多媒体数字版权保护水印算法研究及应用
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
作为信息隐藏技术研究领域的一个重要分支,数字水印技术是实现版权保护的有效方法。数字水印技术是一种将特定的标识信息(即数字水印),通过数字内嵌的方法隐藏在数字载体中,这些数字载体包括数字图像、音频、视频等多媒体以及文档、软件等数字内容。数字水印的嵌入不影响数字载体的使用价值,且数字水印不易被探知、篡改和擦除,以此来确定数字内容的版权归属、认证数字内容来源的真实、确认数字内容的跟踪侵权行为。本论文基于数字水印技术对图像和视频媒体的版权保护方法进行研究。主要包括以下几个方面的内容:
     1.针对JPEG图像版权保护问题,提出了一种实用的JPEG图像版权保护水印算法。对JPEG图像解压缩后的像素矩阵进行操作处理,水印嵌入在分块图像的DCT中低频交流系数。对水印信号进行了伪随机置乱,结合了视觉掩蔽特性控制水印嵌入的强度,并引入了量化条件分析处理避免JPEG压缩对水印的影响。水印提取不需要载体JPEG图像。算法对于常见的图像处理方法和恶意攻击具有良好的鲁棒性,特别是图像格式转换等处理,有利于JPEG图像的版权保护。
     2.提出了一种实用的基于MPEG-2的数字视频水印算法。直接对压缩视频数据流进行操作,水印算法基于MPEG-2压缩编码的差分编码过程,将水印信号嵌入在视频图像IDR帧的分块DCT直流系数上。水印提取时不需要完全解码,且实现了盲提取。为了解决同步性问题,设计同步码来表征水印信息的分组编号。周期性嵌入水印信息以满足实际中视频水印的随机检测性。算法对于低比特率MPEG-2压缩、同步攻击等常见视频处理方法具有较好的鲁棒性。
     3.针对新一代视频压缩标准H.264提出了一种基于H.264编码方式的视频水印算法。视频水印的嵌入和提取都是针对压缩视频流的语法元素进行处理,而不需要进行完全的视频解码处理。通过水印鲁棒性,方案中选择合适的4×4子块视频图像数据进行水印嵌入,以追求水印鲁棒性和视觉不可感知性的平衡。为了避免水印后视频数据比特率的增加,同时提高视频水印的安全性,水印处理只针对视频宏块中的非零量化系数进行。实验结果证明该方案是可行的。
     4.对数字水印技术不可感知性的评价方法进行研究,提出了种新的基于小波变换和视觉加权方法的图像质量客观评价方法WVWPSNR。该方法将图像的DWT变换和HVS特性相结合,并利用子图分解以及视觉加权处理实现图像质量的客观评价。实验中对多幅降质图像进行测试,处理方法包括JPEG压缩、JPEG2000压缩、White Noise(白噪声)、Gaussian Blur (高斯模糊)、FastFading。实验结果表明该方法可行、有效,更加趋近于主观评价结果。尤其是该方法对JPEG压缩图像的客观质量评价值与主观质量评价值具有高度一致性。由于JPEG与MPEG-2、H.264等压缩标准兼容,因此该方法同样适用于MPEG-2、H.264编码方式的视频图像质量评价。
     5.设计并实现了一种实用的多媒体数字水印系统。主要功能包括数字水印管理、水印域管理、算法服务器管理、算法管理以及系统管理(包括系统监控和日志管理)。相关技术包括数字水印生成技术、水印的盲处理方案设计以及水印的嵌入和提取方法流程等。其中水印提取与检测模块可以单独作为第三方工具以供使用,增强了水印系统应用的灵活性。水印比对方式涵盖了主观对比显示和客观评价指标峰值信噪比PSNR、误比特率BER。数字水印系统的设计旨在推广数字水印技术的实际应用。
As an important branch of information hiding, digital watermarking is an effective method for copyright protection. Watermarking is defined as the process of embedding special identification information directly into digital multimedia, such as digital image, audio, video, document, software and so on. And the watermark information can not affect the value in use of the digital media. Moreover, it is difficult to detect, distort or remove the digital watermarking. So, the watermark is used for verifying the copyright of the digital media content, authenticating the truth of the digital contents, confirming the tracking infringement of the digital contents. The main research contents are based on the watermarking methods of copyright protection for digital image and digital video. Main achievements in this thesis are summarized as follows:
     1. A practical watermarking algorithm for the copyright protection of JPEG image is proposed in this paper. By operating the pixel matrix of depressed the JPEG image, we can use the DCT coefficients to embed the watermark. The strength of watermark can be controlled by visual masking and analysis of the quantization condition during the embedding of watermark No original image is needed when extracting the watermark. The proposed scheme can achieve excellent robustness to common image processing methods and some attacks in favor of protecting the copyright of JPEG image.
     2. Digital video watermarking technology has attracted a great deal of research interest in the past few years for the copyright protection. An innovative practical video watermarking algorithm based on MPEG-2is proposed in this paper. By operating the compressed video data-stream directly, we embed watermarking information in DC coefficients of block image which is in the IDR picture, in DPCM process of MPEG-2coder. Watermark can be extracted blindly without original images and complete decoding is unnecessary. The algorithm designs one kind of synchronization code in order to resolve the synchronization problem. Watermark information is embedded periodically for random testing. The proposed scheme can achieve good excellent robustness to common video processing methods such as low bit rate MPEG-2compression and synchronization attacks.
     3. Along with rapid development of HDTV, copyright protection of digital contents has been more and more concerned. H.264, the latest video compression standard, is widely used in many video standards and technologies, such as digital video broadcasting handheld, blue-ray disk and HD-DVD. An innovative watermarking algorithm based on H.264compressed domain is proposed. The embedding and extracting are performed using the syntactic elements of the compressed bit stream. In this way, complete decoding is unnecessary in both embedding and extracting processes. Through the analyses of the time and space, some appropriate sub-blocks are selected for embedding watermarks, increasing watermark robustness while reducing the declination of the visual quality. In order to avoid bit-rate increasing and strengthen the security of this video watermarking scheme, only a set of nonzero coefficients quantized in different parts of macroblocks is chosen for inserting watermark. The experiment results show the proposed scheme can achieve excellent robustness against some common attacks.
     4. Considering the importance of the assessment for imperceptibility in digital watermarking technology, a new objective method WVWPSNR (Wavelet and Vision_Weighted Peak Signal Noise Ratio) is presented in this paper. In which the method is based on DWT, and the sensitivity of HVS (Human Visual System) is weighted using sub-band division. In this method, the assessment values of the new method accord with MOS (Mean Opinion Score). In order to demonstrate the effectiveness and to verify the reliability of WVWPSNR method, a series of experiment for JPEG、JPEG2000、White Noise、Gaussian Blur and FastFading images are made and tested. The results suggest that the proposed method can provide accurate measures of image quality under JPEG compression.
     5. In order to put the watermarking technology in practice much more widely, we design and carry out a practical multimedia watermark system. The main functional modules include watermark management, watermark domain management, watermark algorithm server management and system management (system monitoring and log management). The technologies are consisted of watermark generating, watermark embedding, watermark extraction, especially the plan design of blind watermarking. In order to enhance the practicability, watermark detection and extraction module can be used as an independent tool. Digital watermarking comparison method includes subjective assessment and objective assessment. In objective method, PSNR and BER are used.
引文
[1].钮心忻.信息隐藏与数字水印[M].北京:北京邮电大学出版社2004.6:52
    [2].International Intellectual Property Alliance, http://www.iipa.com.
    [3].Bloom J A, Cox I J, Kalker T et al. Copy protection for DVD video[J]. In Proc. IEEE, Jul.1999, vol.87, pp.1267-1276.
    [4].Touretzky D S. (2000) Gallery of CSS Descramblers[EB/OL]. http://www.cs.cmu.edu/-dst/DeCSS/Gallery.
    [5].http://www.cptwg.org.
    [6].Ingemar J.Cox, Matthew L.Miller and Jeffrey A.Bloom. Digital watermarking. Beijing: Publishing House of Electronics Industry,2003.
    [7].Cox I J, Miller M L. The first 50 years of electronic watermarking. EURASIP Journal on Applied Signal Processing,2002,2:126-132.
    [8].孙水发.数字水印技术研究.[D].浙江大学,2005.
    [9].孙水发,李海军,蒋铭,万钧力.数字水印的应用及需求分析[J].信息技术,2007,(9):8-11.
    [10].J. Puate and F. Jordan, Using Fractal Compression Scheme to Embed a Digital Signature into an Image[C], Proceedings of the SPIE Video Techniques and Software for Full-Service Networks, January 1997,2915:108-118.
    [11].G. Voyatzis, and I. Pitas, Chaotic Watermarks for Embedding in the Spatial Digital Image Domain[C], Proceedings of International Conference on Image Processing, Oct.1998,2:432-436.
    [12].M. S. Fu and C. Au Oscar, Data Hiding in Halftone Images using Stochastic Error Diffusion [C], Proceedings of IEEE International Confererce on Acoustics, Speech and Signal Processing, May 2001,3:1965-1968.
    [13].刘瑞祯,谭铁牛.基于奇异值分解的数字图像水印算法[J],电子学报,2001,2,29(2):168-171.
    [14].F.J. Gonzalez-Serrano, et al., Independent Component Analysis Applied to Digital Image Watermark[C], Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing,2001,3:1997-2000.
    [15].刘琚,孙建德.基于ICA的数字水印的方法[J],电子学报,2004,4,32(4):657-660.
    [16].孙水发,仇佩亮.基于参数导引随机共振的数字水印算法[J].通信学报.2005:26(12):48-55.
    [17].Campisi P, Kundur D, Neri A. Robust Digital Watermarking in the Ridgelet Domain[J]. IEEE Signal Processing Letters,2004,11(10):826-830.
    [18].Peining Tao, Ahmet M. Eskicioglu, Robust Block-based Watermarking Scheme in Curvelet Domain[C], Proceedings of Information, Communications & Signal Processing,2007 6th International Conference on 10-13 Dec.,2007:1-5.
    [19].张志禹,于海燕,张九龙等,一种基于脊波域的盲检数字水印算法[J].电子学报,2007,35(9):1804-1808.
    [20].李海峰,宋巍巍,王树勋,基于Contourlet变换的稳健性图像水印算法[J].通信学报,2006,27(4):87-94.
    [21].Katzenbeisser S, Veith H. Securing Symmetric Watermarking Schemes Against Protocal Attacks[C]. In:Proceedings of the SPIE vol.4675, Security and Watermarking of Multimedia Contents Ⅳ,2002,260-268.
    [22].张雨,肖扬.基于Iurbo(?)马的数字水印方案[EB/OL]. In中国科技论文在线.http://www.paper.edu.cn.
    [23].Jengnan T, WenL H, Chern I L. An Asymmetric Subspace Watermarking Method for Copyright Protection[J]. IEEE Transactions on Signal Processing, Feb 2005, Vol.53, No.2, pp. 784-792.
    [24].Kim T Y, Choi H, Lee K et at. An Asymmetric Watermarking System With Many Embedding Watermarks Corresponding to One Detection Watermark. Signal Processing Letter[J], Mar. 2004,11(3):375-377.
    [25].刘立刚,陈晓苏,胡蕾.抗协议攻击的版权保护安全方案[J].中山大学学报,2004,Vol.43,No.增刊2,pp.83-86.
    [26].Adelsbach A, Katzenbeisser S, Veith H. Watermarking Schemes Provably Provably Secure Against Copy and Ambiguity Attacks[C]. In:ACM Workshop on Digital Rights Management (DRM'03). Washington:ANM Press,2003.pp.111-119.
    [27].Celik M U, Sharma G, Tekalp A M. Collusion-Resilient Fingerprinting by Random Pre-Warping[J]. IEEE Signal Processing Letters, Oct.2004, Vol.11 No.10, pp.837-865.
    [28].张新鹏,王朔中.抗可逆性攻击和加载攻击的安全水印系统[J].中山大学学报,2004,Vol.43,No.增刊2,pp.10-13.
    [29].Yoo H, Lee H, Lee S et al. Designated Verification of Non-invertible Watermark[C]. In: ISC'03, LNCS 2851, Berlin, Heidelberg:Springer-Verlag,2003, pp.338-351.
    [30].Lee H, Lee I. Designated Verification of Digital Watermark for Network Based Image Distribution. In:ICCS'03, LNCS 2660[C], Berlin, Heidelberg:Springer-Verlag,2003. 1069-1078.
    [31].I. J. Cox, M. L. Miller, J. A. Bloom数字水印.王颖,黄志蓓泽.电子工业出版社,2003.7-16.
    [32].尹浩,林闯,邱锋等.数字水印技术综述.计算机研究与发展,2005,42(7):1093-1099.
    [33].蒋铭.变换域的数字图像水印技术及图像质量评价研究[D].三峡大学,2009.
    [34].K.Tanaka,Y.Nakamura,and K.Matsui,"Embedding secret information into a dithered multilevel image,"in Proc.1990 IEEE Military Commun. Conf. Sept.1990, pp.216-220.
    [35].王颖,肖俊,王蕴红.数字水印原理与技术.科学出版社.北京,2007.
    [36]."Unzign watermark removal software," http://altern.org/watermark/,1997.
    [37J.F.A. Petitcolas. "Watermarking Schemes Evaluation". IEEE Transactions on Signal Processing,2000,17(5),pp:58-64.
    [38].Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, Secure Spread Spectrum Watermarking for Multimedia[J], IEEE Transaction on Image Processing, 1997,6(12):1673-1687.
    [39].金喜子,姜文哲.块级篡改定位的JPEG图像脆弱水印[J].电子学报,2010,38(7):1585-1589
    [40].余淼,和红杰,张家树.一种高定位精度的安全JPEG图像认证水印算法[J].中国科学E辑:信息科学,2007,37(2):315-328.
    [41].李春,黄继武.一种抗JPEG压缩的半脆弱图像水印算法[J].软件学报,2006,17(2):315-324
    [42].暴晋飞,柏森,朱桂斌,李瑶.一种抗JPEG压缩的数字图像水印算法[J].重庆邮电大学学报(自然科学版),2009,21(6):749-753.
    [43].Choi Y, Aizawa K. Digital watermarking using inter-block correlation:extension to JPEG coded domain[C] M Proc. IEEE Int Conf. Information Technology:Coding and Computing, 2000:133.
    [44].Luo W, Heileman G L, Pizano C E. Fast and robust watermarking of JPEG files[C] M Proc. IEEE 5th Southwest Symp. Image Analysis and Interpretation,2002:158.
    [45].Luo W, Heileman G L, Pizano C E. A fast and robust watermarking method for JPEG images. Computer Modelling and New Technologies,2004,8(1):39-47.
    [46].陆哲明,吴吴大,刘忠仁等.一种用于版权通知和保护的多功能彩色图像水印算法[J].电子学报,2004,32(5):778-781
    [47].朱从旭.实现图像版权通知、保护和内容认证的多功能水印[J].通信学报,2009,30(11):101-104,110
    [48].陈晓苏,刘立刚,卢正鼎.网络环境下数字图像版权保护安全协议的设计与分析[J].计算机学报,2006,29(9):1722-1728
    [49].Frank Hartung, Jonathan K. Su, Bernd Girod. Spread spectum watermarking:Malicious attacks and counterattacks. In Proceedings of SPIE Security and Watermarking of Multimedia Contents, San Jose,1999:147-158.
    [50].Young-Yoon Lee, Han-Seung Jung, Sang-Uk Le.3D DFT-based video watermarking using perceptual models. Proceedings of 2003 IEEE International Midwest on Circuit and Systems. 2003,3:1579-1582.
    [51].G. Langelaar and R. Lagendijk, Optimal differential energy watermarking of DCT encoded images and video[J], IEEE Transaction on Image Processing, vol.10, no.1, pp.148-158, Jan. 2001.
    [52].Sun T F, Jiang X H, Shi S S, et al. A novel differential energy video watermarking based on Watson visual model [C]//International Symposium on Electronic Commerce and Security. Nanchang, China:Nanchang HangKong University,2009:179-183.
    [53].Yulin Wang, Alan Pearmain. Blind MPEG-2 Video Watermarking Robust Against Geometric Attacks:A Set of Approaches in DCT Domain, IEEE TRANSACTIONS ON IMAGE PROCESSING,2006,15(6):1536-1543.
    [54].Zina Liu, Huaqing Liang, Xinxin Niu, Yixian Yang. A robust video watermarking in motion vectors. In Proceedings of 7th International Conference on Signal Processing,2004, 3:2358-2361.
    [55].Hartung and B. Girod, "Watermarking of uncompressed and compressed video," Signal Process., vol.66, no.5, pp.283-301, May 1998.
    [56].F. Hartung and B. Girod, Digital Watermarking of MPEG-2 Coded Video in Bitstream Domain, Proc. IEEE Internatioinal Conference on Acoustics, Speech and Signal Processing, ICASSP-97, Vol.4, No.4, pp.2621-2624.
    [57].B.G.Mobasseri.A Spatial Digital Video Watermark that Survives MPEG.Proceedings of International Conference on Information Technology,2000:68-73.
    [58].Yuk Ying Chung, Fang Fei Xu, "A Secure Digital Watermarking Scheme for MPEG-2 Video Copyright Protection," avss, pp.84,2006 IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS'06),2006.
    [59].David, et al. Implementation of a watermarking algorithm for H.264 video sequence[EB/OL]. http://www.ep.liu.se/exjobb/isy/2004/3516.html,2004-10-16.
    [60].Gand Qiu, P Marziliano, ATS Ho, D He, Q Sun A hybrid watermarking scheme for H.264/AVC video[A]. Proceedings of the 17th International Conferernce on Pattern Recognition[C]. UK:Cambridge Press,2004.4:865-869.
    [61].NOORKAMI M, MERSEREAU R M. Compressed-domain video watermarking for H.264[A]. Proceedings of ICIP[C]. Genva, Italy,2005.890-893
    [62].GOLIKERI A, NASIOPOULOS P, WANG Z J. An improved scalar quantization-based digital video watermarking scheme for H.264/AVC[A]. IEEE International Symposium on Circuits and Systems[C]. Island of Kos, Greece,2006.
    [63].S SAKAZAWA, Y TAKISHIMA, Y NAKAJAMA. H.264 native video watermarking method[A]. IEEE International Symposium on Circuits and Systems[C]. Island of Kos, Greece.2006
    [64].Hua Cao, Jingli Zhou, Shengsheng Yu, et al. Implement of semi-fragile blind watermark algorithm for H.264 low bit-rates video stream[J]. Acta Electronic Sinica.2006, 34(1):40-44.(in Chinese)
    [65].Eugene T. Lin, Ahmet M. Eskicioglu, Reginald L. Lagendijk and Edward J. Delp, "Advances inDigital Video Content Protection", Proceedings of the IEEE, Vol.93, No.1, pp 171-183, January 2005.
    [66].M.Holliman, N.Memon, and M.Yeung, "On the need for image dependent keys in watermarking," in Proc. Second Workshop on Multimedia, Newark, NJ,1999.
    [67].H.264 Reference Software Group [Online]. Available: http://www.iphome.hhi.de/suehring/tml/download
    [68].Wang Zhou,Bovik A C.A universal image quality index.IEEE Signal Processing Letters, 2002,9(3):81-84
    [69].Wang Zhou,Bovik A C,Sheikh H R,et al. Image quality assessment:From error visibility to structural similarity. IEEE Transactions on Image Processing,2004,13(4):600-612
    [70].Wang Z,Bovik A C,Simoncelli E P.Structural Approaches to Image Quality Assessment[C].In:Bovik A C. Handbook of Image and Video Processing(Second Edition), New York, USA:Academic Press,2005:1-33.
    [71].D. Xu, R. Wang, and J. Wang, "Blind digital watermarking of low bit-rate advanced H.264/AVC compressed video," Digital Watermarking, pp.96-109,2009.
    [72].A. Mansouri, A. M. Aznaveh, F. Torkamani-Azar, F. Kurugollu. A Low Complexity Video Watermarking in H.264 Compressed Domain. IEEE Transcations on Information Forensics and Security, vol.5,no.4, pp.649-657,2010.
    [73].A. Mansouri, A. M. Aznaveh, and F. Torkamani Azar, "Blind H.264 compressed video watermarking with pattern consideration," in Proc. ICASSP, Dallas, TX,2010, pp. 1754-1757.
    [74].M. Noorkarni and R. M. Mersereau, "A framework for robust watermarking of H.264-encoded video with controllable detection performance," IEEE Trans. Inf. Forensics Security, vol.2, no.l, pp.14-23, Mar.2007.
    [75].Stefan Katzenbeisser, Fabien A.P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Inc.,2000.
    [76].尤新刚,郭云彪,周琳娜.峰值信噪比不宜用来评价信息隐藏技术.信息隐藏全国学术研讨会(CIHW2000/2001)论文集[C].西安:西安电子科技大学出版,2001:129-134.
    [77].A. M. Eskicioglu, P. S. Fisher. Image quality measures and their performance [J]. IEEE Trans on Communication, vol.43, pp.2959-2965, Dec.1995.
    [78].J. L. Mannos and D. J. Sakrison, The effects of a visual fidelity criterion on the encoding of images, IEEE Trans. Information Theory, vol.4, pp.525-536,1974.
    [79].M.Miyahara. Quality assessments for visual service. IEEE Communications Magazine, Vol.26, no.10, pp.51-60, Oct.1988.
    [80].林仲贤、孙秀如编著.视觉及测色应用[M].科学出版社,1987.6.Lin Zhongxian, Sun Xiuru. Vision and Color measurement Application.[M]. Science Press.1987.6
    [81].M.iyahara M, Kotani K, A lgaziV R. Objective picture quality scale (PQS) for image coding [J]. IEEE Transactions on Communications,1998,46(9):1215-1226.
    [82].Ma Miao, Ding Li, Hao Chongyang. Judgment of the Imperceptibility of Digital Watermarking Based on Gray Correlation Degree [J]. Computer Engineering and Applications,2003.22:22-23
    [83].Liu Ruizhen, Tan Tieniu. A General Watermarking Framework for Optimal Energy Estimation [J]. Chinese Journal of Computers,2001,24:242-247.
    [84].温泉.多媒体数字水印的鲁棒性和不可感知性研究[D].吉林大学,2005.
    [85].Bradley A.P. A wavelet visible difference predictor. IEEE Trans.on Image Processing, 1998;8(5):717-730.
    [86].丁艺芳.基于小波变换和视觉系统的图像质量综合评价新算法[D].上海大学,2001.
    [87].SHE IKH HR,WANG Z,CORMACK L,et a.1 LIVE image quality assessment database [DB/OL]. http://live. ece. utexas.edu/research/quality,2006.
    [88].毕厚杰.新一代视频压缩编码标准[M]——H.264/AVC北京:人民邮电出版社,2005.
    [89].王曜著.视频点播[M].北京:北京邮电大学出版社.2009.2
    [90].赵坚勇 著.数字电视技术[M].西安:西安电子科技大学出版社.2011.4
    [91].谷利泽,郑世慧,杨义先著.现代密码学[M].北京:北京邮电大学出版社.2009.8
    [92].俞银燕,汤帜.数字版权保护技术研究综述[J].计算机学报,2005,28(12):1957-1968
    [93].裴庆祺,高铭鼎,范科峰.数字电视领域的数字版权保护技术标准综述[J].信息技术与标准,2004,(4):33-37
    [94].李旭东.评价数字水印相似程度的公式分析及改进[J].自动化学报,2008,(2):208-210.
    [95].许文丽,李磊,王育民.抗噪声、几何失真和JPEG压缩攻击的鲁棒数字水印方案[J].电子与信息学报,2008,(4):933-936.
    [96].BAS P, CHASSERY J M, MACQ B. Geometrically invariant watermarking using feature points[J]. IEEE Transactions on Image Processing,2002,11(9):1014-1028.
    [97].Zheng D, Zhao J Y, Saddik A E. RST-invariant digital image watermarking based on log-polar mapping and phase correlation[J]. IEEE Transactions on Image Processing, 2003,13(8):753-765.
    [98].Zhang L, Qian G B, Xiao W W, et al. Geometric invariant blind image watermarking by invariant Tschebycheff moments[J]. Optics Express,2007,15(5):2251-2261.
    [99].L1 Lei-da, YUAN Xiao-ping, LU Zhao-lin, et al. Rotation invariant watermark embedding based on scale-adapted characteristic regions [J]. Information Sciences,2010,18 (15): 2875-2888.
    [100].李克秋,庄庶,张永.一种基于几何不变特征区域的数字水印算法[J].大连理工大学学报,2011,(2):274-280.
    [101].Ping D, Brankov J G, Galatsanos N P, et al. Digital watermarking robust to geometric distortions[J]. IEEE Transations on Image Processing,2005,14(2):2140-2150.
    [102].Xin Y Q, Liao S, Pawlak M. Circularly orthogonal moments for geometrically robust image watermarking [J]. Pattern Recognition,2007,40(12):3740-3752.
    [103].LOU Ou-jun. Feature point based image watermarking scheme in contourlet domain against geometrical attacks [J]. Journal of Computer Research and Development,2010,47 (1):113-120.
    [104].李振宏,吴慧中.基于DWT及方向可控金字塔变换的抗几何攻击水印[J].中国图象图形学报,2010,15(2):211-219.
    [105].袁大洋,肖俊,王颖.数字图像水印算法抗几何攻击鲁棒性研究[J].电子与信息学报,2008,30(5):1251-1256.
    [106].郑秋梅,顾国民,王玉菲,赵敏.一种新的抗几何攻击的数字水印算法[J].中国石油大学学报(自然科学版),2012,(1):188-192.
    [107].石慧,林闯,李明楚,孙晰锐.基于Contourlet变换的抗几何攻击数字水印算法[J].光电子.激光,2011,(10):1575-1581.
    [108].徐紫涵,王向阳.可有效抵抗一般性几何攻击的数字水印检测方法[J].自动化学报,2009,35(1):23-27.
    [109].LEE H Y, KIM H S, LEE H K. Robust image watermarking using local invariant features[J]. Optical Engineering,2006,45(3):1-10.
    [110].XIANG Shiyun, KIM H J, HUANG Jiwu. Invariant image watermarking based on statistical features in the low frequency domain[J]. IEEE Trans on Circuits and Systems for Video Technology,2008,18(6):777-790.
    [111].LI L D, GUO B L, SHAO K. Geometrically robust image watermarking using scale-invariant feature transform and Zernike moments[J]. Chinese Optics Letters,2007,5(6):332-335.
    [112].Rothe I, Susse H, Voss K. The method of normalization to determine invariants pattern analysis and machine intelligence[J]. IEEE Transaction,1996,18(4):366-376.
    [113].MIK OL AJCZYK K, SCHMID C. Indexing based on scale invariant interest points[C]//Proceedings of the International Conference on Computer Vision. Piscataway: IEEE,2001:525-531.
    [114].同鸣,闫涛,姬红兵.一种抵抗强剪切攻击的鲁棒性数字水印算法[J].西安电子科技大学学报,2009,36(1):22-27.
    [115].TANG C W, HANG H M. A feature-based robust digital image watermarking scheme[J] IEEE Transactions on Signal Processing,2003,51(4):950-958.
    [116].WEINHEIMER J, QI X J, QI J. Towards a robust feature-based watermarking scheme: proceedings of IEEE International Conference on Image Processing[C]. New York:IEEE, c2006:1401-1404.
    [117].王新宇,詹永照.基于顶点范数的三维模型鲁棒数字水印算法[J].江苏大学学报(自然科学版),2011,(6):695-700.
    [118].刘全,张乐,张永刚,Christian Bessiere,傅启明,王晓燕.基于角点特征的几何同步数字水印算法[J].通信学报,2011,(4):25-31.
    [119].刘向丽,寇卫东,王志国.一种新的非对称数字水印算法[J].西安电子科技大学学报,2008,(1):129-132

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700