吉林大学学报(工学版) ›› 2024, Vol. 54 ›› Issue (4): 1065-1077.doi: 10.13229/j.cnki.jdxbgxb.20220647

• 计算机科学与技术 • 上一篇    

基于Tucker分解和双置乱加密的立体图像零水印算法

韩绍程1(),张鹏2,刘欢3,王博1   

  1. 1.中国民航大学 工程技术训练中心,天津 300300
    2.天津品源科技有限公司,天津 300300
    3.中国民航大学 电子信息与自动化学院,天津 300300
  • 收稿日期:2022-05-25 出版日期:2024-04-01 发布日期:2024-05-17
  • 作者简介:韩绍程(1981-),男,高级实验师. 研究方向:数字图像水印技术.E-mail: schan_cauc2012@163.com
  • 基金资助:
    国家自然科学基金项目(62172418);天津市应用基础研究多元投入重点项目(21JCZDJC00830);中央高校基本业务费专项项目(3122022077)

Stereo image zero watermarking algorithm based on Tucker decomposition and double scrambling encryption technology

Shao-cheng HAN1(),Peng ZHANG2,Huan LIU3,Bo WANG1   

  1. 1.Engineering Technology Training Center,Civil Aviation University of China,Tianjin 300300,China
    2.Tianjin Pinyuan Technology Co. ,Ltd,Tianjin 300300,China
    3.College of Electronic Information and Automation,Civil Aviation University of China,Tianjin 300300,China
  • Received:2022-05-25 Online:2024-04-01 Published:2024-05-17

摘要:

针对立体图像版权保护和现有零水印方案抵御几何攻击鲁棒性能欠佳的问题,提出了一种新的基于Tucker分解和分数阶Jacobi-Fourier矩(FJFM)的彩色立体图像抗几何攻击零水印算法。首先对原始彩色立体图像的左、右视点分别进行R、G、B通道分离,接着将分离后的6个通道联合并视作一个三阶张量进行Tucker分解,获得包含左、右视点相关性的第一能量图;然后计算该能量图4×4非重叠分块后均值子图的FJFM混合低阶矩特征,并利用该特征构造二值鲁棒特征矩阵;最后将经过双重置乱加密后的原始水印和混沌排序置乱后的特征矩阵进行异或操作,得到最终的认证零水印。实验结果表明,本文算法对添加噪声、滤波、压缩等常见非几何攻击均表现出很强的鲁棒性,水印检测NC值均在0.98以上;在抵抗旋转、缩放、平移和剪切几何攻击性能方面整体优于对比算法。

关键词: 零水印, 立体图像, 几何攻击, Tucker分解, 分数阶Jacobi-Fourier矩

Abstract:

Aiming at the problems of stereo image copyright protection and the poor robustness of existing zero watermarking schemes against geometric attacks, a novel zero watermarking algorithm against geometric attacks is proposed for color stereo image based on Tucker decomposition and Fractional-order Jacobi-Eourier Moments (FJFM). Firstly, the R, G and B channels of the left and right views of the original color stereo image are separated respectively. Then, the separated six channels are combined and treated as a third-order tensor for Tucker decomposition to obtain the first energy map containing the correlation between the left and right views. Secondly, the mixed low-order moment feature (MLMF) of the mean sub-image obtained by 4×4 non-overlapping blocking to the first energy map is calculated based on FJFM. Then the binary robust feature matrix is constructed according to the MLMF. Finally, the final authentication zero watermark is generated using the exclusive-or operation between the watermark encrypted by the double scrambling and encryption methods and the feature matrix scrambled using the proposed chaotic system. Experimental results show that the proposed algorithm shows strong robustness to the common non-geometric attacks such as adding noise, filtering and compression, and the NC values of watermark detection are more than 0.98. In addition, the proposed algorithm is overall superior to the comparison algorithms in resisting rotation, scaling, translation and the cropping geometric attacks.

Key words: zero watermarking, stereo image, geometric attack, Tucker decomposition, fractional-order Jacobi-Fourier moments

中图分类号: 

  • TP391

图1

Tucker分解示意图"

图2

立体图像Art 及其Tucker分解后的6张能量图"

图3

不同参数下的图像重构结果"

图4

不同参数下的MSRE值"

表1

不同攻击下的MSE值"

攻击方式及参数MSE攻击方式及参数MSE
无攻击0旋转5°0.006 3
高斯噪声0.050.035 2旋转25°0.010 6
椒盐噪声0.050.019 2旋转45°0.012 6
中值滤波9×90.037 6旋转90°0
维纳滤波9×90.024 4缩小0.5倍0.031 1
JPEG压缩100.019 9放大2倍0.002 6

图5

不同迭代次数下的矩阵变换置乱结果"

图6

使用完备拉丁方进行置乱的结果"

图7

二维混沌映射分叉图"

图8

零水印生成和检测过程"

表2

矩阵填充规则"

Q1Q2Q3Q4
元素00110000100110010
元素11001111011001101

图9

立体图像Art, Computer, Flowers, Hoops"

图10

原始水印及其预处理结果"

表3

唯一性检测(NC)"

ArtComputerFlowersHoops
Art1.000 00.565 90.634 20.669 8
Computer0.565 91.000 00.661 20.534 5
Flowers0.634 20.661 21.000 00.626 6
Hoops0.669 80.534 50.626 61.000 0

图11

安全性测试"

表4

非几何攻击测试结果"

攻击类型及

参数

NCArtComputerFlowersHoops
高斯噪声ANC0.997 40.992 21.000 01.000 0
0.1SNC0.989 60.981 70.994 80.989 6
椒盐噪声ANC0.997 40.997 41.000 01.000 0
0.1SNC0.997 40.992 21.000 01.000 0
中值滤波ANC1.000 00.994 81.000 01.000 0
9×9SNC1.000 00.992 21.000 00.994 8
维纳滤波ANC1.000 01.000 01.000 01.000 0
9×9SNC1.000 01.000 01.000 01.000 0
JPEG压缩ANC1.000 01.000 01.000 00.997 4
10SNC1.000 01.000 01.000 00.997 4
JPEG2000压缩ANC1.000 01.000 01.000 01.000 0
90SNC1.000 01.000 01.000 01.000 0

表5

几何攻击类型及参数"

序号攻击类型及参数序号攻击类型及参数
1旋转5°8向左平移20列
2旋转20°9向右平移20列
3旋转40°10中心剪切1/16
4缩小0.5倍11左上角剪切1/16
5放大2倍12右上角剪切1/16
6向上平移20行13左下角剪切1/16
7向下平移20行14右下角剪切1/16

图12

几何攻击测试结果"

表6

组合攻击测试结果"

序号非对称攻击对称攻击
攻击后的右视点ANC攻击后的左视点SNC

(0.994 8)

(0.987 0)

(0.989 6)

(0.981 7)

(1.000 0)

(1.000 0)

(1.000 0)

(1.000 0)

(0.997 4)

(0.992 2)

(0.994 8)

(0.992 2)

表7

不同算法鲁棒性对比结果(ANC/SNC)"

序号攻击类型及参数文献[6]算法文献[9]算法文献[10]算法文献[13]算法文献[14]算法本文算法
平均值—/0.971 30.914 1/0.815 90.962 7/0.949 00.984 9/0.965 20.953 4/0.978 60.990 2/0.984 0
1高斯噪声0.1—/0.992 90.859 1/0.699 40.960 3/0.936 60.981 4/0.973 30.888 0/0.936 60.992 1/0.984 6
2椒盐噪声0.1—/0.995 80.881 7/0.751 00.976 7/0.963 70.992 0/0.989 30.922 6/0.967 30.996 3/0.993 5
3中值滤波9×9—/0.995 80.896 8/0.792 70.979 7/0.969 60.993 7/0.989 10.983 4/0.985 20.998 3/0.997 3
4维纳滤波9×9—/0.999 20.906 2/0.811 10.984 9/0.980 00.995 2/0.992 60.996 0/0.997 81.000 0/0.999 8
5JPEG压缩10—/0.996 30.909 1/0.818 40.990 5/0.985 70.993 2/0.989 90.987 6/0.985 40.999 6/0.999 0
6JPEG2000压缩90—/0.998 80.901 9/0.801 90.982 3/0.974 30.996 7/0.994 80.996 5/0.994 51.000 0/0.999 9
7旋转5°—/0.999 60.870 2/0.727 80.964 3/0.962 00.984 0/0.965 70.941 4/0.983 30.996 9/0.999 3
8旋转20°—/0.999 60.856 3/0.674 10.958 2/0.966 00.964 1/0.906 20.915 9/0.959 30.988 8/0.999 3
9旋转40°—/0.999 20.849 1/0.640 70.958 2/0.966 40.954 7/0.876 90.919 1/0.947 10.975 5/0.998 2
10缩小0.5倍—/1.000 00.932 1/0.863 90.998 6/0.997 20.994 9/0.995 40.999 4/0.999 41.000 0/1.000 0
11放大2.0倍—/1.000 00.985 3/0.970 50.999 7/0.999 50.995 2/0.995 20.999 8/0.999 91.000 0/1.000 0
12上移20行—/0.937 30.871 0/0.726 00.912 7/0.880 20.983 0/0.966 80.935 0/0.991 60.981 2/0.964 5
13下移20行—/0.932 70.870 3/0.723 60.913 2/0.883 80.983 3/0.962 20.931 7/0.982 70.981 7/0.964 2
14左移20列—/0.938 50.870 1/0.737 30.916 9/0.885 70.983 8/0.964 10.936 2/0.984 90.985 0/0.968 4
15右移20列—/0.913 10.871 5/0.737 30.915 2/0.884 50.985 9/0.971 50.938 6/0.986 00.980 6/0.965 0
16中心剪切1/16—/0.946 00.989 8/0.967 30.966 3/0.948 20.982 9/0.955 10.950 3/0.966 20.984 8/0.971 0
17左上角剪切1/16—/0.941 90.990 1/0.967 60.967 3/0.947 30.980 7/0.947 60.955 3/0.970 10.986 0/0.965 7
18右上角剪切1/16—/0.939 40.989 6/0.965 70.970 8/0.950 40.983 0/0.958 30.954 3/0.983 80.985 5/0.969 0
19左下角剪切1/16—/0.946 90.990 7/0.970 30.967 8/0.949 30.984 0/0.949 90.958 10.9 7680.985 4/0.970 6
20右下角剪切1/16—/0.953 40.990 7/0.970 80.969 9/0.949 80.985 7/0.960 40.959 6/0.973 80.987 0/0.970 2

表8

时效性测试 (s)"

算 法零水印生成时间零水印检测时间总时间
文献[60.484 70.384 20.868 9
文献[90.201 00.131 90.332 9
文献[102.401 01.271 33.672 3
文献[131.313 30.638 51.951 7
文献[143.192 03.392 86.584 8
本文1.586 41.229 52.815 9
1 Huang Ying, Niu Bao-ning, Guan Hu, et al. Enhancing image watermarking with adaptive embedding parameter and PSNR guarantee[J]. IEEE Transactions on Multimedia, 2019, 21(10):2447-2460.
2 温泉, 孙锬锋, 王树勋. 零水印的概念与应用[J]. 电子学报, 2003, 31(2): 214-216.
Wen Quan, Sun Tan-feng, Wang Shu-xun. Concept and application of zero-watermark[J]. Chinese Journal of Electronics, 2003, 31(2):214-216.
3 Xiong Xiang-guang. A zero watermarking scheme with strong robustness in spatial domain[J]. Acta Automatica Sinica, 2018, 44(1):160-175.
4 刘万军, 孙思宇, 曲海成, 等. 一种抗几何旋转攻击零水印算法[J]. 计算机应用研究, 2019, 36(9): 2803-2808.
Liu Wan-jun, Sun Si-yu, Qu Hai-cheng, et al. Anti-geometric rotation attack zero watermarking algorithm[J]. Application Research of Computers, 2019, 36(9): 2803-2808.
5 Kang Xiao-bing, Lin Guang-feng, Chen Ya-jun, et al. Robust and secure zero-watermarking algorithm for color images based on majority voting pattern and hyper-chaotic encryption[J]. Multimedia Tools and Applications, 2020, 79(1): 1169-1202.
6 Yang Hong-ying, Qi Shu-ren, Niu Pan-pan, et al. Color image zero-watermarking based on fast quaternion generic polar complex exponential transform[J]. Signal Processing: Image Communication, 2020, 82(5):115747-115765.
7 吴德阳, 赵静, 汪国平, 等. 一种基于改进奇异值和子块映射的图像零水印技术[J]. 光学学报, 2020, 40(20):85-97.
Wu De-yang, Zhao Jing, Wang Guo-ping, et al. An image zero watermarking technology based on ameliorated singular value and subblock mapping[J]. Acta Optica Sinica, 2020, 40(20): 85-97.
8 张天骐, 叶绍鹏, 柏浩钧, 等. 结合编码交织的频数质心零水印算法[J]. 北京邮电大学学报, 2021,44(5):67-73.
Zhang Tian-qi, Ye Shao-peng, Bai Hao-jun, et al. Frequency centroid zero watermarking algorithm combine with coding interleaving[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(5):67-73.
9 Zhou Wu-jie, Jiang Gang-yi, Yu Mei, et al. Reduced-reference stereoscopic image quality assessment based on view and disparity zero-watermarks[J]. Signal Processing: Image Communication, 2014, 29(1):167-176.
10 Wang Chun-peng, Wang Xing-yuan, Xia Zhi-qiu, et al. Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm[J]. Information Sciences, 2019, 470:109-120.
11 Yamni M, Karmouni H, Sayyouri M, et al. Novel octonion moments for color stereo image analysis[J]. Digital Signal Processing, 2021, 108: 102878-102894.
12 Wang Chun-peng, Hao Qi-xian, Ma Bin, et al. Octonion continuous orthogonal moments and their applications in color stereoscopic image reconstruction and zero-watermarking[J]. Engineering Applications of Artificial Intelligence, 2021, 106: 104450-104468.
13 韩绍程, 张鹏. 基于DOCT和SURF的立体图像零水印算法[J]. 图学学报, 2022, 43(2): 254-262.
Han Shao-cheng, Zhang Peng. Stereo image zero watermarking algorithm based on DOCT and SURF[J]. Journal of Graphics, 2022, 43(2): 254-262.
14 韩绍程, 张鹏, 李鹏程. 基于FFST和Hessenberg分解的立体图像零水印算法[J]. 包装工程, 2022, 43(9): 197-206.
Han Shao-cheng, Zhang Peng, Li Peng-cheng. Stereo image zero watermarking algorithm based on FFST and Hessenberg decomposition[J]. Packaging Engineering, 2022, 43(9): 197-206.
15 Wang Lei, Bai Jing, Wu Jia-qi, et al. Hyperspectral image compression based on lapped transform and Tucker decomposition[J]. Signal Processing: Image Communication, 2015, 36(1):63-69.
16 张芳燕, 骆挺, 蒋刚毅,等. 基于左右视点相关性的立体图像鲁棒水印方法[J]. 光电工程, 2018, 45(12):4-14.
Zhang Fang-yan, Luo Ting, Jiang Gang-yi, et al. Robust stereo images watermarking based on correlations of left and right views[J]. Opto-Electronic Engineering, 2018, 45(12):4-14.
17 Yang Hong-ying, Qi Shu-ren, Tian Jia-lin, et al. Robust and discriminative image representation: Fractional-order Jacobi-Fourier moments[J]. Pattern Recognition, 2021, 115: No. 107898.
18 杨刘洋, 吕翔. 一种基于完备拉丁方的图像加密算法[J]. 计算机应用研究, 2015, 32(11):3435-3438.
Yang Liu-yang, Xiang Lyu. Image encryption algorithm based on complete Latin square[J]. Application Research of Computers, 2015, 32(11):3435-3438.
19 Wu Yue, Yang Ge-lan, Jin Hui-xia, et al. Image encryption using the two-dimensional logistic chaotic map[J]. Journal of Electronic Imaging, 2012, 21(1):No. 13014.
20 Hua Zhong-yun, Zhou Yi-cong, Chi-man Pun, et al. 2D Sine Logistic modulation map for image encryption[J]. Information Sciences, 2015, 297: 80-94.
21 Madhu S. Image encryption based on a new 2D logistic adjusted logistic map[J]. Multimedia Tools and Applications, 2020, 79(1):355-374.
22 Daniel S, Chris P. Learning conditional random fields for stereo[C]∥ IEEE Conference on Computer Vision and Pattern Recognition, Minneapolis, USA, 2007:1-8.
[1] 陆文琦,周天,谷远利,芮一康,冉斌. 基于张量分解理论的车道级交通流数据修复算法[J]. 吉林大学学报(工学版), 2021, 51(5): 1708-1715.
[2] 赵岩,孟丽茹,王世刚,陈贺新. 符合人眼视觉感知特性的改进PSNR评价方法[J]. 吉林大学学报(工学版), 2015, 45(1): 309-313.
[3] 沈丽丽, 孟宪茂, 张晶, 高强, 侯春萍. 平面和立体图像的ERP特性研究[J]. 吉林大学学报(工学版), 2013, 43(增刊1): 101-105.
[4] 张春彦, 王世刚, 贾丛新, 孙爱朦, 陈贺新. 基于LED屏的立体图像生成方法[J]. 吉林大学学报(工学版), 2013, 43(增刊1): 394-397.
[5] 孙建国,张国印,门朝光,姚爱红,曹刘娟. 基于分形理论的小波域水印模型[J]. 吉林大学学报(工学版), 2011, 41(01): 203-0208.
[6] 徐涛,张艳宁 . 三维网格模型零水印技术[J]. 吉林大学学报(工学版), 2007, 37(04): 901-904.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!