鲁棒数字水印算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
鲁棒数字水印技术在多媒体内容保护和相关领域中具有很好的应用价值,如版权保护、盗版追踪、拷贝控制和广播监控等等。但目前鲁棒数字水印技术还未得到充分的研究,有很多技术方面的难题亟待解决,这给研究工作带来了挑战和机遇。对数字水印的深入研究将侧重于完善相关理论,提高水印算法的鲁棒性,增强水印技术的安全性。
     数字水印技术的两大重要性质是不可感知性和鲁棒性,一个好的鲁棒水印算法应该在不可感知的前提下能够抵抗各种攻击,但不可感知性和鲁棒性是相互矛盾的,鲁棒水印研究的关键之一在于如何选择合适的视觉感知模型,达到水印鲁棒性和不可感知性的平衡与统一。大量的水印算法主要利用扩频、信道编码和视觉感知模型来提高水印的鲁棒性,这对一般信号处理具有较好的鲁棒性,但难以抵抗由旋转、缩放等几何变换造成的去同步攻击,抗几何攻击的水印算法是需要解决的难点问题。此外,在视频水印中还要考虑时间轴上的攻击,如帧平均、帧删除、帧重组等,因此针对不同的应用需求设计鲁棒水印是水印研究的重点。
     与Contourlet变换相结合的鲁棒水印算法(AWCD),分析Contourlet变换特性,在此基础上建立相应视觉掩蔽模型,综合频率、亮度和纹理参数确定水印嵌入强度,自适应地将水印信息嵌入到图像Contourlet分解后的高频子带,保证了水印的不可见性,分别对水印和嵌入区域高频子带系数置乱以提高水印的安全性和鲁棒性,水印信息在Contourlet逆变换中影响到低频子带,使水印分布到整个载体图像的高频和低频区域,因此AWCD算法具有较强的鲁棒性,水印的提取通过相邻系数对比的盲检测算法,能够不借助原始图像提取水印。
     针对抗几何攻击的数字水印研究,提出基于平衡多小波的视频水印算法(VW-BMW),将载体视频转换到对数极坐标变换系LPM,使旋转和缩放转换为该坐标系下的平移,构造基于平移不变的平衡多小波,得到具有旋转、缩放不变性的能量特征值,通过修改该值嵌入水印,使算法对信号处理攻击和几何攻击都具有鲁棒性。所构造的平衡多小波不需要预滤波,计算耗费较少,能够满足视频水印所需要的实时性。水印嵌入时根据嵌入区域的能量特征值自适应控制水印的嵌入强度,保证水印嵌入达到最大强度的同时不会造成视觉失真。
     在小波域数字水印算法研究的基础上,结合Shamir门限密钥分享算法提出视频水印算法(SSVW),通过拉格朗日插值多项式将水印图像分为多个水印影子,循环嵌入到视频序列中。在嵌入水印时,对水印影子的不断更新,使算法能够有效抵抗共谋攻击,在提取水印时,根据密钥分享理论利用部分水印影子信息就能够恢复原始水印,为了防止欺骗攻击,采用单向散列hash函数验证水印影子的有效性。SSVW算法不但对常见信号处理和攻击有较好的鲁棒性,而且对于视频中的帧删除、帧平均攻击的情况,也能很好的检测出水印。
Robust digital watermarking is widely used in multimedia content protection and correlation field, such as copyright protection, traitor tracing, copy protection and broadcast monitoring. But the technology of video watermarking hasn't been developed enough. There are still lots of problems to be solved which bring chances and challenges for study. The study of digital watermarking will emphasize the robustness and security of watermarking system.
     The important characters of watermarking are robustness and imperceptibility. But they are contradictive indeed. The key of this problem is how to make an appropriate Human Visual System to achieve the balance of robustness and imperceptibility. At present, the most of watermarking algorithms increase robustness of the watermarking by using the spread spectrum, the channel coding and the performance of HVS. These algorithms are robust to the commonly signal processing, but they are difficult to resist the geometric attacks such as rotation and scale. Therefore, how to solve the problem of geometric attacks in embedding and detecting is a still difficult research. Moreover, video sequence may be faced with some temporal attacks, such as frame average, frame removal, frame reconstruct and so on. So the research of robust watermarking for different application is valuable.
     The Contourlet transform is adopted by virtual of its advantages of a flexible multiresolution, local and directional expansion because of using contour segments. The robust watermarking algorithm in Contourlet domain (AWCD) was proposed. According to the frequency, luminance and texture characteristics of HVS, the watermark composed of a pseudorandom sequence is adaptively embedded into the high-pass subbands. The detection of watermarking is according to the neighboring coefficients, and the algorithm is blind. Experimental results show that the algorithm has good robustness against attacks and imperceptibility.
     According to that the balanced multiwavelets are simultaneously orthogonal, symmetric and compactly supported the watermarking algorithm (VW-BMW) is proposed based on BMW. The algorithm combines the LPM to get an invariant energy for rotation, and scaling. We embed the watermark into the energy features to achieve the robustness resist geometric distortions. The balanced multiwavelets need no prefiltering procedure and have show better prospects in application especially in computing complexity. So it can satisfy the real-time and robustness of video watermarking simultaneously.
     A robust and blind video watermarking (SSVW) based on Shamir's secret sharing scheme for multiusers is proposed. It divides the field of host video signal into multisegments and then splits the original watermark into corresponding number shares with secret sharing algorithm. Each share of watermark is embedded into the corresponding segment of host video signal. The computing complexity of algorithm is reduced by grouping the frame sequence. In the embedding processing, the updating of watermark shadows is periodic, so the scheme proposed can resist collusion attack. In the extract processing, the hashing function is used before watermark reconstruction to resist the cheating attack. Experiment results show that the proposed watermarking technique is robust against many signal processing especially the frame average and frame lose.
引文
[1]Stefan Katzenbeisser,Fabien A P Petitcolas著,吴秋新,钮心忻,杨义先,罗守山,杨晓兵译.信息隐藏技术--隐写术与数字水印.北京:人民邮电出版社,2001年9月
    [2]汪小帆,戴跃伟,茅耀斌.信息隐藏技术--方法与应用.北京:机械工业出版社,2001年5月
    [3]Mitchell D Swanson,Mei Kobayashi,Ahmed H Tewfik.Multimedia data-embedding and watermarking technologies,in:Proceedings of the IEEE,1998,86(6):1064-1087
    [4]Fabien A P Petitcolas,Ross J Anderson,Markus G Kuhn.Information hiding--a survey,in:Proceedings of the IEEE,1999,87(7):1062-1078
    [5]Frank Hartung,Martin Kutter.Multimedia watermarking technologies,in:Proceedings of the IEEE,1999,87(7):1079-1107
    [6]Voyatzis G,Pitas I.The use of watermarks in the protection of digital multimedia products,in:Proceedings of the IEEE,1999,87(7):1197-1207
    [7]Cox I J,Miller M L,Bloom JA著,王颖等译.数字水印.北京:电子工业出版社,2003年7月
    [8]Celik M U,Saber E,Sharma G,et al.Analysis of feature-based geometry invariant watermarking,in:Proceedings of SPIE:Security and Watermarking of Multimedia Contents Ⅲ,2001,4314:261-268
    [9]Ozer I B,Ramkumar M,Akansu A N.New method for detection of watermarks in geometrically distorted images,in:2000 IEEE International Conference on Acoustics,Speech,and Signal Processing(ICASSP'2000),Istanbul,Turkey,2000(4):1963-1966
    [10]Cheng,H.A review of video registration methods for watermark detection in digital cinema applications,in:2004 IEEE International Symposium on Circuits and Systems,23-26 May 2004,Vancouver,BC,Canada,Vol.5,2004:704-707
    [11]Cai L,Do S D.Rotation,scale and translation invariant image watermarking using radon transform and Fourier transform,in:Proceedings of the IEEE 6~(th) Circuits and Systems Symposium on Emerging Technologies:Frontiers of Mobile and Wireless Communication,Vol.1,2004:281-284
    [12]Zitova B,Flusser J.Image registration methods:A survey.Image and Vision Computing, 2003, 21(11): 977-1000
    [13] Goshtasby, A. Registration of images with geometric distortions. IEEE Transactions on Geoscience and Remote Sensing, 1988,26(1): 60-64
    [14] Braudaway G W, Mintzer F. Automatic recovery of invisible image watermarks from geometrically distorted images. Journal of Electronic Imaging, 2000,9(4): 477-483
    [15] Dong P, Brankov J G, Galatsanos N. Geometric robust watermarking based on a new mesh model correction approach. in: International Conference on Image Processing, Rochester, NY, United States, 2002(3): 493-496
    [16] Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public key cryptosystems. Comm ACM, 1978, 21 (2): 120-126
    [17] An J H, Dodis Y, Rabin T. On the security of joint signature and encryption. Eurocrypt'02, LNCS 2332. Berlin: Springer-Verlag, 2002: 83-107
    [18] Dent A W. Hybrid signcryption schemes with insider Security. ACISP'05, LNCS 3574. Berlin: Springer-Verlag, 2005: 253-266
    [19] Bellare M, Rogaway P. The exact security of digital signatures: how to sign with RSA and Rabin. in: Proceeding of Advances in Cryptology, Eurocrypt'96. Berlin: Springer-Verlag, 1996: 399-416
    [20] Coron J S. On the exact security of full domain hash. in: Proceeding of Advances in Cryptology, CRYPTO'00. 2000: 229-235
    [21] Sun H M, Shieh S P. Secret sharing in graph-based prohibited structure. in: Proceeding of IEEE INFOCOM. 1997: 718-724
    [22] Johnston J, Jayant N, Safranek R. Signal compression based on models of human perception. in: Proceedings of Tricomm. 1993, 81(10):1385-1422
    [23] Westfeld A, Ptzmann A. Attacks on Steganographic Systems. in: Proceeding of the 3~(rd) International Workshop on Information Hiding. Dresden, Germany, 1999
    [24] Dumitrescu S, Wu Xiaolin, Wang Zhe. Detection of LSB Steganography via Sample Pair Analysis. in: Proceeding of the 5~(th) International Workshop on Information Hiding. Springer-Verlag, 2002
    [25] Dumitrescu S, Wu Xiaolin, Memon N. On Steganalysis of Random LSB Embedding in continuous-tone Images. in: Proceeding of IEEE ICIP'02. New York, USA: 2002
    [26] Cooperman M, Moskowitz S. Steganographic Method and Device. 1997
    [27] Brassil J, Low S, Maxemchuk N, et al. Electronic Marking and Identification Techniques to Discourage Document Copying. in: Proceeding of Infocom'94. Junel994: 1278-1287
    [28] Maxemchuk N F, Low S H. Performance Comparison of Two Text Marking Methods. IEEE Journal on Selected Areas in Communications. 1998, 16(4): 561-572
    [29] Moulin P, O'Sullivan, J A. Information-theoretic analysis of information hiding. Information Theory, IEEE Transactions on Vol. 49, Issue 3, 2003(3): 563-593
    [30] Christian C, Thomborsen C, Aiken A, et al. Software watermarking: models and dynamic embeddings. in: Proceeding of the 26~(th) Annual SIGPLAN-AIGACT Symposium on Principles of Programming Languages (POPL'99). Association for Computing Machinery Press, 1999: 311-324
    [31] Coumou D J, Sharma G Insertion, Deletion Codes with Feature-Based Embedding: A New Paradigm for Watermark Synchronization with Applications to Speech Watermarking. IEEE Transactions on Information Forensics and Security, Vol. 3, Issue 2, 2008(6): 153-165
    [32]Tirkel A Z. Electronic watermark. Digital Image Computing Technology and Applications, 1993,10(1): 666-673
    [33] Schyndel R, Tirkel A, Oshorne C. A digital watermark, in: Proceedings of the IEEE, International Conference on Image Processing. Austin, Texas, 1994,2: 86-90
    [34] Cox I J, Kilian J, Leighton T. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 1997,6(12): 1673-1687
    [35] Pitas I. A method for watermark casting on digital images. IEEE Transactions on Circuit and Systems for Video Technology, 1998,8(6): 775-780
    [36] Voyatzis G, Pitas I. Chaotic watermarks for embedding in the spatial digital image domain. in: Proceeding of IEEE, 1998: 432-436
    [37] Deepa Kundur. Multiresolution Digital Watermarking: Algorithm and Implication for Multimedia Signals. PhD Dissertation, University of Toronto,Canada,1999
    [38] Fleet D J, Heeger D J. Embedding invisible information in color images. in: Proceeding of International Conference on Image Processing, Vol.531, 1997(1): 532-535
    [39] Ruanaidh J, Pun T. Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Processing, 1998,66(3): 303-317
    [40] Kutter M, Bhattacharjee S K, Ebrahimi T. Towards second generation watermarking schemes. in: Proceeding of IEEE International Conference on Image Processing (ICIP'99), 1999(1): 320-323
    [41] Bas P, Chassery J M, Macq B. Geometrically invariant watermarking using feature points. IEEE Transactions on Image Processing, 2002,11(9): 1014-1028
    [42] Tang C W, Hang. A feature-based robust digital image watermarking scheme, IEEE Transactions on Signal Processing, 2003, 51(4): 950-959
    [43] Ohbuchi R, Masuda H, Aono M. Watermarking three-dimensional polygonal models. in: Proceeding of the ACM International Conference on Multimedia 97. Seattle. 1997: 261-272
    [44] Praun E, Hoppe H, Finkelstein A. Robust mesh watermarking. in: Proceeding of SiGGRAPH, 1999:49-56
    [45] Bender W, Gruhl D, Morimoto N, et al. Techniques for Data Hiding. IBM System Journal, 1996, 35 (3/4): 313-336
    [46]Boney L, Tewfik A, Hamdy K. Digital watermarks for audio signals. IEEE International Conference on Multimedia Computing and Systems, 1996(1): 473-480
    [47] Hartung F, Girod B. Digital watermarking of MPEG2 coded video in the bitstream domain. in: Proceeding of IEEE International Conference on Acoustic, Speech and Signal Processing, Munich, Germany, 1997: 2621-2624
    [48] Simitopoulos D, Tsaftaris S A, Boulgouris N V, et al. Compressed domain video watermarking of MPEG streams. in: Proceeding of IEEE International Conference on Multimedia and Expo Lausanne, Switzerland, 2002: 569-572
    [49] Lu Chun-Shien, Chen Jan-Ru, Fan Kuo-Chin. Real-time frame-dependent video watermarking in VLC domain. Signal Processing: Image Communication, 2005, 20(7): 624-642
    [50] Pereira S, Ruanaidh J, Deguillaume F. Template based recovery of Fourier-based watermarks using log-polar and log-log maps. in: Proceeding of the 1999 6~(th) International Conference on Multimedia Computing and Systems (ICMCS'99), Florence, Italy, 1999(1): 870-874
    [51] Pereira S, Pun T. Robust template matching for affine resistant image watermarks. IEEE Transactions on Image Processing, 2000, 9(6): 1123-1129
    [52] Pereira S, Pun T. Iterative template matching algorithm using the Chirp-Z transform for digital image watermarking. Pattern Recognition, 2000, 33(1): 173-175
    [53] Altun O, Sharma G, Celik U, A Set Theoretic Framework for Watermarking and Its Application to Semifragile Tamper Detection, IEEE transaction on Information Forensics and Security, 2006(12): 479-492
    [54] Qi X J, Qi J. Improved affine resistant watermarking by using robust templates. in: Proceeding of IEEE International Conference on Acoustics, Speech, and Signal Processing, Montreal, Que, Canada, 2004,3: 405-408
    [55] Delannay D, Roover C D, Macq B. Temporal Alignment of Video Sequences for Watermarking Systems. in: Proceedings of SPIE-Security and Watermarking of Multimedia Contents V, Santa Clara, CA, United States, 2003, 5020: 481-492
    [56] Brassil J, Low S, Maxemchuk N. Electronic Marking and Identification Techniques to Discourage Document Copying. in: Proceeding of Infocom. 1994(6): 1278-1287
    [57] Maxemchuk N F, Low S H. Performance Comparison of Two Text Marking Methods. IEEE Journal on Selected Areas in Communications. 1998,16(4):561-572
    [58] Yang Huijuan, Kot A C. Text document authentication by integrating inter character and word spaces watermarking. in: Proceeding of IEEE International Conference on Multimedia and Expo, ICME2004. Taipei, China. 2004(2): 955-958
    [59] Christian C, Thomborsen C. Software watermarking: models and dynamic embeddings. in: Proceedings of the 26~(th) Annual SIGPLAN-AIGACT Symposium on Principles of Programming Languages (POPL'99). Association for Computing Machinery Press, 1999: 311-324
    [60] Curran D, Hurley N, Cinneide M. Securing java through software watermarking. PPPJ 2003. Kilkenny City, Ireland. 2003:145-148
    [61] Menden A, Iida H, Matsumoto K. A practical method for watermarking java programs. in: Proceeding of the 24~(th) Computer Software and Applications Conference (compsac2000). Taipei, Taiwan. 2000
    [62] Nagra J, Thomborson C. Threading software watermarks. in: Proceeding of the 6~(th) International Workshop on Information Hiding. Berlin: Springer-Verlag, 2004: 208-233
    [63] Ryutarou Ohbuchi, Hiroshi Masuda, Masaki Aono. Data embedding algorithms for geometrical and non-geometrical targets in three-dimensional polygonal models. Computer Communications, 1998,21(15): 1344-1354
    [64] Benedens O. Two high capacity methods for embedding public watermarks into 3D polygonal models. in: Proceeding of the Multimedia and Security Workshop at ACM Multimedia. Orlando, Florida. 1999: 95-99
    [65] Kanai S, Date H, Kishinami T. Digital watermarking for 3D polygons using multiresolution wavelet decomposition. in: Proceeding of International Workshop on Geometric Modeling. Tokyo. 1998: 296-307
    [66] Radu Sion, Mikhail Atallan, Sunil Prabhakar. Watermarking relational databases. in: Proceeding of ACM SIG-MOD. California, USA. 2003
    [67] Rakesh Agrawal, Jerry Kierna. Watermarking Relational databases. in: Proceeding of the 28~(th) VLDB Conference. Hongkong, China. 2002: 155-166
    [68] Guo Huiping, Li Yingjiu, Liu Anyi. A fragile watermarking scheme for detecting malicious modifications of database relations. Information Sciences. 2006, 178: 1350-1377
    [69] Mwangi, Elijah. A Geometric Attack Resistant Image Watermarking Scheme Based on Invariant Centroids. Signal Processing and Information Technology, 2007(12): 190-193
    [70] Lichtenauer J, Setyawan I, Kalker T, Lagendijk R. Exhaustive geometrical search and the false positive watermark detection probability. in: Proceeding of SPIE-Security and Watermarking of Multimedia Contents V, Santa Clara, CA, USA, 2003, 5020: 203-214
    [71] Darmstaedter V, Delaigle J F, Quisquater J J, Macq B. Low cost spatial watermarking. Computers & Graphics, 1998, 22(4): 417-424
    [72] Acken J M. How watermarking adds value to digital content. Communications of the ACM, 1998,41(7):74-77
    [73] Stankovic S, Djurovic I, Pitas I. Watermarking in the Space/Spatial-Frequency Domain Using Two-Dimensional Radon Wigner Distribution. IEEE Transaction on Image Processing, 2001,10(4): 650-658
    [74] Lin Ching yung, Chang Shih-fu. SemiFragile Watermarking for authenticating JPEG visual content. Security and Watermarking of Multimedia Contents. San Jose: SPIE, 2000,3971: 140-151
    [75] Hartung F, Su J K, Girod B. Spread spectrum watermarking: malicious attacks and counterattacks. in: Proceedings of SPIE, Security and Watermarking of Multimedia Contents, San Jose, CA, USA, 1999,3657: 147-158
    [76] Tefas A, Pitas I. Multi-bit image watermarking robust to geometric distortions. in: Proceeding of IEEE International Conference on Image Processing (ICIP'2000), Vancouver, BC, 2000(3): 710-713
    [77] Baudry S, Nguye P N, Maitre H. Estimation of geometric distortions in digital watermarking. in: Proceeding of IEEE International Conference on Image Processing (ICIP'02), Rochester, NY, United States, 2002(2): 885-888
    
    [78] 孙圣和,陆哲明,牛夏牧等.数字水印技术及应用.科学出版社,2004:1-385
    [79] Wolfgang R B, Delp E J. A watermark for digital images. in: Proceeding of IEEE International Conference on Image Processing, 1996(3): 219-222
    [80] Bors A G, Pitas I. Image watermarking using DCT domain constraints. in: Proceeding of the IEEE International Conference on Image Processing.Lausanne,Switz:IEEE,1996:231-234
    [81]Ruanaidh J,Dowling W J,Boland F M.Phase watermarking of digital images,in:Proceeding of IEEE International Conference on Image Processing,1996(3):239-242
    [82]Kundur D,Hatzinakos D.A robust digital image watermarking method using wavelet-based fusion.Image Processing,1997.in:Proceeding of International Conference on,Vol.1,1997(10):544-547
    [83]Watson A B.DCT quantization matrices visually optimized for individual images,in:Proceedings of Human Vision,Visual Processing,and Digital Display IV.Allebach,Bernice E.Rogowitz,1993:20-26
    [84]Podilchuk C I,Wenjun Zeng.Image-adaptive watermarking using visual models.IEEE Journal on Selected Areas in Communications,Vol.16,Issue.4,1998(5):525-539
    [85]Kim S W,Suthaharan S,Lee H K.Image watermarking scheme using visual model and BN Distribution.Electronics Letters,1999,35(3):212-214
    [86]Barni M,Bartolini F,Piva A.Improved wavelet based watermarking through pixel wise masking.IEEE Transactions on Image Processing,2001,10(5):783-791
    [87]Reddy A,Chatterji B.A New Wavelet Based Logo-Watermarking Scheme.Pattern Recognition Letters.2004,26(7):1019-1027
    [88]凌贺飞,卢正鼎,邹复好,李瑞轩.基于Watson视觉感知模型的能量调制水印算法.软件学报,2006,17(5):1124-1133
    [89]Braudaway G W,Mintzer F.Automatic recovery of invisible image watermarks from geometrically distorted images.Journal of Electronic Imaging,2000,9(4):477-483
    [90]Ozer I B,Ramkumar M,Akansu A N.New method for detection of watermarks in geometrically distorted images,in:Proceeding of IEEE International Conference on Acoustics,Speech,and Signal Processing,Istanbul,Turkey,2000(4):1963-1966
    [91]Su P C,Kuo C C.An image watermarking scheme to resist generalized geometrical transformations,in:Proceeding of SPIE-The International Society for Optical Engineering,Vol.4209,2000:354-365
    [92]Kutter M.Watermarking resisting to translation,rotation,and scaling,in:Proceedings of SPIE-Multimedia Systems and Applications,Boston,MA,USA,Vol.3528,1999:423-431
    [93]桑茂栋,赵耀.抵抗几何攻击的数字图像水印.电子与信息学报,2004,26(12): 1875-1881
    [94] Hefei Ling, Zhengding Lu, Fuhao Zou, Wugang Yuan. A Geometrically Robust Watermarking Scheme Based on Self-Recognition Watermark Pattern. in: Proceeding of IEEE International Conference on Multimedia and Expo, 2006(7): 1601 - 1604
    [95] Farzam M, Shirani S. A Robust Multimedia Watermarking Technique Using Zernike Transform. in: Proceeding of IEEE 4~(th) Workshop on Multimedia Signal Processing. 2001:529-534
    [96] Zhang Li, Qian Gongbin. Geometric Distortions Invariant Blind Second Generation Watermarking Technique Based on Tchebichef Moment of Original Image. Journal of Software, Vol. 18,2007(9): 2283-2294
    [97] Jen-Sheng Tsai, Win-Bin Huang, Chao-Lieh Chen. A feature-based digital image watermarking for copyright protection and content authentication. in: Proceeding of International Conference on Image Processing, 2007: 469-472
    [98]Yanwei Yu, Zhengding Lu, Hefei Ling, Fuhao Zou. A robust blind image watermarking scheme based on feature points and rs-invariant domain. in: Proceeding of the 8th International Conference on Signal Processing, Vol. 2, 2006: 16-20
    [99] Dugelay J L, Roche S. Still-image watermarking robust to local geometric distortions. IEEE Transaction on Image Processing, Vol.15 Issue.9,2006: 2831-2842
    [100] Ho Y K, Wu M Y. Robust object-based watermarking scheme via shape self similarity segmentation. Pattern Recognition Letters, 2004,25(15): 1673-1680
    [101] Wugang Yuan, Hefei Ling, Zhengding Lu, Fuhao Zou, Yanwei Yu. Image Content-based Watermarking Resistant against Geometrical Distortions. in: Proceeding of the 8th International Conference on Signal Processing, 2006
    [102] Arena S, Carana M, Lancini R. Digital watermarking applied to MPEG2 coded video sequences exploiting space and frequency masking. in: Proceeding of International Conference on Image Processing, 2000: 438-441
    [103] Su K, Kundur D, Hatzinakos D. A content-dependent spatially localized video watermark for resistance to collusion and interpolation attacks. in: Proceeding of International Conference on Image Processing, 2001(1): 818-821
    [104] Swanson M, Zhu B. Multiresolution scene-based video watermarking using perceptual models. IEEE Journal on Selected Areas in Communications, 1998, 16(4): 540-550
    [105] Delaigle J F, Devleeschouwer C, Macq B, Langendijk L. Human visual system features enabling watermarking. in: Proceeding of IEEE International Conference on Multimedia and Expo,Vol.2,2002(8):489-492
    [106]Zhang X H,Lin W S,Xue P.Just-Noticeable Distortion Estimation for Image Pixels.in:Proceeding of IEEE 7~(th) Workshop on Multimedia Signal Processing.2005(10):1-4
    [107]Wang S,Zheng D,etc.An Image Quality Evaluation Method Based on Digital Watermarking.Circuits and Systems for Video Technology,2007,1(17):98-105
    [108]Wang Z,Bov Ikac.Structural approaches to image quality assessment.Handbook of Image and Video Processing(Al Bovik,eds.),second edition,Academic Press,May 2005
    [109]Daly S.The visible difference predictor:An algorithm for the assessment of image fidelity,in:Proceeding of SPIE The International Society for Optical Engineering,1992,1616:2-15
    [110]Heeger D J,Teo P C.A model of perceptual image fidelity,in:Proceeding of IEEE International Conference on Image Processing.1995:343-345
    [111]Watson A B,Solomon J A.Model of visual contrast gain control and pattern masking.Journal of Optical Society of America,1997,14(9):2379-2391
    [112]Van Den,Branden C J.Quality assessment of motion rendition in video coding.IEEE Transactions on Circuits and Systems for Video Tech,1999(9):766-782
    [113]Do M N,Martin Vetterli.Contourlets:A new directional multiresolution image representation,in:Proceeding of the 36~(th) Asilomar Conference on Signals,Systems and Computers,2002(1):497-501
    [114]焦李成,谭山.图像的多尺度几何分析:回顾和展望.电子学报,Vol.31,No.12A,2003(12):1975-1981
    [115]Jayalakshmi M,Merchant S N,Desai U B.Blind Watermarking in Contourlet Domain with Improved Detection.in:Proceeding of Intelligent Information Hiding and Multimedia Signal Processing,2006(12):449-452
    [116]Baaziz Nadia.Adaptive watermarking schemes based on a redundant contourlet transform,in:Proceeding of the International Conference on Image Processing,Genoa,2005(1):221-224
    [117]陈开亮,王建军.一种HVS和Contourlet相结合的图像水印算法.计算机辅助设计与图形学学报,Vol.19,No.6,2007(6):811-816
    [118]李海峰,宋巍巍,王树勋.基于Contourlet变换的稳健性图像水印算法.通信学报,2006,27(4):87-94
    [119]Shangqin Xiao,Hefei Ling,Fuhao Zou,Zhengding Lu.Adaptive Image Watermarking Algorithm in Contourlet Domain.in:Proceeding of 2~(nd) Japan-China Joint Workshop on frontier of Computer Science and technology,FCST 2007,2007(11):125-130
    [120]Bamberger R H,Smith M J T.A filter bank for the directional decomposition of images:Theory and design.IEEE Transactions on Signal Process.1992,40(4):882-893
    [121]Farook Sattar,Lars Floreby,et al.Image enhancement based on a nonlinear multiscale method.IEEE Transactions on Image Processing.1997,6(6):888-895
    [122]Pennec E L,Mallat S.Image Compression with Geometrical Wavelets.in:Proceeding of the International Conference on Image Processing,2000(9):661-664
    [123]Do M N,Vetterli M.Contourlets.Beyond Wavelets,Stoeckler J,Welland G V.Academic Press,2002
    [124]Haitsma J,Kalker T.A watermarking scheme for digital cinema,in:Proceeding of International Conference for Image Processing.2001:487-489
    [125]Lancini R,Mapelli F,Tubaro S.A robust video watermarking technique in the spatial domain,in:Proceeding of Video/Image Processing and Multimedia Communications 4~(th) EURASIP-IEEE Region 8 International Symposium on VIPromCom,2002(6):251-256
    [126]黄文勇,唐龙.一种抗几何变换攻击的MPEG4视频对象水印方案.小型微型计算机系统,2005,26(5):803-806
    [127]Ye Dengpan,Dai Yuewei,Wang Zhiquan.A Fast motion Segmentation Based Watermarking for MPEG2 Video.in:Proceeding of 8~(th) International Conference on Control,Automation,Robotics and Vision,Kunming,China,2004(2):1088-1091
    [128]Boulgouris N V,Koravos F D,Strintzis M G.Self-synchronizing watermark detection for MPEG4 objects,in:Proceeding of ICECS,2001(3):1371-1374
    [129]Elarbi M,Ben Amar C,Nicolas H.A Video Watermarking Scheme Resistant to Geometric Transformations.in:Proceeding of the International Conference on Image Processing,Vol.5,2007(9):481-484
    [130]Serdean C V,Ambroze M A,Tom linson M.DWT-based high-capacity blind video watermarking invariant to geometrical attacks.Vision,Image and Signal Processing,2003,150(1):51-58
    [131]Shangqin Xiao,Zhengding Lu,Fuhao Zou,Hefei Ling.Video Watermarking Algorithm Based on Balanced Multiwavelets.in:Proceeding of 8~(th) International Conference on Signal Processing, Vol. 1, 2006(11): 286-289
    [132] Chui C K, Lian J A. A study of orthonormal multi-wavelets. J.Appl. Numer. Math., Vol. 20, no.3, 1996(3): 273-298
    [133] Leburn J, Vetterli M. High-order balanced multiwavelets: theory, factorization and design. IEEE Transactions on Signal Process, 2001,49(9): 1918-1929
    [134] Lawton W, Lee S L, Shen Z W. An algorithm for matrix transformation and wavelet construction. Math. Comput. Vol. 65, no. 214, 1996(4): 723-737
    [135] Donovan G, Geronimo J S. Construction of orthogonal wavelets using fractal interpolation functions. SIAM J. Math. Anal, Vol. 27, no. 4, 1996: 1158-1192
    [136] Bruce Kessler. Balanced biorthogonal scaling vectors using fractal macroelements on [0,1]. Applied and Computational Harmonic Analysis, Vol.22, issue 3, 2007(5): 286-303
    [137] Xiong H L, Zhang T X. A translation and scale invariant adaptive wavelet transform. IEEE Transactions on Image Processing. 2000, 9(12): 2100-2108
    [138] Pun C M, Lee M C. Log-polar wavelet energy signatures for rotation and scale invariant texture classification. IEEE Transactions on Pattern Analysis and Machine Intelligence. 2003. 25(5):590-603
    [139] Cui P, Li J. Rotation and scaling invariant texture classification based on Radon transform and multiscale analysis. Pattern recognition letters. 2006(5): 408-413
    [140] Blakley G R. Safeguarding Cryptographic Keys. In: Proceedings of the National Computer Conference. AFIPS Press, 1979, 48:313-317
    [141] Boneh D, Shaw J. Collusion-Secure Fingerprinting for Digital Data. IEEE Transactions on Information Theory, 1998,44: 1897-1905
    [142] Yacobi Y. Improved Boneh-Shaw Content Fingerprinting. LNCS, 2001, 2020: 378-391
    [143] Zane F. Efficient Watermark Detection and Collusion Security. LNCS, 2000, 1962:21-32
    [144] Domingo-Ferrer J, Herrera-Joancomarti J. Short Collusion-Secure Fingerprints Based on Dual Binary Hamming Codes. Electron. Letters, 2000(36): 1697-1699
    [145] Sebe F, Domingo-Ferrer J. Collusion-Secure and Cost-Effective Detection of Unlawful Multimedia Redistribution. IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews, 2003(33): 382-389
    [146] Su Karen, Kundur D, Hatzinakos D. Statistical Invisibility for Collusion-Resistant Digital Video Watermarking. IEEE Transactions on Multimedia, 2005(7): 43-51
    [147]Trappe W,Wu M,Wang Z J,Liu K J R.Anti-collusion Fingerprinting for Multimedia.IEEE Transactions on Signal Processing,2003(51):1069-1087
    [148]Celik M U,Sharma G,Tekalp A M.Collusion-Resilient Fingerprinting by Random Pre-Warping.IEEE Signal Processing Letters,2004(11):831-835
    [149]Kirovski D,Malvar H,Yacobi Y,A dual watermark-fingerprint system Multimedia.IEEE Vol.11,Issue.3,July-Sept.2004:59-73
    [150]Campisi P,Video watermarking in the 3D-DWT domain using quantization-based methods,in:Proceeding of IEEE 7~(th) Workshop on Multimedia Signal Processing,2005(10):1-4
    [151]Chor B,Fiat A,Naor M,Pinkas B.Tracing Traitors.IEEE Transactions on Information Theory,2000,46:893-910
    [152]Minoru Kuribayashi,Hatsukazu Tanaka.A New Anonymous Fingerprinting Scheme with High Enciphering Rate,in:Proceeding of the 2~(nd) International Conference on Cryptology,India,2001(12):30-39
    [153]Stinson D,Wei R.Combinatorial Properties and Constructions of Traceability Schemes and Frame-proof Codes.SIAM J.on Disc.Math.,Vol.11,1998(1):41-53
    [154]Aggelos Kiayias,Moti Yung.Breaking and Repairing Asymmetric Public-Key Traitor Tracing.LNCS 2696,2003:32-50
    [155]Shamir A.How to Share a Secret.Communications of the ACM,1979,22(11):612-613
    [156]肖尚勤,卢正鼎,凌贺飞,邹复好.基于P2P系统信任机制的DRM模型.计算机研究与发展,2007(4):567-573
    [157]Asmuth C A,Blakley G.R.Pooling,Splitting and Reconstituting Information to Overcome Total Failure of Some Channels of Communication.in:Proceeding of the 1982 Symposium on Security and Privacy,Oakland,CA.IEEE Press,1982:156-169
    [158]Karnin E D,Greene J W,Hellman M E.On Secret Sharing System.IEEE Transactions on Information Theory.1983(29):35-41

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700