DEM数字水印模型与算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
DEM数据是国家基础设施建设和地球科学研究的支撑性成果之一,在国家经济、国防建设中占有十分重要的地位。随着数字化和网络化的飞速发展,DEM数据的存储、传输、复制都变得非常方便快捷,其安全和版权问题也日益凸显,侵权、泄密、非法传播与使用等行为屡禁不止,仅依靠目前现行的安全保密措施和法律法规,根本无法有效阻止与打击各种非法行为。
     数字水印技术作为一种新兴的信息安全技术,为DEM数据的安全保护提供了一种切实可行的解决途径。数字水印技术是在数据中嵌入秘密水印信息,并使其成为源数据不可分离的一部分,由此来确定版权拥有者、跟踪侵权行为、认证数字内容等,从而为DEM数据的安全使用提供强有力的技术支撑。
     本论文结合DEM数据特征、精度和应用要求,对DEM数字水印技术进行了系统研究,主要研究成果如下:
     (1)建立了一种实用的栅格DEM数字水印模型——基于映射机制的栅格DEM数字水印模型。该模型建立了水印信息序列与栅格DEM高程值之间的映射关系,解决了两者之间的变化不同步问题,可有效增强水印算法的抗裁剪能力和抗高程平移能力;同时,该模型具有水印容差自主控制机制,可根据实际精度需求,自主调节水印容差大小,以满足DEM数据精度要求及水印算法对不同噪声的抵抗能力。
     (2)根据所建立的栅格DEM数字水印模型,分别提出了一种抗裁剪的DEM水印算法和一种抗高程平移的DEM水印算法。这两种算法均采用量化思想对DEM高程数据进行水印信息调制,达到了盲检测的目的。同时,运用所建水印模型的特性,实现了水印算法在数据裁剪、高程平移、数据删除、随机噪声等方面的强鲁棒性。
     (3)结合DEM地形特征,提出了一种顾及地形特征的栅格DEM水印算法。该算法继承了抗裁剪、抗高程平移水印算法的特性,并通过对DEM地形因子的分析、归类,提炼了其中最为基础的两大地形因子——坡度和坡向,在水印嵌入过程中,充分考虑水印嵌入对坡度坡向的影响,运用DEM误差分析理论,制定顾及坡度坡向因子的水印嵌入策略和方法,最大限度的降低了水印嵌入对DEM地形分析的影响。
     (4)建立了一种实用的不规则三角网DEM数字水印模型——基于映射机制的不规则三角网DEM数字水印模型。根据此模型,可分别建立水印信息序列与高程坐标、平面坐标的映射关系,解决水印信息与载体数据的变化不同步问题,有效增强了水印算法的鲁棒性。
     (5)根据所建立的不规则三角网DEM水印模型,提出了一种顾及拓扑特征的不规则三角网DEM数字水印算法。该算法选择离散高程点的X坐标集作为水印信息的承载通道,通过平面坐标建立离散高程点与水印信息序列的映射关系,采用量化调制机制将水印信息嵌入到X坐标集中,对高程数据不再进行水印嵌入,保持了DEM数据的高程精度。在水印嵌入过程中,为保证嵌入水印后不规则三角网拓扑关系的正确性,建立了拓扑约束条件。
     (6)根据所建立的不规则三角网DEM水印模型,提出了一种基于点重要度的不规则三角网DEM数字水印算法。该算法继承了顾及拓扑特征的DEM水印算法的特性,同时,又建立了点重要度的水印嵌入约束条件,仅对离散高程点中的部分“重要点”进行水印信息的嵌入,以缩减水印嵌入所引起的数据改变比例,达到“以较小误差代价获得较优鲁棒性”的目的。
     (7)结合DEM误差分布规律,针对本文提出的模型和算法,运用概率统计理论,对数字水印生成、嵌入过程进行分析,推导了水印嵌入对DEM数据精度的影响公式,从理论上分析了水印嵌入对DEM数据精度的影响。
DEM data is one of the supportive achievements in the field of national infrastructure and earth science research, and plays a significant role in national economy and defenses. With the rapid development of digitization and network, the storage, transmission and replication of DEM data is very convenient, so the security and copyright issues have become increasingly salient. It has been recognized that the current security laws and technologies are inadequate for dealing with the behavior of infringement, disclosure, illegal dissemination and usage.
     Digital watermarking technology is a new information security technology, and can provide a feasible and practical solution for the copyright protection for DEM data. Digital watermarking is the process of embedding secret information into digital data, and later the information can be extracted or detected for a variety of purposes such as copyright prevention, ownership authentication, infringement tracking and tamper detection. Digital watermarking is being deemed essential to provide a strong technical support to the legitimate use of DEM data.
     In this paper, combining the feature, accuracy and application requirements of DEM data, the digital watermarking of DEM is systematically studied. The main results are as follows:
    
     (1) A practical digital watermarking model of raster DEM is proposed based on mapping mechanism. By this model, a mapping relationship is established between watermark sequence and elevation coordinates of raster DEM so as to resolve the no synchronization problem of each other, which can effectively enhance the robustness of watermarking algorithm in the data clip and the elevation translation. Simultaneously, this model can independently control the size of mapping tolerance to meet the accuracy requirement of DEM data and the robustness of watermarking algorithm.
     (2) Two algorithms are put forward based on the proposed digital watermarking model of raster DEM. The two algorithms are blind watermarking algorithm by quantification mechanism. And by the features of this proposed model, the two algorithms have the strong robustness in data clip, elevation translation, data deletion and random noise.
     (3) A digital watermarking algorithm of raster DEM is proposed considering the terrain features. This algorithm inherits the characteristics of the above two algorithms. In this paper, the slope and aspect are considered as two basic terrain factors. So in the process of watermark embedding, the slope and aspect are taken into account. And then using the theory of DEM error, a reasonable strategy of watermark embedding is developed to minimize the impact of watermark embedding on terrain analysis.
     (4) A practical digital watermarking model of TIN-DEM is established based on mapping elevation coordinates can be established, and the mapping relationship between watermark sequence and plane coordinates can also be established. This mapping relationship can effectively enhance the robustness of watermarking algorithm.
     (5) An algorithm considering topological features is put forward based on the established digital watermarking model of TIN-DEM. This algorithm embeds the watermark information into the X coordinates by quantification mechanism. So this algorithm can effectively maintain the elevation accuracy of DEM. In the process of watermark embedding, some constraint conditions are proposed in order to ensure the correctness of topology.
     (6) According to the importance of point, a digital watermarking algorithm of TIN-DEM is proposed. This algorithm inherits the characteristics of the algorithm considering topological features. And according to the importance of point, some constraint conditions are established in order to minimize the impact of watermark embedding on DEM accuracy. Simultaneously, this algorithm can achieve the purpose of“obtain the superior robustness by the small error cost”.
     (7) According to the theory of probability and statistics, the impact rule of watermark embedding on DEM accuracy is analyzed combining the error distribution of DEM data and the algorithms proposed above. Meanwhile, the impact formula is derived theoretically.
引文
[1]李志林,朱庆.数字高程模型[M].武汉:武汉大学出版社,2001.
    [2]王光霞.DEM精度模型建立与应用研究[D].郑州:解放军信息工程大学,2005.
    [3]孙圣和,陆哲明,牛夏牧.数字水印技术与应用[M].北京:科学出版社, 2004.
    [4]刘爱利. DEM近无损自适应数字水印算法研究[D].南京:南京师范大学,2007.
    [5]符浩军,朱长青,徐惠宁.基于小波变换的数字栅格地图水印算法[J].测绘科学. 2009, 34(3): 107-108.
    [6]闵连权.一种鲁棒的矢量地图数据的数字水印[J].测绘学报. 2008, 37(2): 262-267.
    [7]隋雪莲,王振国,耿则勋.一种用于版权通知和保护的遥感图像水印算法[J].遥感信息. 2007(3).
    [8]王向阳,杨红颖,侯丽敏.一种用于版权保护的混合域数字图像水印算法[J].测绘学报. 2006, 53(3): 240-244.
    [9]杨成松,朱长青,陶大欣.基于坐标映射的矢量地理数据全盲水印算法[J].中国图象图形学报. 2010, 15(4): 684-688.
    [10]朱长青,符浩军,杨成松.基于整数小波变换的栅格数字地图数字水印算法[J].武汉大学学报(信息科学版). 2009, 34(5): 619-621.
    [11]钱洪宝,周尔民,王启虹.数字水印技术在军事测绘保障中的应用初探[J].军事测绘. 2007(1): 56-57.
    [12]张丽娟,李安波,闾国年等. GIS矢量数据的自适应水印研究[J].地球信息科学. 2008, 10(6): 724-728.
    [13]王勋,林海,鲍虎军.一种鲁棒的矢量地图数字水印算法[J].计算机辅助设计与图形学学报. 2004, 16(10): 1377-1381.
    [14]闾国年,刘爱利.数字水印技术的DEM版权保护适用性研究[J].遥感学报. 2008, 12(5): 810-818.
    [15]王志伟,朱长青,殷硕文.一种基于DFT的DEM自适应数字水印算法[J].中国图象图形学报. 2010, 15(5): 796-801.
    [16] Tirkel A Z, Rankin G A, van Schyndel R M, et al. Electronic Water Mark[C].DICTA-93 Macquarie University. Sydney: 1993:666-673.
    [17] Van S R G, Z T A, F O C. A Digital Watermark[C].Proc IEEE Int Conf on Image Processing (ICIP'94). 1994:86-90.
    [18] Andrew B.Watson. DCT Quantization Matrices Visually Optimized for Individual Images[C]. in Proc.SPIE, Vol.1913, 1993:202-216.
    [19] J.Zhao, E.Koch. Embedding Robust Labels into Images for Copyright Protection [J].Technical Report, Fraunhofer Institute for Computer Graphics, Darmstadt, Germany, 1994.
    [20] Cox, I.J., Killian and T. Leighton et al. A Secure, Robust Watermark for Multimedia [J]. Workshop on Information Hiding, Newton Institute, Univ. of Cambridge. May 1996:1-16.
    [21] J. C I, L. M M. A Review of Watermarking and the Importance of Perceptual Modeling[C].Human Vision and Electronic Imaging II. California,USA: 1997.
    [22] Chun Hsien Chou, Yun Chin Li. A Perceptually Tuned Sub-band Image Coder Based on the Measure of Just-noticeable-distortion Profiles[C]. IEEE transactions on circuits and systems for video technology, 1995:467-476.
    [23] Andrew B.Watson, Gloria Y.Yang, Joshua A. Solomon et al. Visibility of Wavelet Quantization Noise[C]. IEEE Transactions on Image Processing, Vol.6, No.8, August 1997:1164-1175.
    [24] J.F.Delaigle, C.De Vleeschouwer and B.Macq. Watermarking Algorithm Based on A Human Visual Model[C]. Signal Processing, 1998:319-335.
    [25]黄继武.一种自适应图像水印算法[J].自动化学报,1999(25):476-482.
    [26] Maity S P, Kundu M K. An Image Watermarking Scheme Using Hvs Characteristics and Spread Transform[C].17th International Conference on Pattern Recognition. 2004:869-872.
    [27]王向阳,杨红颖,邬俊.基于内容的离散余弦变换域自适应遥感图像数字水印算法[J].测绘学报. 2005, 4(4): 324-330.
    [28] M.Kutter, S.K. Bhattacharjee and T.Ebahimi. Towards Second Generation Watermarking Schemes[C]. International Conference on Image Processing, 1999:320-323.
    [29] Z.Ji, W.W.Xiao, J.H.Wang and J.H.Zhang. A Rotation and Scaling Invariant Second Generation Watermarking Scheme[C]. IEEE Region 10 Conference on Computers, Communications, Control and Power Engineering, Oct, 2002:921-924.
    [30] P.Bas, J.M.Chassery and B.Macq. Geometrically Invariant Watermarking Using Feature Points. IEEE Transacions on Image Processing, 2002:1014-1028.
    [31]王向阳,侯丽敏,杨红颖.基于图像特征点与伪Zernike矩的鲁棒水印算法研究[J].计算机研究与发展, 2008. 45(5): 772-778.
    [32]李雷达,郭宝龙,武晓钥.一种新的空域抗几何攻击图像水印算法[J].自动化学报. 2008, 34(10): 1235-1242.
    [33]李传目,洪联系,万春.基于SIFT特征点的抗几何攻击水印算法[J].光电子激光. 2009, 20(6): 802-806.
    [34]邓成,高新波.基于SIF T特征区域的抗几何攻击图像水印算法[J].光子学报. 2009, 38(4): 1005-1010.
    [35] A.Miyazaki and A.Okamoto. Analysis of Watermarking Systems in the Frequency Domain and Its Application to Design of Robust Watermarking Systems. ICIP, 2001:506-509.
    [36] C.S.Shieh, H.C.Huang, F.H.Wang and J.S.Pan. Genetic Watermarking Based on Transform-domain Techniques [J]. Pattern Recognition, 2004, 37(3):555-565.
    [37] S.Pereira, S.Voloshynoskiy and T.Pun. Optimal Transform Domain Watermarking Embedding via Linear Programming [J]. Signal Processing, 2001, 81(6):1251-1260.
    [38] J.Tzeng, W.L.Hwang and I.L.Chen. Enhancing Image Watermarking Methods with/without Reference Images with Optimizations by Second Ordered Statistics [C]. IEEE Transactoins on Image Processing, 2002, 11(7):771-783.
    [39] M.Ashourian, Z.M.Yusof, S.H.S.Salleh and S.A.R.S.Bakar. Design of Image Watermarking System in Subband Transform Domain with Minimum Distortion [C]. TENCON2000. Processing,2000:379-382.
    [40] P.H.W.Wong and O.C.Au. A Blind Watermarking Technique in JPEG Compressed Domain [C]. Pro. Of 2002 IEEE int. Conf. on Image Processing (ICIP), 2002, 3:497-500.
    [41] R.Praun, H.Hoppe and A.Finkelstein. Robust Mesh Watermarking [C]. Annual Conference Series Computer Graphics Processing, 1999:49-56.
    [42] T.Harte and A.G.Bors. Watermarking 3D Models [C]. International Conference on Image Processing, 2002:661-664.
    [43] Z.Q.Yu, H.S.Ip and L.F.Kowk. A Robust Watermarking Scheme for 3D Triangular Mesh Models [J]. Pattern Recognition, 2003, 36(11):2603-2614.
    [44] Z.Q.Yu, H.S.Ip and L.F.Kowk. Robust Watermarking of 3D Polygonal Models Bansed on Vertex Scrambling [C]. Processing of Computer Graphics International, 2003:254-257.
    [45]喻志强,叶豪盛等.稳健的三角形网格数字水印技术[J].计算机应用,20022,2(9):94-96.
    [46]喻志强,赵荣椿等.自适应于局部几何特征的三维模型水印算法[J].计算机工程与应用. 2002(22):23-27.
    [47]朱晓冬等.一种三维模型数字水印算法的设计与实现[J].计算机应用与软件, 2004. 21(9): 98-100.
    [48] R.Ohbuchi, H.Masuda and M.Aono. watermarking Three-Dimensional Polygonal Models through Geometric and Topogical Modifications [C]. IEEE Journal on Selected Areas in Communications, 1998, 16(4):551-560.
    [49] F.Cayre and B.Macq. Data Hiding on 3D Triangle Meshes [C]. IEEE Transactions and Signal Processing, 2003, 51(4):939-949.
    [50] R.Ohbuchi, H.Masuda and M.Aono. Watermarking Multiplr Object Types in Three-Dimensional Models [C]. Multimedia and Security Workshop at ACM Multimedia’98, 1998.
    [51] R.Ohbuchi, H.Masuda and M.Aono. Embedding Data in 3D Models [C]. Proc. Of European Workshop on Interactive Distributed Multimedia Systems and Telecommunication Service,
    [52]刘旺,孙圣和.基于三维DCT变换的NURBS模型鲁棒数字水印嵌入算法[J].电子测量与仪器学报, 2005. 19(6): 1-5.
    [53]刘旺,孙圣和.基于DCT的三维网格模型数字水印算法[J].测试技术学报, 2007. 21(4): 329-335.
    [54]刘旺,孙圣和.基于DFT的鲁棒三维网格模型数字水印算法[J].计算机工程与应用, 2006. 42(14): 192-196.
    [55]张小梅,刘泉.基于全局几何特征的三维模型数字水印算法[J].武汉理工大学学报, 2007. 29(12): 123-126.
    [56]胡敏等.基于几何特征的自适应三维模型数字水印算法[J].计算机辅助设计与图形学学报, 2008. 20(3): 390-394.
    [57]罗永等.数字高程模型数据整数小波水印算法[J].软件学报, 2005. 16(6):1096-1103.
    [58] Xuchong, L., W. Jianxin and L. Yong. Lossless DEM Watermark Signature Based on Directional Wavelet [C]. in Image and Signal Processing, 2009. CISP '09. 2nd International Congress on. 2009:1-5.
    [59]何密等.基于EMD的DEM数据信息伪装技术[J].计算机应用, 2007. 27(6): 1345-1348.
    [60]刘水强,陈继业,朱鸿鹏.基于经验模式分解的数字高程模型数据伪装方法[J].武汉大学学报:信息科学版, 2008. 33(6): 652-655.
    [61]何密,罗永,成礼智.数字高程模型数据的无损数字水印[J].计算机工程与应用, 2007. 43(30): 40-43.
    [62]闾国年,刘爱利.数字水印技术的DEM版权保护适用性研究[J].遥感学报, 2008(5): 810-818.
    [63]刘爱利,闾国年.基于DCT域数字水印技术的DEM版权保护研究[J].地球信息科学, 2008. 10(2): 214-223.
    [64] He, X. and J. Liu. A Digital Watermarking Algorithm for DEM Image Based on Stationary Wavelet Transform. in Information Assurance and Security, 2009. IAS '09. Fifth International Conference on. 2009:221-224.
    [65]周启鸣,刘学军.数字地形分析[M].北京:科学出版社, 2006.
    [66]陈辉,郭科,郑文峰.数字水印技术应用于遥感图像版权保护的评测标准研究[J].物探化探计算技术. 2008, 30(5): 436-441.
    [67] Ren N, Zhu C Q. Semi-Blind Watermark Algorithm for High- Resolution Remote Sensing Images Based On Key Matrix[C].The 2nd International Conference on Image Analysis and Signal Processing. Xia Men, China: 2010:262-265
    [68] [华先胜,石青云.局部化数字水印算法[J].中国图象图形学报. 2001, 6(7): 642-647.
    [69]金聪.数字水印理论与技术[M].北京:清华大学出版社, 2008.
    [70]孙圣和,陆哲民.数字水印处理技术[J].电子学报. 2000, 28(8): 85-95.
    [71]杨义先,钮心析.数字水印理论与技术[M].北京:高等教育出版社, 2006.
    [72]赵翔,林郝.数字水印综述[J].计算机工程与设计. 2006, 27(11): 1946-1950.
    [73]陈述彭,童庆喜,郭华东.遥感信息机理研究[M].北京:科学出版社, 1998.
    [74]朱述龙,张占睦.遥感图象的获取与分析[M].北京:科学出版社, 2002.
    [75]陈辉,郭科,郑文峰.数字水印技术应用于遥感图像版权保护的评测标准研究[J].物探化探计算技术. 2008, 30(5): 436-441.
    [76] M B, F B, V C. Near-Lossless Digital Watermarking for Copyright Protection of Remote Sensing Images[J]. Internal Geoscience and Remote Sensing Symposium(IGARSS) V3. 2002: 1447-1449.
    [77] Drira F, Denis F, Baskurt A. Image Watermarking Technique Based On the Steerable Pyramid Transform[J]. Wavelet Applications in Industrial Processing. 2004, 5607: 165-176.
    [78] Reddy P R, Dr. Prasad M V N K, Rao D D S. Robust Digital Watermarking of Images Using Wavelets[J]. International Journal of Computer and Electrical Engineering. 2009, 1(2): 1793-8198.
    [79] Hassanien A E. A Copyright Proction Using Watermarking Algorithm[J]. Informatica. 2006, 17(2): 187-198.
    [80]李旭东.基于分块DCT和量化的图像盲水印算法[J].计算机工程. 2006, 32(21): 139-144.
    [81]郗坤洪,叶瑞松.基于DCT和混沌的双重图像水印算法[J].计算机工程. 2009(4).
    [82]葛万成,朱春生,陈康力.基于DCT域直流分量的数字水印技术[J].同济大学学报(自然科学版). 2004, 32(6): 795-798.
    [83]方春,张翠芳,王宏霞等.基于整数DCT变换的新水印算法[J].中国图象图形学报. 2008, 13(9): 1694-1700.
    [84]危蓉,廖振松,徐伟.基于视觉特征和DCT变换的数字水印[J].计算机工程. 2007(4).
    [85] G F, Ym Y. Adaptive Dct Based Digital Watermarking Scheme[C].Information Technology for Manufacturing Systems. Macao, China: 2010:1136-1142
    [86] Agreste S, Andaloro G. A New Approach to Pre-Processing Digital Image for Wavelet-Based Watermark [J]. Journal of Computational and Applied Mathematics. 2008, 221(2): 274-283.
    [87] Lin S D, Shie S, Guo J Y. Improving the Robustness of Dct-Based Image Watermarking Against Jpeg Compression [J]. Computer Standards & Interfaces. 2010, 32(1): 54-60.
    [88] Chang C, Lin C, Tseng C, et al. Reversible Hiding in Dct-Based Compressed Images [J]. Information Sciences. 2007, 177(13): 2768-2786.
    [89] Huang F, Guan Z. A Hybrid Svd-Dct Watermarking Method Based On Lpsnr [J]. Pattern Recognition Letters. 2004, 25(15): 1769-1775.
    [90] I G V, J P L, V S. Svd-Based Approach to Transparent Embedding Data Into Digital Images[J]. Lecture Notes in Computer Science(S0302-9743). 2001: 263-274.
    [91] Bhatnagar G, Raman B. Robust Watermarking Using Distributed Mr-Dct and Svd[C].2009Seventh International Conference on Advances in Pattern Recognition. 2009:21-24
    [92]李旭东,张振跃.利用矩阵范数实现的公开水印技术[J].计算机辅助设计与图形学学报. 2005, 17(8): 1857-1861.
    [93]胡珂,钟裕标,刘丽华.数字航空影像辐射信息精处理问题的探讨[J].测绘与空间地理信息. 2007, 30(3): 162-164.
    [94]冯茂岩,冯波,沈春林.基于分块DCT变换和Arnold置乱的自适应图像水印算法[J].计算机应用. 2008, 28(1): 171-173.
    [95]向德生,熊岳山.基于DWT的图像水印算法研究[J].计算机工程与设计. 2005(3): 611-613.
    [96]张秋余,李凯.基于混沌和SVD-DWT的稳健数字图像水印算法[J].计算机应用研究. 2010, 27(718-720).
    [97] Panda J, Bisht J, Kapoo R, et al. Digital Image Watermarking in Integer Wavelet Domain Using Hybrid Technique[C].2010 International Conference on Advances in Computer Engineering. 2010:163-197
    [98]苏庆堂.基于整型小波变换的彩色图像盲水印算法[J].计算机应用研究. 2009, 26(6): 2168-2172.
    [99]荣星,高承实.一种基于复合混沌序列的扩频水印算法[J].计算机应用研究. 2010, 27(2): 704-706.
    [100]赵玉霞,康宝生.基于混沌系统与提升小波的彩色图像盲水印算法[J].计算机应用研究. 2010, 27(1): 247-250.
    [101] Taherinia A H, Jamzad M. A Robust Image Watermarking Using Two Level Dct and Wavelet Packets Denoising[C].2009 International Conference on Availability, Reliability and Security. 2009:223-227
    [102] Huai-Bin W, Hong-Liang Y, Chun-Dong W, et al. A New Watermarking Algorithm Based On Dct and Dwt Fusion[C].2010 International Conference on Electrical and Control Engineering. 2010:2614-2617
    [103]孙中伟,冯登国. DCT变换域乘嵌入图像水印的检测算法[J].软件学报. 2005, 16(10): 1798-1804.
    [104] M K, H T. A Watermarking Scheme Based On the Characteristic of Addition Among Dct Coefficients[C].Information Security: Third International Workshop. Wollongong, Australia: 2000
    [105]张伟,陈新龙,詹斌.基于DCT的图像水印算法研究与实现[J].计算机技术与发展. 2009, 19(9): 157-159.
    [106]黄继武,Shi Yun Q.,程卫东. DCT域图像水印:嵌入对策和算法[J].电子学报. 2000, 28(4): 57-60.
    [107]刘传才,傅晓菲. DCT域中DC分量上嵌入水印的稳健性检验[J].计算机工程与应用.2001(21): 13-15.
    [108]梁杰,李吉星.一种基于DCT变换的盲水印检测算法[J].武汉大学学报(信息科学版). 2004, 29(7): 632-634.
    [109]李诺,闫德勤.一种二维DCT彩色图像数字水印的新算法[J].计算机工程与应用. 2007(2): 43-45.
    [110]朱从旭,陈志刚.一种基于混沌映射的空域数字水印新算法[J].中南大学学报(自然科学版). 2005, 36(2): 272-276.
    [111]邵利平,覃征,衡星辰.一种基于图像置乱变换的空域图像水印算法[J].计算机工程. 2007, 33(2): 122-124.
    [112]周熠.基于小波变换和视觉掩蔽的自适应水印方案[J].红外与激光工程. 2004, 33(5): 524-527.
    [113]赵辉,余波,陈建勋.基于小波变换和人类视觉系统的盲数字水印算法[J].计算机技术与发展. 2008, 18(9): 141-144.
    [114]刘瑞祯,谭铁牛.基于奇异值分解的数字图像水印方法.[J].电子学报. 2001, 29(2): 168-171.
    [115]李旭东.抗几何攻击的空间域图像数字水印算法[J].自动化学. 2008, 34(7): 832-837.
    [116]方艳梅,黄继武.基于CDMA扩频技术的图象水印算法[J].中国图象图形学报. 2003, 8(11): 1314-1319.
    [117]黄达人,刘九芬,黄继武.小波变换域图像水印嵌入对策和算法[J].软件学报. 2002, 13(7): 1290-1297.
    [118]钱洪宝,周尔民,王启虹.数字水印技术在军事测绘保障中的应用初探[J].军事测绘. 2007(1): 56-57.
    [119]张丽娟,李安波,闾国年等. GIS矢量数据的自适应水印研究[J].地球信息科学. 2008, 10(6): 724-728.
    [120]王勋,林海,鲍虎军.一种鲁棒的矢量地图数字水印算法[J].计算机辅助设计与图形学学报. 2004, 16(10): 1377-1381.
    [121] Ro P, Dn V. A Robust Digital Watermarking Scheme for Video Copyright Protection in the Wavelet Domain[J]. MEASUREMENT. 2010, 43(10): 1720-1726.
    [122]张专成,张殿富,闫小萍.一种鲁棒的基于DWT域自适应量化步长的图像盲水印算法[J].中国图象图形学报. 2006(6): 840-847.
    [123] Wang H, Lu L, Que D, et al. Adaptive Audio Digital Watermark Algorithm Based On M-Sequence Modulation[J]. Signal Processing, 2004. Proceedings. ICSP '04. 2004 7th International Conference on. 2005, 3: 2401.
    [124]吴一全,庞磊.基于Contourlet变换的抵抗几何攻击的视频水印算法[J].系统仿真学报. 2009, 21(7): 1969-1973.
    [125]赵耀.基于小波变换的抵抗几何攻击的鲁棒视频水印[J].中国科学. 2006, 36(2): 137-152.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700