Background technology
Digital watermarking is considered " last line of defense " of multi-media safety as a kind of technology that rises because of copyright protection, has played important function in the transmission of copyright and preservation process.If in a Digital Media, only embedded an information, then be referred to as single watermark; If embedded two or more information, then be referred to as many watermarks.Along with concrete use increasingly extensive of works transaction, usage track, Web publishing etc. under the network environment, demand to multi-watermark technology is urgent day by day, what the present invention relates to mainly is many watermarks field, is characterized in many watermaking systems are considered as the multi-user communication process of an information theory Network Based.
Multi-watermark technology has been obtained certain achievement in research, and wherein the most representative method can be divided three classes: repeat embedding, piecemeal embedding and merge to embed.
Repeating to embed (Re-Watermarking) is direct, the most tangible method, it is directly transplanted by single watermarking algorithm, thereby in fact be exactly repeatedly to adopt single watermarking algorithm that a plurality of watermark informations are embedded one by one, the watermark quantity that this method embeds directly influences the quality of carrier works, and after adopting this method to embed a plurality of watermarks, when detecting i watermark, must have the i time watermarked after, the i+1 time data before watermarked, this will limit its availability in a lot of practical applications.
Piecemeal embed (Segmented Watermarking) with repeat to embed different, it is cut apart being used for watermarked space, each subspace embeds a different watermark information, thereby realizes the embedding of a plurality of watermark informations, and can detect simultaneously.The restricted number of cutting apart can be with this theoretical watermark quantity that embeds, when cutting apart quantity and increase, each subspace will reduce simultaneously, this moment is the watermarked difficulty more that just becomes in each subspace.And the great advantage of this method is to embed a plurality of watermark informations simultaneously, needn't carry out in order, and can detect simultaneously, therefore uses more in practice.
With watermarked different a kind of scheme one by one is earlier each watermark to be merged, and then the single watermark embedded mode of synthetic watermark according to routine is embedded in the carrier, promptly merges to embed.This method can be broken away from the carrier capacity preferably and embed the restriction of algorithm to watermarked number, but these class methods require good application image integration technology, could obtain effect preferably, and require a plurality of watermarks to embed simultaneously, be not suitable for the situation that to predict watermark number and all watermark informations, comparatively speaking, this type of algorithm is less.But it should be noted that a transform method of these class methods---quadrature watermark method, use more.So-called quadrature watermark method is meant that the watermark of embedding is the pseudo random sequence of quadrature, when coherent detection, can not influence each other like this; This just is equivalent to as a whole embedding is done in the advanced line linearity stack of the pseudo random sequence of a plurality of quadratures then, and the process of this process and fusion is very similar.And when detecting watermark, because mutually orthogonal between each watermark, can the phase mutual interference, but the existence that this method can only detect watermark information usually is whether, and must quadrature or nearly orthogonal between each watermark, this is restricted in actual applications.
To sum up, existing many water mark methods mostly are the simple deformation of single watermarking algorithm, remain to be further developed at aspect of performances such as capacity, validity, robustnesss.
Containing the side information watermark is to produce on the basis of side information theory, network source encoding theory and dirty paper code theory.Cox equals first watermark to be regarded as in 1999 a kind of communication that contains side information.At present, contain the advantage of side information watermaking system, obtain people's approval gradually at aspects such as capacity, robustness, validity.
The present invention is applied to many watermarks field with side information thought, and a kind of new many water mark methods are provided.
Summary of the invention
Prior theory research and experimental study show that all the use of side information can improve the performance of watermaking system really.Yet the application of side information thought in the watermark field mainly concentrates in single watermark, fully used as yet in many watermarks.
Main purpose of the present invention provides a kind of new many water mark methods, its basic principle is that the implementation procedure with many watermarks is considered as a kind of multi-user communication process that contains side information, make full use of the side information that can from entities such as carrier and watermark, obtain in the embodiment side information ideologize watermark implementation procedures such as network source encoding theory and multi-user communication theory, and utilize these side informations to realize the embedding and the extraction of many watermarks.
The multi-watermark technology that the present invention proposes comprises that a kind of information theory Network Based realizes the many water mark methods of piecemeal of the method and an information theory Network Based of many watermarks.
1. information theory Network Based realizes the method for many watermarks
Prior theory research and experimental study show that all the use of side information can improve the performance of watermaking system really, but what adopt at present only is the simplest side information form, promptly for information source X
1With information source X
2, at transmission information source X
1The time, detector only is concerned about whether can effectively detect X
1, and be indifferent to and can detect X
2, as shown in Figure 1; Equally, at transmission information source X
2The time, detector only is concerned about whether can effectively detect X
2, can the pass is indifferent to detect X
1Contain in the side information list watermaking system existing, just as supplementary, more effectively transmit watermark with auxiliary watermaking system from the side information of carrier, this is quite reasonable in single watermaking system.And in many watermaking systems, more than one of the watermark information that need to embed, if still only consider side information between carrier and the different watermarks, the side information thought in so single watermaking system can be applied directly in many watermaking systems; Yet, in fact, may also have correlation between a plurality of watermark informations, and this correlation can be utilized mutually also, and this moment be in identical status between a plurality of watermark informations, it is more reasonable to utilize correlated source coding theorem in the network information theory that it is carried out analysis meeting.Because in the correlated source coding theory, a plurality of information sources are of equal importance, and detector requires to detect effectively all information, and what Fig. 2 showed is a kind of typical correlated source traffic model.
We are on the basis of analyzing network information theories such as correlated source coding theorem, multi-user communication, the implementation procedure of many watermarks is analogized to multi-user communication process based on side information, and the information theory Network Based that provides Fig. 3 to show realizes the embedding grammar of many watermarks.In the method,, from carrier and a plurality of watermark information, extract side information, each watermark information is contained the coding or the preliminary treatment of side information in the watermark encoder stage; Embed the stage in watermark, still fully excavate the side information in carrier and each watermark, to determine embedded location, embedment strength effectively.And, need utilize some side informations in watermark encoder and the watermark embed process to determine detection threshold equally in the watermark detection stage.
2. many water mark methods of the piecemeal of information theory Network Based
Traditional many water mark methods of typical piecemeal are directed to single watermarking algorithm, carrier is carried out piecemeal after, not enough to the correlation utilization between a plurality of of carrier and the many watermarks, be also referred to as blind many watermarking algorithms, performances such as its validity are not high.
We utilize the relevant information between carrier works and watermark information and a plurality of watermark to optimize watermark embedded location, watermark embed strength and watermark detection threshold value, proposed a kind of many water mark methods of piecemeal that make full use of the information theory Network Based of various side informations, what Fig. 4 showed is the block diagram that watermark embeds and extracts.This method replaces a watermark information with big reference templates such as carrier works piecemeal and generation and piecemeals with a reference template, carries out the watermark information preliminary treatment and obtains the watermark information template; Utilize the Watson sensor model to calculate the perception gap, and utilize the perception gap that the watermark information template is carried out the perception shaping and handle,, reduce embedding distortion to improve the fidelity of carrier to greatest extent; Utilize carrier works side information to seek the optimum position that watermark embeds in the mode of maximum correlation, make that the interference between carrier and a plurality of watermark information reaches minimum, the validity when guaranteeing watermark detection; Utilize the carrier side information to determine embedment strength in the mode that fixed linear is relevant, making has fixing linear correlation values between carrier partition and the corresponding watermark information, thereby further guarantees the validity of watermark detection.
Embodiment
Describe each detailed problem that relates in the method provided by the present invention in detail below in conjunction with accompanying drawing.
1. information theory Network Based realizes the method for many watermarks
As shown in Figure 3, the information theory Network Based provided by the invention specific embodiments that realizes many watermarks is as follows:
(1) analyze a plurality of watermark m[i to be embedded] (1≤i≤N) and support C
oBetween correlation and the correlation between a plurality of watermark information, be that side information is to watermark information m[i with these passes] contain the coding of side information, obtain watermark encoder signal W
i, wherein N represents the watermark number that needs embed.
(2) in conjunction with the embedding strategy of fixing robustness, fixedly the embedding strategy etc. of fidelity contains the embedding strategy of side information, according to support C
oWith all watermark encoder signal W
i(relation between 1≤i≤N) realizes W
1Embedding, in telescopiny, comprise and utilize side information to select embedded location, embedment strength, finally obtain moisture seal signal C
W1
(3) repeat above-mentioned steps, all be encoded and embed, finally obtain moisture seal signal C up to all watermark signals
W
According to foregoing description, among the present invention watermark encoder with embed device and routine and contain identical in the side information list watermaking system, can adopt various codings and embedded mode, and watermark extraction process also with routine to contain the watermark of side information list identical, its special character is, relates to a plurality of watermarks in the telescopiny, thereby from the angle analysis problem of multi-user communication, and, set up the method that realizes that many watermarks embed based on the correlated source coding theory with a plurality of watermark information fair plays.Compare with existing many water mark methods, its difference is: in the process of a plurality of watermark informations being encoded and embedding, encoder and embedding device have made full use of the correlation between carrier and watermark and a plurality of watermark, and this is the embodiment of network source encoding theory.
2. many water mark methods of the piecemeal of information theory Network Based
As shown in Figure 4, the many water mark methods of piecemeal provided by the invention at first utilize the corresponding piecemeal of carrier works and the maximum linear correlation between the watermark signal to select embedded location as side information, the detection threshold and the embedment strength factor, secondly the carrier works gap array correspondence that will utilize the Watson model to obtain is assigned to its perception is shaped, obtain the watermark encoder signal, regulate watermark embed strength by linear correlation values between immobilization carrier works and the watermark encoder signal then, finish telescopiny, utilize the linear correlation detector to detect at last, the output watermark information.Relate generally to following 4 kinds of modes of utilizing side information in the implementation process:
(1) utilize the corresponding piecemeal of carrier and the maximum linear correlation between the watermark information to select embedded location, detection threshold and embedment strength as side information;
(2) utilize the Watson model to extract the carrier side information, use the gap array that the information model of representing watermark is carried out perception and be shaped, obtain the watermark encoder signal;
(3) utilize carrier to make linear correlation values between the watermark encoder signal, regulate watermark embed strength in the mode of linear correlation values between immobilization carrier and the watermark encoder signal as side information;
(4) detection threshold of determining according to the maximum linear correlation between corresponding piecemeal of carrier and the watermark information detects watermark information in the mode of linear correlation.
Select the implementation step of embedded location, detection threshold and embedment strength 2.1 utilize side information
(1) establish carrier image size and be M1 * N1, watermark quantity to be embedded is N, then according to formula (1) to k watermark m[k] carry out preliminary treatment and obtain watermark information template w
m[k],
W wherein
r[k] (1≤k≤N) be size for M * M and between [0,1] pseudo random sequence of Normal Distribution, w
r[k, i, j] (1≤i, k value that sequence is located at [i, j] of the expression of j≤M).
(2), carrier is divided into the piece of size for M * M and non-overlapping copies according to watermark quantity
, and use c
0[t, x, y] (1≤i, pixel value in every of the expression of j≤M).
(3) calculate the information model w that represents k watermark
mAll piecemeals of [k] and carrier
Between linear correlation values, if watermark m[k]=1, then select and w
m[k] has the piece of maximum linear correlation as embedded location, and with maximum related value and the yardstick zoom factor β [k] of time difference of big correlation as watermark, simultaneously will time big correlation threshold tau during as watermark detection
Lc[k]; If m[k]=0, then select and w
m[k] has the piece of minimal linear correlation as embedded location, and with the difference of minimum correlation value and time little correlation yardstick zoom factor β [k] as watermark, simultaneously will time little correlation threshold tau during as watermark detection
Lc[k].Wherein zoom factor β [k] is used for follow-up definite embedment strength.
2.2 utilize the Watson model to extract the implementation step that side information carries out watermark encoder
(1), utilize DC coefficient after each piecemeal discrete cosine transform of carrier to the predefined frequency sensitive kilsyth basalt of Watson model t[i, j according to formula (2)] adjust, obtain brightness and shelter function threshold t
L[k, i, j],
α wherein
TBe a constant, value is 0.649 usually, C
o[k, 0,0] is the DC coefficient of k piecemeal after discrete cosine transform in the carrier image, C
0,0Be the mean value of all piecemeal DC coefficient of carrier image, also can be set at the constant of representative image expection intensity.
(2) calculate contrast masking threshold s[k, i, j according to formula (3)],
s[k,i,j]=max{t
L[k,i,j],|C
o[k,i,j]|
w[i,j]t
L[k,i,j]
1-w[i,j]} (3)
W[i in the formula, j] be a constant between 0 and 1, and can be different because of the difference of coefficient of frequency, all w[i in the Watson model, j] all be taken as 0.7.Final thresholding s[k, i, j] estimated be every variation size that in a just perceptible scope, can stand of piece discrete cosine transform, also be called the gap.
(3) utilize the gap that the watermark information template is carried out perception and be shaped, promptly at first the watermark information template is carried out discrete cosine transform and obtain W
m[k] utilizes formula (4) to W then
m[k] carries out perception and is shaped and obtains perception shaping information W under the discrete cosine transform domain
s[k],
W
s[k]=W
m[k]s[k] (4)
At last to W
s[k] carries out inverse discrete cosine transform and obtains spatial domain shaping template w
s[k], i.e. watermark encoder signal.
Determine the implementation step of embedment strength 2.3 utilize side information
(1) embedment strength of supposing k watermark is α [k], then watermark encoder signal w
s[k] will be embedded in the corresponding piecemeal by formula (5),
c
w[k]=c
o[k]+α[k]w
s[k] (5)
At this moment, can calculate moisture seal signal c according to formula (6)
w[k] and watermark information template w
mLinear correlation values between [k],
z
lc(w
m[k],c
w[k])=(C
0[k]·w
m[k]+w
a[k]·w
m[k])/(M×M) (6)
W wherein
α[k] determines according to formula (7).
w
a[k]=α[k]w
s[k] (7)
In formula (6), use τ
Lc[k]+β [k] replaces z
Lc(w
m[k], c
w[k]), can obtain watermark embed strength and be
(2) embedment strength that adopts (8) formula to obtain obtains containing watermarking images according to formula (5) embed watermark information.
2.4 extract the implementation step of watermark in conjunction with side information
(1) adopt with telescopiny in identical mode to carrier c to be detected
nCarry out piecemeal, and obtain each piecemeal c
n[t]
(2) with the embedded location in the telescopiny as key, may contain the piecemeal c of watermark information according to formula (9)
nDetect watermark information in [k],
Z wherein
Lc(w
r[k], c
n[k]) expression carrier block c
n[k] and watermark information w
rLinear correlation values between [k], τ
Lc[k] is the detection threshold that utilizes the linear correlation values between carrier partition and the watermark information template to determine in the telescopiny.
3. test result
We are applied in the method that is proposed under the multiple situations such as different images, different watermark informations, have carried out sufficient experiment, have verified the validity of many water mark methods proposed by the invention.Provide below with the method for the present invention's proposition and the experiment comparative result of the many water mark methods of conventional blind piecemeal.In the experiment, the carrier of employing is 256 * 256 gray level image, and the watermark quantity of embedding is 128.The many water mark methods of conventional blind piecemeal are divided into the piece of 256 non-overlapping copies with gray level image, and every block size is 16 * 16, selects 128 piecemeals to be used to embed 128 watermark informations then from 256 piecemeals at random, and identical embedment strength is adopted in all watermarks.
(1) validity of carrier image experiment at random
Consider that different images may have certain influence at random to experiment, in order to prove absolutely the broad applicability of this method, we test carrier at random, and it is constant promptly to fix 128 watermark informations, 1000 experiments are carried out in the continuous conversion of carrier image in 1000 width of cloth images.
Fig. 5 is the distribution situation of the average error rate of the watermark information that extracts of two kinds of methods, experimental result shows: under the situation that carrier image is selected at random, the average error rate of this method mainly is distributed near 0, can obtain good validity, and the average error rate of the many water mark methods of conventional blind piecemeal mainly is distributed on 0.6, and its validity is relatively poor.
(2) random watermark validity experiment
Consider that different watermarks also may affect to experiment, in order to prove absolutely the broad applicability of this method, we test random watermark, and promptly the immobilization carrier image is constant, 128 watermark informations constantly change, and 1000 groups of watermark informations are carried out 1000 experiments.
Fig. 6 is the distribution situation of the average error rate of the watermark information that extracts of two kinds of methods, experimental result shows: under the situation that watermark is selected at random, the average error rate of the method that the present invention proposes is distributed near 0, can obtain good validity, and the average error rate of the many water mark methods of conventional blind piecemeal is distributed between 0.5 and 0.6, and its validity is relatively poor.
(3) robustness experiment
In order further to test the performance of method provided by the invention, we test the robustness of this method, and what table 1 showed is that various common images are handled the attack average error rate of a plurality of watermarks of extraction down.As seen from Table 1, handle under the attack at normal image, method provided by the invention can obtain the lower error rate, promptly has robustness preferably.
To sum up, many water mark methods that the present invention proposes have good validity, and normal image processing attack is had robustness preferably.
The robustness of table 1. this method under the normal image processing is attacked
Attack |
The error rate |
Amplify 2 times |
0 |
Dwindle 1/2 |
0.023 |
Low-pass filtering (3 * 3) |
0.257 |
Medium filtering (3 * 3) |
0.047 |
Shear 1/9 |
0.148 |
JPEG compresses (50%) |
0.035 |
JPEG compresses (70%) |
0.092 |
Gas noise (0.0008) |
0.098 |