用户名: 密码: 验证码:
栅格地理数据数字水印模型与算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
栅格地理数据是地理空间数据的主要组成部分之一,其在国民经济、国防建设、人类生活中发挥着重要的作用。随着栅格地理数据的“数字化”和“网络化”进程不断加快,栅格地理数据的安全问题也变得日益严峻,数据安全事故层出不穷,诸如数据泄密、版权侵犯、非法使用和分发等现象屡禁不止。而仅仅依靠传统的数据安全技术和当前法律法规,并不能有效遏制诸如此类的数据安全事故。
     作为新兴的信息安全前沿技术,数字水印技术在栅格地理数据安全领域发挥着越来越重要的作用。基于此需求驱动,本论文结合栅格地理数据特点、精度特征和应用要求等,运用相关数学工具,对栅格地理数据数字水印技术进行了深入的研究。论文具体的研究成果如下:
     (1)结合栅格地理数据特点,分析了栅格地理数据数字水印技术的特征,重点剖析了图像水印技术与栅格地理数据水印技术的主要区别,总结了栅格地理数据水印攻击方式,探讨了不同水印攻击方式对栅格地理数据水印算法产生的影响及其对策。
     (2)提出了两种二值栅格地理数据水印算法。结合二值栅格地理数据的水印嵌入特征,引入游程长度编码思想,通过修改编码数据的游程长度,提出一种基于游程长度的二值栅格地理数据水印算法;通过分析几何变换过程中分块栅格地理数据的变化特征,提出了抗几何变换的二值栅格地理数据水印算法。较好的解决了当前二值栅格地理数据水印容量低和算法鲁棒性较差等问题。
     (3)建立了精度可控的栅格地理数据变换域水印模型。从变换域水印算法的设计角度考虑,结合灰度级/彩色级栅格地理数据的特点,构建了一种精度可控的适应于变换域的栅格地理数据水印嵌入和提取/检测模型,对于栅格地理数据变换域水印算法的设计具有较好的参考和指导意义。然后在所提出模型的指导下,设计并实施了一种基于小波变换的栅格地理数据水印算法。
     (4)针对栅格地理数据拼接处理和切割处理过程中的水印特征,设计了相应的水印方案。在所提出模型的指导下,以进一步提高算法鲁棒性和降低最大水印误差为目标,提出了一种抗几何变换的栅格地理数据变换域水印算法;并以此为原型算法,引入四叉树分块递归判断的思想,设计了一种抗拼接处理的栅格地理数据水印检测方法;最后,基于栅格地理数据的精度特征,提出了一种适合于小尺寸栅格地理数据的抗切割处理水印算法。
     (5)构建了面向多级分发的栅格地理数据水印模型。在对地理空间数据多级分发的现状及其存在的安全隐患进行深入总结和分析的基础上,构建了一种较理想的面向多级分发的栅格地理数据水印模型,此模型主要对多级分发中的栅格地理数据文件访问权限控制、流向标识、多版权保护、使用跟踪等问题予以考虑和解决。
     (6)建立了一种基于字节流的栅格地理数据水印算法。在充分剖析数据加密技术与数字水印技术各自优缺点的基础上,结合栅格地理数据的存储和流通特性,将数据加密思想引入到水印算法的设计中,建立了一种基于字节流的栅格地理数据水印算法。较好地解决了面向多级分发的栅格地理数据水印模型中对数据流向标识、使用权限控制等问题。
     (7)设计了三种栅格地理数据多级水印算法。采用量化区间分区的策略,设计了基于量化分区的栅格地理数据多级水印算法;采用水印信息分段的策略,设计了基于水印信息分段的栅格地理数据多级水印算法;采用栅格地理数据分块的策略,设计了基于数据分块的栅格地理数据多级水印算法。所设计的水印算法较好地解决了面向多级分发的栅格地理数据水印模型中对数据多级版权保护、使用跟踪等问题。
     (8)基于所研究的水印模型与算法,采用面向对象思想进行设计与开发,同时面向接口编程,实现了栅格地理数据水印原型系统。
Raster Geographic data, a main part of geo-spatial data, plays an important role in thenational economy, national defense construction and human life. With the accelerating process ofraster geographic data digitalization and network, its security problem has become increasinglyserious, data security incidents emerge in an endless stream, such as data leakage, illegal usage,copyright infringement and so on. However, rely solely on traditional data security technologyand the current laws and regulations, suchlike phenomenon cannot be effectively curbed.
     As a rising frontier technology in the information security field, the digital watermarkingtechnology is becoming more and more crucial in the security area of raster geographic dataprotection. Based on this demand-driven, combining with the data feature, precisioncharacteristics and application requirements of raster geographic data, applying some pertinentmathematical tools, in-depth research on raster geographic data digital watermark technologywas conducted in this paper. The specific research results are as follows:
     (1) In combination with the characteristics of raster geographic data, the feature of digitalwatermarking technology for raster geographic data was analyzed, which focused on the majordifference between the natural image watermarking technology and the raster geographic datawatermarking technology. The attacking methods of raster geographical data watermarking weresummed up, their different effects on the raster geographic data watermarking algorithm and thecorresponding countermeasures were explored.
     (2) Two kinds of binary raster geographic data watermarking algorithm were proposed.Based on the characteristics of binary raster data watermarking embedding, by introducing theidea of Run-Length Encoding (RLE) and modifying the run length of the encoded data, a binaryraster geographic data watermarking algorithm based on the run length was proposed. Byanalyzing the variation characteristics of the blocking raster data in the geometric transformationprocess, an anti-geometric transformation binary raster geographic data watermarking algorithmwas presented. The two algorithms effectively solved the problems of the low watermarkingcapacity and the poor robustness of current binary raster geographic data watermarkingalgorithms.
     (3) A watermarking model for transform domain raster geographic data was established.From the design perspective of transform domain watermarking algorithm, combining with thecharacteristics of raster geographic data, a new watermarking embedding and detection modelfor raster geographic data was built, which adapted to the transform domain, being of goodreference and guidance significance for the design of transform domain raster geographic datawatermarking algorithm. Under guidance of the proposed model, a raster geographic data watermarking algorithm based on wavelet transform was designed and implemented.
     (4) Based on the watermarking feature of raster geographic data in the splicing and cuttingprocess, a corresponding watermarking algorithm was proposed. Under the direction of themodel advanced, aiming to further improve the algorithm robustness and reduce the maximumwatermarking error, a robust watermarking algorithm for geometric transformation for rastergeographic data in transform domain was presented; then taking it as a prototype algorithm andintroducing the idea of quad-tree block recursive judgment, an anti-splicing raster geographicdata watermarking detection method was designed; finally, an anti-cutting raster geographic datawatermarking algorithm was proposed based on the precision characteristics of raster geographicdata.
     (5) Oriented to multi-level distribution, a raster geographical data watermarking modelwas constructed. Based on the in-depth summary and analysis of the status of geospatial datamulti-level distribution and its security risks, an ideal multi-level distribution oriented rastergeographical data watermarking model was constructed, which preferably solved the problemssuch as the flow direction identifier of raster geographic data, file access control, data copyrightprotection and use track in the multi-level distribution process.
     (6) A byte stream-based raster geographic data watermarking algorithm was established.Based on the fully dissection of the respective advantages and disadvantages of data encryptiontechnology and digital watermarking technology, combining with the storage and flowcharacteristics of raster geographic data and introducing the data encryption idea into the designof watermarking algorithm, a byte stream-based raster geographic data watermarking algorithmwas built. The algorithm provides a good solution for the flow direction identifier of rastergeographic data in the multi-stage circulation process, the access control and other issues.
     (7) Three kinds of multi-level watermarking algorithm for raster geographic data wereproposed. Adopting the quantization interval division strategy, the watermarking informationsegmentation strategy and the raster geographic data blocking strategy respectively, accordingly,a quantization division-based, a watermarking information segmentation-based and a datablocking-based multi-level watermarking algorithm for raster geographic data was proposed.Those three watermarking algorithms effectively solved the data multi-stage copyright protection,flow direction tracking and other problems in the multi-level distribution oriented rastergeographic data watermarking model.
     (8) On the basis of the studied watermarking models and algorithms, using theobject-oriented thought in the designing and developing process and adopting the interface-oriented programming, a watermarking prototype system for raster geographic data wasperformed.
引文
[1]王家耀.空间信息系统原理[M].北京:科学出版社,2004.
    [2]何建邦,闾国年,吴平生.地理信息共享的原理与方法[M].北京:科学出版社,2003.
    [3]朱长青,杨成松,任娜.论数字水印技术在地理空间数据安全中的应用[J].测绘通报,2010,10:1-3.
    [4] C.E SHANNON.Communication Theory of Secrecy System[J].Bell System technical Journal,1949,28(4):656-715.
    [5]冯登国.密码学原理与实践[M].北京:电子工业出版社,2009.
    [6]孙圣和,陆哲明,牛夏牧.数字水印技术与应用[M].北京:科学出版社,2004.
    [7]杨义先,钮心忻.数字水印理论与技术[M].北京:高等教育出版社,2006:10-25.
    [8]钟桦,张小华,焦李成.数字水印与图像认证-算法及应用[M].西安:西安电子科技大学出版社,2006:23-25.
    [9]钮心忻.信息隐藏与数字水印[M].北京:北京邮电大学出版社,2004:117-131.
    [10]张春田,苏育挺.信息产品的版权保护技术―数字水印[J].电信科学,1998,14(12):15-17.
    [11]田乐,李宇.一种基于数字水印的媒体自动识别技术[J].计算机应用,2007,27(10):2461-2463.
    [12]Voyatzis G,Pitas I. The use of watermarks in the protection of digital multimediaproducts[C]. Proceedings of IEEE,1999,87(7):1197-1207.
    [13]魏鹏.基于DSP的数字视频水印技术的研究[D].福建:福建师范大学,2005.
    [14]崔东峰.压缩域视频水印方法研究[D].沈阳:辽宁师范大学,2005.
    [15]吴柯.一种基于DCT系数的数字视频水印方法[J].现代计算机.2007,(253).
    [16]Ro P D.V.A.R. Digital Watermarking Scheme for Video Copyright Protection in the WaveletDomain[J]. MEASUREMENT.2010,43(10):1720-1726.
    [17]S.K.Lee,Y.S.Ho.Digital Aodio Watermarking in the Cepstrum Domain[J].IEEE TransactionsConsumer Electronics,Oct.2000,46(3):744-750.
    [18]H.J.Kim.Audio Watermarking Techniques.Pacific Rim Workshop on Digital Steganography,Kyushu Institue of Technology[J].Japan,2003:3-4.
    [19]Swanson M. D,Kobayashi M,Tewfik A. H. Mutlimedia data Embedding and watermarkingtechniques[J]. Proceedings of the IEEE,1998,86(6):1064-1087.
    [20]D.Y.Shih,S.Y.T.Wu.Combinational Image Watermarking in the Spatial and FrequencyDomains[J].Pattern Recognition2003,36(4):969-975.
    [21]王秋生,孙圣和.基于量化数字音频信号频域参数的水印嵌入算法[J].声学学报,2002,27(4):379-385.
    [22]孙圣和,王秋生.数字音频信号的脆弱水印嵌入算法[J].计算机学报,2002,25(5):520-525.
    [23]李京兵.一种可抗几何攻击的二值文本图像数字水印算法[J].海南大学学报自然科学版,2006,24(2):137-143.
    [24]孙建国,门朝光,俞兰芳,曹刘娟.矢量地图数字水印研究综述[J].计算机科学,2009,36(9):11-16.
    [25]杨成松,朱长青.基于常函数的抗几何变换的矢量地理数据水印算法[J],测绘学报,2011,2(40):256-261.
    [26]N.Nikolaidis,I.Pitas,V.Solachidis.Fourier descriptors watermarking of vector graphicsimages[C].Proceedings of the International Conference of Image Processing.Vancouver,Canada,2000,3:10-13.
    [27]钟尚平,高庆狮.矢量地图水印归一化相关检测的可行性分析与改进[J].中国图象图形学报,2006,11(3):401-409.
    [28]闵连权.一种鲁棒的矢量地图数据的数字水印[J].测绘学报,2008,37(2):262-267.
    [29]杨成松.矢量地理数据数字水印模型与算法研究[M].郑州:信息工程大学,2011.
    [30]V.Solachidis, N.Nikolaidis, I.Pitas. Watermarking Polygonal Lines Using FourierDescriptors[J].IEEE Computer Graphics and Applications,vol.24,3:44-51.
    [31]M.Voigt,B.Yang,C.Busch.Reversible watermarking of2D-vector data[C].Proceedings ofthe2004Multimedia and Security Workshop on Multimedia and Security,Magdeburg. Germany.2004:160-165.
    [32]任娜.遥感影像数字水印算法研究[M].南京:南京师范大学,2011.
    [33]王向阳,杨红颖,邬俊.基于内容的离散余弦变换域自适应遥感图像数字水印算法[J].测绘学报,2005,34(4):324-330.
    [34]王贤敏,关泽群,吴沉寒.遥感影像高逼真度二维信息隐藏盲算法[J].计算机工程与应用,2004,13:2-5.
    [35]I.B.Ismail, I.R.Farah, M.B.Ahmed. Satellite images watermarking based on wavelettechnique[C].Second Information and Communication Technologies,2006,1:1988–1993.
    [36]符浩军,朱长青,李永练等.抗几何变换的二值栅格地图盲水印算法[J].《测绘科学技术学报》,2013,30(1):91-94.
    [37]王勋,朱夏君,鲍虎军.一种互补的数字栅格地图水印算法[J].浙江大学学报:工学版,2006,40(6):1056-1059.
    [38]何密,罗永,成礼智.数字高程模型数据的无损数字水印[J].计算机工程与应用,2007.43(30):40-43.
    [39]刘水强,陈继业,朱鸿鹏.基于经验模式分解的数字高程模型数据伪装方法[J].武汉大学学报:信息科学版,2008.33(6):652-655.
    [40]王志伟.DEM数字水印模型与算法研究[M].郑州:信息工程大学,2011.
    [41]闾国年,刘爱利.数字水印技术的DEM版权保护适用性研究[J].遥感学报,2008(5):810-818.
    [42]A Z Tirkel,G A Rankin,R M van Schyndel et al.Electronic Watermark.DICTA-93MacquarieUniversity,Sydney,1993-12:666-672.
    [43]Schyndel R G van,Tirkel A Z,Osborne C F.A digital watermark[C].First IEEE InternationalImage Processing Conference,1994,2:86-90.
    [44]P.W.Wong.A Public Key Watermark for Image Verification and Authentication[C].InternationConference on Image Processing,1998,1:455-459.
    [45]A.Garimella,M.V.V.Satyanaeayana,R.Satish Kumar,P.S.Murugesh,U.C.Niranjan.VLSIImplementation of Online Digital Watermarking Technique with Difference Encoding for8-bitGray Scale Images[C].16th Intermational Conference on VLSI Design,2003:283-288.
    [46]Q.Z.Wu,H.Y.Cheng,Y.W.Lin,S.Y.Lee.Trust-worthy Video Enforcement for Electtronic Tollcollection.Digest of Technical Papers[C]. International Conference on ConsumerElectronics,2000:112-113.
    [47]S.C.Byun,I.L.Lee,T.H.Shin,B.H.Ahn.A Pubilc-key Based Watermarking for Color ImageAuthentication[C].IEEE International Conference on Multimedia and Expo,2002,1:593-596.
    [48]邵利平,覃征,衡星辰.一种基于图像置乱变换的空域图像水印算法[J].计算机工程,2007,33(2):122-124.
    [49]Low C,Teoh A B,Tee C.Fusion of Lsb and Dwt Biometric Watermarking Using Offline HandwrittenSignature for Copyright Protection[C].Lecture Notes in Computer Science,2009:786-795.
    [50]Lee G,Yoon E,Yoo K.A New Lsb Based Digital Watermarking Scheme with Random MappingFunction[J].2008:130-134.
    [51]Q.M.Ge,Z.M.Lu,X.M.Niu.Oblivious Video Watermarking Scheme with Adaptive EmbeddingMechanism[C].The Second International Conference on Machine Learning and Cybernetics,2003:2876-2881.
    [52]何冰,王晅.基于Radon变换不变矩的鲁棒性数字水印技术[J].计算机工程与应用,2010,46(9):98-101.
    [53]陈中,刘昌荣,旷海兰.基于Arnold变换的改进LSB水印嵌入方法研究[J].衡阳师范学院学报,2010,31(3):67-70.
    [54]W.Bender,D.Gruhl,N.Morimoto.Technique for Data Hiding[C].Proceedings of the SPIE2420,1995:164-173.
    [55]D.Coltuc,P.Bolon.Watermarking by Histogram Specification[C].Proceedings of the SPIE,Security and Watermarking of Multimedia Contents,1999,3657:252-263.
    [56]D.Coltuc,P.Bolon.Robust Watermarking by Histogram Specification[C].InternationalConference on Image Processing,1999:236-239.
    [57]D.Coltuc, J.M.Chassery, P.Bolon. Image Authentication by Exact HistogramSpecification[C].IEEE Fourth Workshop on Multimedia Signal Processing,2001:499-504.
    [58]H.Cheng,M.A.Isnardi.Spatial Temporal and Histogram Video Registration for DigitalWatermark Detection[C].International Conference of Image Processing,2003:735-738.
    [59]P.M.Cheng,A Robust Digital Watermarking Based on A Statistic Approach[C].InternationalConference on Information Technology:Coding and Computing,2000:116-121.
    [60]N.Nikolaidis,I.Pitas.Robust Image Watermarking in the Spatial Domain[J].SignalProcessing,1998,66(3):385-403.
    [61]R.Chandramouli,N.Memon.How Many Piexls to Watermark[C].International Conference onInformation Technology:Coding and Computing,2000:11-15.
    [62]A.K.Bhattacharjya,H.Ancin.Data Embedding in Text for A Copier System[C].InternationalConference on Image Processing(ICIP`99),1999,2:245-249.
    [63]M.Wu,E.Tang,B.Lin.Data Hiding in Digital Binary Image[C].IEEE International Conferenceon Multimedia and Expo,2000,1:393-396.
    [64]H.P.Lu, A.C.Kot, J.Cheng. Secure Data Hiding in Binary Document Images forAuthentication[C]. Proceeding of the2003International Symposium on Circuits andSystems(ISCAS`03),2003,3:806-809.
    [65]A.Tefas,I.Pitas.Robust Spatial Image Watermarking Using Progressive Detection[C].IEEEInternational Conference on Acoustics, Speech, and Signal Processing(ICASSP`01),2001,3:1973-1976.
    [66]A.Tefas,G.Louizis,I.Pitas.3D Image Watermarking Robust to Geometric Distortions[C].IEEEInternational Conference on Acoustics,Speech,and Signal Processing(ICASSP`01),2002,4:3465-3468.
    [67]G.Louizis,A.Tefas,I.Pitas.Copyright Protection of3D Images Using Watermark of SpecialSpatial Structure[C].IEEE International Conference on Multimedia and Expo(ICME`02),2002,2:557-560.
    [68]V.Solachidis, N.Nikolaidis, I.Pitas. Watermarking polygonal Lines Using FourierDescriptors[C].IEEE International Conference on Acoustics,Speech,Signal Processing,2000,4:1955-1958.
    [69]I.Kitamura,S.Kanai,T.Kishinami.Copyright Protection of Vector Map Using DigitalWatermarking Method based on Discrete Fourier Tranform[C].IEEE2001IntermationalGeoscience and Remote Sensing Symposium(IGARSS`01),2001,3::1191-1193.
    [70]V.Solachidis,N.Nikolaidis,I.Pitas.Fourier Descriptors Watermarking of Vector GraphicsImages[C].International Conference on Image Processing,2000,3:9-12.
    [71]A.Piva,F.Bartolini,L.Boccardi,V.Cappellini.Watermarking Through Color Image BandsDecorrelation[C].IEEE International Conference on Multimedia and Expo(ICME`2000),2000,3:1283-1286.
    [72]P.Thitimajshima,Y. Thitimajshima.Hiding Confidential Signature into Digital Images viaFrequency Domain[C].Proceedings of IEEE Region10International Conference on Electricaland Electronic Technology,2001,1:246-249.
    [73]J.J.K.O.Ruanaidh, W.J.Dowling, F.M.Boland. Phase Watermarking of DigitalImages[C].Proceedings of the1996International Conference on Image Procedding,1996,3:239-242.
    [74]孟岚,杨红颖,王向阳.基于图像归一化的DFT域数字水印嵌入算法[J].小型微型计算机系统,2008,29(11):2153-2156.
    [75]叶吉祥,陈琪,荆东星.基于傅立叶域的有意义图像数字水印算法[J].计算机工程与科学,2009,31(11):49-51.
    [76]王向阳,侯丽敏,邬俊.基于图像特征点的强鲁棒数字水印嵌入方案[J].自动化学报,2008,31(1):1-6.
    [77]桑军,向宏,胡海波.采用量化嵌入的二元纯位相滤波器图像水印[J].计算机工程与应用,2009,45(13):84-86.
    [78]李永宁,钟小莉,谢曼曼.基于Arnold置乱和离散傅立叶变换的图像加密算法[J].唐山师范学院学报,2010,32(2):73-75.
    [79]王秋生,孙圣和.一种数字音频信号的水印嵌入新算法[J].声学学报,2001,26(5):464-467.
    [80]J.W.Huang,Y.Q.Shi.Embedding Gray Level Images[C].The2001IEEE International Symposiumon Circuits and Systems(ISCAS`2001),2001,5:239-242.
    [81]H.S.Song,N.I.Cho,J.W.kim.Robust Watermarking of3D mesh Models[C].2002IEEE Workshopon Multimedia Signal Processsing,2002:332-335.
    [82]M.A.Suhail, M.S.Obaidat. Digital Watermarking-based DCT and JPEG Modal[J]. IEEETransactions on Instrumentation and Measurement,2003,52(5):1640-1647.
    [83]毛万欣,卢正鼎.一种基于DCT变换的自适应水印算法[J].计算机工程与科学,27(7):43-45(5).
    [84]贝依林,桑胜举.基于HVS的多通道DCT彩色图像水印算法[J].计算机应用,2009,29(12):3431-3433.
    [85]陆萍,董虎胜,马小虎.一种彩色图像的自适应灰度级数字水印算法[J].计算机应用与软件,2010,27(5):102-104.
    [86]李昊,吕建平,杨芳芳.基于正负量化的DCT域数字图像盲水印算法研究[J].计算机工程与应用,2011,47(5):186-187.
    [87]Y.P.Wang,M.J.Chen,P.Y.Cheng.Robust Image Watermark with Wavelet Transform and SpreadSpectrum Techniques[C].Conference Record of the Thirty-Fourth Asilomar Conference onSignals,systemand Computer,2000,2:1846-1850.
    [88]J.Yang,M.H.Lee,X.H.Chen.Mixing Chaotic Watermarks for Embedding in Wavelet TransformDomain[C].IEEE International Symposium on Circuits and Systems(ISCAS`2002),2002,2:668-671.
    [89]潘蓉,高有行.基于小波变换的图象水印嵌入方法[J].中国图像图形学报,2002,7(7):667-671.
    [90]谢泽会,曹卫锋.一种基于DWT和HVS的图像版权保护研究[J].计算机应用与软件,2010,27(8):75-78.
    [91]王宝珠,陈丽英,齐莉.基于人类视觉特性的彩色图像水印算法研究[J].河北工业大学学报,2008,37(5):30-36.
    [92]曹长修,牟白森,张本.改进的图象小波域水印算法[J].贵州科学,2002,20(4):5-9.
    [93]严继利,陈明明.基于小波变换的彩色图象数字水印算法[J].计算机与数字工程,2006,34(4):59-66.
    [94]龚劬,郭吉强.一种基于DWT的双密钥自适应水印算法[J].计算机应用与应用,2008,44(27):127-129.
    [95]梅蕤蕤.数字地图版权保护[D].深圳:深圳大学,2002.
    [96]王勋,朱夏君,鲍虎军.一种互补的栅格数字地图水印算法[J].浙江大学学报,2006,40(6):34-49.
    [97]闵连权,喻其宏.基于离散余弦变换的数字地图水印算法[J].计算机应用与软件,2007,24(1):146-148.
    [98]马武刚.基于小波变换的数字地图水印算法研究[J].电脑与信息技术,2007,15(4):43-45.
    [99]符浩军,朱长青,徐惠宁.基于小波变换的数字栅格地图水印算法[J].测绘科学,2009,34(3):107-108.
    [100]朱长青,符浩军,杨成松.基于整数小波变换的数字栅格地图数字水印算法[J].武汉大学学报:信息科学版,2009,34(5),619-621.
    [101]朱静静,曾平,谢琨.针对栅格地图的快速鲁棒盲水印算法[J].计算机工程,2008,4(1):167-169.
    [102]孙新,徐登洋,曹智.基于视觉邻域的电子地图数字水印鲁棒性评价模型[J].测绘通报,2010,4:62-65.
    [103]王志伟,朱长青,王奇胜.一种基于HVS和DFT的栅格地图自适应数字水印算法[J].武汉大学学报:信息科学版,2011,36(3):351-354.
    [104]王贤敏,关泽群,吴沉寒.遥感影像高逼真度二维信息隐藏盲算法[J].计算机工程与应用,2004,13:2-5.
    [105]王贤敏,关泽群,吴沉寒.小波用于基于遥感影像特征的自适应二维盲水印算法[J].计算机工程与应用,2004,20:37-41.
    [106]尹忠海,简剑峰,周利华,陈婕,季虹.以改进影像逼真度为约束条件的变换域水印嵌入强度[J].西安电子科技大学学报(自然科学版),2005,32(3):339-343.
    [107]王向阳,杨红颖,邬俊.基于内容的离散余弦变换域自适应遥感图像数字水印算法[J].测绘学报,2005,4:46-52.
    [108]耿迅,龚志辉,张春美.基于HVS和整数小波变换的遥感图像水印算法[J].测绘通报,2007,8:20-23.
    [109]陈晨,何建农.DFT域数字水印算法在遥感图像中的应用[J].计算机与现代化,2008,11:77-79.
    [110]任娜,朱长青,王志伟.抗几何变换的高分辨率遥感影像半盲水印算法[J].武汉大学学报:信息科学版,2011,36(3):327-332.
    [111]朱长青,任娜.一种基于伪随机序列和DCT的遥感影像水印算法[J].武汉大学学报:信息科学版,2011,36(12):1427-1427.
    [112]李丽丽,孙劲光.基于DFT和水印分割的遥感影像数字水印方案[J].计算机系统应用,2011,20(9):204-207.
    [113]李丽丽,孙劲光.基于Harris-Laplace特征区域的遥感图像水印算法[J].计算机应用与软件,2012,29(3):98-102.
    [114]李丽丽,孙劲光.基于Contourlet变换的遥感影像数字水印方案[J].计算机应用与软件,2012,29(2):60-63.
    [115]李丽丽,孙劲光.基于DCT与分形理论的遥感影像鲁棒水印算法[J].计算机系统应用,2011,20(11):171-173.
    [116]高建华.论版权保护的图像数字水印技术研究[J].计算机安全,2012:43-46.
    [117]王树梅.图像特征里的小波域水印算法[J].计算机工程与应用,2011,47(8):175-178.
    [118]张晓强,王蒙蒙,朱贵良.图像水印算法研究新进展[J].计算机工程与科学,2012,34(4):17-21.
    [119]刘绪崇,罗永,王建新,汪洁.基于第二代Bandelet变换的图像认证水印算法[J].通信学报,2010,31(12):123-128.
    [120]刘鹏程.基于水印的图像内容认证技术及其应用[J].绍兴文理学院学报,2011,31(8):51-56.
    [121]曹家,王轩.基于混沌序列的脆弱数字水印算法[J].计算机工程,2011,37(12):125-129.
    [122]陈珂,牛丽,于复生.一种基于离散小波域的脆弱水印算法[J].计算机仿真,2011,28(6):145-148.
    [123]张志明,徐建桥,严承华.基于图像数字水印的身份认证研究[J].计算机与数字工程,2010,38(3):95-97.
    [124]刘秀芬,范科峰,张素兵,莫玮.一种新的DRM权限跟踪模型[J].计算机应用研究,2009,26(6):2151-2153.
    [125]赵彦涛,李志全.一种改进的图像篡改定位及恢复的双水印算法[J].光电子激光,2009,20(7):938-941.
    [126]杨钒,薛模根,崔松,王硕.一种兼具版权保护及窜改认证双重功能的数字水印算法[J].计算机应用研究,2009,26(8):3050-3052.
    [127]罗剑高,韩国强,沃焱,梁鹏.篡改定位精度可动态调整的无损图像认证算法[J].华南理工大学学报,2011,39(7):121-126.
    [128]李海华.基于数字水印的图像认证技术[J].杭州电子科技大学学报,2010,30(1):42-45.
    [129]华一新,吴升,赵军.地理信息系统原理与技术[D].北京:解放军出版社,2001.
    [130]季智,戴旭初.数字水印攻击技术及其对策分析[J].测控技术,2005,24(5):14-17.
    [131]伍凯宁,曹汉强,朱耀庭等.数字水印攻击技术及对策研究[J].计算机应用研究,2004,9:153-157.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700