计算机应用 ›› 2012, Vol. 32 ›› Issue (04): 971-975.DOI: 10.3724/SP.J.1087.2012.00971

• 信息安全 • 上一篇    下一篇

基于公钥的可逆数字水印

李立宗1,顾巧论2,高铁杠3   

  1. 1. 天津职业技术师范大学 计算与语音中心, 天津 300222
    2. 天津职业技术师范大学 信息技术工程学院, 天津 300222
    3. 南开大学 软件学院, 天津 300071
  • 收稿日期:2011-10-10 修回日期:2011-11-11 发布日期:2012-04-20 出版日期:2012-04-01
  • 通讯作者: 李立宗
  • 作者简介:李立宗(1979-),男,天津宝坻人,讲师,硕士,CCF会员,主要研究方向:图像处理、信息安全;顾巧论(1967-),女,河北河间人,教授,博士,主要研究方向:信息安全、复杂系统优化与控制;高铁杠(1966-),男,河北河间人,教授,博士,主要研究方向:信息安全、软件工程。
  • 基金资助:
    国家自然科学基金资助项目;天津市自然科学基金资助项目;天津职业技术师范大学科研发展基金资助项目

Reversible digital watermarking based on public key system

LI Li-zong1,GU Qiao-lun2,GAO Tie-gang3   

  1. 1. Center of Information, Tianjin University of Technology and Education, Tianjin 300222, China
    2. School of Information Technology Engineering, Tianjin University of Technology and Education, Tianjin 300222, China
    3. College of Software, Nankai University, Tianjin 300222, China
  • Received:2011-10-10 Revised:2011-11-11 Online:2012-04-20 Published:2012-04-01
  • Contact: LI Li-zong

摘要: 为了提高可逆数字水印的安全性和透明性,增加嵌入容量,提出了一种基于公钥的可逆数字水印。该方法首先对载体图像直方图中峰值点与左右两侧的零值点之间的像素点进行移位,然后提取载体图像的特征值,将该特征值与经过混沌系统加密的数字水印进行异或处理后,采用公钥将其嵌入到处理后的载体图像内。图像的验证过程是嵌入过程的逆过程,验证完成后,根据峰值点及其与零值点之间的关系将移位的像素点复原,即可完全复原原始图像。采用公钥系统和混沌系统充分保证了系统的安全性,峰值点与其两侧的零值点之间的像素移位既保证了能够嵌入更多的信息和较高的峰值信噪比,又保证了所有的像素点都能被认证。通过对大量的图像进行仿真分析,结果显示该方法具有较高的安全性,与同类方法相比,能够嵌入更多的信息量,同时具有更高的透明性。

关键词: 公钥系统, 可逆数字水印, 混沌系统, 直方图, 峰值

Abstract: A reversible digital watermarking based on public key system was proposed to improve the security, transparency and embedding capacity. This technique shifted the pixels between the peak and zero in the histogram, extracted the characteristics of the original image, used the Boolean exclusive OR operator between the characteristics value and the watermark image processed with chaotic system, and finally embedded the value into the image with the public key. Verification process was the inverse process of the embedding. After the verification, the shifted pixels were recovered depending on the relationships of the peak and zero in the histogram, and the image was recovered. The public key system and chaotic system guarantee the system security. The shift between the peak and zero pixels ensured more embedded information, higher peak signal- to-noise ration, and authentication of all the pixels. The process was simulated with lots of images. The results show that the method is safer than others, can embed more information, and has more transparency.

Key words: public key system, reversible watermarking, chaotic system, histogram, peak value