用户名: 密码: 验证码:
矿山工程图纸安全防护研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
矿山工程图是矿山设计、施工和生产管理工作中所绘制的一系列图纸,它是采矿企业经营管理和生产指挥的极为重要的技术资料和重要依据。近年来,随着计算机技术、网络技术在矿山企业应用的不断深入,矿山工程图数字化、矿山资料信息化、采矿设计和矿山工程图数字化管理已成为建立现代矿山企业的必备条件,同时也是企业进入数字和信息时代的基本要求和基础建设。然而,数字化作品易于修改、复制和传播的特点,也使得盗版和恶意篡改越来越猖獗,安全问题日趋重要。
     针对矿山工程图设计、绘制、管理中存在的相关问题,结合矿山企业的实际情况,从一定程度上解决了当前矿山工程图嵌入水印容量较小、鲁棒性较差等安全问题。主要工作如下:
     1.结合矿山矿山工程图数字化和数字化矿山工程图管理存在的问题及计算机辅助设计技术的发展特点,引入分形思想,提出了一种无需对工程图数据做修改的全频率无损数字水印实现方法。首先对工程图实施小波变换,变换后的中高频部分采用Bandelet跟踪工程图几何流,将纹理和边缘作为工程图的特征从而构造出工程图高频无损水印参数.对于小波变换的低频部分,通过选取最优的矩阵范数,得到低频系数水印参数生成方案,达到提取工程图统计和边缘特征,对工程图实现全面保护的目的。本算法具有良好的抗攻击能力,能够广泛用于对不可修改数据的保护。
     2.提出两种基于QR (Quick Response)分解的矿山工程图半脆弱水印方案。该方案针对精确定位型半脆弱水印算法的安全性问题,选取与工程图内容密切相关的工程图QR分解作为水印,用混沌系统对其加密来增强水印的安全性。认证时通过水印差值定位工程图被篡改的位置,通过奇异值差值反映被篡改区域的篡改强度。本算法不仅提高了精确定位型水印算法的安全性,而且还可以估计出被篡改区域的篡改强度。
     3.提出一种基于Hadamard抗打印和扫描的矿山工程图水印算法。该算法首先对载体工程图分块并进行筛选,找到适合嵌入水印的块;在嵌入之前,结合SVD (Snayperskaya Vinyovka Dragunov)分解,不同类的块使用不同的量化步长,以此来增强水印的鲁棒性;然后,利用量化的方法将经过水印嵌入到上述块的系数相位中。本算法对常规操作具有鲁棒性,能够检测对内容的恶意篡改,定位能力好,误检和漏检率低,安全性好。
     提出的矿山工程图安全的研究成果,对数字水印技术在矿山工程图安全防护上具有一定的意义。
Mine well engineering map is a serial of drawings made in the process of mining design, operation and production management; it is very crucial technical data and important reference for mine engineering companies'the running managements and production guides. In recent years, as the instant deep application of computer and Internet technology in mine enterprises, the mine well engineering maps are more and more digitalized, the mine data are more and more informationalized, mine project design and mine well engineering maps'digital management has been the essential items in establishing a modern mine enterprise; at the same time, it is also the basic requirements and infrastructure construction in enterprises'enter into the digital and information time. But because the digitalized work is easy to be amended, copied and transferred, which make the piracy and malicious falsification more and more rampantly, the safety matter is becoming more and more important.
     This thesis is based on some of the existing problems in the mine well engineering map's design, drawing combined with mine enterprises' realistic, solve for some degree the current mine project drawing's safety matters such as embedded watermarking capacity limited, lack of robustness. The main wok as below:
     1. This thesis brings in a fractal idea, which based on the existing problems of realization and management to the digitalized mine well engineering map together with the TCAD development characteristics; raise a realization method of complete frequency lossless digital watermarking without amendments to digital data. First make short wave to the drawings, adopt Bandelet to track the drawing geometric flows in the medium-high frequency part, use the texture and edge as the drawing characteristics to make high frequency lossless watermarking parameter. For the short wave low frequency part, get low frequency coefficient watermarking parameter derivative plan by choosing the best normofamatrix, realize image statistics extraction and edge characteristics, and completely protect the images. This algorithm has good performance in anti-attack, could be widely applied in the protection to the un-amendable data.
     2. Two kinds of mine well engineering map semi-fragile watermarking plans have been raised based on the QR (Quick Response) resolution; because the existence of safety problem in accuracy located type semi fragile watermarking algorithm, the thesis chooses the image QR resolution, which is closely related to the image content, as the watermarking, then use the chaotic efficient encryption to strengthen watermarking safety.
     3. The thesis raises a mine well engineering map watermarking algorithm on Hadamard, which is anti-print and scan. The algorithm first divides the carrying images into blocks and makes selection, to have the embeddable watermarking blocks; before the embedment, combined with SVD (Snayperskaya Vinyovka Dragunov) division, apply different quantization step in different kinds of blocks to strengthen watermarking robustness. Then embed the above watermarking into the above blocks' phase by quantization method. This algorithm has robustness in usual practice, could testify the malice falsification to the content, with good location ability, low mistake and missing rate, good safety performance.
     The mine well engineering map safety research results rose in this thesis solves for degree the current watermarking method's capacity limitedness, weak robustness, is meaningful to the application of digital watermarking technology in the mine well engineering map safety.
引文
[I]Cai Z C, Sun W, Xiong C Z. Watermarking of two dimensional engineering graph based on the orthogonal complete U-system[C]. Ninth International Conference on Computer Aided Design and Computer Graphics (CAD/CG005),2005,12 (10), 206-209.
    [2]Kwon K R, Jang B J, Lee E J. Copyright protection of architectural CAD drawing using the multiple watermarking schemes[C]. International Conference on Multimedia and Expo, Taipei,2004,23 (5),871-874.
    [3]Park H K, Lee S H, Kwon K R. Blind watermarking for copyright protection of 3D CAD drawing[C]. Advanced Communication Technology. Phoenix Park, America, 2006,25 (8),253-256.
    [4]Kwon K R, Sohn J S. The watermarking for 3D CAD drawing using line, arc,3D face components[C]. International Conference on Multimedia and Expo. Toronto, 2006,12(10),253-256.
    [5]Kwon K R, Chang H J, Moon K S.3D CAD drawing watermarking based on three components[C]. International Conference on Image Processing. Atlanta, GA,2006, 15(5),1385-1388.
    [6]Ohbuchi R, Masuda H, Aono N. Embedding data in 3D models[C]. Steinmetz R, edl Lecture Notes in Computer Science,1997,43 (5),1-10.
    [7]Ohbuchi R, Masuda H, Aono N. Watermarking three dimensional polygonal models through geometric and topological modification[C]. IEEE Journal of Selected Areas in Communications,1998,16(4):551-560.
    [8]Ohbuchi R, Masuda H, Aono N. Watermarking multiple object types in three. Dimensional models[C]. Proceedings of the Workshop on Multimedia & Security at ACM Multimedia, Bristol,1998,43 (10),83-91.
    [9]Ohbuchi R, Masuda H, Aono N. Data embedding algorithms for geometrical and non-geometrical targets in three-dimensional polygonal models[C]. Computer Communications,1998,21(15):1344-1354.
    [10]Maret Y, Ebrahimi T. Data hiding on 3D polygonal meshes[C]. Proc of ACM Multimedia and Security Workshop, Magdeburg,2004,54(14),68-74.
    [11]Kanai S, Date H. Digital watermarking for 3D polygons using multiresolution wavelet decomposition[C]. Proceedings of International Workshop on Geometric Modeling, Tokyo,1998,16(10),296-307.
    [12]Uccheddu F, Corsini M, Barni M. Wavelet-based blind watermarking of 3D models[C]. Proceedings of the 2004 Multimedia and Security Workshop, Magdeburg,2004,28(1),143-154.
    [13]Yeo B L, Yeung M M. Watermarking 3D objects for verification[C]. IEEE Computer Graphics and Applications,1999,19(1):36-45.
    [14]Fornaro C, Sanna A. Public key watermarking for authentication of CSG models[C]. Computer Aided Design,2000,32(12):727-735.
    [15]Chou C M, Tseng D C.A public fragile watermarking scheme for 3D model authentication [C]. Computer Aided Design,2005,38(11):1154-1165.
    [16]Wang W B, Zheng G Q.A numerically stable fragile watermarking scheme for authenticating 3D models [J]. Computer Aided Design,2008,40(9):634-645.
    [17]Wu H T, Cheung Y M.A fragile watermarking scheme for 3D meshes[C]. Proc of the 7th Workshop on Multimedia and Security. New York,2005,32 (10),117-124.
    [18]Solachidis V, Nikolaidis N, Pitas I. Fourier descriptors watermarking of vector graphics images[C]. Image Processing of International Conference. Vancouver, Canada,2000,32(8),9-12.
    [19]Li Y, Xu L. A blind watermarking of vector graphics images[C]. Computational Intelligence and Multimedia Applications,2003,22 (12),424-429.
    [20]Sonnet H,.Isenberg T, Dittmann J. Illustration watermarks for vector graphics[C]. Proc 1 lth Pacific Conf. Computer Graphics and Applications,2003,32 (3),73-82.
    [21]Gou H, Wu M. Data hiding in curves with application to fingerprinting maps[C]. IEEE Trans Signal Processing,2005,10(53):3988-4005.
    [22]汪亚顺,徐铭政.基于二维工程图的数字水印比例算法[J].南昌大学学报(工科版),2003,25(4):29-31.
    [23]汪亚顺,刘良文,徐铭政.基于二维工程图的数字水印扩频算法[J].南昌大学学报(工科版),2005,27(4):91-94.
    [24]孙伟,齐东旭.基于复数系的工程图数字水印算法[J].中国图象工程图学报(A版特刊),2003,8(A):626-630.
    [25]刘良文,游步东,徐铭政,等.数字水印技术应用于工程图的探索和实现[J].南昌大学学报(工科版),2006,28(3):256-259.
    [26]彭飞,孙星明.一种基于特征的二维工程图信息隐藏算法[J].计算机工程与应用,2007,43(15):54-55.
    [27]黄晓生,顾景文.基于混沌的小波域二维工程图数字水印算法[J].苏州科技学院学报(工程技术版),2006,19(3):77-80.
    [28]黄晓生,顾景文.一种非盲检测的二维工程图数字水印算法.工程图学学报,2006,4(4):158-161.
    [29]温泉,孙锬锋,王树勋.零水印的概念与应用[J].电子学报,2003,12(2):214-217.
    [30]周其东.零水印技术研究[J].计算机安全,2004,5(23):41-42.
    [31]潘西明,刘良文,赵红洲.零水印算法在工程图中的应用实现[J].微计算机信息, 2006,22(10):310-313.
    [32]Du Q Z, Peng F.A Zero-watermark algorithm with real-mean for 2D Engineering graphic[C]. Proc. of the 2008 Intimation Symposium on Electronic Commerce and Security. Guangzhou, China,2008,19(23):890-893.
    [33]刘列夫,莫国良,张三元等.文本分类在工程图中的信息隐藏应用[J].计算机应用,2006,42(12):7-9.
    [34]Ohbuchi R, Masuda H, Aono N. Watermarking multiple object types in three-dimensional models[C]. Proc. of the Workshop on Multimedia & Security at ACM Multimedia.Bristol, U.K.,1991,29(10):83-91.
    [35]张新宇,彭维,张三元.3格数字水印研究进展[J].计算机辅助设计与工程图学学报,2003,15(8):913-920.
    [36]尹康康,潘志庚,石教英.VRML场景中的纹理水印[J].工程图学学报,2000,4(3):126-132.
    [37]尹康康,潘志庚,石教英.一种强壮的网格水印算法[J].计算机辅助设计与工程图学学报,2001,13(2):102-107.
    [38]张静,郑国勤.基于几何特征的三维网格数字水印算法[J].计算机辅助设计与工程图学学报,2005,17(4):740-747.
    [39]王新宇,詹永照.基于矢量长度的三维网格模型公有水印算法[J].江苏大学学报(自然科学版),2008,(3):248-251.
    [40]徐涛,张艳宁.基于固定正交基频谱分析的三维网格模型盲水印算法[J].光电工程,2007,11(4):119-125.
    [41]齐越,舒军,沈旭昆等.一种基于八叉树的三维网格盲水印算法[J].北京航空航天大学学报,2008,34(3):331-335.
    [42]中国煤炭教育协会职业教育教材编审委员会.煤矿地质与矿山工程图[M].北京:煤炭T业出版社,2007.
    [43]吕苗荣.信息提取与矿山信息系统研究开发[D].长沙:中南人学,2003.
    [44]谭建荣,陆国栋,张树有等.CAD方法与技术[M].北京:科学出版社,2005.
    [45]武妍.基于VBA的AutoCAD二次开发系统的研究与应用[D].太原:太原理工大学,2008.
    [46]黄艳丽.广西大厂高峰锡矿三维数字化矿山信息系统的建立及应用研究[D].昆明:昆明理工大学,2008.
    [47]牛建鹏,杨本生,孙利辉.基于AutoCAD的矿山施工图数字化设计方案优化[J].黄金,2009,30(3):41-42.
    [48]千玉琨,涂兴子,康全玉等.矿山工程图CAD开发技术[M].徐州:中国矿业人学出版社,2005.
    [49]Benedens O. Watermarking of 3D polygon based models with robustness against mesh simplification[C]. Proceedings of SPIE:Security and Watermarking of Multimedia Contents, San Jose, California,1999,29(12):329-340.
    [50]Benedens O. Two high capacity methods for embedding public watermarks into 3D polygonal models[C]. Proceedings of the Multimedia and Security-workshop at ACM Multimedia 99, Orlando, Florida,1999,15(7):95-99.
    [51]Benedens, Christoph Busch. Towards Blind Detection of Robust Watermarks in Polygonal Models[C]. EUROGRAPHICS,2000,32(22):892-896.
    [52]N. Abdulaziz and K.K.Pang. Wavelet Transform and Channel Coding for Data Hiding in video[C]. International Conferences on Info-tech and Info-net,2001,29(2): 791-796.
    [53]J. R. Kim, Y. J. Baek, H. K Lee and Y. H. Suh. Robust Mage Watermarking Using Radon Transform and Bispectrum Invariants[C]. Information Hiding 2002,42(23): 145-159.
    [54]G.Peyre. S.Mallat. Surface compression with geometric Bandelets[C]. ACM Transactions on Graphics,2005,24(3):601-608.
    [55]G.Peyre, S.Mallat. Discrete Bandelets with geometric onhogonal filters[C]. Proceedings of Lcip,2005,52(21):345-349.
    [56]Langelaar G C, Setyawan I, Lagendijk R L. Watermarking digital image and video data. A state-of-the-art overview [J]. IEEE Signal Processing Magazine,2000,17(5): 20-46.
    [57]何传江,蒋海军,黄席樾.快速分形工程图编码的一种特征方法[J].电子学报,2004,32(1):1864-1867.
    [58]Zhou Y M, Zhang C, Zhang Z K. An efficient fractal image coding algorithm using unified feature and DCT [J]. Chaos, Solitons and Fractals,2009,39(4):1823-1830.
    [59]Zhou Y M, Zhang C, Zhang Z K. Fast hybrid fractal image compression using an image feature and neural network [J]. Chaos, Solutions & Fractals,2008,37(2): 623-631.
    [60]孙霞,吴自勤.分形原理及其应用[M].北京:中国科学技术大学出版社,2003:53-74.
    [61]Ni Rong-rong, Ruan Qiu-qi. An adaptive watermarking based on iteration mapping and image content [J]. Journal of China Institute of Communications,2004,25(5): 182-189.
    [62]Zhage Ran, Chen Xiang-dong. A digital watermarking technique based on wavelet transform[J]. Journal of China Institue of Communications,2004,25(2):125-130.
    [63]Zhang Da-qi, Zhang Yong-hong, Kang Bao-sheng. Digital image information hiding technology based on RB curve blending [J]. Journal of Image Graphics,2006,11(2): 235-243.
    [64]Huang Ji-wu, Shi Y Q, Yao Ruo-he. Adaptive image watermarking based on block classification [J]. Journal of Image Graphics,1999,4(8):640-643.
    [65]Joo S H, Suh Y H, Shin J H, et al. A new robust watermark embeddeing into wavelet DC component [J]. ETRI Journal,2002,124(5):401-421.
    [66]Pan Rong, Gao You-xing. Image watermarking method based on wavelet transform [J]. Journal of Image and Graphics,2002,7(7):667-671.
    [67]Xiang De-sheng, Xiong Yue-shan, Zhu Geng-ming. An image adaptive Gray-scale watermarking embedding and extracting algorithm based on visual system [J]. Journal of Image Graphics,2006,11(7):1026-1035.
    [68]K.Maeno. Q.Sun, Sh.-F.Chang, et al. New Semi-Fragile Image Authenticaion Watermarking Techniques Using Random Bias and Non-Uniform Quantization[C]. Proceedings of SPIE on Security and Watermarking of Multimedia Contents, San Jose, California USA,2002,46(57):659-670.
    [69]Lin P L. Digital watermarking models for resolving rightful ownership and authenticating legitimate custome[C]r. J. System and Software,2001,55(3):26-271
    [70]Wang Y, Doherty J F and Van Dyck R E. A wavelet-based watermarking algorithm for ownership verification of digital image[C]. IEEE trans. On Image Processing, 2002,11(2):77-88.
    [71]X.Zhou, X.Duan and D.Wang. A Semi-Fragile Watermark Scheme for Image Authentication[J]. Proceedings of the 10th International Multimedia Modeling Conference. Brisbane Australia,2004,34(2):541-545.
    [72]Kutter M and Winkler S. A vision-based masking model for spread spetrum image watermarking[C]. IEEE trans. Image Processing,2002,11(1):16-25.
    [73]Chen B. Design and analysis of digital watermarking, information embedding, and data hiding systems[C]. Ph. D Thesis, Massachusetts Institute of Technology, Cambridge, MA,2000,21(29):209-213.
    [74]Nikolaidis A and Pitas I. Region-based image watermarking[C]. IEEE trans. On Image Processing,2001,10(11):1726-1740.
    [75]Nikolaidis A and Pitas I. Robust watermarking of facial image based on salient geometric pattern matching[C]. IEEE tans. On Multimedia,2000,2(3):172-184.
    [76]Quan Liu, Xuemei Jiang, Zude Zhou. A unified digital watermark algorithm based on singular value decomposition and spread spectrum technology[C]. Chinese Journal of Electronics,2005,14(4):621-624.
    [77]Delaigie J F, De Vleeschouwer D and Macq B. Low cost perceptive digital picture watermarking method[C]. Proc. ECMAST'97, Milan, Italy,2007,31(21):153-167.
    [78]Macq B, Delaigie J F and De Vleeschouwer D. Digital watermarking. [C] Optical Security and Counterfeit Deterrence Technique,2006,19(29):99-110.
    [79]Kutter M, Jordan F and Bossen F. Digital signature of color image using amplitude modulation[C]. J. Electron. Imaging,2007,7(2):326-332.
    [80]Koch E and Zhao J. towards robust and hidden image copyright labeling[C]. IEEE Workshop on Nonlinear Signal and Image Processing. Neos Marmaras, Greece, June 2005,18(2):123-132.
    [81]Koch E and Zhao J. Towards robust and hidden image copyright labeling[C]. IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras, Greece, 2002,31(21):431-434.
    [82]聂守平,魏晓燕.数字工程图的奇异值分解[J].南京师大学报(自然科学版),2001,vol 24(1):59-61
    [83]Dittmann J, Arnd Steinmetz Ralf Steinmetz. Content-based digital signature for motion pictures authentication and content-fragile watermarking[C]. ICMCS,2004, 2(16):209-213.
    [84]Qiao L and Nahrstedt K. Watermark schemes and protocols for protecting rightful ownership and customer's rights [J], J. Vis. Commun. Image Presentation.2008, 9(3):194-210
    [85]Servetto S D. Podilchuk C.I. and Ramachandran K., Capacity issues in digital watermarking[C]. IEEE ICIP, Chicago, Illinois,2008,8(1):445-448.
    [86]宋玉杰,刘瑞祯,谭铁牛等.数字水印技术在印刷品防伪中的应用[J].中国图象工程图学报,2001,6(5):450-454.
    [87]陈海生.印刷工程图水印防伪算法的研究[D].西安:西安理工大学,2005,14-41.
    [88]张静,张春田.能抗打印——扫描过程的数字工程图水印算法[M].全国第三届信息隐藏学术研讨会论文集.西安:机械工业出版社,2001,151-157.
    [89]C.Y. Lin. Public Watermarking Surviving General Scaling and Cropping:An Application for Print-and-Scan Process[C]. Multimedia and Security Workshop at ACM Multimedia. Orlando,1999,12(4):120-124.
    [90]C.Y. Lin, S.F. Chang. Distortion Modeling and Invariant Extraction for Digital Image Print-and-Scan Process[C]. International Symposium on Multimedia Information Processing. Taipei,1999,18(26):156-159.
    [91]李刚,杨杰.一种基于二值印刷工程图的数字水印方案[J].上海交通大学学报,2005,39(4):570-573.
    [92]T. Mizumoto, K. Matsui. Robustness investigation of DCT digital watermark for printing and scanning[C]. Electronics and Communications. Japan,2003,86(4): 11-19.
    [93]牛少彰,钮心忻,杨义先等.半色调工程图中数据隐藏算法[J].电子学报,2004,32(7):1180-1183
    [94]牛少彰,伍宏彰,谢正程.抗打印扫描数字水印算法的鲁棒性[J].中山大学学报(自然科学版),2004,43(2):1-4.
    [95]A.M. Alattar. Smart Image Using Digimarc's Watermarking Technology. IS&T/SPIE's 12th International Symposium on Electronic Imaging. San Jose, California,2000,3971(25),23-28
    [96]Hsu Chiou-Ting, Wu Ja-Ling. Hiding digital watermarks in image[C]. IEEE Trans. On Image Processing,2004,8(1):58-68.
    [97]Tirkel A, Rankin G., Schyndel R van, Ho W, Mee N and Osbome C. Electronic watermark[C]. Proceedings DICTA 2003,12(2):666-672.
    [98]Zhao J and Koch E. Embedding robust labels into images for copyright protection. International Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, Vienna, Austria,2005,23(9):490-495.
    [99]Alp Vision. http://www. alpvision. com. Switzerland,2000.
    [100]O.Ruanaidh J J K, Dowling W K and Boland F M. Watermarking digital image for copyright protection[C]. IEEE Proceedings on Signal and Image Processing.1996, 143(4):250-256.
    [101]Craver S, Memin N, Yeo B L, Yeung M. Resolving rightful ownerships with invisible watermarking techniques:limitations, attacks, and implications[J]. IEEE Journal on Selected Areas in Communications,1998,64(4):573-586.
    [102]Zeng W and Liu B. A statistical watermark detection technique without using original image for resolving rightful ownerships of digital images[C]. IEEE Trans. On Image Processing,1999,8(11):1534-1548.
    [103]潘文林,刘慧洁等译.扫描与半色调处理第二版[M].北京:清华大学出版社,2000,5(9):157-211.
    [104]Wolfgang R B and Delp E J. A watermark for digital images[C]. Proc. IEEE Int. Conference on Image Processing, Lausanne, Switzerland,2006,39(3):219-222.
    [105]Hemandez J J, Perez-Gonzalez F, Rodrigez J M. And Nieto G.. Performance analysis of a 2-Dmultipulse amplitude modulation scheme for data hiding and watermarking still images[C]. IEEE Journal on Selected Areas of Communications, 2008,16(4):510-524.
    [106]陈萍.鲁棒的印刷工程图水印研究:[D].北京:北京交通大学,2006.
    [107]Swanson M D, Zu B and Tewifik A. H. Robust data hiding for images[C]. IEEE 7th Digital Signal Processing Workshop, Loen, Norway,2006,21(39):37-40.
    [108]Burgett S, Koch E and Zhao J. A novel method for copyright labeling digitized image data[C]. Fraunhofer 1nst, Comput. Graphics, Darmstadt, Germany, Tech. Rep.,1994,36(7):320-323.
    [109]Tao B and Dickinson B. Adaptive watermarking in the DCT domain[C]. Proc. IEEE International Conference on Image Processing, Lausanne, Switzerland,1996,25(8): 236-239.
    [110]Cox I J and Miller M L.A review of watermarking and the importance of perceptual modeling[C]. Proc. SPIE 3016:Human Vision and Electronic Image Ⅱ, San Jose, California, Journal on selected areas in communication,1998,16(4):525-539.
    [111]Wolfgang R B, Podilchuk C I and Delp E J. Perceptual watermarks for digital images and video[C]. Proc. IEEE,2004,87(7):1108-1126.
    [112]Piva A., Bartoloni E and Cappellini V. DCT-based watermarking recovering without resorting to the uncorrupted original image[C]. Proc. IEEE Internatinal Conference on Image Processing, Santa Barbara, CA, USA,23(1):520-524.
    [113]Wong P W. A public key watermark for image verification and authentication[C]. Proc. ICIP,2003,9(1):76-80.
    [114]Wong P W. Secret and public key image processing[C],2005.
    [115]Wong P W. A watermark for image integrity and ownership verification[C]. Portland OR:Proc. Of IS& PIC Conf.,2007,37(16):231-235.
    [116]刘瑞祯,谭铁牛.基于奇异值分解的数字工程图水印算法[J].电子学报,2001,7(2):168-171.
    [117]彭工华.小波变换与工程应用[M].北京:科学出版社,1999,8-46.
    [118]勒济芳Visual C++小波变换技术与工程实践[M].北京:人民邮电出版社,2004,58-76.
    [119]刘九芬,黄达人,胡军全.数字水印中的正交小波基[J].电子与信息学报,2003,(4):453-459.
    [120]董刚,张良,张春田.一种半脆弱性数字水印算法[J].通信学报,2003,24(1):33-38.
    [121]Fridrich J, Goljan M and Baldoza A C. New fragile authentication watermark for images[C]. Proc. ICIP, Vancouver, Canada,2004,17(3):446-449.
    [122]Nopporn and Sangiamkun W. Digital watermarking technique for image authentication by neighboring block similarity measure[C]. Proc. IEEE Region 10 International on Electrical and Electronic Technology,2003,14(23):734-747.
    [123]P. H. W. Wong, O. C. Au. A novel blinds multiple watermarking technique for images. [C] IEEE Trans on Circuits and Systems for Video Technology.2003,13(8): 813-830.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700