图像和视频水印嵌入新方法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
多媒体信息的数字化极大地提高了信息表达的效率和准确性,网络技术的飞速发展,为传播数字化产品提供了便捷廉价的途径。由于数字信息产品的复制不会产生模拟产品复制时出现的质量降低问题,任意复制传播数字产品的行为变得越来越泛滥。同时,各种图像、音视频编辑软件的应用也变得非常普及,一方面人们可以享受到其带来的便利,但另一方面也使得对数字产品的内容进行篡改变得很容易。
     为了解决这个问题,数字水印技术通过将一种不可见的标记嵌入到多媒体信息产品中,用以标识原创作者对作品的所有权或对信息的完整性进行验证。从本质上说,数字水印技术是信源编码在信息安全领域的应用,从信息处理的角度看,嵌入载体对象的水印信号可以看作是在强背景下叠加一个弱信号,只要叠加的水印信号强度低于人类视觉或听觉的感知门限,就可以在不引起人类感知的情况下嵌入水印信息。
     数字图像是网络上最常见到,也是最容易被随意拷贝和修改的多媒体信息,在所有的数字水印技术中,数字图像的水印技术是最受到关注和研究的。目前图像水印的基本实现方法是把载体当做信道,将待隐藏的水印信息用密钥扰乱,用各种方法嵌入到载体中,要求载体的变化不被感知,隐藏的水印信息经过传输和攻击后仍然可以检测提取出来,由此衍生出水印系统中的水印生成、嵌入、提取和攻击四大部分技术,其中水印的嵌入方法对系统性能具有决定性的影响。
     分形变换利用图像的自相似性进行压缩,可获得较传统算法高得多的压缩比,在未来会得到广泛应用。由于分形变换的实现机制非常特殊,传统的基于DCT、DWT的水印嵌入算法难以在分形变换中实现,因此必须根据分形变换的特点研究有针对性的水印嵌入方法。现有的基于分形变换的水印嵌入技术利用值域子块最佳匹配块的位置不变性,根据最佳匹配块所处的不同寻找区域来嵌入和提取水印,由于有些寻找区域的匹配块并不是最佳的,这些非最佳匹配块参与图像的重构,使水印图像质量有较大的降低,一些改进的算法虽然提高了图像质量,但存在水印容量低、鲁棒性不强的问题。基于对分形变换有关参数的研究,实现一种利用分形变换过程中的对比度因子参数嵌入水印的新方法,可以嵌入较大的水印容量,由于嵌入始终是基于最佳匹配块进行的,重构的水印图像质量很好,同时给出了相应的提取算法,提高了水印提取的准确度。
     水印检测和提取时需要原始数据和密钥的方案叫做私有水印方案或明水印方案,那些只需要密钥但不需要原始数据的方案叫公有水印或盲水印方案。通常私有水印在经过JPEG压缩和滤波等图像处理后的鲁棒性能比较好,然而私有水印方法在诸如DVD播放的水印探测中是不可行的,因为此时原始数据无法得到,在这种情况下,盲水印方案由于不需要原始数据就可以检测到水印就成为可行的方法,盲水印的缺点是鲁棒性较低,与私有水印相比有较高的虚警率,但它具有的实用性使其依然成为水印的研究热点。对DCT、DWT系数统计模型在水印检测中的性能进行分析,找出对水印系统虚警性能具有决定影响的因素,在此基础上实现两个利用块DCT和DWT变换的盲水印嵌入方法,通过对水印信号进行扩频处理延长水印的长度,在嵌入的过程中引入人眼视觉模型实现自适应嵌入,保证了水印检测过程中的低虚警率。算法简单实用,实验结果表明所提出的两种盲水印算法具有很好的安全性和鲁棒性。
     以电影、电视剧为代表的影视工业已经成为一个拥有巨大利润空间的产业,它的数字化同样带来了版权保护的问题。视频水印技术作为数字视听产品版权保护系统的核心技术而备受电子厂商和研究者的关注。H.264是一种新的视频编码方法,它具有的很多优良特性使它将成为下一代可应用的视频标准而获得广泛应用,它使用的帧内预测、1/4像素精度运动估计使它可获得比以前视频标准高得多的压缩比和视频质量,但它使用的这些新特性又不利于采用传统视频水印的方法来嵌入水印。在对帧内预测编码模型研究的基础上,实现了一种在H.264编码过程中快速嵌入水印的算法,提取水印时实现了盲检测,并且算法复杂度低可满足视频实时处理的需要。
     DRM数字版权管理系统是对有形和无形资产版权和版权所有者关系的定义、辨别、交易、保护、监控和跟踪的手段,它为数字媒体的商业运作提供了一套完整的实现手段。数字水印是DRM系统实现版权保护的基本手段,前述的鲁棒图像和视频水印算法可以抵抗试图祛除水印的攻击。协议攻击并不祛除水印,而是通过添加一个伪造的水印来干扰版权的认证,现有的鲁棒水印算法无法抵抗这种攻击,而数字签名是抵抗这种攻击的有效策略,因此将数字水印和PKI结合起来引入到DRM系统中,构造一个具备更完善版权保护功能DRM系统的应用框架,并对其进行了功能描述。
The digitization has offered great convenience for the storage and using of the multimedia information and improved the efficiency and accuracy of information expressing greatly at the same time. With the rapidly development of the computer and network technology, Internet has already become the most convenient and the low-priced way to propagate digital products which include electronic publication, digital audio and video, digital cartoon and picture and the limitless business opportunity has appeared with the development of E-commerce technology. But we must also face a new severe challenge which is duplicating, spreading and distorting illegally of digital products because the case of quality degradation which occurred frequently in analog reproduction do not take place while duplicating the digital information products, it is totally lossless to reproduce the digital information. With the performance strengthens and price reducing constantly of the various kinds of digital hardware products, the wanton behavior of duplicating the digital products overflows more and more. This is very unfavorable to those authors of digital works. Meanwhile the performance of the personal computer is stronger and stronger now, it is also popularized very much that the application of various kinds of software for editing picture, audio and video, on one hand people can enjoy the facility brought by these software, on the other hand tampering content of digital products become very easy.
     In order to solve this problem, digital watermarking technology is used to label the original creator's ownership or proving to the authenticity and integrality of the digital works through embedding a kind of invisibility mark into the multimedia information products. As a new effective technological means to the copyright protection and content authenticity of digital information products, the digital watermarking technology has already become the research focus of the field of information security nowadays.
     The digital image is the most common multimedia information on the network, which is also very easy to be copied and revised. The watermarking of digital image is paid the close attention among all digital watermarking technology and the basic principle and frame of the watermarking of digital image have been analyzed. Although some literatures consider watermarking detection should be the focal point that watermarking study at present, this paper still thinks that the embedding technology of watermarking is the determinant factor which deciding the performance of watermarking system and it is still necessary to study new embedding tactics according to the new transformation methods.
     There are three kinds of image watermarking embedding algorithm proposed in this paper. One is the watermarking embedding method based on the fractal transformation that is completely different from traditional method to realize the image compression, it contributes to resisting these kinds of attacks based on fractal transformation by embedding watermarking according to its characteristic. The other two are blind watermarking methods that realized by using the DCT and DWT coefficiences of the image blocks. It is of important practical value for this method because the primitive information is no needed when watermarking detection.
     The movie & TV industry represented by film and TV play has already become an industry with enormous profit space and its digitization has brought the question of copyright protection too because digital video watermarking may become key technology of the digital audio-visual products copyright protection system, which concerned by electronic manufacturer and researcher extremely. H.264 is a new kind of video coding standard and a lot of fine characteristics that it has make it become the applicable video standard of next generation and win extensive application, intra-frame prediction, 1/4 pixel precision movement estimate make it can obtain than before video standard high compression ratio and video quality much. But these new characteristics that it uses are unfavorable to the method to adopt traditional video watermarking to embedding the watermarking again. A quick embedding watermarking tactics based on H.264 coding standard was put forward to in this paper which can detect blindly the watermarking message and has low computer complexity.
     Digital Rights Management (DRM) system are intended to provide a controlled consumption of digital content to protect the intellectual property rights of the authors and the content providers. It specifies the permissions, constraints, obligations, conditions, and agreements with the holders of intellectual property for content usage. Digital watermarking is the basic method by which the DRM realize copyright protection. Robust watermarking methods can hold out the attacks which attempt to get rid of watermarking, but these methods can’t resist to the watermarking protocol attack which disturbing the copyright authentication through add a counterfeit watermarking rather than to get rid of watermarking. Digital signature is the effective tactics of resisting this kind of attack. Through analyzing structure of DRM system and application of watermark technology among them, the application frame of introducing to DRM system of combining digital watermarking and PKI is proposed in this paper, the function of the application frame was described and the performances of resisting to watermarking protocol attack was analyzed.
引文
[1] 汪小帆,戴跃伟,茅耀斌.信息隐藏技术-方法与应用.机械工业出版社, 2001.18~142
    [2] Bruce Schneier. 吴世忠,祝世雄,张文政等译.应用密码学-协议、算法与 C 源程序.机械工业出版社,2000. 1~32
    [3] FIPS 186. Digital Signature Standard. 1994. 22~49
    [4] Stefan Katzenbeisser, Fabien A.P.Petitcolas, editors. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, 2000. 4~22
    [5] 刘振华,尹萍.信息隐藏技术及其应用.科学出版社, 2002.11~35
    [6] G. B. Rhoads. Steganography System. United States Pattern, 1998. 1~44
    [7] J. Cox, M. L. Miller and J. A. Bloom. Digital watermarking. Morgan Kaufmann, 2002.17~24
    [8] G. Voyatzis and I. Pitas. The Use of Watermarks in the Protection of Digital Multimedia Products. Proceeding of the IEEE, 1998, 87(7): 1197~1207
    [9] A.Z.Tirkel, G.A.Rankin, R.M.vanSchyndel, et al. Electronic Water Mark. DICTA-93. Macquarie University, Sydney, Decmeber 1993. 666-672
    [10] I. J. Cox, J. Kilian, F. T. Leighton and T. Shamoon. Secure Spread Specturm Watermarking for Multimedia. IEEE Transaction on Image Processing, 1997, 6(12): 1673~1687
    [11] Pitas. A Method for Signature Casting on Digital Image. In: Proc of International Conference on Image processing, 1996.3: 215-218
    [12] G. Voyatzis and I. Pitas. Chaotic Watermark for Embedding in the Spatial Digital Image Domain. In: International Conference on Image Processing (ICIP'98), Oct. 4~7, 1998. 2: 432~436
    [13] Deepa Kundur and Dimitrios Hatzinakos. Digital Watermarking Using Multiresolution Wavelet Decomposition. In: Proceedings of IEEE ICASSP '98, Seattle, WA, USA, May 1998. 5: 2969 ~2972
    [14] W. Bender, D. Gruhl, and N. Morimoto. Techniques for Data Hiding. IBM Syst. J. 1996. 35(4):313~336
    [15] Boney L, Tewfik A, Hamdy K. Digital watermarks for audio signal. In: IEEE Int. Conf. on Multimedia Computing and System, 1996, 1: 473~480
    [16] J Brassil, S Low, NF Maxemchuk, et al. Electronic marking and identication techniques to discourage document copying. IEEE Journal on Selected Areas in Communications, 1995, 4:234~240
    [17] Matsui K,Tanaka K. Video-steganography: How to secretly embed a signature in a picture. In: IMA Intellectual Property Project Proceedings, 1994. 1: 187~206
    [18] Md Swanson, Mei Kobayashi, Ah Tewfik. Multimedia data-embedding and watermarking technologies. Proceedings of the IEEE, 1998, 87(7):324~329
    [19] Langelaar G C, Lagendijk R L, Biemond J. Real-time labeling methods for MPEG compressed video. In: 18th Symposium on Information Theory, 1997. 1: 25~32
    [20] F. Hartung and B. Girod. Watermarking of Uncompressed and Compressed Video. Signal Processing, Special Issue on Copyright Protection and Access Control for Multimedia Service, 1998, 66(3): 283~301
    [21] http://www. Digimarc. com
    [22] http://www. Alpvision. com
    [23] http://www.igd.fhg.de/igd-a8/index.html?projects/talisman/index.html
    [24] 2003 年度科技型中小企业技术创新基金若干重点项目指南.科学技术部编制.24
    [25] http://www.assuredigit.com
    [26] 王炳锡,陈琦,邓峰森.数字水印技术.西安电子科技大学出版社,2003.6~104
    [27] 孙圣和,陆哲明,牛夏牧等著.数字水印技术及应用.科学出版社,2004.1~385
    [28] R. Dugad, K. Ratakonda and N. Ahuja. A New Wavelet-based Scheme for Watermarking Image. In: International Conference on Image Processing, Oct. 4~7, 1998. 2: 419~423
    [29] X. D. Zhang, K. T. Lo, J. Feng and D. S. Wang. A Robust Image Watermarking Using Spatial-Frequancy Feature of Wavelet Transform. In: 5th International Conference on Signal Processing, Aug. 21~25, 2000. 2: 1100~1105
    [30] J. C. Yen. Watermark Embedded in Permuted Domain. Electronics Letters, 2001, 37(2): 80~81
    [31] G. R. Feng, L.G. Jing, et al. A Novel Algorithm for Embedding and Detecting Digital Watermarks. In: IEEE Internaional Conference on Acoustics, Speech and Signal Processing, April 6~10, 2003. 3: 549~552
    [32] S. Tsekeridou, N. Nikolaidis, N. Sidiropoulos et al. Copyright Protection of Still Image Using Self-similar Chaotic Watermarks. In: International Conference on Image Processing, Sept. 10~13, 2000. 1: 411~414
    [33] J. W. Huang and Y. Q. Shi. Emdedding Image Watermarking Gray Level Images. In: The 2001 IEEE International Symposium on Circuits and Systems, 2001. 5: 239~242
    [34] Y. C. Chen and L. W. Chang. A Security and Robust Digital Watermarking Technique by the Block Ciper RC6 and Secure Hash Algorithm. In: International Conference on Image Processing, 2001. 2: 518~521
    [35] X. Niu and S. H. Sun. Adaptive Gray level Digital Watermark. In: Proceedings of IEEE International Conference on Signal Processing, Beijing, China, 2000. II: 1293~1296
    [36] Y. S. Seo, M. S. Kim, H. J. Park, et al. A Secure Watermarking for JPEG-2000. In: Internional Conference on Image Processing, 2001. 2: 530~533
    [37] G. Louizis, A. Tefas and I. Pitas. Copyright Protection of 3D Image Using Watermarks of Specific Spatial Struceure. In: IEEE International Conference onMultimedia and Expo (ICME'02), 2002. 2: 557~560
    [38] G. C. M. Silvestre and W. J. Dowling. Embedding Data in Digital Image Using CDMA Techniques. In: IEEE International Conference on Image Processing, 2000. 1: 589~592
    [39] V. Ratnakar. Image Watermarking with Zero-mean Patches. In: Conference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers, 1999. 2: 1513~1517
    [40] X. M. Niu and S. H.Sun. Digital Image Watermarking Based on Error Coerrection Coding Technique. Image Processing & Communication, 2000, 6(4): 303~305
    [41] I. S. Reed and G. Solmon. Polynominal Codes over Certain Finite Fields.SIAM Journal of Applied Mathematics, 1960, 8: 300~304
    [42] R.Lancini, F. Mapelli and S. Tubro. A Robust Video Watermarking Technique for Compression and Transcoding Processing. In: IEEE International on Multimedia and Expo(ICME'02), 2002. 1: 549~552
    [43] J.Yang, M.H.Lee and J. Y. Park. Enhancing Robustness of Information Hiding against Interference of Communication with Turbo Code. In: IEEE International Symposium on Circuits and System(ISCAS'2002), 2002. 1: I-13-16
    [44] B. G. Mobasseri. A Spatial Digital Video Watermark that Survives MPEG. In: International Conference on Information Technology:Coding and Computing, 2000. 68~73
    [45] Tao B, Dickinson B. Adaptive Watermarking in the DCT Domain. In: International Conference on Accoustics, Speech, and Signal Processing,1997. 4: 2985~2988
    [46] R. Dugad, K. Ratakonda and N. Ahuja. A New Wavelet-based Scheme for Watermarking Image. In: International Conference on Image Processing, 1998. 2: 419~423
    [47] X. D. Zhang, K. T. Lo, J. Feng, et al. A Robust Image Watermarking Using Spatial-Frequancy Feature of Wavelet Transform. In: 5th International Conference on Signal Processing, 2000. 2: 1100~1105
    [48] Lumini, D. maio. A Wavelet-based Image Watermarking Scheme. In: International Conference on Infromation Technology:Coding and Computing, 2000. 122~127
    [49] V. Solachidis, N.Nikolaidis and I. Pitas. Watermarking Polygonal Lines Using Fourier Descriptors. In: IEEE International Conference on Acoustics,Speech and Signal Processing, ICASSP'00, 2000. 4: 1955~1958
    [50] P. Thitimajshima, Y. Thitimashima and Y. Rangsanseri. Hiding Confidential Signature into Digital Images via Frequancy Domain. In: Proceedings of IEEE Region 10 International Conference on Electrical and Electronic Technology, 2001. 1:246~249
    [51] F.Alturki and R.Mersereau. Robust Oblivious Digital Watermarking Using Image Transform Phase Modulation. In: International Conference on Image Processing,2003. 2: 84~87
    [52] A. T. S. Ho, J. Shen, A. K. K. Chow, and J. Woon. Robust Digital Image-in-Image Watermarking Algorithm Using the Fast Hadamard Transform.In: Processing of the 2003 International Symposium on Circuits and Systems(ISCAS'03),2003.3: III-826 ~III-829
    [53] W.L.Tang and Y.Aoki. A Watermarking Method Bassed on Fresnel Diffraction. In: Fourth International Conference on Signal Proceedings(ICSP'98), 1998. 2:951~953
    [54] W. P. Li. Vector Transform and Image Coding. IEEE Transactions on Circuits and System for Video Technology,1999. 1(4): 297~307
    [55] V. Fotopoulos, S.Krommydas and A. N. Skodras. Gabor Transform Domain Watermarking.In: International Conference on Image Processing, 2001. 2:510~513
    [56] M. Farzam and S. Shirani.A Robust Multimedia Watermarking Technique Using Zernike Transform. IEEE Workshop on Multimedia Signal Processing, Cannes, France, 2001. 529~534
    [57] Corvi M, Nicchiotti G. Wavelet-based image watermarking for copyright protection. In: Scandinavain Conference On Image Analysis SCIA'97, 1997. 221~224
    [58] 陈青,苏详芳,王延平.采用小波变换的鲁棒隐形水印算法.通信学报, 2001, 22(7): 61~65
    [59] 周亚训,叶庆卫,徐铁峰.基于小波和余弦变换组合的图像水印方案.电子学报,2001,29(12):1693~1695
    [60] Mora-Jimenez and A.Navia-Vazquez.A New Spread Spectrum Watermarking Method with Self-synchronization Capabilities.In: Internation Conference on Image Processing, 2000. 1: 415~418
    [61] C. I. Podilchuk and W. J. Zeng. Image-adaptive Watermarking Using Visual Models. IEEE J. Sel. Areas Commun, 1998, 16:525~539
    [62] J. J. K. O'Ruanaidh and T. Pun. Rotation,Scale and Translation Invariant Digital Image Watermarking. Signal Processing. 1998,66(3):303~317
    [63] J. S. Seo, J. Haitsma, T. Kalker and C. D. Yoo. A Robust Image Fingerprinting System Using the Radon Transform.Signal Processing:Image Communication, 2004. 19:325~339
    [64] Bruyndonckx. Spatial method for copyright labeling of digital images. In: IEEE workshop on nonlinear signal and image processing. Halkidiki, Greece.1995. 221~226
    [65] Patrick Bas. Using fractal code to watermark image. In: proceedings of the ICIP, 1999. 5: 342~351
    [66] T. Kalker. Watermarking estimation through detector observation. In: Proc of IEEE Benelux S ignal Processing Symposium’98. Leuven, Belgium. 1999. 221~226
    [67] T. Kalker, Depovers, J. Haitsna, et al. A video watermarking system for broadcastmonitoring. In: Proceeding IS&SPIE 11th aymo, Electronic image in’99: Secutity and watermarking of Multimedia Content. Baltimore, USA. Jan. 1999.3657~3671
    [68] M. Kutter, F. Jordan, F. Bossen. Digital signature of color images using amplitude modulation. In: Proceeding of SPIE, storage and retrieval for image and video databases, 1997. 30(22): 518~526
    [69] B. chen. Dither modulation: A New Approach to Digital Watermarking and Information Embedding, San Jose, CA, USA. 1999. 342~353
    [70] Maws. Digital watermarking by geometric warping. In: Proceedings of ICIP, 1998. 6: 324~331
    [71] M. Barni, F. Bartolini, A. De Rosa, et al. A new decoder for the optimum recovery of nonadditive watermarks. IEEE Transactions on Image Processing, 2001, 10(5): 755~766
    [72] 伯晓晨,沈林成,常文森.一种新的盲图像水印检测算法.计算机学报, 2001, 24(12): 1279~1286
    [73] C. I. Podilchuk, W. J. Zeng. Image-Adaptive Watermarking Using Visual Models. IEEE Journal on Selected Areas in Communications, 1998, 16(4): 525~539
    [74] 黄继武, Y. Q. SGI,程卫东. DCT 图像水印:嵌入对策和算法.电子学报, 2000, 28(4): 386~389
    [75] M. Coni, G. Nicchioti. Wavelet-based image watermarking copyright protection. In: Scandinavian Conference on Image Analysix SCA, 97. Munich, Germany. June 1997. 22~30
    [76] D. Kundur, D. hatzinakos. A robust digital image watermarking method using wavelet–based fusion. In: Proceedings of the IEEE International Conference on Image Processing, ICIP’97. San Jose, CA. 1997. 544~547
    [77] Rakesh Dugad, Krishna Ratakonda, Narendra Ahuja. A New Wavelet-Based Scheme for Watermarking Images. In: Proceedings of the IEEE International Conference on Image Processing, ICIP’98. San Jose, CA. 1998. 223~227
    [78] P.Chyi Su, Houng-Jyh, Mike Wang ,et al. Digital Image Watermarking in Regions of Interest. In: PICS’99. Bombay, India. 1999. 295~300
    [79] De Rosa, M. Barni, F. Bartolini, et al. Optimal decoding of non-additive full fram DFT watermarks. In: proceeding of 3th Workshop on information hiding. Dresden, German.1999. 159~171
    [80] Q. Ruanaidh, W. J. Dowling, F. M. Boland. Phase watermarking of digital images. In: Proceedings of the International Conference on Image Processing. Olden bourg Verlag. 1996. 239~242
    [81] Ingemar J. Cox, Matt L. Miller. Electronic watermarking: the first 50 years. 2004 8th international conference on control, automation, robotics and vision. Kuming, China. 2004. 1~8
    [82] Arnaud E.Jacquin. Fractal Image Coding: A Review. In: Proceeding of the IEEE, 1993. 81(10):187~194
    [83] 李水根,吴纪桃.分形与小波.北京:科学出版社,2002.108~145
    [84] J.Puate, F.Jordan.Using fractal compression scheme to embed a digital signature into image . In: Proceeding of SPIE Photonics East'96 Symposium, 1996.103-124
    [85] 胡臻平,葛孚华,李天牧.基于分形压缩编码的数字水印技术.计算机应用, 2001, 12(3): 34~36
    [86] 曹华,周敬利,胡玉平.基于分形变换对比度因子的图像数字水印新算法. 计算机应用,2005, 25(5):1135~1137
    [87] 孙中伟,冯登国. DCT 域乘嵌入图像水印的检测算法.软件学报, 2005, 16(10):1798~1804
    [88] 伯晓晨, 沈林成,常文森,牛轶峰. DCT 变换域盲图像水印的自适应检测. 计算机研究与发展, 2004, 39(4):502~510
    [89] Juan R. Hernández, M. Amado, et al. DCT-Domain Watermarking Techniques for Still Images: Detector Performance Analysis and a New Structure. IEEE Transactions on image processing, 2000,9(1):110~121
    [90] Edmund Y.Lam, Joseph W.Goodman.A mathematical analysis of the DCT coefficients distribution for images. IEEE Transaction on Image Processing, 2000, 9(10):1661~1666
    [91] Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom. 数字水印.王颖,黄志蓓译. 北京: 电子工业出版社, 2003.1~55
    [92] 曹华,胡玉平,苏曙光.基于图像DCT域向量调制的盲水印算法研究.微计算机应用,2005, 26(6): 655~657
    [93] 丁玮,闫伟齐,齐东旭.基于Arnold变换的数字图像置乱技术.计算机辅助设计与图形学学报, 2001, 13(4): 338~341
    [94] 杜耀刚,蔡安妮,孙景鳌. DCT域基于块分类的不可感知加性数字水印.计算机工程与应用,2005,87(1):143~145
    [95] E. Koch, Zhao Jian, Towards robust and hidden image copyright labelling, In: Proc. of IEEE, 1999.452~455
    [96] W. N. Lie, G. S. Lin, C. L. Wu, and T. C. Wang. Robust image watermarking on the DCT domain. In: Proc. IEEE Int. Symp. Circuits and Systems, 2000. 1: 228~231
    [97] 崔锦泰.小波分析导论.程正兴译.西安: 西安交通大学出版社, 1995. 4~64
    [98] 张力.图像数字水印技术的研究. [博士学位论文].广州:华南理工大学图书馆, 2002. 36~65
    [99] 刘九芬,黄达人,胡军全.数字水印中的正交小波基.电子与信息学报, 2003, 25(4): 453~459
    [100] 黄达人,刘九芬,黄继武.小波变换域图像水印嵌入对策和算法.软件学报,2002, 13(7): 1290~1297
    [101] Podichuk CI, Zeng W. Image-Adaptive watermarking using visual models.IEEE Journal on Special Areas in Communications, 1998, 16(4): 529~539
    [102] Pan R, Gao YX. Image watermarking method based on wavelet transform. Journal of Image and Graphics, 2002,7(7):667~671
    [103] Xiang H, Wang LD, Lin H, et al. Digital watermarking system with chaotic sequence. In: the International Society for Optical Engineering Proceedings Series, Bellingham Wash, 1999. 499~457
    [104] Cao JG, Fowler JE, Younan NH. An image-adaptive watermark based on a redundant wavelet transform. In: Proceedings of the IEEE International Conference on Image Processing. Thessaloniki, 2001. 277~280
    [105] Barni M, Bartolini F, Piva A. Improved wavelet-based watermarking through pixel-wise masking. IEEE Transactions on Image Processing, 2001,10(5):783~791
    [106] Niu X.M, Lu ZM, Sun SH. Digital watermarking technique based on multiresolution decomposition. In: ACTA Electronica Sinica, 2000. 28(8):1~4
    [107] 张军,王能超,曹奎.一种基于多小波的盲的数字图像水印技术.小型微型计算机系统,2002,23(2):148~152
    [108] Xiang H, Wang LD, Lin H, Shi JY. Digital watermarking systems with chaotic sequences. In: the International Society for Optical Engineering Proceedings Series, Vol. 3657. Bellingham, Wash, 1999. 449~457
    [109] M. Kutter, F. Jordan, F. Bossen. Digital watermarking of color images using amplitude modulation. Journal of Electronic imaging, 1998, 7(2): 326~332
    [110] MPEG-1 Committee Draft. ISO/IEC JTC1/SC29/WG11,ISO/IEC CD 11171: Information technology, Dec 1991
    [111] MPEG-2 Committee Draft. ISO/IEC JTC1/SC29/WG11,ISO/IEC CD 13818: Information technology, Dec 1993
    [112] ITU-T Draft ITU-T Recommendation H.261. Video Codec for Audiovisual Services at p*64k bit/s.Mar.1993
    [113] ITU-T Draft ITU-T Recommendation H.263. Video Codec for low bit rate communication, May. 1996
    [114] ITU-T Draft for "H.263++" Annexes U,V. and W to Recommendation H.263, Nov.2000
    [115] SIKRO. MEPG-4 video standard verification model. IEEE Trans on Circuit and System for Video Technology, 1997,7(1): 19~31
    [116] 钟玉琢,王琪,赵黎,杨小勤 编译. MPEG-2 运动图像压缩编码国际标准及 MPEG的新进展.北京:清华大学出版社,2002.78~112
    [117] F. Hartung and B. Girod. Watermarking of Uncompressed and Compressed Video. Signal Processing, Special Issue on Copyright Protection and Access Control for Multimedia Service, 1998, 66(3): 283~301
    [118] Langelaar G C, Lagendijk R L, Biemond J. Real-time Labeling Methods for MPEG Compressed Video. In: 18th Symposium on Information Theory in the Benelux, Veldhoven, The Netherlands, 1997. 15~16
    [119] Langelaar G C, Lagendijk R L, Biemond J. Real-time Labeling Methods for MPEG-2 Compressed Video. Visual Commun and Image Representation, 1998, 9(4): 56~270
    [120] L. J. Cox, J. Kilian, T. Leighton, et al. Secure spread spectrum watermarking for images, audio and video. In: ICIP'96, 1996. 3:243-246
    [121] Wenwu Zhu, Zixiang Xiang, Ya-Qin Zhang, Multiresolution watermarking for images and video. IEEE Trans. on Circuits and Systems for video technology,1999, 9(4): 545-550
    [122] F. Deguillaume, G. Csurka, Thierry Pun, etc. Robust 3D DFT video watermarking. In: Proc of SPIE, 1999. 3657:113~124
    [123] Tae-Yun Chung, Minsuk Hong, Young-Nam Oh, et al. Digital watermarking for copyright protection of MPEG2 compressed video. IEEE Trans. on Consumer Electronics, 1998, 44( 3):895-901
    [124] Hsu Chiou-Ting, Wu, Ja-Ling. DCT-based watermarking for video. IEEE Transactions on Consumer Electronics, 1998, 44( 1):206-216
    [125] F. Jordan, M. Kutter, T. Ebrahimi.Propasal of a watermarking technique for hiding/ retrieving data in compressed and decompressed video, ISO/IEC JTC I /SC29/WG 1 I /MPEG97/M2281, 1997
    [126] E. Hartung, B.Girod. Digital watermarking of MPEG-2 coded video in the bitstreatn domain. In: ICASSP 97, 1997. 4:2621~2624
    [127] J.Song and K.J.R.Liu. A data embedding scheme for H.263 compatible video coding. In: Proc. IEEE Int. Symp. Circuits and Systems, 1999. 4: 390-393
    [128] F.Hartung, M.Kutter. Multimedia watermarking techniques. Proceeding of the IEEE, 1999, 87(7): 1079~1107
    [129] Langelaar G C, Lagendijk R L. Optimal differential energy watermarking(DEW) of DCT encoded images and Video. IEEE Trans on Image Processing, 2002, 67(3): 231~235
    [130] Draft ITU-T recommendation and final draft international standard of joint video specification (ITU-T Rec. H.264| ISO/IEC 14496-10 AVC). Joint Video Team (JVT) of ISO/IEC MPEG and ITU-T VCEG JVT-G050, 2003
    [131] C. T. Hsu and J. L. Wu. DCT-based Watermarking for Video. IEEE Trans on Consumer Electronics, 1998, 44(2): 239~246
    [132] F. Jordan, M. Kutter, and T. Ebrahimi. Proposal of a Watermarking Technique for Hiding/Retrieving Datas in Compressed and Decompressed Video. Technical report M2281, ISO/IEC document, JTC1/SC29/WG11,1997
    [133] T.Wiegang, G.J.Sullivan, G.Bj?ntegaard, et al. Overview of the H.264/AVC video coding standard. IEEE Trans. Circuits Syst. Video Technology, 2003, 13(7): 560~576
    [134] G.J.Sullivan, T.Wiegand. Joint Model Reference Encoding Methods and Decoding Concealment Methods. JVT-I049d0.doc, Joint Video Team (JVT) of ISO/IEC MPEG and ITU-T VCEG. September, 2003, San Diego, USA
    [135] T.Wiegand and B.IROD. Lagrangian Multiplier Selection in Hybrid Video Coder Control[C]. In: Proc. ICIP 2001, Thessaloniki, Greece, October 2001. 4: 221~232
    [136] H.264/AVC Joint Model 9.8 (JM-9.8). Available: http://bs.hhi.de/~suehring/tml/
    [137] P.W.Wong and N. Memon. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Processing, Oct. 2001, 10: 1593~1601
    [138] Eugene T. Lin, AHMET M. ESKICIOCLU, etc. Advances in Digital Video Content Protection. Proceedings of the IEEE, 2005. 93(1): 171~183.
    [139] 沈海波.数字水印技术在 DRM 中的应用.培训与研究-湖北教育学院学报, 2004, 21(5): 25~27
    [140] Hartung F, Ramme F. Digital rights management and watermarking of multimedia content for m-commerce application. IEEE Communication Magazine, 2000, 11(38): 78~84
    [141] Sonera Plazza Ltd MediaLab: Digital Rights Management White Paper. http:// www. medialab.sonera.fi/workspace/DRM-WhitePaper.pdf, 2002
    [142] 刘立刚,陈晓苏,胡蕾.抗协议攻击的数字版权保护安全方案.中山大学学报(自然科学版), 2004, 43 Suppl.2: 83~86
    [143] 程卫东,刘红梅.数字产品版权保护认证机制.中山大学学报(自然科学版), 2004, 43 Suppl.2: 91~93
    [144] L?ytynoja, Tapio Sepp?nen, Nedeljko Cvejic. Experimental DRM Architecture Using Watermarking and PKI. http:// www. mediateam. oulu. fi/ publications/ pdf/ 444. pdf
    [145] Sabu Emmanuel, Mohan S.Kankanhalli. A digital right management scheme for broadcast video. Multimedia System 2003,8:444~458
    [146] B. MACQ, J.Dittmann,E J.Delp. Benchmarking of Image Watermarking Algorithms for Right Management. Proceedings of the IEEE. 2004, 92(6): 971~984
    [147] Deepa Kundur, Kannan Karthik. Video Fingerprinting and Encryption Principles for Digital Rights Management. Proceedings of the IEEE. 2004,92(6): 918~932

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700