法的嵌入效果较好,但鲁棒性欠佳; (1). Li Haifeng [1] proposed a method of directly superimposing the watermark on the large coefficient in the contourlet domain and using the blind signal separation technology to realize the watermark extraction. The embedding effect of this method is good, but the robustness is not good;

(2).Zhao Xu[2]在此基础上对水印进行加密嵌入, (2).Zhao Xu[2] encrypted and embedded the watermark on this basis,

(3).Nadia Baaziz[3]将小波域视觉模型引入contourlet域,经修改提出一种基于HVS特性的contourlet域水印算法,使得contourlet域水印的嵌入实现自适应; (3).Nadia Baaziz[3] introduced the wavelet domain visual model into the contourlet domain, and proposed a contourlet domain watermarking algorithm based on HVS characteristics after modification, so that the embedding of the contourlet domain watermark can be self-adaptive;

(4).Jayalakshmi M.[4]将小波域水印与contourlet域水印进行了比较,证明contourlet域在掩蔽性和鲁棒形方面确实具有较好的效果。 (4). Jayalakshmi M. [4] compared the wavelet domain watermark with the contourlet domain watermark, and proved that the contourlet domain does have a better effect in terms of masking and robustness. the

以上这些涉及contourlet域水印的方法,存在统一的缺陷是抗击几何攻击效果效差,即不能抵抗较大角度旋转、大尺度缩放以及仿射变换的攻击。 The above methods involving watermarking in the contourlet domain have a common defect in that they are less effective against geometric attacks, that is, they cannot resist attacks of large-angle rotation, large-scale scaling, and affine transformation. the

[1]李海峰,宋巍巍,王树勋,基于Contourlet变换的稳健性图像水印算法,通讯学报,2007年第4卷,87-94 [1] Li Haifeng, Song Weiwei, Wang Shuxun, Robust Image Watermarking Algorithm Based on Contourlet Transform, Journal of Communications, Volume 4, 2007, 87-94

[2]Zhao Xu,Ke Wang and Xiao-hua Qiao,Novel Watermarking Scheme in ContourletDomain Based on Independent Component Analysis,computer society,2006 [2]Zhao Xu, Ke Wang and Xiao-hua Qiao, Novel Watermarking Scheme in ContourletDomain Based on Independent Component Analysis, computer society, 2006

[3]Nadia Baaziz,Adaptive Watermarking Schemes Based On A Redundant ContourletTransform,IEEE,2005 [3] Nadia Baaziz, Adaptive Watermarking Schemes Based On A Redundant ContourletTransform, IEEE, 2005

[4]Jayalakshmi M.,S.N.Merchant and U.B.Desai,Blind Watermarking in ContourletDomain with Improved Detection,computer society,2006 [4]Jayalakshmi M., S.N.Merchant and U.B.Desai, Blind Watermarking in ContourletDomain with Improved Detection, computer society, 2006

发明的内容 content of the invention

本发明目的是针对上述已有技术的不足,提出一种基于contourlet变换抗几何攻击数字图像水印方法,以实现对数字产品版权的可靠保护。 The purpose of the present invention is to address the shortcomings of the above-mentioned prior art, and propose a digital image watermarking method based on contourlet transformation to resist geometric attacks, so as to realize reliable protection of digital product copyright. the

实现本发明目的的技术关键是在水印嵌入时计算含水印图像I的一阶原点矩,留为提取时对所受几何攻击参数的估计,实现抗几何攻击的能力。在水印提取时通过对经攻击后含水印图像的一阶原点矩和二阶中心矩估计几何变换参数,并利用contourlet变换对遭攻击后水印进行复原,具体方按如下: The technical key to realize the purpose of the present invention is to calculate the first-order origin moment of the watermarked image I when the watermark is embedded, and leave it as the estimation of the parameters of the geometric attack suffered during the extraction, so as to realize the ability of resisting the geometric attack. During the watermark extraction, the geometric transformation parameters are estimated by the first-order origin moment and second-order central moment of the watermarked image after the attack, and the watermark after the attack is restored by using the contourlet transformation. The specific method is as follows:

一、水印嵌入过程 1. Watermark embedding process

(1)将宿主图像I进行contourlet分解,得到低频、中低频、中高频和高频层次的子带B(i)和每个子带的变换系数xi; (1) performing contourlet decomposition on the host image I to obtain sub-bands B(i) of low frequency, mid-low frequency, mid-high frequency and high-frequency levels and the transformation coefficient x i of each sub-band;

(2)对水印图像W进行contourlet分解,得到低频、中频和高频的频率层次的子带Bw(i)和每个子带的变换系数yi; (2) Perform contourlet decomposition on the watermark image W to obtain sub-bands B w (i) of the frequency levels of low frequency, intermediate frequency and high frequency and the transformation coefficient y i of each sub-band;

(3)依据宿主图像的变换系数xi,计算宿主图像I每层每个子带的能量:Ei=∑(xi)2,i=1,2,3...n; (3) Calculate the energy of each subband of each layer of the host image I according to the transformation coefficient x i of the host image: E i =∑(xi ) 2 , i=1, 2, 3...n;

(4)对每层子带的能量Ei,按照从大到小的顺序标记,选择能量最大的子带为水印嵌入目标子带Bmax; (4) For the energy E i of each layer of sub-bands, mark them in descending order, and select the sub-band with the highest energy as the watermark embedding target sub-band B max ;

(5)将每层水印的变换系数yi按照绝对值从大到小排列,将每层的排列顺序矩阵记为水印提取的第一密钥R; (5) Arrange the transformation coefficients yi of each layer of watermark from large to small according to the absolute value, and record the sequence matrix of each layer as the first key R extracted by the watermark;

(6)将每层能量最大子带Bmax中的变换系数按绝对值从大到小排列,并选择出前S 个系数,按照与每层水印的每个变换系数yi大小对应的关系叠加,即将水印嵌入在宿主图像中,该S的取值为水印图像W对应该层子带的系数个数; (6) Arrange the transformation coefficients in the maximum energy sub-band B max of each layer from large to small in absolute value, and select the first S coefficients, and superimpose according to the relationship corresponding to the size of each transformation coefficient y i of each watermark, That is to embed the watermark in the host image, the value of the S is the number of coefficients of the watermark image W corresponding to the sub-band of the layer;

(7)将嵌入水印的宿主图像变换系数进行contourlet反变换,重构出含水印的图像I′; (7) Perform contourlet inverse transformation on the transformation coefficient of the host image embedded with the watermark to reconstruct the watermarked image I′;

(8)计算含水印图像I′的一阶原点矩:m1,0、m0,1和m0,0,并将它们存入1*3矩阵,记为第二密钥X,留为提取时参数估计使用。 (8) Calculate the first-order origin moments of the watermarked image I′: m 1,0 , m 0,1 and m 0,0 , and store them in a 1*3 matrix, record it as the second key X, and leave it as Used for parameter estimation when extracting.

二、水印提取过程 2. Watermark extraction process

1)计算经攻击后含水印图像I″的一阶原点矩m1,0′,m0,1′,m0,0′和二阶中心矩μ1,1′,μ2,0′,μ0,2′,并利用下式估计出图像所受几何攻击的几何参数,即 1) Calculate the first-order origin moment m 1,0 ′, m 0,1 ′, m 0,0 ′ and the second-order central moment μ 1,1 ′, μ 2,0 ′ of the watermarked image I″ after the attack, μ 0, 2 ′, and use the following formula to estimate the geometric parameters of the geometric attack on the image, namely

角度参数 θ c = 1 2 tan - 1 2 μ 1,1 ′ μ 2,0 ′ - μ 0,2 ′ , angle parameter θ c = 1 2 the tan - 1 2 μ 1,1 ′ μ 2,0 ′ - μ 0,2 ′ ,

水平缩放参数 a = m 0,0 m 1,0 ′ m 0,0 ′ m 1,0 , 垂直缩放参数 b = m 0,0 ′ 2 m 1,0 m 0,0 2 m 1,0 ′ Horizontal scaling parameter a = m 0,0 m 1,0 ′ m 0,0 ′ m 1,0 , Vertical scaling parameter b = m 0,0 ′ 2 m 1,0 m 0,0 2 m 1,0 ′

水平平移参数 p = m 1,0 ′ - m 1,0 m 0 , 0 , 垂直平移参数 q = m 0,1 ′ - m 0,1 m 0 , 0 horizontal translation parameter p = m 1,0 ′ - m 1,0 m 0 , 0 , Vertical translation parameter q = m 0,1 ′ - m 0,1 m 0 , 0

2)根据图像所受几何攻击参数对受攻击图像I″进行反向操作,得到攻击还原图像Ir; 2) Reversely operate the attacked image I″ according to the geometric attack parameters of the image to obtain the restored attack image I r ;

3)将攻击还原图像Ir进行contourlet分解,得到低频、中低频、中高频和高频层次的子带Br(i)和每个子带的变换系数xi’; 3) Perform contourlet decomposition on the attack restoration image I r to obtain the sub-bands B r (i) of low frequency, mid-low frequency, mid-high frequency and high-frequency levels and the transformation coefficient x i ' of each sub-band;

4)计算攻击还原图像Ir每层每个子带的能量Ei’=∑(xi’)2,然后按由大到小顺序排列子带Br(i),i=1,2,3...n 4) Calculate the energy E i '=∑(xi ' ) 2 of each sub-band in each layer of the attack restoration image I r , and then arrange the sub-bands B r (i) in descending order, i=1, 2, 3 ...n

5)将每层能量最大子带Brmax中的系数按绝对值从大到小排列,选择前S个系数,即为水印图像W对应该层子带的系数个数,S的取值与嵌入时相同; 5) Arrange the coefficients in the maximum energy sub-band B rmax of each layer from large to small in absolute value, select the first S coefficients, that is, the number of coefficients of the watermark image W corresponding to the sub-band of the layer, the value of S and the embedding same time;

6)将所选的S各个系数与原宿主图像I中每层能量最大子带Bmax中系数排序后相减,得到提取受攻击后水印每层变换系数 6) Subtract the selected coefficients of S from the coefficients in the maximum energy sub-band B max of each layer in the original host image I after sorting, and obtain the transformed coefficients of each layer of the watermark after extraction.

                        yi’=(Ir-I)/α y i '=(I r -I)/α

式中α与嵌入时相同; In the formula, α is the same as when embedding;

7)通过第一密钥R还原受攻击后水印每层变换系数yi’位置; 7) Restoring the position of the transformed coefficient y i ' of each layer of the watermark after being attacked by the first key R;

8)将受攻击后水印变换系数yi’进行contourlet逆变换,得到提取的水印。 8) Perform contourlet inverse transformation on the attacked watermark transformation coefficient y i ' to obtain the extracted watermark.

本发明由于采用是基于contourlet变换的数字水印技术,使水印嵌入具有计算速度快、视觉效果好的优点;同时由于通过能量与系数大小控制选择适合嵌入水印的变换系数,解决了水印嵌入位置的选择问题,可自主选择合适系数,保证水印的隐蔽于安全性;此外由于通过对原始含水印图像与受攻击后含水印图像之间几何矩的比较计算,还原图像所受攻击,实现图像同步,完成水印提取,可有效抵抗旋转、缩放、平移各种几何攻击。 Because the present invention adopts the digital watermark technology based on contourlet transformation, the watermark embedding has the advantages of fast calculation speed and good visual effect; at the same time, because the transformation coefficient suitable for embedding watermark is selected through the control of energy and coefficient size, the selection of watermark embedding position is solved problem, the appropriate coefficients can be independently selected to ensure the concealment of the watermark in security; in addition, by comparing and calculating the geometric moments between the original watermarked image and the attacked watermarked image, the attack on the image can be restored, and image synchronization can be achieved. Watermark extraction can effectively resist various geometric attacks such as rotation, scaling and translation. the

附图说明Description of drawings

图1是本发明水印嵌入过程框图; Fig. 1 is a block diagram of the watermark embedding process of the present invention;

图2是本发明水印提取过程框图; Fig. 2 is a block diagram of the watermark extraction process of the present invention;

图3从未受攻击图像中提取的水印结果图; Figure 3 is the watermark result map extracted from the unattacked image;

图4从压缩与噪声攻击图像中提取的水印结果图; Figure 4 is the watermark result image extracted from the compressed and noise attack image;

图5从旋转攻击图像中提取的水印结果图; Figure 5 is the watermark result map extracted from the rotation attack image;

图6从放大3倍攻击图像中提取的水印结果图; Figure 6 is the watermark result map extracted from the 3 times enlarged attack image;

图7从缩小0.8倍攻击图像中提取的水印结果图; Figure 7 is the watermark result map extracted from the 0.8 times reduced attack image;

图8从不对称放大攻击图像中提取的水印结果图; Figure 8 is the watermark result map extracted from the asymmetric amplification attack image;

图9从综合攻击图像中提取的水印结果图。 Fig. 9 is a graph of watermarking results extracted from synthetic attack images. the

具体实施方式Detailed ways

一.基础理论介绍 1. Introduction to basic theory

1、Contourlet变换 1. Contourlet transformation

Contourlet变换是小波变换的一种新扩展,是一种多尺度、局部化、多方向的图像表示方法,已发展成为一种“真正”的能够捕捉几何结构的二维信号表示。Contourlet变换采用双重滤波器组结构,首先采用拉普拉斯塔式分解对输入图像进行多尺度分解以捕获点奇异。每一次LP分解生成一个分辨率为原图像一半的低频子带和与原图像分辨率相同的高频子带,此高频子带为原始图像和低频子带上采样滤波后的差值信号。对低频子带继续使用LP变换进行迭代分解,便可以将原始图像分解为一系列不同尺度上的低频和高频子带。随后,对LP分解所得到的高频子带使用方向滤波器组DFB进行方向性分析。该DFB的作用是捕获图像的方向性高频信息,将分布在同方向上的奇异点合成为一个系数。在计算时采用1层的树结构分解,在每层先通过扇型滤波器组QFB进行扇型方向上的频率切分,随后与旋转重采样操作适当组合以实现图像高频信息方向性分析,捕获图像中的线、面奇异性。DFB的最终结果可以看作图像的高频信息将频域划分为21个锲形区域。 Contourlet transform, a new extension of wavelet transform, is a multi-scale, localized, and multi-directional image representation method, which has been developed into a "true" two-dimensional signal representation capable of capturing geometric structures. The Contourlet transform employs a dual filter bank structure, which first uses a Laplacian decomposition to perform a multi-scale decomposition of the input image to capture point singularities. Each LP decomposition generates a low-frequency sub-band with half the resolution of the original image and a high-frequency sub-band with the same resolution as the original image. The high-frequency sub-band is the difference signal after sampling and filtering between the original image and the low-frequency sub-band. By continuing to use LP transform to iteratively decompose the low-frequency subbands, the original image can be decomposed into a series of low-frequency and high-frequency subbands on different scales. Subsequently, the directional filter bank DFB is used for directional analysis on the high-frequency subbands obtained by LP decomposition. The function of the DFB is to capture the directional high-frequency information of the image, and synthesize the singular points distributed in the same direction into a coefficient. The tree structure decomposition of layer 1 is used in the calculation. In each layer, the frequency segmentation in the fan direction is performed through the fan filter bank QFB, and then it is properly combined with the rotation resampling operation to realize the directional analysis of the high frequency information of the image. Capture line and surface singularities in images. The final result of DFB can be regarded as the high-frequency information of the image divides the frequency domain into 21 wedge-shaped regions. the

2、几何矩 2. Geometric moments

几何矩包括原点矩和中心矩,对于定义于o-xy平面上的二维函数f(x,y)∈L(R2),它的(p+q)阶混合原点矩定义为: Geometric moments include origin moments and central moments. For a two-dimensional function f(x, y)∈L(R 2 ) defined on the o-xy plane, its (p+q) order mixed origin moments are defined as:

mm pqpq == ∫∫ -- ∞∞ ++ ∞∞ ∫∫ -- ∞∞ ++ ∞∞ xx pp ythe y qq ff (( xx ,, ythe y )) dxdydxdy

其中p,q=0,1,2,...。 where p, q=0, 1, 2, . . . the

对于数字图像f(x,y),其(p+q)阶原点矩定义为: For a digital image f(x, y), its (p+q) order origin moment is defined as:

mm pqpq == ΣΣ ii ΣΣ jj ii pp jj qq ff (( ii ,, jj ))

图像的中心矩定义为: The central moment of the image is defined as:

μμ pqpq == ΣΣ xx ΣΣ ythe y (( xx -- xx ‾‾ )) pp (( ythe y -- ythe y ‾‾ )) qq II (( xx ,, ythe y ))

其中 x ‾ = m 1,0 m 0,0 , y ‾ = m 0,1 m 0,0 in x ‾ = m 1,0 m 0,0 , the y ‾ = m 0,1 m 0,0

利用原始图像几何矩的仿射不变性,在水印检测前利用原始图像一个或多个几何矩估计水印图像所经过的几何变换,根据估计的参数对水印图像进行相应校正和水印检测。该方法可在任意域中实现,包括空域和各种频域,是目前抵抗几何攻击比较简单有效的一种方法。 Using the affine invariance of the geometric moments of the original image, one or more geometric moments of the original image are used to estimate the geometric transformation of the watermark image before watermark detection, and the watermark image is corrected and detected according to the estimated parameters. This method can be implemented in any domain, including the air domain and various frequency domains, and it is a relatively simple and effective method for resisting geometric attacks. the

二、相关符号说明 2. Explanation of related symbols

I原始宿主图像 I original host image

B(i)原始宿主图像每个频率层次的第i个子带 B(i) The i-th subband of each frequency level of the original host image

xi原始宿主图像变换系数 x i original host image transformation coefficient

W水印信号 W watermark signal

Bw(i)水印图像每个频率层次的第i个子带 B w (i) the i-th subband of each frequency level of the watermark image

yi水印图像变换系数 y i watermark image transformation coefficient

Ei原始宿主图像每个频率层次第i个子带的能量 E i The energy of the i-th subband of each frequency level of the original host image

Bmax原始宿主图像每个频率层次中能量最大子带 B max The maximum energy subband in each frequency level of the original host image

S选择嵌入水印的系数个数 S selects the number of coefficients to embed the watermark

Zi含水印变换系数 Z i contains watermarked transform coefficients

u水印每一位信息 u watermark every bit of information

α嵌入强度 α Embedding Strength

R水印变换系数排序的位置矩阵 The position matrix of R watermark transformation coefficient sorting

mp,qp+q阶原点矩 m p, q p+q order origin moment

μp,qp+q阶中心矩 μ p, q p+q order central moment

X几何矩参数密钥 X geometric moment parameter key

I′含水印图像 I'watermarked image

I″经攻击后含水印图像 I″Watermarked image after attack

θc角度参数 θ c angle parameter

a水平缩放参数 a Horizontal scaling parameter

b垂直缩放参数 b vertical scaling parameter

p水平平移参数 p horizontal translation parameter

q垂直平移参数 q vertical translation parameter

Ir攻击还原图像 i r attack restore image

Br(i)攻击还原图像每个频率层次的第i个子带 B r (i) attack the ith subband of each frequency level of the restored image

Brmax还原图像每个频率层次中能量最大子带 B rmax restores the maximum energy subband in each frequency level of the image

xi’攻击还原图像变换系数 x i 'Attack to restore image transformation coefficients

yi’受攻击后水印图像变换系数 y i 'Watermark image transformation coefficient after being attacked

三、基于contourlet变换抗几何攻击数字水印嵌入 3. Digital watermark embedding against geometric attacks based on contourlet transform

参照图1,本发明的数字水印嵌入过程如下: With reference to Fig. 1, the digital watermark embedding process of the present invention is as follows:

步骤1,对宿主图像I进行contourlet分解。 Step 1, perform contourlet decomposition on the host image I. the

将宿主图像I进行4层contourlet分解,得到低频、中低频、中高频和高频层次的子带B(i)和每个子带的变换系数xi;由于高频部分抗压缩能力差,并且人眼对低频部分比较敏感,因此选择先将图像进行4层分解后,再将水印分别嵌入2、3、4层的过程。这样多层嵌入可以很好的提高水印的鲁棒性,并且将水印能量分散使得即使图像某一层遭受攻击后仍能保存水印能量,对其进行恢复。 Decompose the host image I into 4 layers of contourlet to obtain the sub-bands B(i) of low frequency, mid-low frequency, mid-high frequency and high-frequency levels and the transformation coefficient x i of each sub-band; due to the poor anti-compression ability of the high-frequency part, and the human The eye is more sensitive to the low-frequency part, so we choose to decompose the image into 4 layers first, and then embed the watermark into the 2nd, 3rd, and 4th layers respectively. Such multi-layer embedding can improve the robustness of the watermark, and disperse the watermark energy so that even if a certain layer of the image is attacked, the watermark energy can still be preserved and restored.

步骤2,对水印图像W进行contourlet分解。 Step 2, perform contourlet decomposition on the watermark image W. the

将水印图像W进行3层contourlet分解,得到低频、中频和高频的频率层次的子带Bw(i)和每个子带的变换系数yi,将水印图像W每层的系数分别对应嵌入到宿主图像2、3、4层的系数中,使得含水印图像具有更好的视觉效果。 Decompose the watermark image W into a three-layer contourlet to obtain the subbands Bw(i) of the low frequency, intermediate frequency and high frequency levels and the transformation coefficient yi of each subband, and embed the coefficients of each layer of the watermark image W into the host image respectively Among the coefficients of layers 2, 3, and 4, the watermarked image has a better visual effect. the

步骤3,计算宿主图像I子带能量。 Step 3, calculate the host image I subband energy. the

对宿主图像I的变换系数进行求和可得到宿主图像I每层每个子带的能量Ei,即Ei=∑(xi)2。能量代表了该子带纹理的复杂程度,可用于判断该子带是否适合嵌入水印。 The energy Ei of each subband of each layer of the host image I can be obtained by summing the transform coefficients of the host image I, that is, Ei=Σ(xi) 2 . Energy represents the complexity of the sub-band texture, which can be used to judge whether the sub-band is suitable for embedding watermarks.

步骤4,按能量大小排列子带。 Step 4, arrange the sub-bands according to the energy size. the

由于能量最大代表图像在该方向上纹理细节最丰富,也就暗示了水印嵌入其中隐蔽性最好,因而可按由大到小顺序标记出每层的能量的最大子带Bmax,并将最大子带Bmax作为水印嵌入的目标子带。 Since the maximum energy represents the richest texture details of the image in this direction, it also implies that the watermark embedded in it has the best concealment, so the maximum energy sub-band Bmax of each layer can be marked in descending order, and the maximum sub-band Target subband with Bmax embedded as watermark. the

步骤5,选择能量最大子带系数。 Step 5, select the maximum energy sub-band coefficient. the

将每层能量最大子带Bmax中的系数按绝对值从大到小排列,选择前S个系数,该S 的取值为水印图像W对应该层子带的系数个数,contourlet变换的重要系数还有一个特点,就是随机噪声会产生类似真实边缘的小波重要系数,但不会产生contourlet重要系数,因此选择在该系数上嵌入水印可有效抵抗噪声攻击。 Arrange the coefficients in the maximum energy sub-band Bmax of each layer from large to small in absolute value, select the first S coefficients, the value of S is the number of coefficients corresponding to the sub-band of the watermark image W, and the important coefficient of contourlet transformation Another feature is that random noise will produce important wavelet coefficients similar to real edges, but will not produce contourlet important coefficients, so choosing to embed watermarks on these coefficients can effectively resist noise attacks. the

步骤6,对水印系数进行处理。 Step 6, process the watermark coefficients. the

将水印的系数同样按照绝对值从大到小排列,并记录该排列顺序矩阵R为第一密钥。水印系数处理是为了在水印嵌入叠加过程中,使大系数与大系数叠加,小系数与小系数叠加,以有效增强水印鲁棒性; The coefficients of the watermark are also arranged in descending order of absolute value, and the arrangement sequence matrix R is recorded as the first key. Watermark coefficient processing is to make large coefficients overlap with large coefficients, and small coefficients overlap with small coefficients in the process of watermark embedding and superposition, so as to effectively enhance the robustness of the watermark;

步骤7,水印嵌入。 Step 7, watermark embedding. the

利用叠加公式将每层水印的每个变换系数yi与水印嵌入目标子带Bmax中的S个变换系数按照大小对应叠加,即将水印嵌入在宿主图像I,叠加公式为: Use the superposition formula to superimpose each transformation coefficient y i of each layer of watermark and the S transformation coefficients in the watermark embedding target subband B max according to the size, that is, the watermark is embedded in the host image I, and the superposition formula is:

                    zi=xi+αu  (u>0)                 (1) z i = x i +αu (u>0) (1)

                    zi=xi-αu  (u<0)                 (2) z i = x i -αu (u<0) (2)

其中,xi代表原是宿主图像变换系数,zi代表含水印变换系数,u代表水印每一位信息。嵌入强度α通过试验选定,当水印叠加后还原图像的视觉效果没有明显噪声,即可接受此嵌入强度,实验中α选取[0 0.1 0.2 0.3]。由于低频属于平滑区域,嵌入强度需选择较低,高频属于纹理复杂区域,嵌入强度可适当增大。 Among them, xi represents the transformation coefficient of the original host image, zi represents the transformation coefficient of the watermark, and u represents each bit of information of the watermark. The embedding strength α is selected through experiments. When the visual effect of the restored image after the watermark is superimposed has no obvious noise, the embedding strength can be accepted. In the experiment, α is selected as [0 0.1 0.2 0.3]. Since the low frequency belongs to the smooth area, the embedding strength needs to be selected to be low, and the high frequency belongs to the complex texture area, and the embedding strength can be increased appropriately. the

步骤8,重构含水印图像。 Step 8, reconstruct the watermarked image. the

将嵌入水印的系数进行contourlet反变换,则可重构出含水印的图像,并输出含有水印的图像I’; By inverse contourlet transforming the coefficients embedded in the watermark, the image containing the watermark can be reconstructed, and the image I' containing the watermark can be output;

步骤9,记录几何矩。 Step 9, record geometric moments. the

计算含水印图像I′的一阶原点矩:m1,0,m0,1,m0,0,将它们存入1*3矩阵记为第二密钥X,留为提取时参数估计使用。具体计算公式为: Calculate the first-order origin moments of the watermarked image I′: m 1,0 , m 0,1 , m 0,0 , store them in a 1*3 matrix as the second key X, and reserve them for parameter estimation during extraction . The specific calculation formula is:

mm 1,01,0 == &Sigma;&Sigma; ii &Sigma;&Sigma; jj ii &times;&times; II &prime;&prime; (( ii ,, jj )) -- -- -- (( 33 ))

mm 00 ,, 11 == &Sigma;&Sigma; ii &Sigma;&Sigma; jj jj &times;&times; II &prime;&prime; (( ii ,, jj )) -- -- -- (( 44 ))

mm 0,00,0 == &Sigma;&Sigma; ii &Sigma;&Sigma; jj II &prime;&prime; (( ii ,, jj )) -- -- -- (( 55 ))

其中,i、j代表含水印图像I′像素的坐标,I′(i,j)代表该位置图像的像素值。 Among them, i and j represent the coordinates of the pixel of the watermarked image I', and I'(i, j) represents the pixel value of the image at this position. the

四、基于contourlet变换抗几何攻击数字水印提取 4. Digital watermark extraction based on contourlet transform anti-geometric attack

参照图2,本发明的数字水印提取过程如下 Referring to Fig. 2, the digital watermark extraction process of the present invention is as follows

步骤1,估计攻击参数。 Step 1, estimate the attack parameters. the

先利用一阶原点矩公式(3)、(4)、(5)对经攻击后含水印图像I″的一阶原点矩m1,0,m0,1,m0,0进行计算; First, use the first-order origin moment formulas (3), (4), and (5) to calculate the first-order origin moment m 1,0 , m 0,1 , m 0,0 of the watermarked image I" after the attack;

再利用如下二阶中心矩公式计算二阶中心矩μ1,1′,μ2,0′,μ0,2′, Then use the following second-order central moment formula to calculate the second-order central moment μ 1,1 ′, μ 2,0 ′, μ 0,2 ′,

&mu;&mu; 11 ,, 11 &prime;&prime; == &Sigma;&Sigma; ii &Sigma;&Sigma; jj (( ii -- ii &OverBar;&OverBar; )) &times;&times; (( jj -- jj &OverBar;&OverBar; )) &times;&times; II &prime;&prime; &prime;&prime; (( ii ,, jj )) -- -- -- (( 66 ))

&mu;&mu; 22 ,, 00 &prime;&prime; == &Sigma;&Sigma; ii &Sigma;&Sigma; jj (( ii -- ii &OverBar;&OverBar; )) 22 &times;&times; II &prime;&prime; &prime;&prime; (( ii ,, jj )) -- -- -- (( 77 ))

&mu;&mu; 00 ,, 22 &prime;&prime; == &Sigma;&Sigma; ii &Sigma;&Sigma; jj (( jj -- jj &OverBar;&OverBar; )) 22 &times;&times; II &prime;&prime; &prime;&prime; (( ii ,, jj )) -- -- -- (( 88 ))

其中,i、j代表受攻击图像I″像素的坐标,I″(i,j)代表该位置图像的像素值, i &OverBar; = m 1,0 &prime; m 0,0 &prime; , Wherein, i, j represent the coordinates of the attacked image I "pixel, and I" (i, j) represents the pixel value of the position image, i &OverBar; = m 1,0 &prime; m 0,0 &prime; ,

jj &OverBar;&OverBar; == mm 0,10,1 &prime;&prime; mm 0,00,0 &prime;&prime; ;;

最后利用第二密钥X中的一阶原点矩:m1,0,m0,1,m0,0和参数估计公式,估计出图像所受几何攻击参数,其中: Finally, use the first-order origin moments in the second key X: m 1,0 , m 0,1 , m 0,0 and the parameter estimation formula to estimate the geometric attack parameters of the image, where:

角度参数为: &theta; c = 1 2 tan - 1 2 &mu; 1,1 &prime; &mu; 2,0 &prime; - &mu; 0,2 &prime; - - - ( 9 ) The angle parameter is: &theta; c = 1 2 the tan - 1 2 &mu; 1,1 &prime; &mu; 2,0 &prime; - &mu; 0,2 &prime; - - - ( 9 )

水平缩放参数为: a = m 0,0 m 1,0 &prime; m 0,0 &prime; m 1,0 , - - - ( 10 ) The horizontal scaling parameters are: a = m 0,0 m 1,0 &prime; m 0,0 &prime; m 1,0 , - - - ( 10 )

垂直缩放参数为: b = m 0,0 &prime; 2 m 1,0 m 0,0 2 m 1,0 &prime; - - - ( 11 ) The vertical scaling parameters are: b = m 0,0 &prime; 2 m 1,0 m 0,0 2 m 1,0 &prime; - - - ( 11 )

水平平移参数为: p = m 1,0 &prime; - m 1,0 m 0 , 0 - - - ( 12 ) The horizontal translation parameters are: p = m 1,0 &prime; - m 1,0 m 0 , 0 - - - ( 12 )

垂直平移参数为: q = m 0,1 &prime; - m 0,1 m 0 , 0 - - - ( 13 ) The vertical translation parameters are: q = m 0,1 &prime; - m 0,1 m 0 , 0 - - - ( 13 )

步骤2,还原受攻击图像。 Step 2, restore the attacked image. the

还原受攻击图像就是对受攻击图像进行如下步骤的反向操作: Restoring the attacked image is the reverse operation of the following steps on the attacked image:

a)通过估计公式(9)估计出受攻击图像I″所遭受的旋转攻击角度θc,对受攻击图像 I″进行反向旋转θc角度,即可还原图像所受的旋转攻击; a) Estimate the rotation attack angle θc suffered by the attacked image I" by the estimation formula (9), and reversely rotate the attacked image I" by the angle θc to restore the rotation attack suffered by the image;

b)通过估计公式(10)和(11)估计出受攻击图像I所遭受的水平缩放参数a和垂直缩放参数b,对受攻击图像I进行比例为1/a的水平缩放,比例为1/b的垂直缩放,即可还原图像所受的缩放攻击; b) Estimate the horizontal scaling parameter a and vertical scaling parameter b suffered by the attacked image I by estimating formulas (10) and (11), and perform a horizontal scaling of the attacked image I with a ratio of 1/a, and the ratio is 1/ The vertical scaling of b can restore the scaling attack on the image;

c)通过估计公式(12)和(13)估计出受攻击图像I所遭受的水平平移参数p和垂直平移参数q,对受攻击图像I进行尺寸为-p的水平平移,尺寸为-q的垂直平移,即可还原图像所受的平移攻击。 c) Estimate the horizontal translation parameter p and vertical translation parameter q suffered by the attacked image I by estimating formulas (12) and (13), and perform a horizontal translation of the size of -p on the attacked image I, and a size of -q Translate vertically to undo the translation attack on the image. the

步骤3,将还原图像进行分解 Step 3, decompose the restored image

将还原图像Ir进行4层contourlet分解,得到低频、中低频、中高频和高频层次的子带Br(i)和每个子带的变换系数xi’。 Decompose the restored image I r into four layers of contourlet, and obtain sub-bands B r (i) of low frequency, mid-low frequency, mid-high frequency and high frequency levels and the transformation coefficient xi ' of each sub-band.

步骤4,计算子带能量 Step 4, calculate subband energy

对攻击还原图像Ir的变换系数xi’进行求和,可得到攻击还原图像Ir每层每个子带的能量Ei’,即Ei’=∑(xi’);然后按由大到小顺序排列子带Br(i),i=1,2,3...n; Summing the transformation coefficients xi ' of the attack restoration image I r , the energy E i ' of each sub-band of each layer of the attack restoration image I r can be obtained, that is, E i '=∑(xi ' ); Arrange sub-bands B r (i) in small order, i=1, 2, 3...n;

步骤5,选择最大子带与系数 Step 5, select the largest subband and coefficient

将攻击还原图像Ir变换后每层能量最大子带Brmax中的系数按绝对值从大到小排列,选择前S个系数,S取值为水印图像W对应该层子带的系数个数; Arrange the coefficients in the maximum energy sub-band B rmax of each layer after the attack restoration image I r is transformed from large to small in absolute value, select the first S coefficients, and the value of S is the number of coefficients in the sub-band corresponding to the watermark image W ;

步骤6,计算水印变换系数。 Step 6, calculating the watermark transformation coefficients. the

将所选的S各个系数与原宿主图像I中每层能量最大子带Bmax中系数排序后相减,得到提取受攻击后水印每层变换系数为: After sorting and subtracting the coefficients of the selected S from the coefficients in the maximum energy sub-band B max of each layer in the original host image I, the conversion coefficients of each layer of the watermark extracted after being attacked are obtained as follows:

                   yi’=(Ir-I)/α        (14) y i '=(I r -I)/α (14)

其中α与嵌入时相同; where α is the same as when embedding;

步骤7,还原水印系数位置。 Step 7, restore the watermark coefficient position. the

通过第一钥R中记录的系数位置信息,将水印系数还原至原始位置,重构出水印每层变换系数yi’; Through the coefficient position information recorded in the first key R, the watermark coefficient is restored to the original position, and the transformation coefficient yi' of each layer of the watermark is reconstructed;

步骤8,还原水印 Step 8, restore the watermark

将受攻击后水印变换系数yi’进行contourlet逆变换,得到提取的水印。 Perform contourlet inverse transformation on the attacked watermark transformation coefficient y i ' to obtain the extracted watermark.

本发明的效果可通过以下实验仿真进一步说明。 The effect of the present invention can be further illustrated by the following experimental simulation. the

1、仿真条件 1. Simulation conditions

选用256*256的lena.bmp图像作为宿主图像,如图3a所示,选取64*64的二值图像 进行试验,如图3b所示。实验软件环境为Matlab7.0。设计了一系列攻击测试,包括高斯低通滤波、维纳滤波、中值滤波、椒盐加噪、高斯加噪、JPEG攻击、剪切,各种尺度的旋转、缩放、平移变换等,在最大攻击强度情况下,对提取的水印通过归一化相关系数NC、峰值信噪比PSNR及均方误差RSM进行质量评价。 Select the 256*256 lena.bmp image as the host image, as shown in Figure 3a, and select the 64*64 binary image for the test, as shown in Figure 3b. The experimental software environment is Matlab7.0. A series of attack tests are designed, including Gaussian low-pass filtering, Wiener filtering, median filtering, salt and pepper noise, Gaussian noise, JPEG attack, shearing, rotation, scaling, translation transformation of various scales, etc., in the maximum attack In the case of strength, the quality of the extracted watermark is evaluated by normalized correlation coefficient NC, peak signal-to-noise ratio PSNR and mean square error RSM. the

2、仿真结果 2. Simulation results

实验结果分别如:图3c、图3d、图4、图5、图6、图7、图8和图9。 The experimental results are shown in Fig. 3c, Fig. 3d, Fig. 4, Fig. 5, Fig. 6, Fig. 7, Fig. 8 and Fig. 9 respectively. the

图3c为嵌入水印后的合成图像结果,其均方误差为16.1703,PSNR可达到34.9178,具有较好的视觉效果和隐蔽性。 Figure 3c is the result of the composite image after embedding the watermark. Its mean square error is 16.1703 and PSNR can reach 34.9178, which has good visual effect and concealment. the

图3d为未加攻击情况下提取的水印结果,可见水印完好无损。 Figure 3d shows the extracted watermark result without attack, it can be seen that the watermark is intact. the

图4、图5、图6、图7、图8和图9均体现了数字水印抵抗各种攻击的能力。 Figure 4, Figure 5, Figure 6, Figure 7, Figure 8 and Figure 9 all reflect the ability of digital watermarking to resist various attacks. the

参照图4,其中图4a为受JPEG压缩质量因子为10攻击时的结果,可见水印仍能清楚的识别,其NC值为0.9372;图4b为受椒盐加噪,均方值为0.03时攻击时提取水印结果;图4c为受高斯加噪均方值为0.1攻击时提取的结果,由图4b和图4c可见,经噪声攻击过,水印的NC值均保持在0.9左右,可清楚识别。这是由于contourlet变换在抑制噪声方面具有杰出的性能,为水印也带来强的抗噪声攻击能力。 Referring to Figure 4, Figure 4a is the result when the JPEG compression quality factor is 10, it can be seen that the watermark can still be clearly identified, and its NC value is 0.9372; Figure 4b is the attack when the salt and pepper noise is added, and the mean square value is 0.03 Watermark extraction results; Figure 4c is the result extracted when the mean square value of Gaussian plus noise is 0.1. It can be seen from Figure 4b and Figure 4c that after the noise attack, the NC value of the watermark remains around 0.9, which can be clearly identified. This is due to the outstanding performance of contourlet transform in suppressing noise, which also brings strong anti-noise attack ability to watermark. the

参照图5,其中图5a、5b、5c为右旋60度攻击后,原始图像、还原图像以及提取水印结果,图5d、5e、5f为右旋45度攻击后原始图像、还原图像以及提取水印结果,图5g、5h、5i为右旋30度攻击后原始图像、还原图像以及提取水印结果。由图5可见,由于采用了几何矩参数估计技术,使图像在遭受旋转攻击后可自动复原,水印提取NC值可保持在0.8700以上,显示了强大的抵抗旋转攻击的能力。 Referring to Figure 5, Figures 5a, 5b, and 5c are the original image, restored image, and watermark extraction results after a 60-degree right-rotation attack, and Figures 5d, 5e, and 5f are the original image, restored image, and watermark extraction after a 45-degree right-rotation attack As a result, Figures 5g, 5h, and 5i show the results of the original image, the restored image, and the extracted watermark after the 30-degree right-rotation attack. It can be seen from Figure 5 that due to the use of geometric moment parameter estimation technology, the image can be automatically restored after being subjected to rotation attacks, and the NC value of watermark extraction can be kept above 0.8700, showing a strong ability to resist rotation attacks. the

参照图6,其中图6a为原始含水印图像,图6b为放大3倍攻击后含水印图像,图6c为经过几何攻击还原后提取出的水印结果,从图6c可见经过还原后图像实现同步,水印提取的NC值可达到0.8798。 Referring to Fig. 6, Fig. 6a is the original watermarked image, Fig. 6b is the watermarked image after the magnification of 3 times the attack, and Fig. 6c is the watermark result extracted after geometric attack restoration. It can be seen from Fig. 6c that the restored image is synchronized. The NC value of watermark extraction can reach 0.8798. the

参照图7,其中图7a为原始含水印图像,图7b为缩小0.8倍攻击后含水印图像,图7c为经过几何攻击还原后提取出的水印结果,经过还原后图像实现同步,水印提取的NC值可达到0.9916。从图7c可见,本方法对缩放攻击具有很好的抵抗能力,提取的水印均可清楚识别。 Referring to Figure 7, Figure 7a is the original watermarked image, Figure 7b is the watermarked image after being reduced by 0.8 times, and Figure 7c is the watermark result extracted after geometric attack restoration, the restored image is synchronized, and the watermark extracted NC The value can reach 0.9916. It can be seen from Figure 7c that this method has good resistance to scaling attacks, and the extracted watermarks can be clearly identified. the

参照图8,其中图8a、图8b、图8c为水平放大3倍攻击结果,图8c、图8d、图8e为垂直放大2倍攻击结果,经过攻击还原处理后提取出的水印NC值均在0.88以上,显示了对不对称放大攻击的鲁棒性。 Referring to Fig. 8, Fig. 8a, Fig. 8b, Fig. 8c are the attack results enlarged horizontally by 3 times, and Fig. 8c, Fig. 8d, Fig. 8e are the results of the vertically enlarged 2x attack. Above 0.88, showing the robustness against asymmetric amplification attacks. the

参照图9,其中图9a为放大两倍并旋转pi/4攻击后图像,图9b为经过几何攻击还原 图像,图9c为提取出水印结果。从图9c  见,水印NC值可达到0.8815,证明对任意几何攻击组合,本方法都可较好还原图像,完成水印提取,实现对数字图像版权的保护和识别。 Referring to Figure 9, Figure 9a is the image after being enlarged twice and rotated by pi/4, Figure 9b is the restored image after geometric attack, and Figure 9c is the result of extracting the watermark. It can be seen from Figure 9c that the NC value of the watermark can reach 0.8815, which proves that for any geometric attack combination, this method can restore the image well, complete the watermark extraction, and realize the protection and identification of digital image copyright. the

以上所有攻击后对水印提取结果的实验数据如表1所示: The experimental data of the watermark extraction results after all the above attacks are shown in Table 1:

表1               各种攻击后水印提取结果数据 Table 1 Watermark extraction result data after various attacks

攻击类型                NC            PSNR           RSM Attack Type NC NC PSNR RSM

高斯滤波                0.9983        28.3421        0.0015 Gaussian filter 0.9983 28.3421 0.0015

维纳滤波                0.9929        20.8088        0.0083 Wiener filter 0.9929 20.8088 0.0083

中值滤波                0.9946        21.3524        0.0073 Median filter 0.9946 21.3524 0.0073

剪切攻击(150*150)       0.9180        11.2240        0.0754 Cut Attack(150*150) 0.9180 11.2240 0.0754

平移                    1.0000        36.1236        0 Translation 1.0000 36.1236 0

JPEG攻击(10)            0.9372        10.6459        0.0862 JPEG Attack(10) 0.9372 10.6459 0.0862

椒盐加噪(0.03)          0.9065        10.0490        0.0989 Salt and pepper noise (0.03) 0.9065 10.0490 0.0989

高斯加噪(0.1)           0.8913        9.8499         0.1035 Gaussian noise (0.1) 0.8913 9.8499 0.1035

旋转攻击(pi/3)          0.8997        9.2216         0.1196 Spin Attack (pi/3) 0.8997 9.2216 0.1196

旋转攻击(pi/4)          0.9153        9.2662         0.1184 Spin Attack (pi/4) 0.9153 9.2662 0.1184

旋转攻击(pi/5)          0.9912        17.9282        0.0161 Spin Attack (pi/5) 0.9912 17.9282 0.0161

扩大3倍                 0.8798        8.4224         0.1438 Expand 3 times 0.8798 8.4224 0.1438

缩小0.8倍               0.9916        19.9958        0.0100 Reduced by 0.8 times 0.9916 19.9958 0.0100

不对称放大              0.8815        8.5118         0.1409 Asymmetric magnification 0.8815 8.5118 0.1409

放大两倍旋转pi/4        0.9392        10.4769        0.0896 Magnify twice rotate pi/4 0.9392 10.4769 0.0896

通过表1可见,基于contourlet域的水印算法拥有频域算法本身具有的抗滤波特点,在传统滤波攻击下水印提取NC值均保持在0.9900以上。由于采用变换域嵌入方法,嵌入位置均匀,可有效抵抗剪切攻击,在减去全图150*150像素后,提取出水印的NC值可达到0.9180。平移攻击不会对水印提取产生任何破坏,NC值为1.0000。另外由于采用了几何矩还原几何攻击技术,使得本方法对各种几何攻击具有强大的抵抗力能力。通过实验结果证明这是一种全面鲁棒的水印嵌入提取方法。 It can be seen from Table 1 that the watermarking algorithm based on the contourlet domain has the anti-filtering characteristics of the frequency domain algorithm itself, and the NC value of the watermark extraction under the traditional filtering attack remains above 0.9900. Due to the transformation domain embedding method, the embedding position is uniform, which can effectively resist the shearing attack. After subtracting the 150*150 pixels of the whole image, the NC value of the extracted watermark can reach 0.9180. The translation attack does not cause any damage to the watermark extraction, and the NC value is 1.0000. In addition, due to the use of geometric moment reduction geometric attack technology, this method has strong resistance to various geometric attacks. The experimental results prove that this is a comprehensive and robust watermark embedding extraction method. the

Claims (5)

1. one kind based on contourlet conversion resist geometric attacks digital image watermark embedding method, comprises following process:
(1) host image I is carried out contourlet and decompose, obtain the subband B (i) of low frequency, medium and low frequency, medium-high frequency and high frequency level and the conversion coefficient x of each subband i
(2) watermarking images W is carried out contourlet and decompose, obtain the subband B of the frequency level of low frequency, intermediate frequency and high frequency w(i) and the conversion coefficient y of each subband i
(3) according to the conversion coefficient x of host image i, the energy of every layer of each subband of calculating host image I: E i=∑ (x i) 2, i=1,2,3 ... n;
(4) to the ENERGY E of every straton band i, according to sequence notation from big to small, the subband of selecting the energy maximum is that watermark embeds target subband B Max
(5) with the maximum subband B of every layer of energy MaxIn conversion coefficient arrange from big to small by absolute value, and S coefficient before selecting, the value of this S is watermarking images W to coefficient number that should the straton band;
(6) with the conversion coefficient y of every layer of watermark iArrange from big to small according to absolute value, every layer the matrix that puts in order is designated as the first key R of watermark extracting;
(7) with each conversion coefficient y of every layer of watermark iEmbed target subband B with watermark MaxIn S conversion coefficient according to the corresponding stack of size, be about to watermark and be embedded in the host image;
(8) the host image conversion coefficient with embed watermark carries out the contourlet inverse transformation, reconstruct the image I that contains watermark ';
(9) calculate the first moment about the origin that contains watermarking images I ': m 1,0, m 0,1, m 0,0, depositing them in the 1*3 matrix and be designated as the second key X, parameter estimation is used when staying to extraction.
2. watermark embedding method according to claim 1, wherein step (7) is described is embedded in watermark in the host image, is to carry out according to following formula:
z i=x i+αu(u>0)
z i=x i-αu(u<0)
Wherein, x iRepresent original host image conversion coefficient, z iRepresentative contains the watermark conversion coefficient, and u represents each information of watermark, and embedment strength α is selected by test.
3. watermark embedding method according to claim 1, wherein step (9) is carried out according to the following procedure:
m 1,0 = &Sigma; i &Sigma; j i &times; I &prime; ( i , j )
m 0,1 = &Sigma; i &Sigma; j j &times; I &prime; ( i , j )
m 0 , 0 = &Sigma; i &Sigma; j I &prime; ( i , j )
Wherein, i, j representative contains the coordinate of watermarking images I ' pixel, and (i j) represents the pixel value of this location drawing picture to I '.
4. one kind based on contourlet conversion resist geometric attacks digital image watermark extraction method, comprises following process:
(1) calculate after attacking and contain watermarking images I " first moment about the origin m 1,0', m 0,1', m 0,0' and second-order moment around mean μ 1,1', μ 2,0', μ 0,2', utilize the first moment about the origin among the second key X: m 1,0, m 0,1, m 0,0With the parameter estimation formula, estimate the suffered geometric attack parameter of image, wherein:
Angle parameter theta c &theta; c = 1 2 tan - 1 2 &mu; 1,1 &prime; &mu; 2 , 0 &prime; - &mu; 0,2 &prime;
The horizontal scaling parameter a = m 0,0 m 1,0 &prime; m 0,0 &prime; m 1,0 , The vertically scale parameter b = m 0,0 &prime; 2 m 1,0 m 0,0 2 m 1,0 &prime;
The horizontal translation parameter p = m 1,0 &prime; - m 1,0 m 0,0 , The vertical translation parameter q = m 0 , 1 &prime; - m 0 , 1 m 0,0 ;
(2) at these geometric attack parameters image I under fire " is carried out reverse operating, obtained attacking the reduction image I r
(3) will attack the reduction image I rCarry out contourlet and decompose, obtain the subband B of low frequency, medium and low frequency, medium-high frequency and high frequency level r(i) and the conversion coefficient x of each subband i';
(4) calculate attack reduction image I rThe ENERGY E of every layer of each subband i'=∑ (x i') 2, then by descending series arrangement subband B r(i), i=1,2,3 ... n;
(5) with the maximum subband B of every layer of energy RmaxIn coefficient arrange from big to small by absolute value, S coefficient before selecting is watermarking images W to coefficient number that should the straton band, the value of S is identical during with embedding;
(6) with every layer of maximum subband B of energy among each coefficient of selected S and the former host image I MaxSubtract each other after the middle coefficient ordering, obtain extracting every layer of conversion coefficient of back watermark under fire
y i’=(I r-I)/α
It is identical when wherein α is with embedding;
(7) by every layer of conversion coefficient y of watermark after the first key R reduction under fire i' position;
(8) incite somebody to action back watermark conversion coefficient y under fire i' carry out contourlet inverse transformation, the watermark that obtains extracting.
5. watermark extracting method according to claim 4, wherein the described calculating of step (1) contains watermarking images I after attacking " first moment about the origin m 1,0', m 0,1', m 0,0' and second-order moment around mean μ 1,1', μ 2,0', μ 0,2', be calculated as follows:
m 1,0 &prime; = &Sigma; i &Sigma; j i &times; I &prime; &prime; ( i , j )
m 0,1 &prime; = &Sigma; i &Sigma; j j &times; I &prime; &prime; ( i , j )
m 0,0 &prime; = &Sigma; i &Sigma; j I &prime; &prime; ( i , j )
&mu; 1,1 &prime; = &Sigma; i &Sigma; j ( i - i &OverBar; ) &times; ( j - j &OverBar; ) &times; I &prime; &prime; ( i , j )
&mu; 2,0 &prime; = &Sigma; i &Sigma; j ( i - i &OverBar; ) 2 &times; I &prime; &prime; ( i , j )
&mu; 0 , 2 &prime; = &Sigma; i &Sigma; j ( j - j &OverBar; ) 2 &times; I &prime; &prime; ( i , j )
Wherein, i, j represent image I under fire " coordinate of pixel, I " (i j) represents the pixel value of this location drawing picture, and:
i &OverBar; = m 1,0 &prime; m 0,0 &prime; j &OverBar; = m 0,1 &prime; m 0,0 &prime; .
CN2008100183558A 2008-06-02 2008-06-02 Digital image watermarking method against geometric attack based on contourlet transform Expired - Fee Related CN101308566B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008100183558A CN101308566B (en) 2008-06-02 2008-06-02 Digital image watermarking method against geometric attack based on contourlet transform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008100183558A CN101308566B (en) 2008-06-02 2008-06-02 Digital image watermarking method against geometric attack based on contourlet transform

Publications (2)

Publication Number Publication Date
CN101308566A CN101308566A (en) 2008-11-19
CN101308566B true CN101308566B (en) 2011-06-29

Family

ID=40125005

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008100183558A Expired - Fee Related CN101308566B (en) 2008-06-02 2008-06-02 Digital image watermarking method against geometric attack based on contourlet transform

Country Status (1)

Country Link
CN (1) CN101308566B (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101534441B (en) * 2009-04-24 2011-04-27 西安电子科技大学 AVS Video Watermarking Method Based on Gray Theory and Uniform Spectrum Theory
CN101567958B (en) * 2009-05-19 2014-11-26 杭州海康威视软件有限公司 Semi-fragile digital watermaking system based on non-redundant Contourlet conversion
CN101872466B (en) * 2009-08-07 2012-02-15 杭州海康威视软件有限公司 Watermark embedding method, and watermark detection method and device
CN101650824B (en) * 2009-09-23 2011-12-28 清华大学 Content erotic image zooming method based on conformal energy
CN101702229B (en) * 2009-11-06 2012-01-11 电子科技大学 Image generation method containing authentication watermark and recovery watermark and recovery method
CN102254294B (en) * 2011-06-30 2012-12-05 西安电子科技大学 Method for compressing image fingerprint based on non-down-sampling Contourlet conversion
CN102279969B (en) * 2011-08-17 2013-04-10 辽宁大学 Print-scan resistant digital watermark method based on contourlet and quotient space
CN102509271B (en) * 2011-11-21 2014-05-07 洪涛 Image restoration method based on multi-dimensional decomposition, iteration enhancement and correction
CN102592256B (en) * 2011-12-28 2015-02-18 辽宁师范大学 Digital image watermark detection method based on support vector machine correction
CN103093464B (en) * 2013-01-16 2016-06-08 四川九洲电器集团有限责任公司 Profile ripple information concealing method based on image
CN103108321B (en) * 2013-01-31 2015-07-15 西安电子科技大学 Determinant and sparsity constraint of non-negative matrix factorization (DSNMF) data integrity authentication watermark method of wireless body area network
WO2017114473A1 (en) * 2015-12-31 2017-07-06 Shanghai United Imaging Healthcare Co., Ltd. Methods and systems for image processing
CN106504757A (en) * 2016-11-09 2017-03-15 天津大学 An Adaptive Audio Blind Watermarking Method Based on Auditory Model
CN109034230B (en) * 2018-07-17 2021-03-30 厦门大学 Single image camera tracing method based on deep learning
CN110889796B (en) * 2018-09-07 2021-11-02 浙江大学 Watermark embedding and watermark extraction method, device and device
CN112669191B (en) * 2019-10-15 2023-07-04 国际关系学院 Anti-overflow reversible digital watermark embedding and extracting method based on image content identification
CN111223035B (en) * 2020-01-07 2022-04-05 鲁东大学 A Color Blind Watermarking Method Based on Hamming Code, Eigenvalue Decomposition and Image Correction

Also Published As

Publication number Publication date
CN101308566A (en) 2008-11-19

Similar Documents

Publication Publication Date Title
CN101308566B (en) Digital image watermarking method against geometric attack based on contourlet transform
Keshavarzian et al. ROI based robust and secure image watermarking using DWT and Arnold map
CN102880998B (en) The extracting method of watermarking images
Wang et al. Locally optimum detection for Barni's multiplicative watermarking in DWT domain
CN102682418B (en) Method for embedding and extracting multiple zero watermarks of digital image
CN102592256B (en) Digital image watermark detection method based on support vector machine correction
CN111242827B (en) Robust color digital image watermarking method based on DT-CWT and SVD transform
CN106408497A (en) A Strong and Robust Watermark Embedding and Extraction Method for Original Remote Sensing Image
CN109727179A (en) A zero watermark generation method and system, extraction method and system
CN101719265A (en) Digital image watermark embedding method and system thereof based on computer-generated hologram
CN103079066B (en) Image Watermark Embedding and Extraction Method Combining Ridgelet Transform and DCT Transform
Joseph et al. Image security enhancement using DCT & DWT watermarking technique
CN102930498B (en) A kind of digital watermark embedding based on Lifting Wavelet and extracting method
CN109754358B (en) Image watermarking method and system based on significance detection and contourlet transformation
CN101504759B (en) Digital image watermark extraction method based on DCT algorithm
CN101075343B (en) Digital Watermarking Method Based on Pyramid Directional Filter Bank
Thomas et al. Contourlet and Gould Transforms for Hybrid Image Watermarking in RGB Color Images.
Bin Experimental research of image digital watermark based on DWT technology
CN101437163B (en) Multi-Watermarking Technology Based on Network Information Theory
Moniruzzaman et al. Robust RGB color image watermarking scheme based on DWT-SVD and chaotic system
Rachmawanto et al. A non-blind robust and impercept watermarking using discrete cosine transform and discrete wavelet transform
CN114549268A (en) DFT-SVD domain anti-attack digital watermark embedding and extracting method
CN118014815B (en) Image watermark embedding method, image watermark extracting method, image watermark embedding device, image watermark extracting device, image watermark embedding equipment and storage medium
Jabbar et al. Compare between DCT and DWT for digital watermarking in color image
Chi et al. A novel self-adaptive discrete wavelet transform digital watermarking algorithm

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20110629

Termination date: 20140602