用户名: 密码: 验证码:
三维几何模型水印嵌入方法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着互联网技术的迅速发展,越来越多的数字产品进入公开网络环境,应用越来越广泛,同时网络上的多媒体信息的版权盗用问题也显著增加。数字水印技术主要通过在多媒体内容中嵌入版权标志数据来确保内容的安全。近年来,随着CAD技术、生物医学技术及三维动画技术的发展,使得三维几何模型也面临所有权保护问题。三维模型水印技术成为计算机图形学与媒体计算领域的研究热点。
     本文针对三维模型水印技术中的关键问题开展研究,从所有者和攻击者两个方面研究三维模型水印算法的鲁棒性问题、局部化问题、特征域选择问题以及信息嵌入机制问题。
     本文的研究工作包括:
     (1)提出了一种基于积分不变量的三维模型半脆弱水印算法。针对现有的三维模型水印算法对鲁棒性定义不明确的问题,分析了常见的攻击手段,并区分成恶意攻击和非恶意攻击。基于三维模型积分不变量设计水印算法,所提出的算法能够抵抗相似变换攻击,对噪声和剪切攻击具备一定的鲁棒性,实用价值较高。
     (2)提出了一种针对采用索引式局部化机制的水印算法的优化框架。针对三维模型水印算法的嵌入容量及不可见性的性能进行优化,改进了一类三维模型水印算法的框架,分别求解一个最大独立集问题和一个指派问题来优化嵌入容量和不可见性。该框架可使水印算法的整体性能有较大的提高。
     (3)提出了一种针对三维模型水印算法的伪认证攻击方法。从攻击者的角度考察三维模型水印算法的有效性。算法通过重排模型的顶点顺序伪造出一个参考模型,使得检测出的水印顺序也相应重排,形成攻击者希望的水印,从而造成所有权检测争执。通过举例说明了该方法的可行性,并进一步分别分析了攻击的成功条件和避免攻击的方法。
With the development of network technology, more and more digital products come into public network. Meanwhile, the copyrights protection problem becomes crucial. By embedding some tags into multimedia contents, digital watermarking techniques can protect their copyrights. In recent years, with the development of CAD, biomedical imaging, 3D animation and other applications, the copyrights protection for 3D models become necessary. Therefore, 3D model watermarking technique has been widely researched.
     In this thesis, we would like to discuss some key problems in 3D model watermarking technique, and research as a proprietor and as an attacker on the robustness, localization, feature selection and data embedding problems.
     The main contributions include:
     (1) A semi-fragile watermarking algorithm for 3D models based on integral invariants is proposed. As the robustness is not well defined for 3D model watermarking, we list some commonly-used attacks and class them into malicious attacks and non-malicious attacks. Based on integral invariants, this algorithm can survive under similar transforms, and be robust against noise and cropping.
     (2) An optimized framework for indexed localization scheme is proposed. To improve the capacity and invisibility of 3D watermarking algorithms, we optimize the watermarking scheme. By solving a maximum independent set problem and an assignment problem, the overall performance of the algorithms are greatly improved.
     (3) A new counterfeit original attack method for 3D model watermarking algorithms is proposed. As an attacker, we check the validity of existing algorithms. By reordering the vertices, the proposed method can counterfeit a fake original model, scramble the extracted watermark and confuse the authentication decision. With an example, we show the feasibility, succeeding conditions and method to avoid.
引文
[1]王炳锡,陈琦,邓峰森.数字水印技术[M].西安:西安电子科技大学出版社, 2003.
    [2] Stefan K, Petitcolas F著,吴秋新等译.信息隐藏技术——隐写术与数字水印[M].北京:人民邮电出版社, 2001.
    [3] Petitcolas F, Anderson R J, Kuhn M G. Information Hiding: A Survey[C]. In Proceedings of IEEE special issue on Protection of Multimedia Content. 1999, 87(7): 1062-1078.
    [4] Dittmann J, Nahrstedt K, Wohlmacher P. A survey of multimedia security[C]. In Multimedia and Security Workshop at ACM Multimedia, October 1999.
    [5] Simmons G. A survey of information authentication[J]. Contemporary Cryptography: The Science of Information Integrity, IEEE Press, 1992: 379-419.
    [6]王育民.通信网的安全—理论与技术[M].西安:西安电子科技大学出版社, 1999.
    [7] Schneider M, Chang S F. A Robust Content Based Digital Signature for Image Authentication[C]. In Proceedings of the 1996 IEEE International Conference on Image Processing, Sep 1996, 3: 227-230.
    [8] Lou D C, Liu J L. Fault Resilient and Compression Tolerant Digital Signature for Image Authentication[J]. IEEE Transactions on Consumer Electronics, 2000, 46(1): 31-39.
    [9]黄继武,谭铁牛.图像隐形水印综述[J].自动化学报, 2000, 26(5): 645-655.
    [10]孙圣和,陆哲明.数字水印处理技术[J].电子学报, 2000, 28(9): 85-90.
    [11]张春田,苏育挺,管晓康.多媒体数字水印技术[J].通信学报, 2000, 21(9): 46-52.
    [12] Hsu C T, Wu J L. Hidden Digital Watermarks in Images[J]. IEEE Transactions on Image Processing, 1999, 8: 58-68.
    [13] Bender W, Gruhl D, Morimoto N. Techniques for Data Hiding[C]. In Proceedings of the SPIE Conference on Storage and Retrieval for Image and Video Databases III, 1995, 2420: 164-173.
    [14] Qiao L, Nahrsted K. Watermarking schemes and protocols for protecting rightful ownership and customers’rights[J]. Journal of Visual Communication and Image Representation, Sep 1998, 9(3): 194-210.
    [15] Wu M, Liu B. Data hiding in images and video, Part I: Fundamental Issues andSolutions[J]. IEEE Transactions on Image Processing, 2003, 12(6): 685-695.
    [16] Boland F M. Watermarking Digital Images for Copyright Protection[C]. In 5th International Conference on Image Processing and its Applications, 1995: 326-330.
    [17] Lee S J, Jung S H. A survey of watermarking techniques applied to multimedia[J]. IEEE Int. Symposium on Industrial Electronics, 2001, 1: 1272-1277.
    [18] Lin E T, Delp E J. A review of data hiding in digital images[C]. In Proceedings of the Image Processing, Image Quality, Image Capture Systems Conference, 1999: 274-278.
    [19] Voyatzis G, Nikolaidis N, Pitas I. Digital watermarking: an overview[C]. In 9th European Signal Processing Conference, 1998: 9-12.
    [20] Eggers J J, Girod B. Informed Watermarking[M]. Norwell, MA: Kluwer, 2002.
    [21] Cox I J, Miller M L, Bloom J A. Watermarking applications and their properties[C]. In International Conference on Information Technology: Coding and computing, 2000: 6-10.
    [22] Fridrich J, Soukal D, Lukas J. Detection of copy-move forgery in digital images[C]. In Proceedings of Digital Forensic Research Workshop, August 2003.
    [23] Luo Weiqi, Huang Jiwu, Qiu Guoping. Robust detection of region duplication forgery in digital image[C]. In 18th International Conference on Pattern Recognition, 2006, 4: 746-749.
    [24] Popescu A C, Farid H. Statistical tools for digital forensics[C]. In 6th International Workshop on Information Hiding, 2004.
    [25] Cox I J, Miller M L, Bloom J A. Digital Watermarking[M]. San Francisco, CA: Morgan Kaufmann, 2001.
    [26] Dittmann J, Steinmetz A, Steinmetz R. Content-based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking[C]. In IEEE International Conference Multimedia Computing and Systems, 1999, 2: 209-213.
    [27] Fridrich J, Goljan M, Du M. Invertible authentication[C]. In SPIE Security and Watermarking of Multimedia Contents, 2001.
    [28] Kundur D, Hatzinakos D. Digital watermarking for telltale tamper-proofing and authentication[C]. In Proceedings of the IEEE Special Issue on Identification and Protection of Multimedia Information, 1999, 87(7): 1167-1180.
    [29] Fridrich J. Image Watermarking for Tamper Detection[C]. In IEEE International Conference on Image Processing, 1998.
    [30] Mintzer F, Lotspiech J, Morimoto N. Safeguarding digital library contents and users[J]. D-Lib Magazine, Dec, 1997.
    [31] Cox I J, Kilian J, Leighton T, et al. Secure spread spectrum watermarking for multimedia[J]. IEEE Trans. Image Processing, Dec. 1997, 6(12): 1837-1687.
    [32] Swanson M D, Kobayashi M, Tewfik A H. Multimedia data embedding and watermarking technologies[C]. In Proceedings of the IEEE, 1998, 86(6): 1064-1087.
    [33]孙圣和.数字水印技术与应用[M].陆哲明,牛夏牧等.北京:科学出版社, 2004.
    [34] Johnson N, Duric Z, Jajodia S. Information Hiding: Steganography and Watermarking Attacks and Countermeasures[M]. Kluwer Academic Publishers, Boston, MA, 2001.
    [35] Lin C Y, Chang S F. Semi-Fragile watermarking for authentication jpeg visual content[C]. In SPIE Security and Watermarking of Multimedia Content II, 2000, 3971: 140-151.
    [36] Lisa M M, Hartwig G W, Boncelet C. Compression-compatible fragile and semi-fragile tamper detection[C]. In SPIE International Conference on Security and Watermarking of Multimedia Contents II, 2000, 3971(12): 140-151.
    [37] Zou Dekun, Shi Yunq, Ni Zhicheng, et al. A Semi-Fragile Lossless Digital Watermarking Scheme Based on Integer Wavelet Transform[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006, 16(10): 1294-1300.
    [38]孙家广.计算机图形学[M].北京:清华大学出版社, 1998.
    [39] Requicha A, Voelcker H. Solid Modeling: Current Status and Research Directions[J]. Computer Graphics and Applications, 1983, 3(7): 25-37.
    [40] Goldfeather J, Hultquist JPM, Fuchs H. Fast constructive-solid geometry display in the pixel-powers graphics system[C]. In ACM SIGGRAPH Computer Graphics, 1986, 20(4): 107-116.
    [41] Mangin J F, Frouin V, Bloch I, et al. From 3d magnetic resonance images to structural representations of the cortex topography using topology preserving deformations[J]. Journal of Mathematical Imaging and Vision, 1995, 5: 297–318.
    [42] Bischoff S, Pavic D, Kobbelt L. Automatic restoration of polygon models[J]. ACM Trans. Graph. 2005, 24(4): 1332-1352.
    [43] Marc A, Johannes B, Daniel C. Computing and Rendering Point Set Surfaces[J]. IEEE Transactions on Visualization and Computer Graphics, 2003, 9(1): 3-15.
    [44] Pauly M, Keiser R, Kobbelt L. Shape modeling with point-sampled geometry[C]. In ACM SIGGRAPH International Conference on Computer Graphics and Interactive Techniques, 2003: 641-650.
    [45] Anders A, Marc A. Ray tracing point set surfaces[C]. In Proceedings of the Shape Modeling International, 2003: 272.
    [46]数学手册编写组.数学手册[M]. 1998年版,北京:高等教育出版社, 1979.
    [47] Kobbelt L. sqrt(3) subdivision[C]. In Proceedings of ACM SIGGRAPH, 2000: 103-112.
    [48] Cayre F, Deviller O, Schmitt F, et al. Watermarking 3D triangle meshed for authentication and integrity[R]. INRIA Research Report, RR-5223, June 2004.
    [49] Chen Y, Medioni G. Object modeling by registration of multiple range images[J]. Image and Vision Computing, 1992, 10(3): 145-155.
    [50] Besl P, McKay J. A method for registration of 3-d shapes[J]. IEEE Transactions on Pattern Recognition and Machine Intelligence, 1992, 14 (2): 239-255.
    [51] Alekseyev S. Volumetric surface reconstruction with level set methods[M]. Diploma Thesis, RWTH Aachen University, Germany, 2003.
    [52]潘志庚,孙树森,李黎.三维模型数字水印综述[J].计算机辅助设计与图形学学报, 2006, 18(8): 1103-1110.
    [53]康显桂.鲁棒图象水印方法的研究[博士学位论文].广州:中山大学信息科学与技术学院, 2004.
    [54] Ohbuchi R, Masuda H, Aono M. Watermarking Three Dimensional Polygonal Models[C]. In Proceedings of ACM Multimedia, 1997: 261-272.
    [55] Ohbuchi R, Masuda H, Aono M. Embedding data in 3D models[C]. In Proceedings of the European Workshop on Interactive Distributed Multimedia Systems and Tele- communication Services, 1997: 1-10.
    [56] Ohbuchi R, Masuda H, Aono M. Watermarking three-dimensional polygonal models through geometric and topological modifications[J]. IEEE Journal on Selected Areas in Communication, 1998, 16(4): 551-560.
    [57] Ohbuchi R, Masuda H, Aono M. Data embedding algorithms for geometrical and on geometrical targets in three-dimensional polygonal models[J]. Computer Communications, 1998, 21(15): 1344-1354.
    [58] Kanai S, Date H, Kishinami T. Digital watermarking for 3D polygons using multi-resolution wavelet decomposition[C]. In Proceedings of International Workshop on Geometric Modeling, 1998: 296-307.
    [59] Benedens O. Watermarking of 3D polygon based models with robustness against mesh simplification[C]. In Conference on Security and Watermarking of Multimedia Contents, 1999, 3657: 329-340.
    [60] Benedens O. Geometry-based watermarking of 3D models[J]. IEEE Computer Graphics and Applications, 1999, 19(1): 46-55.
    [61] Benedens O, Busch C. Towards blind detection of robust watermarks in polygonal models[C]. In Proceedings of Eurographics, 2000:C199-C208.
    [62] Praun E, Hoppe H, Finkelstein A. Robust mesh watermarking[C]. In ACM SIGGRAPH Computer Graphics Proceedings, Annual Conference Series, 1999: 325-334.
    [63] Wagner M G. Robust watermarking of polygonal meshes[C]. In Proceedings of Geometric Modeling and Processing, 2000: 201-208.
    [64] Cayre F, Macq B. Spatial watermarking of 3D triangle meshes[C]. In Conference on Applications of Digital Image Processing XXIV, 2001, 4472: 155-166.
    [65] Mao X Y, Shiba M, Imamiya A. Watermarking 3D geometric models through triangle subdivision[C]. In Security and Watermarking of Multimedia Contents III Conference, 2001, 4314: 253-260.
    [66] Yin Kangkang, Pan Zhigeng, Shi Jiaoying, et al. Robust mesh watermarking based on multiresolution processing[J]. Computers & Graphics, 2001, 25(3): 409-420.
    [67] Ohbuchi R, Mukaiyama A, Takahashi S. A frequency-domain approach to watermarking 3D shapes[C]. In Proceedings of Eurographics, 2002: 373-382.
    [68] Aspert N, Drelie E, Maret Y, et al. Steganography for three-dimensional polygonal meshes[C]. In Proceedings of SPIE, 2002, 4790: 705-708.
    [69] Cayre F, Rondao-Alface P, Schmitt F, et al. Application of spectral decomposition to compression and watermarking of 3D triangle mesh geometry[J]. Signal Processing. 2003, 18(4): 309-319.
    [70] Yu Zhiqiang, Ip H H S, Kwok L F. A robust watermarking scheme for 3D triangular mesh models[J]. Pattern Recognition, 2003, 36(11): 2603-2614.
    [71] Murotani K, Sugihara K. Watermarking 3D polygonal meshes using the singular spectrum analysis[C]. In Proceedings on Mathematics of Surfaces, 2003, 2768: 85-98.
    [72] Kalivas A, Tefas A, Pitas I. Watermarking of 3D models using principal component analysis[C]. In Proceedings 2003 International Conference on Multimedia and Expo, 2003, 1: 637-640.
    [73] Benedens O. Robust watermarking and affine registration of 3D meshes[J]. Information Hiding, 2003, 2578: 171-195.
    [74] Maret Y, Ebrahimi T. Data hiding on 3D polygonal meshes[C]. In Proceedings of ACM Multimedia and Security Workshop, 2004: 68-74.
    [75] Li Li, Zhang David, Pan Zhigeng, et al. Watermarking 3D mesh by spherical parameterization[J]. Computers & Graphics, 2004, 28(6): 981-989.
    [76] Jin Jianqiu, Dai Minya, Bao Hujun, et al. Watermarking on 3D mesh based onspherical wavelet transform[J]. Journal of Zhejiang Univ Sci, 2004, 5(3): 251-258.
    [77] Uccheddu F, Corsini M, Barni M. Wavelet-based blind watermarking of 3D models[C]. In Proceedings of the 2004 Multimedia and Security Workshop, 2004: 143-154.
    [78] Cho WH, Lee M E, Lim H, et al. Robust watermarking for copyright protection of 3D polygonal model[J], Advances in Multimedia Information Processing, 2004, 3333: 378-385.
    [79] Wu Jianhua, Kobbelt L. Efficient spectral watermarking of large meshes with orthogonal basis functions[J]. Visual Computer, 2005, 21(8-10): 848-857.
    [80] Zafeiriou S, Tefas A, Pitas I. Blind robust watermarking schemes for copyright protection of 3D mesh objects[J]. IEEE Transactions on Visualization and Computer Graphics, 2005, 11(5): 596-607.
    [81] Alface P R, Macq B. Feature-based watermarking of 3D objects: Towards robustness against remeshing and de-synchronization[C]. In Conference on Security, Steganography and Watermarking of Multimedia Contents VII, 2005, 5681: 400-408.
    [82] Cho J W, Prost R, Jung H Y. An oblivious watermarking for 3-D polygonal meshes using distribution of vertex norms[J]. IEEE Transactions on Signal Processing, 2007, 55(1): 142-155.
    [83] Lee S H, Kwon K R. A watermarking for 3D mesh using the patch CEGIs[C]. In Digital Signal Processing, 2007, 17(2): 396-413.
    [84] Yeung M, Yeo B L. Fragile watermarking of three-dimensional objects[C]. In Proceedings of IPCIP'98 International Conference on Image Processing, 1998, 2: 442-446.
    [85] Yeo B L, Yeung M M. Watermarking 3d objects for verification[J]. IEEE Computer Graphics and Applications, 1999, 19(1): 36-45.
    [86] Dittmann J, Benedens O. Invertible authentication for 3D-meshes[C]. In 5th Conference on Security and Watermarking of Multimedia Contents, 2003, 5020: 653-664.
    [87] Fridrich J, Goljan M, Du R. Lossless Data Embedding for All Image Formats[C]. In Proceedings of SPIE Security and Watermarking of Multimedia Contents IV, 2002, 4675: 572-583.
    [88] Cho W, Lee M, Lim H, et al. Watermarking technique for authentication of 3-D polygonal meshes[C]. In Proceedings of International Workshop on Digital Watermarking, 2004: 259-270.
    [89] Lee S K, Ho Y S. A fragile watermarking scheme for three dimensional polygonalmodels using triangle strips[J]. IEICE Transactions on Communications, 2004, 87(9): 2811-2815.
    [90] Wu H T, Cheung Y M. A new fragile mesh watermarking algorithm for authentication[C]. In 20th International Information Security Conference, 2005, 181: 509-523.
    [91] Lin HYS, Liao HYM, Lu CS, Lin JC. Fragile watermarking for authenticating 3-D polygonal meshes[J]. IEEE Transactions on Multimedia, 2005, 7(6): 997-1006.
    [92] Chou Changmin, Tseng Dinchang. A public fragile watermarking scheme for 3D model authentication[J]. Computer-Aided Design, 2006, 38(11): 1154-1165.
    [93] Wang Weibo, Zheng Guoqin, Yong Junhai, et al. A numerically stable fragile watermarking scheme for authenticating 3D models[J]. Computer-Aided Design, 2008: 634-645.
    [94] Cho M, Sohn Y, Bu S. 3D Multiple Digital Watermarking Framework for joint-creatorship verification[C]. In International Conference on Cyberworlds, 2006: 141-144.
    [95] Lee S H, Kwon K R. Mesh watermarking based projection onto two convex sets[J]. Multimedia Systems, 2008, 13: 323-330.
    [96] Maheshwari P, Agarwal P, Prabhakaran B. Progressive compression invariant semi-fragile watermarks for 3d meshes[C]. In Proceedings of the 9th workshop on Multimedia & Security, 2007: 245-250.
    [97] Benedens O. Affine invariant watermarks for 3D polygonal and NURBS based models[C]. In Proceedings of the 3rd International Workshop Information Security, 2000: 15-29.
    [98] Fornaro C, Sanna A. Public key watermarking for authentication of CSG models[J]. Computer-Aided Design, 2000, 32(12): 727-735.
    [99] Wu Yinghui, Guan Xin, Kankanhalli M S, et al. Robust invisible watermarking of volume data using the 3D DCT[C]. In Proceedings of Computer Graphics International, 2001: 359-362.
    [100] Lee J J, Cho N I, Lee S U. Watermarking algorithms for 3D NURBS graphic data[C], In EURASIP Journal on Applied Signal Processing, 2004, (14): 2142-2152.
    [101] Cotting D, Weyrich T, Pauly M, et al. Robust watermarking of point-sampled geometry[C]. In 6th International Conference on Shape Modeling and Applications, 2004: 233-234.
    [102] Ohbuchi R, Mukaiyama A, Takahashi S. Watermarking a 3D shape model defined as a point set[C]. In International Conference on Cyberworlds, 2004: 392-399.
    [103] Solachidis V, Pitas L. Watermarking digital 3-d volumes in the discrete Fourier transform domain[J]. IEEE Transactions on Multimedia, 2007, 9: 1373-1383.
    [104] Gelasca E D, Ebrahimi T, Corsini M, et al. Objective evaluation of the perceptual quality of 3D watermarking[C]. In IEEE International Conference on Image Processing, 2005, 1-5: 445-448.
    [105] Corsini M, Gelasca E D, Ebrahimi T, et al. Watermarked 3-D mesh quality assessment[J]. IEEE Transactions on Multimedia, 2007, 9(2): 247-256.
    [106] Bian Zhe, Hu Shimin, Martin R. Comparing small visual differences between conforming meshes[C]. In 5th International Conference on Geometric Modeling and Processing, 2008, 4975: 62-78.
    [107] Manay S, Hong B W, Yezzi A J, et al. Integral invariant signatures[C]. In Proceedings of ECCV, 2004, LNCS(3024): 87-99.
    [108] Pottmann H, Huang Qixing, Yang Yongliang, et al. Integral invariants for robust geometry processing[R]. Technical report, Vienna Univ. of Technology, 2005.
    [109] Yang Yongliang, Lai Yukun, Hu Shimin, et al. Robust Principal Curvatures on Multiple Scales[C]. In Proceedings of 4th Eurographics Symposium on Geometry Processing, 2006: 223-226.
    [110] Pottmann H, Huang Qixing, Yang Yongliang, et al. Geometry and Convergence Analysis of Algorithms for Registration of 3D Shapes[J]. International Journal of Computer Vision, 2006, 67(3): 277-296.
    [111] Lai Yukun, Zhou Qianyi, Hu Shimin, et al. Robust Feature Classification and Editing[J]. IEEE Transactions on Visualization and Computer Graphics, 2007, 13: 34-45.
    [112] I. Porteous. Geometric Differentiation[M]. 2nd edition. Cambridge University Press, 2001.
    [113] Meagher D. Geometric Modeling Using Octree Encoding[J]. Computer Graphics and Image Processing, 1982, 19(2): 129-147.
    [114] Deering M. Geometry compression[C]. In Proceedings of ACM SIGGRAPH, 1995: 13-20.
    [115] Rossignac J. EdgeBreaker: Connectivity compression for triangler meshes[J]. IEEE Transactions on Visualization and Computer Graphics, 1999: 47-61.
    [116] Taubin G, Rossignac J. 3D geometry compression[C]. In ACM SIGGRAPH Conference Course Notes 21, 1999.
    [117] Alliez P, Desbrun M. Valence-driven connectivity encoding of 3D meshes[C]. In Proceedings of EuroGraphics, 2001.
    [118]韩纪庆.音频信息处理技术[M].北京:清华大学出版社, 2007.
    [119]田丽华.编码理论[M].西安:西安电子科技大学出版社, 2003.
    [120] Matt P, Craig K, Reid G, et al. Rendering complex scenes with memory-coherent ray tracing[C]. In Proceedings of the 24th annual conference on Computer graphics and interactive techniques, 1997: 101-108.
    [121] William E L, Harvey E C. Marching cubes: A high resolution 3D surface construction algorithm[C]. In Proceedings of the 14th annual conference on Computer graphics and interactive techniques, 1987: 163-169.
    [122] Marc L. Efficient ray tracing of volume data[J]. ACM Transactions on Graphics, 1990, 9(3): 245-261.
    [123] Fakir S. N, Greg T. Simplification and repair of polygonal models using volumetric techniques[J]. IEEE Transactions on Visualization and Computer Graphics, 2003, 9(2): 191-205.
    [124] Gelfand N, Mitra N J, Guibas L J, et al. Robust global registration[C]. In Symposium on Geometry Processing, 2005: 197-206.
    [125] Brigham EO. The fast Fourier transform and its applications[M]. Englewood Cliffs: Prentice Hall Signal Processing Series, 1988.
    [126] Berg M, Krteveld M, Overmars M, et al. Computational Geometry: Algorithms and Applications[M], Springer Verlag, Berlin, 1997.
    [127] Ding Wei, YanWeiqi, Qi Dongxu. Digital Image Scrambling Technology Based on Arnold Transformation[J]. Journal of Computer-Aided Design & Computer Graphics, 2001, 13(4): 338-341.
    [128] Cignoni P, Rocchini C, Scopigno R. Metro: Measuring Error on Simplified Surfaces[J]. Computer Graphics Forum, 1998, 17(2): 167-174.
    [129]许国志,马仲蕃著.整数规划初步[M].沈阳:辽宁教育出版社, 1985.
    [130] Walukiewicz S. Integer Programming[M]. London: Kluwer Academic Publishers, 1990.
    [131]马仲蕃.线性整数规划的数学基础[M].北京:科学出版社, 1995.
    [132]茨木俊秀,福岛雅夫著,曾道智译.最优化方法[M].北京:世界图书出版公司, 1997.
    [133]卢开澄.计算机算法导引[M].北京:清华大学出版社, 1996.
    [134] Leguizamon G, Michalewicz Z. A ant system for the maximum independent set problem[C]. In Proceedings of the VII Argentinian Congress on Computer Science, Santa Cruz, 2001, 2: 1027-1040.
    [135] Dorigo M. Optimization, learning and natural algorithms[D]. Ph.D. Thesis, Dip. Elettronica e Informazione, Politecnico di Milano, Italy, 1992.
    [136] Dorigo M, Maniezzo V, Colorni A. Ant system: optimization by a colony of cooperating agents[J]. IEEE Transactions on Systems, Man, and Cybernetics, 1996, 26(1): 28-41.
    [137] Dorigo M, Gambardella L M. Ant colony system: a cooperative learning approach to the travelingsalesman problem[J]. IEEE Transactions on Evolutionary Computation, 1997, 1(1): 53-66.
    [138]邢文训,谢金星编著.现代优化计算方法[M].第2版.北京:清华大学出版社, 2005.
    [139] Dorigo M, Stützle T著,张军等译.蚁群优化(Ant Colony Optimization)[M].北京:清华大学出版社, 2007.
    [140]杨义先,钮心忻编著.数字水印理论与技术[M].北京:高等教育出版社, 2006.
    [141]陈宝林.最优化理论与算法[M].第2版.北京:清华大学出版社, 2005.
    [142] Nielson G, Foley T. A Survey of Applications of an Affine Invariant Norm[C]. In Academic Press Professional, 1989.
    [143] Liu Tyngluh, Chen Hwanntzong. A Variational Approach for Digital Watermarking[C]. In International Conference on Image Processing, 2000, 3: 674-677.
    [144] Craver S, Memon N, Yeo B L, Yeung M M. Can Invisible Watermarks Resolve Rightful Ownerships?[R]. IBM Research Report, 1996.
    [145] Craver S, Memon N, Yeo B L, Yeung M M. On the Invertibility of Invisible Watermarking Techniques[C]. In IEEE International Conference on Image Processing, 1997.
    [146] Craver S, Memon N, Yeo B L, Yeung M M. Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications[J]. IEEE J. Select. Areas Communication, 1998, 16(4): 573-586.
    [147] Schneier B. Applied Cryptography: protocols, algorithms, and source code in C[M]. 2nd edition. John Wiley & Sons, Inc., 1996.
    [148]毛文波,王继林,伍前红等译.现代密码学理论与实践[M].北京:电子工业出版社, 2004.
    [149] Desmedt Y, Frankel Y. Threshold cryptosystems[C]. In Proceedings on Advances in cryptology, 1989: 307-315.
    [150] Lubin J. A human vision system model for objective picture quality measurements[J]. International Broadcasting Convention, 1997: 498-503.
    [151] Podilchuk CI, Zeng Wenjun. Image-adaptive watermarking using visual models[J]. IEEE Journal on Selected Areas in Communications, 1998, 16(4): 525-539.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700