搜索

x

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于像素不扩展视觉密码的光学彩色脆弱水印

刘睿泽 祝玉鹏 周新隆 米沼锞 吴承哲 秦俏华 柯常军 史祎诗

引用本文:
Citation:

基于像素不扩展视觉密码的光学彩色脆弱水印

刘睿泽, 祝玉鹏, 周新隆, 米沼锞, 吴承哲, 秦俏华, 柯常军, 史祎诗

Optical color fragile watermark based on pixel-free expansion visual cryptography

Liu Rui-Ze, Zhu Yu-Peng, Zhou Xin-Long, Mi Zhao-Ke, Wu Cheng-Zhe, Qin Qiao-Hua, Ke Chang-Jun, Shi Yi-Shi
PDF
HTML
导出引用
  • 本文提出了一种基于像素不扩展视觉密码的光学彩色脆弱水印系统. 一方面, 使用像素不扩展视觉密码对水印图像进行编码, 避免了因视觉密码引起的像素扩展问题, 使得后续可以选择与水印图像具有相同像素大小的彩色宿主图像, 大大减少了传输过程中所占用的网络带宽以及存储空间. 另一方面, 使用相位恢复算法对编码后水印图像进行处理得到用于嵌入宿主图像的相位信息, 以光学的方式进一步提高水印图像的安全性. 使用计算机模拟验证所提光学彩色脆弱水印的可行性、不可感知性, 并通过一系列仿真攻击实验验证所提水印具有良好的脆弱性, 在面对噪声污染以及旋转、运动模糊处理、滤波等常见的攻击下均可灵敏地检测出图像发生了篡改.
    In recent years, with the continuous development of computer technology, it has brought convenience to people to obtain image information. However, at the same time, the falsification and theft of image information have also emerged, so information security has received increasing attention. When images are used for medicine, military, court, and other purposes, it is necessary to ensure the authenticity and integrity of the image content. Fragile watermarks are used to verify the authenticity and integrity of image content due to their sensitivity to tampering. The watermark information is embedded in the image and integrated with the image. When it is necessary to detect the authenticity and integrity of image information, the extracted watermark can be used to determine whether the image is reliable and complete. Therefore, we propose an optical color fragile watermarking system based on pixel-free expansion visual cryptography. On the one hand, encoding watermark images by using pixel-free expansion visual cryptography avoids pixel expansion issues caused by visual cryptography, allowing for the selection of color host images with the same pixel size as the watermark image in the future, greatly reducing the network bandwidth and storage space occupied during transmission. On the other hand, phase recovery algorithm is used to process the encoded watermark image to obtain phase information for embedding into the host image, further improving the security of the watermark image in an optical way. The feasibility and imperceptibility of the proposed optical color fragile watermark are verified through computer simulation, and its good fragility is verified through a series of simulation attack experiments. It can sensitively detect image tampering in the face of common attacks such as noise pollution, rotation, motion blur processing, filtering, etc.
      通信作者: 史祎诗, sysopt@126.com
    • 基金项目: 国家重点研发计划(批准号: 2021YFB3602604)、国家自然科学基金(批准号: 62131011, 62075221, 61975205)、中国科学院科教融合项目、中央高校基本科研业务费专项资金和河北省创新能力提升项目(批准号: 20540302D)资助的课题.
      Corresponding author: Shi Yi-Shi, sysopt@126.com
    • Funds: Project supported by the National Key Research and Development Program of China (Grant No. 2021YFB3602604), the National Natural Science Foundation of China (Grant Nos. 62131011, 62075221, 61975205), the Fusion Foundation of Research and Education of Chinese Academy of Sciences, University of Chinese Academy of Sciences, the Fundamental Research Funds for the Central Universities of China, the Innovation Capability Improvement Plan of Hebei Province, China (Grant No. 20540302D).
    [1]

    Thanki R 2021 Int. J. Digit. Crime Fourensics 13 35Google Scholar

    [2]

    张凤英 2014 硕士学位论文 (成都: 西南交通大学)

    Zhang F Y 2014 M. S. Thesis (Chengdu: Southwest Jiaotong University

    [3]

    沈嘉琪 2019 硕士学位论文 (武汉: 华中科技大学)

    Shen J Q 2019 M. S. Thesis (Wuhan: Huazhong University of Science and Technology

    [4]

    周新隆, 祝玉鹏, 杨栋宇, 张峻浩, 卢哲, 王华英, 董昭, 柯常军, 史祎诗 2021 物理学报 70 244201Google Scholar

    Zhou X L, Zhu Y P, Yang D Y, Zhang J H, Lu Z, Wang H Y, Dong Z, Ke C J, Shi Y S 2021 Acta Phys. Sin. 70 244201Google Scholar

    [5]

    杨雅姿 2023 硕士学位论文 (荆州: 长江大学)

    Yang Y Z 2023 M. S. Thesis (Jingzhou: Yangtze University

    [6]

    Chen Z Y 2013 Signal Process. Image Commun. 28 301Google Scholar

    [7]

    龚馨慧 2019 硕士学位论文 (北京: 北京邮电大学)

    Gong X H 2019 M. S. Thesis (Beijing: Beijing University of Posts and Telecommunications

    [8]

    郁滨, 付正欣, 沈刚, 房礼国 2014 视觉密码(合肥: 中国科学技术大学出版社)第2—3页

    Yu B, Fu Z X, Shen G, Fang L G 2014 Visual Cryptography (Hefei: University of Science and Technology of China Press) pp2–3

    [9]

    Naor M, Shamir M 1994 Lect. Notes Comput. Sci. 950 1Google Scholar

    [10]

    赵永康 2023 博士学位论文 (天津: 南开大学)

    Zhao Y K 2023 Ph. D. Dissertation (Tianjin: Nankai University

    [11]

    Blundo C, Bonis A D, Santis A D 2001 Designs Codes Cryptogr. 24 255Google Scholar

    [12]

    Blundo C, Santis A D, Naor M 2000 Inf. Proc. Lett. 75 255Google Scholar

    [13]

    Lin C C, Tsai W H 2003 Pattern Recognit. Lett. 24 349Google Scholar

    [14]

    Hou Y C 2003 Pattern Recognit. 36 1619Google Scholar

    [15]

    Yamamoto H, Hayasaki Y, Nishida N 2004 Opt. Express 12 1258Google Scholar

    [16]

    Machizaud J, Fournel T 2012 Opt. Express 20 22847Google Scholar

    [17]

    于韬, 杨栋宇, 马锐, 史祎诗 2020 物理学报 69 144202Google Scholar

    Yu T, Yang D Y, Ma R, Shi Y S 2020 Acta Phys. Sin 69 144202Google Scholar

    [18]

    Ateniese G, Blundo C, Santis A D, Stinson D R 2001 Theor. Coumpt. Sci. 250 143Google Scholar

    [19]

    Shyu S J 2007 Pattern. Recogn. 40 1014Google Scholar

    [20]

    Shyu S J 2009 Pattern. Recogn. 42 1582Google Scholar

    [21]

    王洪君, 马冬鹤, 张恩绮, 赵腾飞 2018 武汉大学学报(工学版) 51 1123Google Scholar

    Wang H J, Ma D H, Zhang E Q, Zhao T F 2018 Eng. J. Wuhan Univ. 51 1123Google Scholar

    [22]

    胡浩, 郁滨, 沈刚 2015 计算机科学 42 103Google Scholar

    Hu H, Yu B, Shen G 2015 Comput. Sci. 42 103Google Scholar

    [23]

    Gerchberg R W, Saxton W O 1972 Optik 35 237

    [24]

    张鹄翔 2021 硕士学位论文 (杭州: 浙江大学)

    Zhang H X 2021 M. S. Thesis (Hangzhou: Zhejiang University

    [25]

    Shi Y S, Yang X B 2017 J. Opt. 19 115703Google Scholar

    [26]

    Shi Y S, Yang X B 2017 Chin. Phys. Lett. 34 114204Google Scholar

  • 图 1  光学水印生成及嵌入过程

    Fig. 1.  Optical watermark generation and embedding process.

    图 2  光学水印提取过程

    Fig. 2.  Optical watermark extraction process.

    图 3  像素不扩展视觉密码编码方案

    Fig. 3.  Pixel-free expansion visual cryptography encoding scheme.

    图 4  仿真结果图 (a)原始图像; (b)水印图像; (c)彩色宿主图像; (d)相位信息; (e)彩色含水印图像; (f)再现图像; (g)叠加图像; (h)提取的水印图像; (i)提取的原始图像

    Fig. 4.  Simulation result diagram: (a) Original image; (b) watermark image; (c) color host image; (d) phase information; (e) color images with watermarks; (f) reproduced image; (g) overlay image; (h) extracted watermark image; (i) extracted original image.

    图 5  任意两张再现图像叠加结果图 (a)第1张再现图像与第2张再现图像叠加; (b)第1张再现图像与第3张再现图像叠加; (c)第2张再现图像与第3张再现图像叠加

    Fig. 5.  Overlay results of any two reproduced images: (a) Overlay of the first reproduced image and the second reproduced image; (b) overlay the first reproduced image with the third reproduced image; (c) overlay of the second and third reproduced images.

    图 6  攻击实验结果图 (a)—(c)高斯噪声、椒盐噪声、均匀噪声; (d)—(h)旋转、运动模糊、高斯低通滤波、裁剪、JPEG压缩

    Fig. 6.  Attack experiment results: (a)–(c) Gaussian noise, salt and pepper noise, uniform noise; (d)–(h) rotation, motion blur, Gaussian low-pass filtering, cropping, JPEG compression.

    图 7  各分量的PSNR与衰减系数的关系

    Fig. 7.  Relationship between PSNR of each component and attenuation coefficient.

    图 8  不同宿主图像与含水印图像对比 (a)—(c) “flower”宿主图像、“fruit”宿主图像、“panda”宿主图像; (d)—(f) “flower”彩色含水印图像, “fruit”彩色含水印图像, “panda”彩色含水印图像

    Fig. 8.  Comparison between different host images and watermarked images: (a)–(c) “flower” host image, “fruit” host image, “panda” host image; (d)–(f) “flower” color watermarked image, “fruit” color watermarked image, “panda” color watermarked image.

    表 1  不同宿主图像的PSNR

    Table 1.  PSNR of different host images.

    实验次数 Flower Fruit Panda
    PSNR PSNR PSNR
    1 50.4512 50.3216 50.4309
    2 50.3675 50.3364 50.3374
    3 50.2660 50.4510 50.4138
    4 50.4219 50.4544 50.3442
    5 50.2407 50.2530 50.3409
    6 50.5150 50.4241 50.4853
    7 50.4227 50.4452 50.4365
    8 50.4355 50.4863 50.3971
    9 50.5024 50.4492 50.3321
    10 50.3872 50.4446 50.2862
    平均 50.4001 50.4066 50.3794
    下载: 导出CSV
  • [1]

    Thanki R 2021 Int. J. Digit. Crime Fourensics 13 35Google Scholar

    [2]

    张凤英 2014 硕士学位论文 (成都: 西南交通大学)

    Zhang F Y 2014 M. S. Thesis (Chengdu: Southwest Jiaotong University

    [3]

    沈嘉琪 2019 硕士学位论文 (武汉: 华中科技大学)

    Shen J Q 2019 M. S. Thesis (Wuhan: Huazhong University of Science and Technology

    [4]

    周新隆, 祝玉鹏, 杨栋宇, 张峻浩, 卢哲, 王华英, 董昭, 柯常军, 史祎诗 2021 物理学报 70 244201Google Scholar

    Zhou X L, Zhu Y P, Yang D Y, Zhang J H, Lu Z, Wang H Y, Dong Z, Ke C J, Shi Y S 2021 Acta Phys. Sin. 70 244201Google Scholar

    [5]

    杨雅姿 2023 硕士学位论文 (荆州: 长江大学)

    Yang Y Z 2023 M. S. Thesis (Jingzhou: Yangtze University

    [6]

    Chen Z Y 2013 Signal Process. Image Commun. 28 301Google Scholar

    [7]

    龚馨慧 2019 硕士学位论文 (北京: 北京邮电大学)

    Gong X H 2019 M. S. Thesis (Beijing: Beijing University of Posts and Telecommunications

    [8]

    郁滨, 付正欣, 沈刚, 房礼国 2014 视觉密码(合肥: 中国科学技术大学出版社)第2—3页

    Yu B, Fu Z X, Shen G, Fang L G 2014 Visual Cryptography (Hefei: University of Science and Technology of China Press) pp2–3

    [9]

    Naor M, Shamir M 1994 Lect. Notes Comput. Sci. 950 1Google Scholar

    [10]

    赵永康 2023 博士学位论文 (天津: 南开大学)

    Zhao Y K 2023 Ph. D. Dissertation (Tianjin: Nankai University

    [11]

    Blundo C, Bonis A D, Santis A D 2001 Designs Codes Cryptogr. 24 255Google Scholar

    [12]

    Blundo C, Santis A D, Naor M 2000 Inf. Proc. Lett. 75 255Google Scholar

    [13]

    Lin C C, Tsai W H 2003 Pattern Recognit. Lett. 24 349Google Scholar

    [14]

    Hou Y C 2003 Pattern Recognit. 36 1619Google Scholar

    [15]

    Yamamoto H, Hayasaki Y, Nishida N 2004 Opt. Express 12 1258Google Scholar

    [16]

    Machizaud J, Fournel T 2012 Opt. Express 20 22847Google Scholar

    [17]

    于韬, 杨栋宇, 马锐, 史祎诗 2020 物理学报 69 144202Google Scholar

    Yu T, Yang D Y, Ma R, Shi Y S 2020 Acta Phys. Sin 69 144202Google Scholar

    [18]

    Ateniese G, Blundo C, Santis A D, Stinson D R 2001 Theor. Coumpt. Sci. 250 143Google Scholar

    [19]

    Shyu S J 2007 Pattern. Recogn. 40 1014Google Scholar

    [20]

    Shyu S J 2009 Pattern. Recogn. 42 1582Google Scholar

    [21]

    王洪君, 马冬鹤, 张恩绮, 赵腾飞 2018 武汉大学学报(工学版) 51 1123Google Scholar

    Wang H J, Ma D H, Zhang E Q, Zhao T F 2018 Eng. J. Wuhan Univ. 51 1123Google Scholar

    [22]

    胡浩, 郁滨, 沈刚 2015 计算机科学 42 103Google Scholar

    Hu H, Yu B, Shen G 2015 Comput. Sci. 42 103Google Scholar

    [23]

    Gerchberg R W, Saxton W O 1972 Optik 35 237

    [24]

    张鹄翔 2021 硕士学位论文 (杭州: 浙江大学)

    Zhang H X 2021 M. S. Thesis (Hangzhou: Zhejiang University

    [25]

    Shi Y S, Yang X B 2017 J. Opt. 19 115703Google Scholar

    [26]

    Shi Y S, Yang X B 2017 Chin. Phys. Lett. 34 114204Google Scholar

  • [1] 吴承哲, 刘睿泽, 史祎诗. 基于光学隐藏视觉密码的欺骗追踪系统. 物理学报, 2024, 73(14): 144201. doi: 10.7498/aps.73.20231721
    [2] 单明广, 刘翔宇, 庞成, 钟志, 于蕾, 刘彬, 刘磊. 结合线性回归的离轴数字全息去载波相位恢复算法. 物理学报, 2022, 71(4): 044202. doi: 10.7498/aps.71.20211509
    [3] 单明广, 刘翔宇, 庞成, 钟志, 于蕾, 刘彬, 刘磊. 结合线性回归的离轴数字全息去载波相位恢复算法. 物理学报, 2021, (): . doi: 10.7498/aps.70.20211509
    [4] 周新隆, 祝玉鹏, 杨栋宇, 张峻浩, 卢哲, 王华英, 董昭, 柯常军, 史祎诗. 基于视觉密码与QR码的光学脆弱水印. 物理学报, 2021, 70(24): 244201. doi: 10.7498/aps.70.20210964
    [5] 陈洁, 周昕, 白星, 李聪, 徐昭, 倪洋. 强散射过程与双随机相位加密过程的等价性分析. 物理学报, 2021, 70(13): 134201. doi: 10.7498/aps.70.20201903
    [6] 谢智强, 贺炎亮, 王佩佩, 苏明样, 陈学钰, 杨博, 刘俊敏, 周新星, 李瑛, 陈书青, 范滇元. 基于Pancharatnam-Berry相位超表面的二维光学边缘检测. 物理学报, 2020, 69(1): 014101. doi: 10.7498/aps.69.20191181
    [7] 于韬, 杨栋宇, 马锐, 祝玉鹏, 史祎诗. 基于增强型视觉密码的光学信息隐藏系统. 物理学报, 2020, 69(14): 144202. doi: 10.7498/aps.69.20200496
    [8] 肖晓, 杜舒曼, 赵富, 王晶, 刘军, 李儒新. 基于赝热光照明的单发光学散斑成像. 物理学报, 2019, 68(3): 034201. doi: 10.7498/aps.68.20181723
    [9] 吴佳键, 龚凯, 王聪, 王磊. 相依网络上基于相连边的择优恢复算法. 物理学报, 2018, 67(8): 088901. doi: 10.7498/aps.67.20172526
    [10] 苏理云, 孙唤唤, 王杰, 阳黎明. 混沌噪声背景下微弱脉冲信号的检测及恢复. 物理学报, 2017, 66(9): 090503. doi: 10.7498/aps.66.090503
    [11] 方志明, 崔荣一, 金璟璇. 基于生物视觉特征和视觉心理学的视频显著性检测算法. 物理学报, 2017, 66(10): 109501. doi: 10.7498/aps.66.109501
    [12] 杜景林, 郑若钦, 谢立. WSANs中基于蜂巢结构的移动容错恢复算法. 物理学报, 2015, 64(1): 018901. doi: 10.7498/aps.64.018901
    [13] 王兴元, 张继明. 一种基于抖动和混沌技术的数字图像篡改检测及修复算法. 物理学报, 2014, 63(21): 210701. doi: 10.7498/aps.63.210701
    [14] 王兴元, 张继明. 一种基于混沌和汉明码的数字图像篡改检测及修复算法. 物理学报, 2014, 63(2): 020701. doi: 10.7498/aps.63.020701
    [15] 刘宏展, 纪越峰. 一种基于角谱理论的改进型相位恢复迭代算法. 物理学报, 2013, 62(11): 114203. doi: 10.7498/aps.62.114203
    [16] 祝振敏, 曲兴华, 毕超, 贾果欣, 张福民. 基于LED阵列的彩色视觉检测光源色度特性研究. 物理学报, 2012, 61(2): 020702. doi: 10.7498/aps.61.020702
    [17] 李俊昌, 彭祖杰, Tankam Patrice, Picart Pascal. 散射光彩色数字全息光学系统及波面重建算法研究. 物理学报, 2010, 59(7): 4646-4655. doi: 10.7498/aps.59.4646
    [18] 和红杰, 张家树. 基于混沌的自嵌入安全水印算法. 物理学报, 2007, 56(6): 3092-3100. doi: 10.7498/aps.56.3092
    [19] 刘福民, 翟宏琛, 杨晓苹. 基于相息图迭代的随机相位加密. 物理学报, 2003, 52(10): 2462-2465. doi: 10.7498/aps.52.2462
    [20] 杨国桢, 顾本源. 光学系统中振幅和相位的恢复问题. 物理学报, 1981, 30(3): 410-413. doi: 10.7498/aps.30.410
计量
  • 文章访问数:  1782
  • PDF下载量:  35
  • 被引次数: 0
出版历程
  • 收稿日期:  2023-10-16
  • 修回日期:  2024-04-28
  • 上网日期:  2024-05-24
  • 刊出日期:  2024-07-05

/

返回文章
返回