图像数字水印理论与技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着数字多媒体技术的发展,数字水印技术已经成为数字版权保护领域研究的一个热点问题。数字水印技术是将特定的信息嵌入到数字媒体中,从而保护数字媒体的安全。数字水印技术的应用除了版权保护,还包括内容认证、隐蔽通信和数据嵌入等等很多方面。在这些应用中,水印被嵌入到宿主数据中,这种嵌入应该是不可见的,并且对于含水印数据的各种可能的操作具有鲁棒性。也就是说从失真变形的含水印数据中仍能够可靠地将水印提取出来。开发鲁棒性的数字水印技术是水印领域研究的热点和难点,也是数字水印技术真正实现广泛的商业化应用必须解决的一个课题。
     本文以静止数字图像水印作为研究对象,对整个数字水印技术进行了系统性的研究。对数字水印的嵌入方法、检测方法、水印的构造方法进行了深入研究;对影响数字水印设计方法有效性的系统指标,如检测器的统计特性、水印容量等问题,运用通信理论和信号检测知识进行了理论分析。
     着重对频域数字水印技术进行研究,致力于鲁棒性的数字水印方法设计。提出一种基于HVS特性的DCT域图像自适应盲水印算法。将HVS对于图像感知的三个主要特征:背景照度特性、频率掩蔽(masking)特性和纹理掩蔽特性,进行量化处理,形成三个掩蔽因子:背景照度掩蔽因子、频率掩蔽因子和纹理掩蔽因子,作为控制水印嵌入的权值。这三个掩蔽因子是和分块DCT系数结合在一起的,根据图像的局部区域特征计算掩蔽因子,使其达到图像自适应性。
     对于抗几何攻击的数字水印方法,本文提出了一种新的鲁棒性大容量数字水印方法。此方法将水印嵌入在图像边缘的DFT幅值中,同时保持图像的平滑区域不变,从而使保真度得到提高。此方法可将2304bits的信息嵌入到512×512大小的图像中。试验结果表明本文提出的方法可以在提高水印嵌入容量、深度的同时保持很高的保真度。此方法采用半盲水印检测技术,利用原始图像的边缘信息图作为检测器的边带信息(side information),这大大减
With the development of digital multimedia technology, digital watermark has become a popular topic in the field of digital copyright protection. Digital watermark servers as protection the securities of digital multimedia by embedding special information into it. Applications of watermarking include not only copyright protection, but also document authentication, covert communications and data embedding, etc. In these applications, a watermark is embedded within a host data. This embedding should be nearly imperceptible and robust against possible manipulations of the watermarked data, in the sense that it should be possible to reliably extract the watermark in a degraded version of the signal. Degradations include operations such as addition of noise, filtering, compression and geometrics distortion. These degradations could be intentional (due to an adversary) or nonintentional (e.g. due to a common image processing). The designing of a watermark resistant to these distortions is still an open problem. Robustness is crucial for watermarking technology in order to be used widely in commercial areas.
    This paper takes still images as example, systematically studied the technology of digital watermarking. The frameworks and methods of embedding, detection and watermark signal encoding were presented. Theoretical analyses of the watermark detector's statistical characteristics and the channel capacity was presented. These are helpful for development efficient watermarking schemes.
    This paper focused on the study of watermarking schemes in frequency domain and tried to develop robust watermarking methods. A DCT domain blind watermark scheme was proposed, which is image self-adaptive and taking into account the HVS. Three masking factors of luminance, frequency and texture were formulated according to the local characteristics of the host image. These three factors were calculated directly according to the 8x8 DCT blocks coefficient.
引文
[1] E A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Information Hiding- A Survey", in Proceedings IEEE, Special Issue on Identification and Protection of Multimedia Information, Vol.87, No.7, July 1999, pp. 1062-1078
    [2] F.A.P. Petitcolas and M. G. Kuhn: StirMark software, available from www.cl.cam.ac.uk/~fapp2/watermarking/image_watermarking/stirmark/.
    [3] Pierre Moulin and Ralf Koetter, Data-Hiding Codes, July19, 2005
    [4] J.A.Bloom, I.J. Cox, T.Kalker, J.-P. M.G Linnartz, M. L. Miller and C.B.S. Traw, "Copy Protection for Ditital Viedo," Proceedings IEEE, Special Issue on Identification and protection of Multimedia Information, Vol. 87, No7, July 1999, pp. 1267-1276.
    [5] C. Herley, "Why Watermarking is Nonsense," IEEE Signal Processing Magazine, Vol. 19, No. 5, Sep.2002, pp.10-11.
    [6] P.Moulin, "Comments on 'Why Watermarking is Nonsense'", IEEE Signal Processing Magazine, Vol.20, No.6, Nov.2003, pp. 57-59.
    [7] F. Bartolini, A. Tefas, M. Barni and I. Pitas, "Image Authentication Techniques for Surveillance Applications," Proc. IEEE, Vol.89, No.10, Oct.2001, pp. 1403-1418.
    [8] E. Martinian and G.W.Wornell, "Authentication with Distortion Constraints", Proc. IEEE Int. Conf. on Image Processing, Rochester, NY, 2002, pp. II. 17-20.
    [9] J. Kelley, "Terror Groups Hide Behind Web Encryption," USA today, Feb. 5, 2001. Available from www.usatoday.com/life/cyber/tech/2001-02-05-binladen, htm
    [10] A. Baros, F. Franco, D. Delannay and B. Macq, "Rate-Distortion Analysisof Steganography for Conveying Stereovision Disparity Maps, " proc. SPIE, Vol. 5306, San Jose, CA, Jan. 2004.
    [11] I. J. cox, M. L. Miller and J. A. "Bloom, Digital Watermarking, " Morgan-Kaufmann, San Francisco, 2002
    [12] 王秋生.变换域数字水印嵌入算法研究[D].哈尔滨:哈尔滨工业大学,2001。
    [13] K. Tanaka, Y. Nakamura and K. Matsui, "Embedding Secret Information into a Dithered Multi-level Image, " Proc. IEEE Milcom, 1990, pp. 216-220
    [14] 石麟,数字水印和多媒体信息安全的研究背景及其意义,中国教师联盟,www.unjs.com
    [15] I. J. Cox, J. Kilian, F. T. Leighton and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia, " IEEE Trans. Image Proc., Vol. 6, No. 12, Dec. 1997, pp. 1673-1687.
    [16] M. D. Swanson, M. Kobayashi and A. H. Tewfik, "Multimedia Data-Embedding and Watermarking Technologies, " proc. IEEE, Vol. 96, No. 6, June 1998, pp. 1064-1087.
    [17] B. Chen and G. W. Wornell, "Quantization Index Modulation Methods: A Class of Provably Good Methods for Digital Watermarking and Information Embedding, " IEEE Trans. Information Theory, Vol. 47, No. 4, May2001, pp. 1423-1443.
    [18] [18] P. Moulin and J. A. O'Sullivan, "Information-Theoretic Analysis of Information Hiding, " IEEE Trans. On Information Theory, Vol. 49, No. 3, 2003, pp. 563-593.
    [19] M. F. Mansour and A. H. Tewfik, "Attacks on Quantization-based Watermarking Schemes, " Proc. 7th Int. Symp. On signal Processing and Its Applications, July 2003, pp. 367-370.
    [20] V. Solachidis and I. Pitas, "Circularly symmetric watermark embedding in 2-D DFT domain", IEEE int. Conf. on Acoustics, Speech and Signal??Processing (Icassp'99), Phoenix, 1999, Vol. 6, pp. 3469-3472.
    [21] J. J. K. O. Ruanaidh and T. Pun "Rotation, Scale and Translation lnvariant Digital Image Watermarking, " IEEE International Conference on Image Processing, Santa Barbar, October 1997, pp. 536-539.
    [22] S. Pereira and T. Pun, " Robust Template Matching for Affine Resistant Image Wateramarks, " IEEE Trans. On Image Processing, Vol. 9, No. 6, June 2000, pp. 1223-1229.
    [23] R. Caldelli, M. Bami, F. Bartolini and A. Piva, "Geometric-Invariant Robust Watermarking Through Constellation Matching in the Frequency Domain, " Proc. ICIP, Vancouver, B. C., pp65-68, Sep. 2000.
    [24] Zheng, D. Zhao, J. El Saddik, A. "RST-invariant digital image watermarking based on log-polar mapping and phase correlation" IEEE Transactions on Circuits and Systems for Video Technology, Vol. 12, Issue: 8, Aug. 2003, pp1753-765.
    [25] Hyung Shin Kim, Heung-Kyu Lee, "Invariant image watermark using Zernike moments" IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, Issue 8Aug. 2003, pp. 766-755.
    [26] D. Simitopoulos, D. E. Koutsonanos, and M. G. Strintzis, "Robust Image Watermarking Based on Generalized Radon Transformations, " IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 8, August 2003.
    [27] M. Holliam, N. Memon, and M. Yeung, "On the Need for Image Dependent Keys in Watermarking, " Proc. 2nd Workshop on Multimedia, Newark, N J, 1999.
    [28] G. Depovere and T. Kalker, "Secret Key Watermarking with Changing Keys, " proc. Int. conf. on Image Proc., Vol. Ⅰ. 10-13, Vancouver, Canada, Sep. 2000
    [29] M. D. Swanson, B. Zhu and A. H. Tewfik, "Multiresolution Scene-Based??Video Watermarking Using Perceptual Models, " IEEE j. Selected Areas in Comm., Vol. 16, No. 4, May 1998, pp. 540-550.
    [30] J. L. Cannons and P. Moulin, "Design and Statistical analysis of a Hash-Aided Image Watermarking System, " IEEE Trans. On Image processing, vol. 13, No. 10, Oct. 2004, pp. 1393-1408.
    [31] I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, " A secure robust watermark for multimedia, " in Information Hiding(G. Goos, J. Hartmanis, and J. Leeuwen, eds. ) vol. 1174 of Lecture Notes in Computer Science, ( University of Cambridge, UK),, Springer-Verlag, May 1996, pp. 185-206.
    [32] A. herrigel, J. O'ruanaidh, H. Petersen, S. Pererira, and T. Pun, "Secure copyright protection techniques for digital images, " in Information Hiding(D. Aucsmith, ed. ), Vol. 1525 of Lecture Notes in Computer Science, (Berlin), Springer-Verlag, 1998, pp. 169-190.
    [33] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, "Attacks on copyright marking systems, " in Proc. 2nd International Workshop on Information Hiding, Portland. OR, Apr. 1998, pp 15-17.
    [34] 张冠男,“数字水印技术研究综述”,2003.10.18,http://jludm.jlu.edu.cn/lab/acd/20031005_zhangguannan.doc
    [35] J. R. Hernandez, M. Amado, and F. Perez-Gonzalez, "DCT-Domain Watermarking Techniques for Still Images: Detector Performance Analysis and a New Structure", IEEE Trans. Image Processing, Vol. 9, January 2000, pp. 55-68.
    [36] J. J. K. O. Ruanaidh and T. Pun, "Rotation, scale and translation invariant spread spectrum digital image watermarking", Signal Processing, vol. 66, no. 3, May 1998, pp. 303-318.
    [37] Kenneth R. Castleman "Digital Image Processing" 1996 by Prentice Hall, Inc.[38] Pierre Moulin and Ralf Koetter "Data-Hiding Codes", University of Illinois, July19, 2005
    [39] M Kutter, S Winkler, "vision-based masking model for spread-spectrum image watermarking", IEEE Transactions on Image Processing, vol.11,No.1,January 2002A
    [40] P.Moulin and A. Ivanovic, "The Zero-Rate Spread-spectrum Watermarking Game," IEEE Transactions on Signal Processing, Vol.51, No.4, Apr.2003, pp.1098-1117.
    [41] H. Malvar and D.Florencio, "Improved Spread Spectrum: A new Modulation Technique for Robust Watermarking," IEEE Trans. Signal processing, Vol.51, no.4, April 2003, pp.898-905.
    [42] T. Liu and P. Moulin, "Error exponents for watermarking game with squared-error constraints," proc. Int. Symp. on Info Theory, Yokohama, Japan, July 2003.
    [43] C.-T. hsu and J.-L. Wu. Hidden digital watermarks in images. IEEE Transactions on Image Processing, 8(1), January 1999, pp58-68.
    [44] I.Cox, J. Killian, T. Leighton, and T. Shamoon. "Secure spread spectrum watermarking for images, audio and video." In proceedings of the IEEE int. Conf. on Image processing ICIP-96, Lausanne, Switzerland, September 16-19 1996, pages: 243-246.
    [45] Briassouli, A.; Strintzis, M.G.; "Locally optimum nonlinearities for DCT watermark detection", Image Processing, IEEE Transactions on Volume 13, Issue 12, Dec. 2004 Page(s): 1604-1617
    [46] Saito, M. Kino, M. Wada,S. "HVS based wavelet watermarking with bit data embedded in color images", Communication Systems, 2002, ICCS2002. The 8th International Conference on volumel,25-28 Nov.2002 page9s):485-488 Voll.
    [47] Parker, K.M. Fowler,J,E, "Redundant-Wavelet Watermarking withPixel-wise Masking", Image processing 2005, ICIP 1005, IEEE International conference on Volumel, 11-14 sept. 2005 pages: 685-688
    [48] EI-Khamy, S. E; Lotty, M,I; Sadek, R.A, "A block based wavelet watermarking technique for copyright protection and authentication" Circuits and Systems,1003. MVVSCAS'03. PROCEEDINGS OF THE 46TH ieeeiNTERNATIONAL Midwest Symposium on Volume 1, 27-30 Dec. 2003 page(s):90-93
    [49] H.V. Poor, An Introduction to detection and estimation Theory, Springer-Verlag, 1994
    [50] S. Pereira and T. Pun, "Fast robust template matching for affine resistant image watermarks," in Proc. 3rd Int. Information Hiding Workshop, 1999, pp. 207-218.
    [51] C. Honsinger and M. Rabbani, "Data embedding using phase dispersion," in PICS 2000: Image Processing, Image Quality, Image Capture, Systems Conf., vol. 3, 2000, pp 264--268.
    [52] P.Bas, J-M. Chassery and B. Macq "Geometrically Invariant Watermarking Using Feature Points" IEEE Trans. Image Processing, vol. 11, Issue.9, pp.1014-1028, 2002
    [53] M.Alvarez-Rodriguez and F. Perez-Gonzalez, "Analysis of Pilot-Based Synchronization algorithms for Watermarking of Still Images," Signal Processing Image Communication, Vol. 17, pp.611-633, Sep. 2002.
    [54] H.C.Kim, H. Oguleye, O.Guitart, and E.J.Delp, "The Watermark Evaluation Test bed (WET) Project at Purdue University," Proc. SPIE, vol.5306, san Jose, CA, jan.2004
    [55] M.barni, F. Bartolini, A.De rosa, and A. Piva, "Capacity of the Watermark-Channel: How Many Bits Can Be Hidden Within a Digital Image?" University of Siena via Roma, Italy, 1999
    [56] Fan Zhang, HongbinZhang, "Digital Watermarking Capacity andReliability, " IEEE International Conference on E-Commerce Technology(CEC'04), pp. 259-298, 2004
    [57] S. Voloshynovskiy and T. Pun, "Capacity-security Analysis of Data Hiding Technologies", University of Geneva, Switzerland, ICEM, 2002
    [58] Deepa Kundur, "Energy Allocation for High-capacity Watermarking in The Presence of Compression, " University of Toronto, Canada, ICIP'2000
    [59] Ryo Sugihar, "Practical Capacity of digital watermark as constrained by reliability, " Tokyo Research laboratory, IBM japan, ltd, ITCC'2001
    [60] H. H. Lee, J. S. Lee, J. W. Kim, and J. U. Choi, "Watermarking Technique of Controlling the Data-Hiding Capacity, " Signal and Image Processing, 2003
    [61] Ruizhen Liu, Tieniu Tan "Theoretical framework for watermark capacity and energy estimation", Proc. SPIE, vol. 4675, Jan. 2002.
    [62] S. Craver, N. Memon, B. Yeo, et al. "Can invisible watermarks resolve rightful ownerships?" Technical Report RC20509. IBM Research Division, 1996
    [63] H. Marmolin, "Subjective MSE measures", IEEE Trans. On system, man and cybernetics, 16, 1986, pp486-489
    [64] N. B. Nill, "A visual model weighted cosine transform for image compression and quality assessment", IEEE Trans. On communication, vol. 6, 1985, pp1215-1232.
    [65] A. P. Bradley, " A wavelet visible difference predictor", IEEE Trans. On image processing, 8(5), 1999, pp717-730.
    [66] M. Miyahara, K. Kotani, and V. R. Algazi, "Objective picture quality scale (PQS) for image coding", IEEE Trans. On communications, 46(9), 1998, pp1215-1226.
    [67] R. G. van Schyndel, A. Z. Tirkel, N. R. A. Mee, C. F. Osborne, "A digital watermark, " in proceedings of the International Conference on Image Processing, November, 1994, Austin, Texas, vol. 2, pp. 86-90.[68] R.B. Wolfgang and E. J. Delp, "A Watermarking Technique for Digital Imagery: Further Studies," in Proceedings of the International Conference on Imaging Science, Systems, and Technology June30-July 3, 1997, Las Vegas, pp. 279-287
    [69] P.M.J. Rongen, M.J.J.J.B. Maes, and C.W.A.M. can Overveld, "Digital image watermarking by salient point modification practical result," in Proc. SPIE Electronic Imaging'99, vol.3657, 1999, pp273-282.
    [70] G. Depovere, T. Kalker and J.-P. Linnartz, "Improved watermark detection reliability using filtering before correlation," in Proc.5th IEEE Int. Conf. Image processing. ICIP98. vol. 1, Chicago. IL Oct4-7, 1998, pp: 430-434.
    [71] W. Bender, D. Gruhl, and N. Morimoto. "Techniques for Data Hiding." IBM Syst. J., Vol. 35, nos. 3-4, p. 313-336, 1996.
    [72] C.I. Podilchuk and Wenjun Zeng, "Image-adaptive watermarking using visual models," in IEEE Journal on Selected Areas in Communications, Vol. 16, Issue.4, may 1998, pp.525-539
    [73] T. Le-Tien, S.Y. Lee, T. Nguyen-Thanh, and T.D. Vo (Vietnam), "Improving the Robustness of Watermarking Approach for Copyright Protection", Communication and Computer Networks, 2004
    [74] D.Kundur, D.Hatzinakos, "A Robust digital Image Watermarking Method using Wavelet-Based Fusion", ICIP,1997
    [75] Maity, S.P; Kundu, M.K. "An image watermarking scheme using HVS characteristics and spread transform," Pattern Recognition, 2004. ICPR 2004. Proceedings of the 17th International Conference on Volume 4, 23-26 Aug. 2004 Page(s):869-871 Vol.4
    [76] Zhao, J. and E. Koch, "Embedding Robust Labels into Images for Copyright Protection", Proc. Of Intellectual Congress on Intellectual Property Rights for Specialized Information Knowledge and New Technologies, Vienna, Austria, pp.242-251, aug. 21-25,1995
    [77] 胡汉平等“基于协同学理论的数字水印检测技术研究”,电子技术应用,2004
    [78] 孙中伟,冯登国“DCT变换域乘嵌入图像水印的检测算法”,软件学报,Oct.2005,16(10):1798-1804
    [79] Chen, T P; Chen, T, "A framework for optimal blind watermark detection, " ACM Multimedia 2001 Workshops-Multimedia and Security: New Challenges; Ottawa, Ont; Canada; 05 Oct. 2001. pp. 11-14. 2001
    [80] Vassaux B, Bas P, Chassery J M. "A new CDMA technique for digital image watermarking, enhancing capacity of insertion and robustness, " [A]. 2001 International Conference on Image Processing, Thessaloniki, Greece, 2001.
    [81] 周利军,周源华。“基于直接序列扩频码的图像空间域水印技术”[J].软件学报,2002,13(2):298~303.
    [82] 孙锐,孙洪,赵晓岚.“基于量化的扩频水印技术”[J].通信技术,2002(2):63~66.
    [83] J. R. Hernandez and F. Perez-Gonzalez, "Statistical Analysis of Watermarking Schemes for Copyright Protection of Images". Proceedings of IEEE, vol. 87(7), 1142-1166.
    [84] 高琦,李人厚,王慧琴,党红梅,刘连山,“基于Gold码的扩频数字水印算法”,西安交通大学学报,第38卷,第2期,pp.119—123,2004年2月
    [85] J. J. Eggers, J. K. Su; B. Girod, "Robustness of a blind image watermarking scheme". Proceedings of ICIP2000, pp 17-20.
    [86] W. Zeng and B. Liu, "A Statistical Watermark Detection Technique Without Using Original Images for Resolving Rightful Ownerships of Digital Images". IEEE Transactions on Image Processing, vol. 8 No. 11, pp. 1534-1548, Nov. 1999.
    [87] G. K. Wallace, "The JPEG still picture compression standard, " IEEE Trans.??Consumer Electron., vol. 38, pp. 18-34, Feb. 1992.
    [88] R. J. Clarke, "Transform Coding of Images", New York: Academic, 1985.
    [89] K. A. Birney and T. R. Fischer, "On the modeling of DCT and subband image data for compression," IEEE Trans. Image Processing, vol. 4, pp. 186-193, Feb. 1995;.
    [90] 黄继武,Yun Q.SHI,程卫东,“DCT域图像水印:嵌入对策和算法”电子学报,2000,voL28(4):57—60
    [91] F. Hartung, J. K. Su, and B. Girod. "Spread spectrum watermarking: Malicious attacks and counterattacks". In Proc. SPIE Security and Watermarking of Multimedia Contents 99, San Jose, CA., January 1999.
    [92] Unzign watermark removal software. Technical report, http://altern.org/watermark/,July 1997.
    [93] M. Holliman and N. Memon. " Counterfeiting attacks on linear watermarking systems". In Proc. IEEE Multimedia Systems 98, Workshop on Security Issues in Multimedia Systems, Austin, Texas, June 1998.
    [94] S. Craver, N. Memon, B. L. Yeo, and M. M. Yeung. "Resolving rightful ownership with invisible watermarking techniques". IEEE J. Selec. Areas Communic. (Special Issue on Copyright and Piracy Protection), 16: 573-586, May 1998.
    [95] M. Kutter, S. Voloshynovskiy, and A. Herrigel. "Watermark copy attack." In Ping Wah Wong and Edward J. Delp, editors, IS&T/SPIE's 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content Ⅱ, volume 3971 of SPIE Proceedings, San Jose, California USA, Jan 2000, pp. 23-28.
    [96] G. C. Langelaar, R. L. Lagendijk, and J. Biemond. "Removing spatial spread spectrum watermarks by non-linear ltering. In Proc. Europ. Signal Processing Conf. (EUSIPCO 98), Rhodes, Greece, Sept. 1998.
    [97] H. S. Stone. "Analysis of attacks on image watermarks with randomized??coefficients". Technical report, NEC Res. Inst., Princeton, New Jersey, May 1996
    [98] S. Voloshynovskiy, S. Pereira, A. Herrigel, N. Baumgartner, and T. Pun. "A generalized watermark attack based on stochastic watermark estimation and perceptual remodulation. In Ping Wah Wong and Edward J. Delp, editors, IS&T/SPIE's 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content Ⅱ, volume 3971 of SPIE Proceedings, San Jose, California USA, 23-28 January 2000. (Paper EI 3971-34).
    [99] J. R. Hernandez, F. Perez-Gonzalez, J. M. Rodrigez, and G. Nieto. "Performance analysis of a 2-D-multipulse amplitude modulation scheme for data hiding and watermarking of still images". IEEE Journal on Selected Areas in Communications, 16(4), May 1998, 510-523.
    [100] A. Z. Tirkel, R. G. van Schyndel, and C. F. Osborne. "A two-dimensional digital watermark". In Dicta-95, pages 378-383, University of Queensland, Brisbane, December 6-8 1995.
    [101] 2003年度科技型中小企业技术创新基金若干重点项目指南.科学技术部编制,p.24.
    [102] http://www.alpvision.com
    [103] http://www.igd.fhg.de/igd-a8/index.html?projects/talisman/index.html
    [104] http://www.assuredigit.com
    [105] Ingemar J. Cox, Matt L. Miller and J.A. Bloom, "Watermarking applications and their properties", Conf. on Informations Technology'2000, Las Vegas, 2000
    [106] V. Licks and R. Jordan, "Geometric attacks on image watermarking systems: a survey," available on-line at: http://www.eece.unm.edu/vlicks/docs/survey.pdf,submitted,2003.
    [107] F. Deguillaume, S. Voloshynovskiy and T. Pun, "Method for the estimation??and recovering form general affine transforms in digital watermarking applications," in SPIE Photonics West, Electronic Imaging 2002, Security and Watermarking of Multimedia contents IV, San Jose, CA, january 2002, pp.20-24
    [108] M.K.Mihcak and R. Venkatesan, "New iterative geometric methods for robust perceptual image hashing," in Proceedings of ACM workshop on Security and Privacy in Digital Rights management, Philadelphia, PA, November 2001
    [109] I.B. Ozer, M. Ramkumar and A.N. akansu, "A new method for detection of watermarks in geometrically distorted images, " in proc. IEEE Int. Conf. on Acoustics, Speech and Signal Processing(ICASSP'00), Istanbul, turkey, June 2000
    [110] L.G. Brown, "A survey of image registration techniques," ACM Computing Surveys,vol.24,no.4, pp.325-376,1992
    [111] N.E Johnson, Z. Duric and S. Jajodia, "Recovery of watermarks from distorted images," in proc. 3rd. International Workshop on Information hiding, 1999, pp. 361-375
    [112] J.L.Dugelay and f.A.P, petitcolas, "Image watermarking: possible counterattacks against random geometric distortions," in proceedings of SPEI Vol.3971. Security and Watermarking of Multimedia Contents Ⅱ, vol.3971, San Jose, CA, January 24-26 2000
    [113] C.-Y.Lin, M.Wu,J.A.Bloom, I.J.Cox,M.L. Miller and Y.M.Lui, "Rotation, Scale, and Translation Resilient Watermarking for Images," IEEE Trans. On Image Proc., Vol. 10, No.5,May 2001, pp.767-782.
    [114] P. Loo and N.G. Kingsbury, "Watermarking using complex wavelets with resistance to geometric distortion," in Proc. EUSIPCO 2000Tampere, Finland, Sept.2000, pp5-8.
    [115] "Motion estimation based registration of geometrically distorted imagesfor watermark," in Proc Spie Conference on Security and Watermarking of Multimedia contents Ⅲ, San Diego, CA, January 2001.
    [116] M. Alghoniemy and A. H. Tewfik, "Geometric Distortions Correction in Image Watermarking," Proc. SPIE San Jose, CA, Vol. 3971, 2000, pp.82-89.
    [117] D. Delannay, I. Setyawan, rLlagendijk and B. Macq, "Relevant modelling and comparison of geometric distortions in watermarking systems," in Proceedings of SPIE. Application of Digital Image Processing XXV, vol. 4790, Seattle, 2002
    [118] D. J. Fleet and D. J. Heger, "Embedding invisible information in color images," in proc. IEEE International Conference on Image Processing (ICIP'97), Vol. 1, Santa Barbara, CA, 1997, pp. 532-535
    [119] A. Piva, M. Barni, F. Bartolini, V. Cappellini, a. De rosa and M. Orlandi, "Improving DFT watermarking robustness through optimum detection and synchronisation," in GMD report 85, Multimedia and Security workshop at ACM Multimedia'99, Orlando, USA, October 1999, pp.65-69
    [120] S. Pereira, J. J. K. O ruanaidh, f. Deguillaume, G. Csurka and Thierry Pun, "Template based recovery of fourier-based watermarks using log-polar and log-log maps," in IEEE Multimedia Systmes 99, International Conference on Multimedia Computing and Systems, vol. 1, Florence Itally, June1999, pp. 870-874.
    [121] D. Delannay, B. Macq and M. Barlaud, "Compensation of geometrical deformations for watermark extraction in the digital cinema application," in SPIE ELECTRONIC Imaging 2001, Security and watermarking of multimedia contents Ⅲ, San Jose, CA, January, 2001.
    [122] D. Delannay and B. Macq, "A method for hiding synchronization marks in scale and rotation resilient watermarking schemes," in SPIE Electronic Imaging 2002, Security and Watermarking of Multimedia contents Ⅳ, San Jose, CA, USA, February 2002.[123] A. herrigel, S. Voloshynovskiy and Y. Rytsar, " The watermark template attack," in SPIE Photonics West, Electronic Imaging 2001, Security and Watermarking of Multimedia Contents Ⅲ, W. Wong and e.J. Dip, Eds, no. San Jose, CA, USA, Jan 2001 pp.4314-4346.
    [124] S. Pereira and T. Pun, "An iterative template matching algorithm using the chirp-z transform for digital image watermarking," Pattern Recognition, vol.33, no.l, pp.173-175, Jan 2000
    [125] S. Voloshynovskiy, F. Deguillaume and T.Pun, "Multibit digital watermarking robust against local nonlinear geometrical distortions," in IEEE International Conference on Image Processing,ICIP2001,Thesaloniki, Greece,2001, pp.999-1002.
    [126] V.licks and R. Jordan, "On digital image watermarking robust to geometric transformations," in Proc. IEEE International Conference on Image processing, ICIP'00, Vancouver, 2000.
    [127] M.Kutter, "Watermarking resisting to translation, rotation, and scaling," in Proc.SPIE Multimedia Systems and Applications, Vol.3528, 1999, pp. 423-432.
    [128] D.Delannay and B. macq, "Generalized 2-D cyclic patterns for secret watermark generation," in ICIP2000-IEEE Signal Processing Society International Conference on Image Processing, Vol. Ⅱ, pp.72-79, Vancouver, Canada, September, 2000.
    [129] F.s.voloshynovskiy and T. Pun, "content adaptive watermarking based on a stochastic multi-resolution image modelling," in Tenth European Signal Processing Conference(EUSIPCO'2000), Tampere, Finlnad, Sep, 2000
    [130] P.Bas. J-M. Chassery, and B. macq, "Robust watermarking based on the warping of pre-defined triangular patterns," in proc. SPIE, JANUARY 2000.
    [131] P.Bas, J.M. Chassery and F. Davoine, "A Geometrical and FrequentialWatermarking Scheme Using Similarities," in EI'1999: Security and Watermarking of Multimedia Content Ⅰ, San Jose, CA, January 1999, pp. 264-272.
    [132] M. Celik, E. Saber, G. Sharma and A. M. Tekalp, "Analysis of feature-based geometry invariant watermarking," in Proceeding sof SPIE: Security and Watermarking of Multimedia Contents Ⅲ, vol. 4314, No. 31, January 2001.
    [133] M. J. J. J. B. Maes and C. W. A. M. van Overveld, "Digital watermarking by geometric warping," in IEEE Int. Conf. Image Processing, vol. 21998, pp. 424-426.
    [134] 朱秀昌,刘峰,胡栋,“数字图象处理图像通信”[M] 北京邮电人学出版社,2002年2月。
    [135] IngemarJ.Cox,Matthew L.Miller,Jeffrey A.Bloom著,王颖,黄志蓓等译,“数字水印”[M]电子工业出版社,北京。

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700