用户名: 密码: 验证码:
图像关联水印理论与应用技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数字化技术为数字信息的处理、复制、转发及销售提供便利的同时,也为非法复制和非法篡改提供了可能。目前,数字水印技术已被认为是解决此难题的具有很大潜力的一种手段。数字水印技术在版权保护、数据认证、数据隐藏等方面具有较多应用。
     论文主要对数字水印理论及版权保护应用技术进行深入的研究和探讨,概括了数字水印技术的原理,介绍了水印技术的现状,系统阐述了水印嵌入与检测原理,分析了数字水印在实际应用中的基本特征和应达到的设计要求、评测方法等。提出了新的算法和应用模型,以利于解决若干理论和实际方面的问题,主要成果概括如下:
     1.对基于离散小波变换域的第二代数字水印进行研究,提出能充分利用图像特征点信息的水印算法LWL,选择更合适的尺度因子来控制水印嵌入的强度和能量,从而有效地抵抗几何攻击和Stirmark攻击。
     2.在分析现有JPEG压缩算法模型和水印算法基本模型的基础上,提出一种基于位平面分解技术的水印算法LZL。该算法将水印技术与JPEG压缩技术结合起来,针对不同类型的水印信息,首先将不同类型的水印信息进行处理转换成统一的二值水印信息序列流,然后在JPEG压缩的过程中嵌入水印信息,从而使算法能够适用于各种形式的水印信息。
     3.利用DT-CWT的特点,提出了一种基于DT-CWT域的数字水印算法LCL,它充分结合了人类视觉系统(HVS)的掩码特性,将水印嵌入到复小波域的低频系数中,提高了水印的性能,使得算法在抗干扰性和不可见性之间做出一个较优的选择。
     4.结合数字版权管理和水印原理,提出一种基于水印技术的数字版权管理模型WDP。它具有三个功能:第一,为用户提供查询、购买和使用数字内容,验证发行商和内容版权的服务;第二,为发行商提供交易内容、追踪内容和验证内容的版权等服务;第三,为版权所有者提供注册版权、委托发行和版权纠纷等服务。本文分析了该模型的合理性与安全性。
     5.结合密码学原理、数字水印技术和认证技术,提出基于数字电视机顶盒的数字电视节目内容版权保护系统设想。试验结果表明,该系统能够有效的抑制数字电视内容的非法传播,实现数字媒体内容的版权保护。
Digital technologies provides facilitate for digital information processing, reproduce, transmit and sales, and brings the possibility of duplication and tampering with illegal. At present, digital watermarking technology has been seen to be a means with great potential to resolve this problem. Digital watermarking technology is applied to the copyright protection, data authentication, data hiding and other fields.
     This paper mainly researches and studies the theory of digital watermarking and copyright protection technology in-depth, sums up the history of digital watermarking technology, introduces the classification, application and the status quo of the watermarking technology, describes watermark embedding and detection principle, analyzes of the basic characteristics in the practical application and the design requirements and evaluation methods. This paper presents a series of new algorithms and application models which solves a number of theoretical and practical aspects.The main results can be summarized as follows:
     1. It research the second-generation digital watermarking based on the discrete wavelet transform (DWT) domain, presented and designed watermarking algorithm (LWL) which can take full advantage of the characteristics information of image, select a more appropriate measure factor to control the strength and energy of the watermark embedding, moreover, to effectively resist Geometric attacks and Stirmark attacks.
     2. On the basis of analysis and comparison of existing JPEG compression algorithm model and the watermarking algorithm (LZL), it presents the JPEG watermarking algorithm of decomposition technology. The algorithm will join watermarking technology and JPEG compression technology. According to the different types of watermarks information, firstly,it shifts different types of watermark information into a unified binary sequence watermark information flow, and then embedded watermark in the process of JPEG compression, so that algorithms can be applied to various watermarking information.
     3 . Considering of the many advantages DT-CWT, an improved digital watermarking algorithm (LCL) based on the DT-CWT domain is presented, which fully integrated the human visual system (HVS) of the mask, embedded the watermark into low-frequency coefficients of the complex wavelet domain. It improves the watermark performance, makes the algorithm choose between interference and visibility.
     4. By integrating digital rights management and watermarking principle, it proposed a digital rights management model (WDP) based on watermarking technology, which has three functions: first, to provide enquiries, the purchase and use of digital content, test publishers and copyright content services for user; second , to provide transactions, track and verify of the contents copyright services for the distributors; third, to provide copyright registration, copyright issuing and copyright disputes service for the owner of copyright. Analysis shows that the model is reasonable and secure
     5. According to principle of cryptography, digital watermarking technology and authentication technology, it developed a digital copyright protection software prototype system, and realized digital TV programming copyright protection system for digital TV set-top boxes. The results show that this system can effectively control the illegal transmission of digital TV content, approve the digital media content copyright protection.
引文
[1]Saito,Makato.Digital content management system using electronic watermark.European Patent,1811419,2007..
    [2]Scott A.Moskowitz,Marc Cooperman.Method and system for digital watermarking.US Patent,7007166,2006.
    [3]陈晓苏,刘立刚,卢正鼎.网络环境下数字图像版权保护安全协议的设计与分析.计算机学报,2006,29(9):1722-1728
    [4]Cernekova Z,Pitas I,Nikou C.Information theory-based shot cut/fade detection and video summarization.In:IEEE Transactions on Circuits and Systems for Video Technology,2006,16(1):82-91.
    [5]Martin Kutter and Stefan Winkler.A Vision-Based Masking Model for spread-Spectrum Image Watermarking.In:IEEE Transactions on Image Processing,2002,11:16-25.
    [6]F.M..Boland,J.J.K O'Ruanaidh,and C.Dautzenberg,"Watermarking digital images for copyright protection," in IEEE Conference Proceedings on Image Processing and its Application,No.410,pp.326-330,IEEE,July 1995.
    [7]Fan Zhang,Jianjun Zhao,Xinhong Zhang.Adaptive Watermarking Algorithm Based on Perceptual Models.In:Intelligent Control and Automation,2006,2:9757- 9760.
    [8]Yanjun Hu,Xiaoping Ma,Linming Dou et al.The Effect of Fidelity Measure Functions on the Capacity of Digital Watermarks.In:Lecture Notes in Computer Science,2006,vol.3919,pp.113-122
    [9]罗永,杨岳湘,成礼智等.数字高程模型数据的信息伪装和信息隐藏技术.软件学报,2007,18(3):739-745.
    [10]易开祥,教英,自适应二维水印系统,中国图像图形学报,2001,6(A 版)(5):444-449
    [11]I.J.Cox,M.L.Miller,J.A.Bloom著,王颖,黄志蓓等译,数字水印.北京:电子工业出版社,2003
    [12]郭云彪,尤新刚,张春田,周琳娜.面向信息隐藏的图像复杂度研究,电子学报,2006,34(6):1048-1052.
    [13]S.Katzenbeisser,F.A.P.Petitcolas编,吴秋新,钮心忻等译,信息隐藏技术-隐写术与数字水印,人民邮电出版社,2001年9月
    [14]W.Bender,D.Gruhl,N.Morimoto.Techniques for Data Hidding.In:Proceedings of SPIE,,San Jose,CA,1995,2420:40
    [15]A.G.Bors,and I.Pitas.Image watermarking using DCT domain constraints.Proceedings of the 3rd IEEE International Conference on Image Processing 1996,3:231-234.
    [16]Fan Kefeng,Mo Wei,Zhao Xinhua,Novel Copyright Protection Scheme for Digital Content,In:Journal of Systems Engineering and Electronics,2006,17(2):423-429.
    [17]I.J.Cox,J.Kilian,Tom Leighton et al,Secure Spread Spectrum Watermarking for Multimedia,In:IEEE Transaction on Image Processing,1997,12(6):1673-1687
    [18]I.J.Cox,J.Kilian,T.Leighton et al.Secure Spread Spectrum Watermarking for Multimedia.NEC Research Institute,Techique Report:95-100,1995
    [19]Xiaoyuan Zhang,Guoqiang Han,Kun Zou et al.An Effective Mechanism Based on Watermark for E-government Information.In:Convergence Information Technology,2007,580-585.
    [20]Fan Gu,Zhe-Ming Lu,Jeng-Shyang Pan.Multipurpose image watermarking in DCT domain using subsampling.In:IEEE International Symposium,2005,5,4417- 4420.
    [21]Ming-Shi Wang,Wei-Che Chen,M.Barni,et al.DCT-domain copyright protection scheme based on secret sharing technique.In:World Scientific and Engineering Academy and Society,2007,107-111.
    [22]Solachidis,V.Pitas,I,Watermarking Digital 3-D Volumes in the Discrete Fourier Transform Domain,Multimedia.In:IEEE Transactions on,2007,9(7):1373-1383.
    [23]Kamran Hameed,Adeel Mumtaz,and S.A.M.Gilani.Digital Image Watermarking in the Wavelet Transform Domain.In:Journal of Applied Science,Engineering and Technology,2006,1(1).
    [24]Ning Zhong,Zunwen He,An Optimal Wavelet-Based Image Watermarking via Genetic Algorithm.In:Third International Conference on Natural Computation,2007,103-107
    [25]Zhang Erhu,Zhao Fan.Adaptive Image Blind Watermarking Method Based on Zerotree of Wavelet.In:Electronic Measurement and Instruments,2007,2,799-802
    [26]Jin-Wook Shin,Ju-Cheng Yang,Sook Yoon et al.An Image Protection Scheme Using the Wavelet Coefficients Based on Fingerprinting Technique.In:Computational Intelligence and Security,2007,4456:642-651.
    [27]E Elbasi,AM Eskicioglu.A DWT-based robust semi-blind image watermarking algorithm using two bands.In:Proceedings of SPIE,2006.
    [28]Jingyu Yang,Jizheng Xu,Feng Wu et al.Image Coding using 2-D Anisotropic Dual-Tree Discrete Wavelet Transform.In:IEEE International Conference on.Image Processing,2007,3(Ⅲ) 165 - 168.
    [29]M.Eerwaid,P.Uh1.A.A survey of wavelet domain watermarking algorithms.In:Security and Watermarking of Multimedia Contents,San Jose·CA.USA,2001,181- 190.
    [30]Kefeng FAN,Wei Mo,Xinhua Zhao.A DRM Model for Distribution of Digital Audiovisual Content.In:Wuhan University Journal of Natural Sciences,2006,11(6):1877-1881.
    [31]Kefeng FAN,Wei Mo,Xinhua Zhao.A Test Platform for the Security and Quality of Video Watermarking Content Protection System.In:Proceedings of the tenth International Conference on Communication Technology,2006,11,2:1505-1508.
    [32]王美华,范科峰,裴庆祺.基于脆弱水印的H.264视频完整性认证方案,西安电子科技大学学报,2007,34(5):823-827.
    [33]Wakin,M.B.,Romberg,J.K.,Hyeokho Choi et al,Wavelet domain.approximation and compression of piecewise smooth images.In:Image Processing,IEEE Transactions on,2006,15(5):1071- 1087.
    [34]X F Ma,T Jiang.The Research on Wavelet Audio Watermark Based on Independent Component Analysis.International Symposium on Instrumentation Science and Technology,2006,442-446.
    [35]Der-Chyuan Lou,Hao-Kuan Tso,and Jiang-Lung Liu.Robust copyright protection scheme for digital images using the low-band characteristic.In:Optical Engineering,2006,45(10):1117-1121.
    [36]黄继武,Yun Q.Shi,一种自适应图像水印算法,自动化学报,1999,25(4):476-482
    [37]曹汉强,向华,一种基于HVS的图像自适应盲水印算法,计算机工程与应用,2005,8:137-139
    [38]William Zhu,Clark Thomborson.Recognition in software watermarking.In:Proceedings of the 4th ACM international workshop on Contents protection and security,Santa Barbara,California,USA,2006,29-36
    [39]Xia X G,Boncelet C G,Arce G R.Wavelet transform based watermark for digital images.In:Optics Express,1998,3(12):497-511.
    [40]Kim J R,Moon Y S.A robust wavelet based digital watermark using level-adaptive threshold.In:Proc of the 6 IEEE Int1 Conf on Image Processing,Kobe.Japan,1999,2:226- 230.
    [41]W.Bender,D.Gruhl,N.Morimoto.Techniques for Data Hidding.In:Proceedings of SPIE,,San Jose,CA,1996,35(3):1147-1152.
    [42]Parthasarathy A.K,Kak S.An Improved Method of Content Based Image Watermarking.In:Broadcasting,IEEE Transactions on 2007,53(2):468-479.
    [43]Xia X G,Boncelet C G,Arce G R.Wavelet transform based watermark for digital images.In:Optics Express,1998,3(12):497-511.
    [44]Cheng-Yi Xiong,Jin-Wen Tian and Jian Liu.Efficient line-based architecture for 2-D discrete wavelet transform.In:Optical Engineering,2006,45(3).1117-1122.
    [45]Manabu Shinohara,Fumiaki Motoyoshi.Wavelet-based robust digital watermarking considering human visual system.In:International Conference on Computer Engineering and Applications,2007,177-180
    [46]Pooyan,M.Delforouzi,A.Adaptive and Robust Audio watermarking in Wavelet Domain.In:Intelligent Information Hiding and Multimedia Signal Processing,2007,2:287-290.
    [47]Tong-Lin He Chun-Yan You Peng Zheng.A New Method of 3-D Wavelet Image Compression.In:Machine Learning and Cybernetics,2007,3,1611-1615.
    [48]Craver S.,Yeo B.-L.and Yeung M.Technical trials and legal tribulations.In:Commun.ACM,1998,41(7):44 -5.
    [49]Xiaojun Qi,Ji Qi,A robust content-based digital image watermarking scheme.In:Signal Processing,2007,87(6):1264-1280
    [50]Grace C.W.Ting,Bok-Min Goia,and Swee-Huay Heng.Attacks on a robust watermarking scheme based on self-reference image.In:Computer Standards & Interfaces,2008,30(1-2):32-35.
    [51]KuterM,VoloshynovskiyS,and Herrigel.A.Watermark copy attack.In:Security and Watermarking of Multimedia Content Ⅱ,San Jose,Califonria USA,2000,pp:23 -28.
    [52]N.V.Koshkina.Methods of synchronizing digital watermarks.In:Cybernetics and Systems Analysis,2008,44(1):145-152.
    [53]张敏瑞,路陈红,易克初.一种基于伪随机序列水印的二维倒谱域图像水印算法.西安电子科技大学学报,2006.33(6):858-861
    [54]Soo-Chang Pei.Yi-Chong Zeng.Tamper proofing and attack identification of corrupted image by using semi-fragile multiple-watermarking algorithm.In:Proceedings of the ACM Symposium on Information,computer and communications security,2006,166-174
    [55]Craver S,Memon N.,Yeo B.L.and Yeung M.Can invisible watermark resolve rightful ownerships.In:Storage and Retrieval for Image and Video Database,Proc.SP IE3 022,San Jose,CA,1997,310-321.
    [56]Der-Chyuan Lou,Hao-Kuan Tsoa and Jiang-Lung Liu.A copyright protection scheme for digital images using visual cryptography technique.In:Computer Standards & Interfaces,2007,29(1):125-131.
    [57]Craver S,Memon N,YeoB.-L.et al.Resolving rightful ownerships with invisible watermarking techniques:limitations,attacks,and implications.In:IEEE Journal on Selected A reasin Communications,1998,16(4):57 3-586.
    [58]Fawad Ahmed,Farook Sattar,Mohammed Yakoob Siyal,et al.A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection.In:Applied Signal Processing,2006,1-15.
    [59]Shuihua Han.Chao-Hsien Chu,Content-based Image Authentication:Current Status,Issues,and Challenges.In:International Conference on Semantic Computing,2007,630-636.
    [60]Lin P.L.Digital watermarking models for resolving rightful ownership and authenticating legitimate customer.In:System and Software,2001,5(3):26-271.
    [61]I.J.Cox,M.L.M iller,J.A.Bloorn.数字水印.(王颖,黄志蓓)电子工业出版社,2003.
    [62]Yang Cheng,Liu Jianbo,Niu Yaqing.Robust Watermark Model Based on Subliminal Channel.In:Computational Intelligence and Security,International Conference on,2007,931-934.
    [63]Lin C,Wu M,Lui Y M,et al.Rotation,scale,and translation resilient public watermarking for images.In:IEEE Transactions on Image Processing.2001,10(5):767-782.
    [64]Voloshynovskiy Svyatoslav,Deguillaume Frederic,Pun Thierry.Multi-bit digital watermarking robust against local nonlinear geometrical distortions.In:Intentional Conference on Image Processing,Thessalonica,Greece,2001,999-1002.
    [65]Jean-Luc Dugelay.St(?)phane Roche,Christian Rey,and Gwena(e|¨)l Do(e|¨)rr Still-Image Watermarking Robust to Local Geometric Distortions,In:IEEE Transactions on image processing,2006,15(9):2831-2842.
    [66]Ghouti,L.Bouridane,A Ibrahim,M.K.Boussakta,S.Digital image watermarking using balanced multiwavelets.In:IEEE Transactions on Signal Processing,2006,54(4):1519-1536.
    [67]Kutter M,Voloshynovskiy S,Herrigel A.Watermark copy attack.In:Proceedings of the SPIE Security and Watermarking of Multimedia Contents Ⅱ,2000,371-380.
    [68]Herrigel A,Voloshynovskiy S,Rytsar Y.The watermark template attack.In:Proceedings of the SPIE Security and Watermarking of Multimedia Contents Ⅲ,2001,4314:394-405.
    [69]Voloshynovskiy Svyatoslav,Pereira Shelby,et al.Attacks on digital watermarks:classification,estimation-based attacks and benchmarks.In:IEEE Communications Magazine(Special issue on digital watermarking for copyright protection:a communications perspective),2001,39:118-127.
    [70]Dan Wang.Peizhong Lu.A Novel Geometrical Robust Image Data Hiding Scheme.In:Image Analysis for Multimedia Interactive Services,2007.59-63.
    [71]Xiaojun Qi,and Ji Qi.A robust content-based digital image watermarking scheme.In:Signal Processing.2007,87(6):1264-1280
    [72]Hu M K.Visual pattern recognition by moment invariants.In:IRE Trans.Information Theory,1962,IT(8):179-187.
    [73]Peter David Wendt.Watermark resistant to rotation and resizing.US Patent,6985601,2006.
    [74]Nguyen,T.T.Tuan,H.D.Nguyen,T.Q.Robust watermarking with improved modified spread spectrum Communications and Information Technologies.In:ISCIT'07.International Symposium on,2007,1108-1112.
    [75]Su J K,Eggers I J,Girod B.Analysis of digital watermarks subjected to optimum linear filtering and additive noise.In:Signal Processing,2001,81(6):1141-1175.
    [76]Kefeng Fan,A Content Protection Scheme for H.264-based Video Sequence.8th ACIS International Conference on Software Engineering,Artificial Intelligence.In:Networking,and Parallel/Distributed Computing(SNPD 2007),2007,7,IEEE Press,388-393
    [77]Andrew Ker.An idea for a blind watermarking scheme resistant to StirMark.Programming Research Group Technical Report RR-01-14.Oxford University Computing Laboratory,2000.
    [78]Wolfgang R B,Delp E J.A watermarking technique for digital imagery:further studies.In:Processing International Conference on Imaging Science,Systems,and Application(CISST),Las Vegas,NV,USA,1997:279-287.
    [79]王春桃,倪江群,黄继武,张荣跃,罗锡璋.基于内容自适应的优化DWT-HMM顽健图像水印算法.通信学报.2007,28(2):80-87.
    [80]曹山,范科峰,王明彦.音频水印算法的实现与攻击测试.通信学报,2007,28(11A):60-63.
    [81]和红杰,陈帆,自嵌入水印算法的安全性分析.电子学报 2007,35(3):558-562.
    [82]宋传鸣,王相海.一种新的小波域视频可分级运动估计方案.计算机学报,2006,29(12):2112-2118
    [83]Kutter M,Bhattachar Jees,KEbrahimit.Towards second generation watermarting scheme[A].Proc of ICIP'99[C].Kobe,Japan:Ieee,2002,1.320-323.
    [84]Kutter,Martin.Watermarking resistance to translation,rotation and scaling [A].Inproceedings of SPIE:Multimedia Systims and Applications[C].San Jose,USA:SPIE,1998,3528.423-431
    [85]Clik M U,Saber E,Sharma G et al.Analysis of feature-based geometry invariant watermarking.In:Security and watermarking of multimedia contents Ⅲ,2001,4314:261-268.
    [86]Bas P,Chassery L M,Macq B.Roubust watermarking based on the warping of pre-defined triangular patterns.In:Security and watermarking of multimedia contents Ⅱ,San Jose,CA,USA,Jan,2000,3971:99-109
    [87]Santa Agreste,Guido Andaloro,Daniela Prestipino,etal.An image adaptive,wavelet-based watermarking of digital images.In:Computational and Applied Mathematics,2007,210(1-2):13-21.
    [88]Cox I.J,Matt L Miller,A review of watermarking and the importance of perceptual modeling.In:Conference on Human Vision and Electronic Imaging,Santa Clara,Califoria,1997.92-99
    [89]Zhou B.,Chen J.A Geometric Distortion Resilient Image Watermarking Algorithm Based on SVD.In:Image and Graphics,2004,9(4):506-512
    [90]Emir Ganic,Ahmet M.Eskicioglu.Robust DWT-SVD domain image watermarking:embedding data in all frequencies.In:Multimedia and security,Magdeburg,Germany,2004,166-174
    [91]Huang Daren,Liu Jiufen,Huang Jiwu.An embedding strategy and algorithm for image watermarking in DWT domain.In:Journal of Software,2002,13(7): 1290-1296
    [92]Kim B.S.,Choi J.G.Robust Digital Image Watermarking Method Against Geometrical Attacks.In:Real Time Imaging,2003,9(2):139-149
    [93]Liu Ruizhen,Wang yunhong,Tang Tieniu,Image content-based watermarking model.In:Image and Graphics,2001,6A(6):558-562
    [94]王贤敏,关泽群,吴沉寒.基于图像内容的局部化自适应数字水印算法.计算机辅助设计与图形学学报,2004,16(4):465-469
    [95]张冠男,王树勋,温泉.一种嵌入可读水印的自适应盲水印算法.电子学报,2005,33(2):308-312.
    [96]P.H.W.Wong and Q.C.Au,A Capacity Estimation Technique for JPEG Image Watermarking.In:IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):746-752
    [97]P.H.W.Wong and Q.C.Au,A Blind Watermarking Technique in JPEG Compressed Domain.IEEE International Conference on Image Processing,2002,(3):497-500
    [98]Tao.B,Dickison B,Adaptive Watermarking in the DCT Domain.In:IEEE International Conference Acoustics,Speech,and Signal Processing,Germany,1997,2985-2988
    [99]伍宏涛,胡云,杨义先,抗JPEG压缩和图像合并的水印算法.电子与信息学报,2005,27(6):914-918
    [100]P.H.W.Wong,C.Oscar and J.W.C.wong,Data Hiding and Watermarking in JPEG Compressed Domain by DC Coefficient Modification.In:Proceedings of SPIE,2000,3971:237-244
    [101]李海峰,宋巍巍,王树勋.基于Contourlet变换的稳健性图像水印算法,通信学报,2006.27(4):84-94
    [102]李春,黄继武.一种抗JPEG压缩的半脆弱图像水印算法.软件学报,2006.17(2):315-324.
    [103]N.Kingsbury.The dual-tree complex wavelet transform:a new efficient tool for image restoration and enhancement.In:Proceedings of Conference on European Signal Processing,Rhodes,1998,319-322
    [104]N.Kingsbury.Image processing with complex wavelets.In:Philosophical Transactions Royal Society London A,1999,357(9):2543-2560
    [105]P.Loo,N.Kingsburg.Digital watermarking with complex wavelets.In:IEEE Transactions on Signal Processing,2000,2(3):29-32
    [106]P.Loo,N.Kingsbury.Digital watermarking using complex wavelets.In:.IEEE Conf.on Image Processing,Vancouver,2000,3608-3616.
    [107]P.Loo,Digital watermarking using complex wavelets,PhD thesis,University of Cambridge,UK,2002.
    [108]李段,王成儒.基于重要小波树的图像水印技术[J].计算机工程与设计,2006,27(1):124-125
    [109]胡永建,数字图像可见水印与方法的研究:[博士学位论文].广州:中山大学,2004,.
    [110]S.Voloshynovskiy,S.Pereira,V.Iquise,et al.Attack Modeling:Towards a Second Generations Watermarking Benchmark.In:Signal processing,2001,81(2001):1177-1214
    [111]B.Chen G.Wornell.Quantization Index Modulation:A Class of Provably Good Methods for Digital Watermarking and information Embedding.In:IEEE Transaction on Information Therory,2006,47(4):1423-1443
    [112]Sai Ho Kwok.Digital Rights Management for Mobile Commerce Using Web Services.In:Journal of Electronic Commerce Research,2006,7(1):1-13..
    [113]Kefeng Fan.A Novel Digital Content Protection System Based on Iris Biometric.In:Fourth International Conference on Fuzzy Systems and Knowledge Discovery,(FSKD2007),2007,8,IEEE Press,4:221-225.
    [114]Kefeng FAN,Wei Mo,Xinhua Zhao.A Novel Authentication Mechanism for Improving the Creditability of DRM System.In:Proceedings of the tenth International Conference on Communication Technology,2006,11,IEEE Press,1:289-292.
    [115]李新国,葛建华,冯利民等.一种适用于IPTV的数字权限管理系统.西安电子科技大学学报,2006.33(6):943-948.
    [116]Reimers,U.H.DVB-The Family of International Standards for Digital Video Broadcasting.In:Proceedings of the IEEE,2006,94(1):173-182.
    [117]Jonker,W.,Linnartz,J.P.Digital rights management in consumer electronics products. In: IEEE Signal Processing, 2004, 21(2): 82-91.
    [118] Miin-Luen Day, Suh-Yin Lee, I-Chang Jou. Multiple Description Watermarking Based on Quantization Index Modulus Modulation. In: Journal of Information Science and Engineering, 2007,23(6): 1785-1800.
    [119] Chen Xiaosu, Hu Lei, Xiao Daolu, A Model of Digital Copyright Protection Framework Based on PKI and Watermarking. In: Computer Engineering and Science, 2005,27(6): 12-14.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700