用户名: 密码: 验证码:
基于混沌和压缩感知的鲁棒性数字水印研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着云技术的发展,数字化产品在人类生活中的广泛应用,有效保护数字多媒体数据版权成为当今时代的需要。数字水印技术作为有效的手段之一,自上世纪90年代出现以来,得到广大研究人员的高度重视。数字水印技术是将特定信息嵌入到宿主数据中,从而保护宿主数据的安全,其内容涉及到版权保护、内容认证、指纹认证、广播监控、注解标记等方面,但是数字水印技术仍未成熟,在实际应用中还存在诸多问题,如实现数字水印走向商业化的鲁棒性水印研究问题。因此,本文以静态图像作为研究对象,主要在鲁棒性水印的设计方面进行了研究,通过结合图像的特征、视觉模型实现了数字水印在空域和变换域的嵌入和检测,为数字水印技术的实际应用提供了有效的解决方案,并对所提出算法进行详细的性能分析和计算机仿真验证。论文的主要创新点归纳如下:
     (1)提出了一种基于小波变换和混沌的函数水印算法。针对图像水印的嵌入量对图像透明性的影响,数字水印由用户自定义的函数产生,扩展了水印的生成空间。对灰度图像进行小波变换,在小波变换的中低频域选择水印嵌入点嵌入水印,通过Logistic混沌对嵌入点坐标加密,用户在得到密钥和加密序列后可提取水印,实验结果表明算法对于原始图像的改变小,水印具有不可见性。算法对常见的水印攻击具有较好的鲁棒性,但在噪声攻击中的高斯噪声和泊松噪声提取水印效果不是很理想。为了提高混沌系统的安全性,设计了五维超混沌系统,并数值证明了系统的可行性。
     (2)提出了基于Contourlet变换和ECC(Elliptical Curve Cryptography)的数字水印算法。在引入中央可信IPP (Intellectual Property Protection, IPP)机构的基础上,提出了基于ECC的公钥数字水印的算法,利用ECC体制的加密解密的优点,在Contourlet小波域中选择避开图像边缘的高频部分,实现水印的嵌入,算法对常见的水印攻击具有较好的鲁棒性,为水印加密体制的标准化提供了有意义的探索。
     (3)提出了基于压缩感知和混沌的函数数字水印算法。在数字水印的框架中,提高水印的嵌入量是目前解决的主要问题之一,分析了函数水印的稀疏性,利用压缩感知理论可嵌入更多的数据,提高水印容量。为了提高压缩感知重构信号的精度,提出了基于SVD(Single Value Decomposition)的观测矩阵设计算法,证明了算法的有效性,实验仿真结果验证可以提高一维信号的重构精度3-5%,提高二维信号的PSNR值1-2dB;在图像归一化的基础上,提出了基于压缩感知和混沌的函数数字水印算法,实验仿真结果表明算法对于几何攻击和常规攻击具有良好的鲁棒性,可以提高水印嵌入量大约7倍。
     (4)提出了基于数字水印的学生程序竞赛集训管理系统和基于数字水印的水稻信息管理系统,为数字水印的实际应用提供了有意义的探索。两个系统是数字水印在彩色图像中的应用,虽然彩色图像的数字水印算法总体上是类似于灰度图像的数字水印算法,但是与灰度图像水印算法又有不同之处,主要在于彩色图像的水印嵌入要考虑到人类对彩色的视觉模型,考虑到不同的实际应用,需要进行颜色空间变换。在提取水印时,利用尺度不变特征变换SIFT(Scale InvariantFeature Transform)对图像校正,由于校正需要原始图像,算法是非盲水印算法,两个系统的运行结果表明了系统对于噪声攻击和几何变换具有良好的鲁棒性。
With the development of cloud technology, the broad application of digitalproducts in human life, effectively protecting the copyright of the digital multimediadata becomes the need of the present era. The digital watermarking technology is as akind of the effective protection means since the1990s, and gets attached greatimportance to the majority of researchers. The digital watermarking technology is thatspecific information is embedded into the host data, so as to protect the security of thehost data, its contents is related to copyright protection, content authentication,fingerprint authentication, broadcast monitoring, annotations mark; But it is not yetmature, there are still many problems in practical applications, such as robustnessdigital watermarking research towards commercialization. Therefore, in thisdissertation, a static image is taken as the research object, mainly in the robustness ofthe watermark design research. By the combination of the characteristics of the imageand the visual model to achieve the digital watermark in the spatial domain andtransform domain embedding and detection, effective solutions to the practicalapplication are provided, and a detailed performance analysis and computersimulation of the proposed algorithm is given. The main innovations of thisdissertation are summarized as follows:
     Firstly, a functional digital watermarking algorithm based on wavelet transformand chaos is proposed. Aiming at the influence of image transparency for watermarkcapacity, the digital watermark is generated by a user-defined function to extend thewatermark generation space. Using wavelet transform deal with grayscale images,choosing embedding points of middle-low frequency in wavelet transform, watermarkembedding points is encrypted by Logistic chaos, user can extract the watermark byobtaining the key and encryption sequence. The experimental results show that thealgorithm changes little to the original image, the watermark is not visible, and isrobust to common watermark attacks. In order to improve the security of chaoticsystems, a five-dimensional hyper-chaos system is designed and the feasibility of thesystem is proved adopting numerical method.
     Secondly, digital watermarking algorithm based on contourlet transform andECC(Elliptical Curve Cryptography) is proposed. ECC public key digitalwatermarking algorithm is given out based on a central trusted IPP (Intellectual Property Protection) institution, the watermark is embedded in contourlet domainavoiding the high frequency of the image edge, and the algorithm has betterrobustness of common watermark attacks, and provides a meaningful exploration forwatermark encryption system standardized.
     Thirdly, a digital watermarking algorithm based on compressed sensing andchaos is proposed. Currently one of the main issues is improving the embeddedwatermarking capacity in architecture of digital watermarking. More data isembedded to improve the watermark capacity by use of compressed sensing theory,and the sparsity of the functional watermark is analyzed. In order to improve thesignal reconstruction precision a measurement matrix design algorithm is presentedbased on SVD(Single Value Decomposition), the effectiveness of the algorithm isproved, the simulation results verify that can improve the reconstruction accuracy3-5%for one dimensional signal and PSNR1-2dB for of two dimensional signal;digital watermarking algorithm is putted forward based on compressed sensing andchaos in normalized image, simulation results show that the algorithm has goodrobustness to geometric attacks and conventional attacks, the embedded informationcapacity of watermarking is enhanced about7times.
     Finally, the student contest management system and rice informationmanagement system based on digital watermarking are proposed, and a meaningfulexploration of the practical application of digital watermarking are provided. Theapplication of digital watermarking is in color image in the two systems, color imagedigital watermarking algorithm is similar to grayscale images overall, but hasdifferent with a grayscale image watermark algorithm, the difference mainly lies inthe color image watermark embedding taking into account the human color visualmodel, and should consider color space transform in the practical application. Whileextracting watermarking, SIFT (Scale Invariant Feature Transform) is used to imagecorrection, the algorithm is non-blind watermarking, and the operating results of thetwo systems shows that the two systems are robust to noise attack and the geometrictransformation.
引文
[1]刘恕.版权保护如何走进“云时代”?.科技日报,2011-12-22(6)
    [2]程光权.基于方向小波图像处理与几何特征保持质量评价研究:[国防科技大学博士学位论文].长沙:国防科学技术大学研究生院,2010,1-20.
    [3] Emil F H.Identification of sound and like signals.United States Patent,3004104,1961-10-10.
    [4] Tirkel A.Z,Rankin G.A,Van Schyndel R.M,et a1.Electronic Water Mark.In:Proc of Digital Image Computing: Techniques and Applications, MacquarieUniversity,1993,666-673
    [5] Van Schyndel R.G,Tirkel A. Z,Osborne C. F.A Digital Watermark.In:Porc ofIEEE International Conference on Image Processing,1994,86-90
    [6] Cox I.J,Miller M.L.Electronic Watermarking:The first50Years.In:Proc ofIEEE Fourth Workshop on Multimedia Signal Processing,2001,225-230
    [7] Lu C S.Multimedia Security: Stegnography and Digital WatermarkingTechniques for Protection of Intellectual Property.London:Idea Grouppublishing,2004,4-5.
    [8]夏嵬.抗几何攻击的鲁棒数字图像水印算法研究:[华中科技大学博士学位论文].武汉:华中科技大学,2010,1-21.
    [9]黄外斌.数字图像水印技术的若干研究:[浙江大学博士学位论文].杭州:浙江大学,2009,1-18.
    [10] Voyatzis G, Pitas I. The use of watermarks in the protection of digitalmultimedia products.Proceedings of IEEE,1999,87(7):1197-1207
    [11]徐光祐,贺伟晟,史元春.中国多媒体技术研究.中国图象图形学报,2005,10(7):805-820
    [12]史元春,徐光祐.中国多媒体技术研究.中国图象图形学报,2009,14(7):1258-1272
    [13]史元春,徐光祐,高原.中国多媒体技术研究.中国图象图形学报,2010,15(7):1023-1041
    [14]史元春,徐光祐,高原.中国多媒体技术研究,中国图象图形学报,2011,16(7):1127-1133
    [15] http://tech.sina.com.cn/digi/2007-04-26/0101298007.shtml.
    [16] Ruanaidh J.J.K,Dowling W.J,Boland F.M.Watermarking Digital Images forCopyright Protection. Vision, Image and Signal Processing, IEEProceedings,1996,143(4):250-256
    [17] Hal Berghel Lawrence O’Gorman.Protecting Ownership Rights through DigitalWatermarking.Computer,1996,29(7):101-103
    [18] Xie L H,Gonzalo R.A Class of Authentication Digital Watermarks for SecureMultimedia Communication.IEEE Transactions on Image Processing,2001,10(11):1754-1764
    [19] Hsieh M S,Tseng D C,Huang Y H. Hiding Digital Watermarks UsingMultiresolution Wavelet Transform.IEEE Trasactions on Industrial Electronics,2001,48(5):875-882
    [20] Chang C.C,Hwang K.F,Hwang M.S. Robust Authentication Scheme forProtecting Copyrights of Images and Graphics. Vision, Image and SignalProcessing, IEE Proceedings,2002,149(1),43-50
    [21]田冰,王伟.一种新的JPEG图像认证半脆弱水印算法.计算机应用,2007,27(1):132-134.
    [22]丁志中,梁秋娟.一种基于关系和量化的强鲁棒性盲水印算法.中国图象图形学报,2010,15(1):31-36
    [23] Dittmaim J.Combining digital watermarks and collusion secure fingerprints forcustomer copy monitoring. IEE Seminar on Secure Images and ImageAuthentication,2000,6:1-6
    [24] Maes M, Kalker T, Linnartz J P M G,et al.Digital watermarking for DVD Videocopy Protection.IEEE Signal Processing Magazine,2000,17(5):47-57
    [25] Dr. Vipula Singh.Digital Watermarking: A Tutorial.Multidisciplinary Journalin Science and Technology,2011:10-21.
    [26] Baisa L,Gunjal. An overview transform domain robust digital imagewatermarking algorithms. Journal of Emerging Trends in Computing andInformation Sciences,2010,2(1):37-42
    [27] Schyndel R G,Tirkel A Z,Osborne C F.A digital watermark.In:Proc of IEEEInternational Conference Image Processing, Austin,1994,86-90
    [28] Hsu C T,Wu JL.Hidden digital watermarks in images.IEEE Trans on ImageProceedings,1999,8(1):58-68.
    [29] Bender W,Gruhl D.Techniques for data hiding.IBM System Journal,1996,35(3-4):313-336.
    [30] Benoit M. Macq,Jean-Jacques Quisquater. Cryptology for Digital TVBroadcasting.Proceedings of IEEE,1995,83(6),944-957
    [31] Wong K.K,Tse C.H,Ng K.S,et.al.Adaptive watermarking., IEEE Transactionson Consumer Electronics,1997,43(4):1003-1009.
    [32] Ingemar J. Cox,Joe Kilian,F. Thomson Leighton,et.al.Secure Spread SpectrumWatermarking for Multimedia. IEEE Transactions on Image Processing,1997,6(12):1673-1687
    [33] Christine I. Podilchuk,Wenjun Zeng. Image-Adaptive Watermarking UsingVisual Models. IEEE Journal on Selected Areas in Communications,1998,16(4):525-538
    [34] Chiou Ting Hsu, Ja Ling Wu. Multiresolution Watermarking for DigitalImages.IEEE Transactions on Circuits and System—II: Analog and Digitalsignal Processing,1998,45(8):1097-1101
    [35] Wenwu Zhu,Zixiang Xiong,Ya-Qin Zhang.Multiresolution Watermarking forImages and Video. IEEE Transactions Circuits and Systems for VideoTechnology,1999,9(4):545-550
    [36] Ioannis Pitas.A Method for Watermark Casting on Digital Images.IEEETransactions on Circuits and Systems for Video Technology,1998,8(6):775-780
    [37] Mitchell D. Swanson,Bin Zhu,Ahmed H. Tewfik,Multi-resolution Scene-BasedVideo Watermarking Using Perceptual Models.IEEE Journal on Selected Areasin Communications,1998,16(4):540-550
    [38] Wenjun Zeng,Bede Liu.A Statistical Watermark Detection Technique WithoutUsing Original Images for Resolving Rightful Ownerships of DigitalImages.IEEE Transactions on Image Processing,1999,8(11):1534-1548
    [39] George Voyatzis,Ioannis Pitas.The Use of Watermarks in the Protection ofDigital Multimedia Products.Proceedings of the IEEE,1999,87(7):1197-1207
    [40] K. S. Ng,L. M. Cheng,L. L. Cheng,et al.Adaptive Watermarking by UsingPixel Position Shifting Technique.IEEE Transactions on Consumer Electronics,1999,45(4):1507-1064
    [41] B.J. Fnlkowski,Lip San Liin. Image Watermarking Using HadamardTransforms.Electronics Letters,2000,36(3):211-213
    [42] Ilhami Torunoglu,Edoardo Charbon.Watermarking-Based Copyright Protectionof Sequential Functions. IEEE Journal of Solid-state Circuits,2000,35(3):434-440
    [43] Chun Shien Lu,Shih Kun Huang,Chwen Jye Sze,et al.Cocktail Watermarkingfor Digital Image Protection. IEEE Transactions on Multimedia,2000,2(4):209-224
    [44] Z.M. Lu,S.H. Sun.Digital Image Watermarking Technique based on VectorQuantization.IEE Electronics Letters,2000,36(4):303-305.
    [45] Xiamu Niu, Shenghe Sun, Wenjun Xiang. Multiresolution Watermarking forVideo based on gray-level Digital Watermark.IEEE Transactions on ConsumerElectronics,2000,46(2):375-384.
    [46] N. Kaewkamnerd, K.R. Rao. Wavelet based Image Adaptive WatermarkingScheme.IEE Electronics Letters,2000,36(4):312-313.
    [47] Min Jen Tsai,Kuang Yao YU,Yi Zhang Chen. Joint Wavelet and SpatialTransformation for Digital Watermarking.IEEE Transactions on ConsumerElectronics,2000,46(1):241-245.
    [48] Ming Shing Hsieh,Din Chang Tseng,Yong Huai Huang. Hiding DigitalWatermarks Using Multiresolution Wavelet Transform.IEEE Transactions onIndustrial Electronics,2001,48(5):875-882
    [49] Chuan-Fu Wu,Wen-Shyong Hsieh.Digital Watermarking Using Zerotree ofDCT. IEEE Transactions on Consumer Electronics,2000,46(1):87-94
    [50] Nasir Memon,Ping Wah Wong.A Buyer–Seller Watermarking Protocol.IEEETransactions on Image Processing,2001,10(4):643-649
    [51] Vassilios Solachidis,Ioannis Pitas,Circularly Symmetric. WatermarkEmbedding in2-D DFT Domain.IEEE Transactions on Image Processing,2001,10(11):1741-1753
    [52] YiweiWang,John F. Doherty,Robert E,et al.A Wavelet-Based WatermarkingAlgorithm for Ownership Verification of Digital Images.IEEE Transactions onImage Processing,2002,11(2):77-88
    [53] Qiang Cheng, Thomas S. Huang.An Additive Approach to Transform-DomainInformation Hiding and Optimum Detection Structure. IEEE Transactions onMultimedia,2001,3(3):273-284.
    [54] Ruizhen Liu,Tieniu Tan.An SVD-Based Watermarking Scheme for ProtectingRightful Ownership.IEEE ransactions on Multimedia,2002,4(1):121-128
    [55] C. C.Chang,K.F.Hwang,M S.Hwang. Robust Authentication Scheme forProtecting Copyrights of Images and Graphics. Vision, Image and SignalProcessing, IEE Proceedings,2002,149(1):43-50
    [56] Patrick Bas,Jean-Marc Chassery,Beno t Macq. Geometrically InvariantWatermarking Using Feature Points.IEEE Transactions on Image Processing,2002,11(9):1014-1028
    [57] Mehmet Utku Celik,Gaurav Sharma,Eli Saber,et al.Hierarchical Watermarkingfor Secure Image Authentication With Localization.IEEE Transactions onImage Processing,2002,11(6):585-595
    [58] Mohamed A. Suhail,Mohammad S. Obaidat.Digital Watermarking-Based DCTand JPEG Model.IEEE Transactions on Instrumentation and measurement,2003,52(5):1640-1647
    [59] Dong Zheng,Jiying Zhao,Abdulmotaleb El Saddik.RST-Invariant Digital ImageWatermarking Based on Log-Polar Mapping and Phase Correlation. IEEETransactions on Circuits and systems for Video Technology,2003,13(8):753-765
    [60] Herley C.Why Watermarking Is Nonsense.Signal Processing Magazine, IEEE,2002,19(5):10-11
    [61] Barni M. What Is the Future for Watermarking?(Part I).Signal ProcessingMagazine, IEEE,2003,20(5):55-60.
    [62] Barni M. What Is the Future for Watermarking?(Part II).Signal ProcessingMagazine, IEEE,2003,20(6):53-59
    [63]温泉,孙锬锋,王树勋.零水印的概念与应用.电子学报,2003,31(2):214-216
    [64] Peter H. W. Wong,Oscar C. Au,Y. M. Yeung. A Novel Blind MultipleWatermarking Technique for Images. IEEE Transactions on Circuits andSystems for Video Technology,2003,13(8):813-830
    [65] Darko Kirovski,Fabien A. P. Petitcolas.Blind Pattern Matching Attack onWatermarking Systems. IEEE Transactions on Signal Processing,2003,51(4):1045-1053
    [66] Patrizio Campisi,Deepa Kundur,Alessandro Neri.Robust Digital Watermarkingin the Ridgelet Domain. IEEE Signal Processing Letters,2004,11(10):826-830
    [67] Longjiang Yu, Xiamu Niu, Shenghe Sun. Print-and-scan Model and theWatermarking Countermeasure. Image and Vision Computing,2005,23:807-814.
    [68]纪震,李慧慧,肖薇薇,等.基于混沌序列的数字水印信号研究.电子学报,2004,32(7):1131-1134
    [69] Yang Zhao,Patrizio Campisi,Deepa Kundur.Dual Domain Watermarking forAuthentication and Compression of Cultural Heritage Images. IEEETransactions on Image Processing,2004,13(3):430-448
    [70] Alexia Briassouli,Michael G. Strintzis.Optimal Watermark Detection UnderQuantization in the Transform Domain.IEEE Transactions on Circuits andSystems for Video Technology,2004,14(12):1308-1319
    [71] Alexia Briassouli,Michael G. Strintzis.Locally Optimum Nonlinearities forDCT Watermark Detection. IEEE Transactions on Image Processing,2004,13(12):1604-1617
    [72] Kaushal Solanki,Noah Jacobsen,Upamanyu Madhow,et al. RobustImage-Adaptive Data Hiding Using Erasure and Error Correction. IEEETransactions on Image Processing,2004,13(12):1627-1639
    [73] Saraju P. Mohanty,Nagarajan Ranganathan,Ravi K. Namballa. A VLSIArchitecture for Visible Watermarking in a Secure Still Digital Camera (S2DC)Design(Corrected).IEEE Transactions on Very Large Scale Integration (VLSI)Systems,2005,13(8):1002-1012
    [74] Tanmoy Kanti Das,Subhamoy Maitra,Joydip Mitra.Cryptanalysis of OptimalDifferential Energy Watermarking (DEW) and a Modified RobustScheme.IEEE Transactions on Signal Processing,2005,53(2):768-775
    [75] Zhe-Ming Lu,Dian-Guo Xu,Sheng-He Sun.Multipurpose Image WatermarkingAlgorithm Based on Multistage Vector Quantization.Transactions on ImageProcessing,,2005,14(6):822-831
    [76] Bijan G. Mobasseri,Robert J. Berger. A Foundation for Watermarking inCompressed Domain.IEEE Signal Processing Letters,2005,12(5):399-402
    [77]钟桦,焦李成.DCT域半易损水印技术.计算机学报,2005,28(9):1549-1557
    [78]刘连山,李人厚,高琦.基于DWT的彩色图像绿色分量数字水印方案.通信学报,2005,26(7):62-67
    [79] T. M. Ng,H. K. Garg.Maximum-Likelihood.Detection in DWT Domain ImageWatermarking Using Laplacian Modeling.IEEE Signal Processing Letters,2005,12(4):285-288
    [80] P.S. Huang,C.S. Chiang,C.P. Chang,et al.Robust Spatial WatermarkingTechnique for Colour Images via Direct Saturation Adjustment.Vision, Imageand Signal Processing, IEE Proceedings,2005,152(5):561-574
    [81] Lahouari Ghouti,Ahmed Bouridane,Mohammad K. Ibrahim,SaidBoussakta.Digital Image Watermarking Using Balanced Multiwavelets.IEEETransactions on Signal Processing,2006,54(4):1519-1536
    [82] C.V. Serdean,M.K. Ibrahim,A. Moemeni,et al. Wavelet and MultiwaveletWatermarking.IET Image Process,2007,1(2):223–230
    [83] Kaushal Solanki,Upamanyu Madhow,B. S. Manjunath,et al.‘Print and Scan’Resilient Data Hiding in Images.IEEE Transactions on Information Forensicsand Security,2006,1(4):464-478
    [84] Sha Wang,Dong Zheng,Jiying Zhao,et al.An Image Quality Evaluation MethodBased on Digital Watermarking.IEEE Transactions on Circuits and Systems forVideo Technology,2007,17(1):98-105
    [85]兰红星,陈松乔,胡爱娜,等.基于小波域的第二代数字水印算法的研究.电子学报,2007,35(9):1799-1803
    [86]金聪,叶俊民,张清国.具有抗几何攻击能力的盲数字图像水印算法.计算机学报,2007,30(3):474-482
    [87]牛盼盼,杨红颖,邬俊,等.基于归一化图像重要区域的数字水印方法.中国图象图形学报,2007,12(10):1774-1777
    [88]张建伟,鲍政,王顺凤.图像小波域奇异值分解的自适应水印方案.中国图象图形学报,2007,12(5):811-518
    [89]车生兵,黄达,李光.基于视觉特性的半脆弱水印算法.通信学报,2007,28(10):134-140
    [90] Xiangyang Wang,Jun Wu,Panpan Niu.A New Digital Image WatermarkingAlgorithm Resilient to Desynchronization Attacks. IEEE Transactions onInformation Forensics and Security,2007,2(4):655-663
    [91] Giulia Boato,Francesco G. B,De Natale,et al. Digital Image Tracing bySequential Multiple Watermarking. IEEE Transactions on Multimedia,2007,9(4):677-686
    [92] S.P. Mohanty,E. Kougianos,N. Ranganathan.VLSI Architecture and Chip forCombined Invisible Robust and Fragile Watermarking.IET Computer&DigitalTechniques,2007,1(5):600–611
    [93] Arvind Kumar Parthasarathy,Subhash Kak.An Improved Method of ContentBased Image Watermarking.IEEE Transactions on Broadcasting,2007,53(2):468-479
    [94] Diljith M. Thodi,Jeffrey J. Rodríguez.Expansion Embedding Techniques forReversible Watermarking. IEEE Transactions on Image Processing,2007,16(3):721-730
    [95] Yeh Shun Chen,Ran Zan Wang.Steganalysis of Reversible Contrast MappingWatermarking.IEEE Signal Processing Letters,2009,16(2):125-128
    [96]方春,张翠芳,王宏霞,等.基于整数DCT变换的新水印算法.中国图象图形学报,2008,13(9):1694-1700
    [97]杨红梅,梁永全,刘连山,等.基于HVS的彩色图像水印视觉不可感知性评价方法.通信学报,2008,29(2):95-100
    [98] Tsz Kin Tsui,Xiao-Ping Zhang,Dimitrios Androutsos. Color ImageWatermarking Using Multidimensional Fourier Transforms.IEEE Transactionson Information Forensics and Security,2008,3(1):16-28
    [99] Anthony T. S. Ho,Xunzhan Zhu,Jun Shen,Pina Marziliano. FragileWatermarking Based on Encoding of the Zeroes of the–z Transform.IEEETransactions on Information Forensics and Security,2008,3(3):567-569
    [100] Chuhong Fei,Raymond H. Kwong,Deepa Kundur. A Hypothesis TestingApproach to Semifragile Watermark-Based Authentication.IEEE Transactionson Information Forensics and Security,2009,4(2):179-192
    [101]肖俊,王颖.基于多级离散余弦变换的鲁棒数字水印算法.计算机学报,2009,32(5):1055-1061
    [102]毛家发,林家骏,戴蒙.基于图像攻击的隐藏信息盲检测技术.计算机学报,2009,32(2):318-327
    [103]杨娟,杨丹,张小洪.基于图像角点特征的第二代水印算法研究.中国图象图形学报,2009,14(5):884-890
    [104]徐紫涵,王向阳.可有效抵抗一般性几何攻击的数字水印检测方法.自动化学报,2009,35(1):23-27
    [105] Rajan Samtani. Ongoing Innovation in Digital Watermarking. IEEEComputer,2009,43(3):111-113
    [106]刘绪崇,罗永,王建新,等.基于第二代Bandelet变换的图像认证水印算法.通信学报,2010,31(12):123-130
    [107] Yasunori Ishikawa,Kazutake Uehira,Kazuhisa Yanaka.Practical Evaluation ofIllumination Watermarking Technique Using Orthogonal Transforms.Journal ofDisplay Technology,2010,6(9):351-358
    [108] Yasunori Ishikawa,Kazutake Uehira,Kazuhisa Yanaka.Optimization of Size ofPixel Blocks for Orthogonal Transform in Optical WatermarkingTechnique.Journal of Display Technology,2012,8(9):505-510
    [109] Nima Khademi Kalantari,Seyed Mohammad Ahadi,Mansur Vafadust.A RobustImage Watermarking in the Ridgelet Domain Using Universally OptimumDecoder.IEEE Transactions on Circuits and Systems for Vedio Technology,2010,20(3):396-406
    [110] Alfredo Rial,Mina Deng,Tiziano Bianchi,et al.A Provably Secure AnonymousBuyer–Seller Watermarking Protocol. IEEE Transactions on InformationForensics and Security,2010,5(4):920-931
    [111] Chun Hsien Chou,Kuo Cheng Liu. A Perceptually Tuned WatermarkingScheme for Color Images. IEEE Transactions on Image Processing,2010,19(11):2966-2982
    [112]王向阳,杨艺萍,杨红颖.基于小波矩的抗几何攻击数字图像水印算法研究.中国图象图形学报,2010,15(1):15-19
    [113]王春桃,倪江群,卓华硕,等.基于可变形多尺度变换的几何不变鲁棒图像水印算法.自动化学报,2011,37(11):1368-1380
    [114] G. Bhatnagar,B. Raman,Q.M.J Wu.Robust Watermarking Using FractionalWavelet Packet Transform.IET Image Process,2012,6(4):386–397
    [115] Jen Sheng Tsai,Win Bin Huang,Yau Hwang Kuo.On the Selection of OptimalFeature Region Set for Robust Digital Image Watermarking.IEEE Transactionson Image Processing,2011,20(3):735-743
    [116] Yu Hsun Lin,Ja Ling Wu.A Digital Blind Watermarking for Depth-Image–Based Rendering3D Images.IEEE Transactions on Broadcasting,2011,57(2):602-611
    [117] Ehsan Nezhadarya,Z. Jane Wang,Rabab Kreidieh Ward. Robust ImageWatermarking Based on Multiscale Gradient Direction Quantization.IEEETransactions on Inforamtion Forensics and Security,2011,6(4):1200-1213
    [118]林晓丹.基于高斯混合模型的DCT域水印检测方法.自动化学报.2012,38(9):1445-1448.
    [119]叶天语.DWT-SVD域全盲自嵌入鲁棒量化水印算法.中国图象图形学报,2012,17(6):644-650.
    [120]薛胜男,陈秀宏.基于混沌加密和SVD的数字图像水印算法.计算机工程,2012,38(19):107-110.
    [121] I J. Cox,J. Kilian,Tom Leighton,T. Shamoon. Secure spread spectrumwatermarking for images, audio and video.In:Proc of IEEE InternationalConference on Image Processing.Lausanne, Switzerland,1996,243-246
    [122] Mauro Barni,Franco Bartolini,Vito Cappellini,et al.A DCT-domain System forRobust Image Watermarking.Signal Processing,1998,66(1998):357-372
    [123] Edmund Y. Lam,Joseph W. Goodman.A Mathematical Analysis of the DCTCoefficient Distributions for Images.IEEE Transactions on Image Processing,2000,(10):1661-1666
    [124] Pierre Moulin,M. K van M h ak.A Framework for Evaluating the Data-HidingCapacity of Image Sources. IEEE Transactions on Image Processing,2002,11(9):1029-1042
    [125] Jagdish C. Patra,Jiliang E. Phua,Cedric Bornand. A Novel DCT DomainCRT-based Watermarking Scheme for Image Authentication Surviving JPEGCompression.Digital Signal Processing,2010,20(6):1579-1611
    [126] Vassilios Solachidis,Ioannis Pitas. Circularly Symmetric WatermarkEmbedding in2-D DFT Domain. IEEE Transactions on Image Processing,2001,10(11):1741-1753
    [127] Ganic E,Dexter S D,Eskicioglu A M.Embedding Multiple Watermarks in theDFT Somain Using Low and High Frequency Bands.In: Proc of SecuritySteganography and Watermarking of Multimedia Contents VII of SPIE, SanJose, CA,2005,175-184
    [128] J. Kusyk,A. M. Eskicioglu.A Semi-blind Logo Watermarking Scheme for ColorImages by Comparison and Modification by Comparison and Modification ofDFT Coefficients. In: Proc of Security Steganography and Watermarking ofMultimedia Contents VII of SPIE, San Jose, CA,2005,107-121
    [129] Ping D, Jovan G B, Nikolas P G,et al. Digital Watermarking Robust toGeometric Distortions.IEEE Transactions on Image Processing,2005,14(12):2140-2150
    [130] Simitopoulos D,Koutsonanos D E. Robust image watermarking based ongeneralized radon transformations,IEEE Transactions on Circuits and Systemsfor Video Technology,2003,13(8):732-745
    [131] Young Sik Kim,Hyung Kwon,Rae Hong Park.Wavelet based WatermarkingMethod for Digital Images Using the Human Visual System.IEEE ElectronicsLetter,1999,35(6):466-468
    [132] N. Kaewkamnerd,K.R. Rao. Wavelet based image adaptive watermarkingscheme.IEEE Electronics Letter,2000,36(4):312-313
    [133] C.V. Serdean, M.A. Ambroze,M. Tomlinson,et al.DWT-based High-CapacityBlind Video Watermarking, Invariant to Geometrical Attacks.Vision, Imageand Signal Processing, IEE Proceedings,2003,150(1):51-58
    [134] Yongjian Hu,Sam Kwong.Wavelet domain adaptive visible Watermarking.IEEEElectronics Letter,2001,37(20):1219-1220
    [135] Xiangui Kang,Jiwu Huang,Yun Q. Shi,et al. A DWT-DFT CompositeWatermarking Scheme Robust to Both Affine Transform and JPEGCompression. IEEE Transactions on Circuits and Systems for VideoTechnology,2003,13(8):776-786
    [136] Shih-Hao Wang,Yuan-Pei Lin. Wavelet Tree Quantization for CopyrightProtection Watermarking. IEEE Transactions on Image Processing,2004,13(2):154-165
    [137] Lute Kamstra,Henk J. A. M. Heijmans.Reversible Data Embedding Into ImagesUsing Wavelet Techniques and Sorting.IEEE Transactions on Image Processing,2005,14(12):2082-2090
    [138] Wei-Hung Lin,Shi-Jinn Horng,Tzong-Wann Kao,et al. An EfficientWatermarking Method Based on Significant Difference of Wavelet CoefficientQuantization.IEEE Transactions on Multimedia,2008,10(5):746-757
    [139] Prayoth Kumsawat,Kitti Attakitmongcol,Arthit Srikaew.A New Approach forOptimization in Image Watermarking by Using Genetic Algorithms. IEEETransactions on Signal Processing,2005,53(12):4707-4719
    [140] Chun Shien Lu,Hong Yuan Mark Liao.Structural Digital Signature for ImageAuthentication: An Incidental Distortion Resistant Scheme.IEEE Transactionson Multimedia,2003,5(2):161-173
    [141] Voyatzis G,Pitas I. Chaotic Watermarks for Embedding in the Spatial DigitalImage Domain.In:Proc of International Conference on Image Processing,1998,432-436
    [142] XIANG Hui,WANG Lin-dong,LIN Hai,et al. Digital Watermarking Systemswith Chaotic Sequences.In:Proc of Conference on Security and Watermarkingof Multimedia Contents,San Jose, CA,1999,449-457
    [143]刘竹松,陈平华,刘怡俊.混沌数字水印技术研究进展.计算机应用研究,2011,28(1):1-5
    [144] Ingrid Daubechies著,李建平,杨万年译.小波十讲.北京:国防工业出版社,2004,5:56-101,127-143
    [145](美)C. Sidney Burrus, Ramesh A Gopinath, Haitao Guo,等著,程正兴译.小波与小波变换导论.北京:机械工业出版社,2007,10,44-65
    [146](美)Donald B.Percival,Andrew T.Walden,R. Gill程正兴等译.时间序列分析的小波方法.北京:机械工业出版社,2006,3,56-103
    [147] E N Lorenz著,刘式达,刘式适,严中伟译.混沌的本质.北京:气象出版社,1997,198-204.
    [148] Li T Y,Yorke J A.Period three implies chaos.Amer. Math. Monthly,1975,82:985-992
    [149]刘秉正,彭建华.非线性动力学.北京:高等教育出版社,2004,21-35.
    [150]罗启彬.基于混沌理论的遥测信息安全技术研究:[中国工程物理研究院博士学位论文].北京:中国工程物理研究院,2008,22-28.
    [151] Alligood K.T.. Chaos:An Introduction to Dynamical Systems. New York:Springer-Verlag,1997,105-180.
    [152]叶瑞松,陈永洪.基于四维混沌系统的数字图像加密.汕头大学学报(自然科学版),2010,25(3):58-64
    [153]刘云,郑永爱,莫丽丽.基于超混沌系统的图像加密方案.中南大学学报(自然科学版),2009,40(1):121-126
    [154]梅蓉,吴庆宪,姜长生.超混沌系统滑模自适应同步控制及其在保密通信中的应用.应用科学学报,2010,28(2):115-122
    [155] Yang Qigui,Zhang Kangming,Chen Guanrong.Hyperchaotic Attractors from aLinearly Controlled Lorenz System. Nonlinear Analysis: Real WorldApplications,2009,10(3):1601-1617
    [156] Wang Xinyuan,Wang Mingjun. A Chaotic Secure Communication Schemebased on Observer. Communications in Nonlinear Science and NumericalSimulation,2009,14(4):1502-1508.
    [157]毕洪波,张玉波,王秀芳.基于超混沌和DCT理论的数字图像水印算法.计算机仿真,2008,25(10):161-163
    [158]胡海岩.应用非线性动力学.北京:航空工业出版社,2001
    [159] Do M.N.,Vetterli M,The Finite Ridgelet Transform for Image Repressentat-ion.IEEE Transactions on Image Processing,2003,12(1):16-28
    [160] Jean-Luc Starck,Candes E J. The Curvelet Transform for ImageDenoising.IEEE Transactions on Image Processing,2002,11(6),670-684
    [161] Jean-Luc Starck, Fionn Murtagh, Emmanuel J. Candès etal.Gray and ColorImage Contrast Enhancement by the Curvelet Transform. IEEETRANSACTIONS ON IMAGE PROCESSING,2003,12(6):706-717
    [162] Gwo Chin Tai, Long Wen Chang.A Novel Public Digital Watermarking for StillImages Based on Encryption Algorithm.In:Proc of IEEE37th Annual2003International Carnahan Conference on SecurityTechnology,Taibei,2003,264-267.
    [163]曹卫兵,李振叶,戴冠中,等.一种新的数字图像隐藏技术.电视技术,2003,257(11):95-97
    [164] Chaw-Chin Chen.RSA Scheme With MRF And ECC For Data Encryption.In:Proc of2004IEEE International Conference on Multimedia and Expo(ICME),2004,Taibei,947-950
    [165] Li Lizong,Gu Qiaolun,Gao Tiegang,Bi Lei. An Image Authentication andVerification based on Public Key.In:Proc of2009International Conference onArtificial Intelligence and Computational Intelligence,ShangHai,China,2009,389-392.
    [166] Sadasivam Subbarayan,S.Karthick Ramanathan. Effective Watermarking ofDigital Audio and Image using Matlab Technique.In:Proc of2009SecondInternational Conference on Machine Vision, Dubai, UAE,2009,317-319
    [167] Ma Bin,Xu Jian. Electronic Seal System Based on RSA Algorithm andPublic-key Infrastructure. In: Proc of2010International Conference onNetworking and Digital Society,Wenzhou,China,2010,636-639
    [168] M. N. Do,M. Vetterli.Contourlets: A New Directional Multiresolution ImageRepresentation.In:Proc of IEEE International Conference on ImageProcessing(ICIP), Pacific Grove, CA, USA,2002(1),497–501
    [169] M N Do,M. Vetterli.The Contourlet Transform: an Efficient DirectionalMultiresolution Image Representation.IEEE Transactions on Image Processing,2005,14(12):2091-2106
    [170] P J Burt,E H Adelson.The Laplacian Pyramid as a Compact Image Code.IEEETransactions on Communications,1983,31(4):532-540
    [171] R.H.Bamberger,M.J.H.Smith.A filter bank for the directional decomposition ofimages: theory and design.IEEE Trans.Signal Proc,1992,40(4):882-893
    [172]李杏梅.Contourlet变换在图像去噪与边缘检测中的应用研究:[华中科技大学博士学位论文].武汉:华中科技大学,15-23
    [173](美)I.Martin Isaacs.ALGEBRA(英文版).第一版.北京:机械工业出版社,2003,5,326-340
    [174]丘维声.抽象代数基础.第一版.北京:高等教育出版社,2003,11-156
    [175] Hankerson D,Menezes A,Vanstone S.Guide to elliptic curvecryptography.New York, USA:LNCS, Springer-Verlag,2004,153-179
    [176] Lauter, K.The advantages of elliptic curve cryptography for wirelesssecurity.IEEE Wireless Communications,2004,11(1):62-67
    [177] Donoho D.Compressed Sensing.IEEE Transactions on Information Theory,2006,52(4):1289-1306
    [178] E.Candès,J.Romberg, T.Tao.Robust Uncertainty Principles: Exact SignalReconstruction from Highly Incomplete Frequency Information.IEEETransaction on Information Theory,2006,52(2):489-509
    [179] Donoho D,Tsaig Y.Extensions of Compressed Sensing.Signal Processing,2006,86(3):533-548
    [180] E. candes,T. tao.Decoding by linear programming.IEEE Trans. Inf. Theory,Dec.2005,51(12):4203–4215
    [181] Nasser Mourad, James P. Reilly. Minimizing Nonconvex Functions for SparseVector Reconstruction. IEEE Transactions on Signal Processing,2011,58(7):3485-3496.
    [182]甘伟,许录平,苏哲.一种压缩感知重构算法.电子与信息学报,2010,32(9):2151-2155
    [183]刘冰,付平,孟升卫.基于正交匹配追踪的压缩感知信号检测算法.仪器仪表学报,2010,31(9):1959-1964
    [184] WANG Tianjing,YANG Zhen,WU Yejun.Maximum Entropy Function Methodfor Signal Reconstruction in Compressed Sensing. MathematicaApplication,2010,23(2):345-352
    [185]岑翼刚,陈晓方,岑丽辉,等.基于单层小波变换的压缩感知图像处理.通信学报,2010,31(8A):52-55
    [186]石光明,刘丹华,高大化,等.压缩感知理论及其研究进展.电子学报,2009,37(5):1069-1081
    [187]林婉娟.压缩感知重建算法及其在数字水印中的应用:[北京交通大学硕士学位论文].北京:北京交通大学信息科学研究所,2011,31-42
    [188].Xinpeng Zhang,Zhenxing Qian,Yanli Ren,et al.Watermarking with FlexibleSelf-Recovery Quality based on Compressive Sensing and CompositiveReconstruction. IEEE Transactions on Information Forensics and Security,2011,6(4):1223-1232
    [189] Baraniuk R.,Davenport M.,De Vore R, et al.Simple Proof of the RestrictedIsometry Property for Random Matrices.Constructive Approximation,2008,28(3):253–263
    [190] Tropp J A,Gilbert A C.Signal Recovery from Random Measurements viaOrthogonal Matching Pursuit. IEEE Transactions on InformationTheory,2007,53(12):4655-4666
    [191] Needell, D.,J. A. Tropp.CoSaMP: Iterative Signal Recovery from Incompleteand Inaccurate Samples. Applied and Computational Harmonic Analysis,2009,26(3):301-321
    [192] Blumensath, T.,M. Davies.Gradient Pursuits.IEEE Transactions on SignalProcessing,2008,56(6):2370-2382
    [193] Ji Shi-hao,Xue Ya,Carin L.Bayesian compressive sensing.IEEE Transactionson Signal Processing,2008,56(6):2346-2356
    [194] Baron D,Sarvotham S,Baraniuk R G.Bayesian Compressive Sensing via BeliefPropagation.IEEE Transactions on Signal Processing,2010,58(1):269-280
    [195] Irina F. Gorodnitsky,Bhaskar D. Rao. Sparse Signal Reconstruction fromLimited Data Using Focuss: A Re-weighted Minimum Norm Algorithm.IEEETransactions on Signal Processing,1997,45(3):600-616
    [196] Marco Duarte,Mark Davenport,Dharmpal Takhar,et al.Single-pixel imaging viacompressive sampling.IEEE Signal Processing Magazine,2008,25(2):83-91
    [197] M.Lustig, D.L.Donoho,J.M.Santos,et al.Compressed Sensing MRI:A Look atHow CS can Improve on Current Imaging Techniques.IEEE Signal ProcessingMagazine,2008,25(2):72-82
    [198]葛照强著.矩阵理论及其在工程技术中的应用.西安:陕西科学技术出版社,1991,115-136
    [199]张翼,向宏.基于图像归一化的抗几何攻击水印技术.电路与系统学报,2009,14(6):53-58
    [200] C H. Lin,D Y. Chan,H. Su,et al.Histogram-Oriented Watermarking Algorithm:Colour Image Watermarking Scheme Robust Against Geometric Attacks andSignal Processing. Vision, Image and Signal Processing, IEEProceedings,2006,153(4):483-492
    [201]王向阳,杨红颖,侯丽敏.一种新的半脆弱彩色图像数字水印算法.自动化学报,2007,33(6):561-566
    [202]李诺,闫德勤.一种二维DCT彩色图像数字水印的新算法.计算机工程与应用,2007,43(2):43-45
    [203]梁栋,殷兵,于梅,等.基于非抽样Contourlet变换的彩色图像数字水印算法.光学学报,2008,28(8):1469-1474
    [204] Tsz Kin Tsui,Xiao-Ping Zhang,Androutsos, D. Color Image WatermarkingUsing Multidimensional Fourier Transforms.IEEE Transactions on InformationForensics and Security,2008,3(1):16-28
    [205] Liu, K.-C,Chou, C.-H. Robust and Transparent Watermarking Scheme forColour Images. Image Processing, IET,2009,3(4):228-242
    [206]付炜,廖晓玉.基于多通道小波变换的彩色图像数字水印嵌入算法研究.仪器仪表学报,2010,31(4):824-830
    [207] Lowe D G. Distinctive Image Features from Scale-Invariant Keypoints.International Journal of Computer Vision,2004,60(2):91-110.
    [208]何利英,李智勇,刘伟灵等.基于SIFT特征点的抗几何失真数字水印算法.计算机工程与应用,2007,43(13):58-60.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700