数字水印技术及应用研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着互联网的普及和数字技术的广泛应用,数字产品变得极大丰富并且传播便捷,同时版权保护问题也日益突出。传统的信息安全技术在数字产品版权保护方面存在的不足,促成了数字水印技术的发展。数字水印技术将数字水印隐藏于数字媒体中,以便在版权纠纷中为版权所有者提供版权证明。鲁棒性和隐蔽性是版权保护数字水印的一般特点,盲提取能力能方便数字水印技术的应用。本文针对数字水印技术的特点及其应用作了以下探索和研究:
     1.提出了基于模板匹配的鲁棒性数字水印方案。该方案依照模板,将数字水印嵌入到图像的小波变换域,实现了数字水印提取过程的自同步和盲提取。在提取数字水印前,通过对宿主图像的锐化处理,能够显著改善数字水印的提取精度,并且能够提高数字水印抗图像处理和有损压缩等攻击的能力。
     2.提出了图像归一化特征区域数字水印方案。该方案消除了基于不变矩的图像归一化(MIBIN)在数字水印技术应用中的问题。在数字水印技术中,MIBIN被用于应对几何变换攻击,但诸如嵌入的数字水印、灰度直方图调整、图像的少量剪切等因素影响归一化图像的稳定性,从而影响数字水印的提取,降低数字水印的鲁棒性。从MIBIN的原理出发分析了上述问题,并在该方案中给出了解决方法。
     3.提出了基于支持向量机(SVM)的数字水印方案。借助SVM良好的学习能力和推广能力,该方案提高了数字水印的鲁棒性,并且实现了不依赖任何辅助信息的数字水印盲提取。该方案利用了数字水印的提取与模式识别的内在相似性,设计了适合于SVM应用的数字水印嵌入和提取方法,分析了SVM的核函数及其参数选取在水印提取效果方面的表现。
     4.提出了对视频具有双重保护的数字水印方案。从视频编码原理出发,分析了在视频中嵌入数字水印后,数字水印和视频之间的相互影响,由此得出了视频重建误差(VRE)的产生和消除机制。该方案利用这种机制提高了数字水印的鲁棒性,并且对视频提供双重保护,既能够由数字水印提供版权证明,同时又利用VRE直接保护视频内容。
     5.提出了以存储为中心的网上交易与认证结构,以及该结构下的数字水印协议。解决了数字水印协议中数字产品信息和交易信息的存储问题,保障了数字产品和交易记录存储的一致性,便于集中管理信息,克服了Buyer-Seller水印协议中的若干安全问题,而且使子协议之间的划分更清晰。
     6.提出了数字水印空间概念,通过改进离散空间静态目标的最优搜索模型和求解方法,建立了数字水印空间中多副本水印的最优提取序列。多副本数字水印方案能够全面提高数字水印的鲁棒性,但是受到攻击后不能确定哪个数字水印副本存在,如果采用穷尽搜索的方式会花费大量时间,而最优提取序列能使提取到数字水印的期望时间最小。
With the rapid development of Internet and digital technology,digital productsbecome more and more popular,mainly because they can be transmitted conveniently,but the problem of copyright protection is also more and more serious.Theinapplicability of traditional information security technology for copyrights problempromotes the development of digital watermarking.Digital watermarking technologyembeds digital watermark in digital media that provides copyright proof for the ownerof digital media.Robustness and invisibility are two important features of digitalwatermark.The blind detection property can facilitate application of digitalwatermarking.
     This dissertation thoroughly studied the watermarking technology and theapplications.The main contributions are listed below:
     1.A robust digital watermarking scheme based on template matching is proposed.The digital watermark is embedded in the wavelet transform domain according to atemplate.This scheme realizes blind watermark extraction without any extrainformation.By sharpening the watermarked image before extraction,the precision ofthe extracted watermark is enhanced,thus the robustness of the watermark is improvedagainst image processing and lossy compression etc..
     2.A new scheme for embedding watermark in normalized feature area ispresented,that eliminates some problems in MIBIN (Moment Invariant Based ImageNormalization).MIBIN has been used in watermarking schemes to resist geometrictransform attacks,however,the stability of the normalized image and watermarkextraction can be affected by the embedded watermark,gray level histogram adjustment,and content removal etc.Thus the robustness of the digital watermark is damaged.FromMIBIN theory,some solutions to these problems are given in this scheme.
     3.A watermarking scheme based on SVM (Support Vector Machine) is presented,the robustness of the scheme comes from the good learning and generalization ability ofSVM,the watermark can be extracted without any auxiliary information.Using thesimilarity of digital watermark extraction and pattern recognition,this scheme gives methods for watermark embedding and extraction,which are suitable to SVMapplication,by analyzing the influence of kernel functions and their parameters onwatermark extraction.
     4.A digital video watermarking scheme with dual protection is presented,whichcan provide copyright proof by the watermark,and protect the video content directly bythe VRE (Video Reconstruction Error).From the video coding procedure,theinteraction between the watermark and the video is analyzed,and the mechanism ofproducing and elimination of VRE is obtained.This mechanism is used by the schemeto enhance the robustness of the watermark and to provide dual protection for the video.
     5.A storage centered online transaction architecture and corresponding protocolare proposed,which settle the storage problem of digital products and transactionrecords in the buyer-seller watermarking protocol.The architecture and the protocol canensure the security of the digital products and their transaction records,and make themeasy to be managed.At the same time,the boundaries between sub-protocols are clearer.
     6.The concept of multi-copy watermark space is given;and the model of optimalsearch for static target is improved,which is used in watermark space for setting upoptimal watermark extraction sequence.Multi-copy watermark scheme can enhance thecomprehensive robustness of the watermark,but it is uncertain which watermark copyexists after attacks,so the extraction time is quite long for an exhausting search.Theoptimal extraction sequence can make the expected extraction time minimal.
引文
[1]Tirkel A Z, Rankin G A, Schyndel R M. Electronic water mark. Digital image Computing, Technology and Applications, 1993, vol.3:666-673
    [2]Schyndel R G, Tirkel A Z, Osborne C F. A digital watermark. IEEE International Conference on Image Processing, 1994, vol.2:86-91
    [3]Bender W, Gruhl D, Morimoto N. Techniques for data hiding. IBM System Journal, 1996, 35:313-336
    [4]Ingemar J C, Joe K, Tom L. Secure spread spectrum watermarking for multimedia. IEEE Transaction on Image Processing, 1997, 6(12):1673-1687
    [5]Podilchuk C I, Zeng W J. Image adaptive watermarking using visual models. IEEE Selected Areas in Communication, 1998, 16(4):525-539
    [6]Barni M, Bartolini F, Cappellini V. Robust watermarking of still images for copyright protection. Proceedings of Digital Signal Processing, 1997, vol.2:499-502
    [7]Hsu C T, Wu J L. Hidden digital watermarking in images. IEEE Transaction on Image Processing, 1999, 8(1):58-68
    [8]Tang W L, Aoki Y. A DCT-based coding of images in watermarking. Proceedings of International Conference on Information, Communications and Signal Processing, 1997,vol.1:510-512
    [9]Kundur D, Hatzinakos D. Digital watermarking using multiresolution wavelet decomposition.Proceedings of IEEE International conference on Acoustics, Speech and Signal Processing,1998, vol.5:2969-2972
    [10]Kundur D, Hatzinakos D. Robust digital image watermarking method using wavelet-based fusion. Proceedings of International Conference on Image Processing, 1997:544-547
    [11]Kundur D, Hatzinakos D. A novel blind deconvolution scheme for image restoration using recursive filtering. IEEE Transactions on Signal Processing, 1998, 46(2):375-390
    [12]Xia X G, Charles G B, Gonzalo R A. A multiresolution watermark for digital images. Proceedings of International Conference on Image Processing, 1997, vol.1:548-551
    [13]Zhu Wenwu, Xiong Zixiang, Zhang Yaqin. Multiresolution watermarking for images and video:a unified approach. Proceedings of International Conference on Image Processing, 1998, vol.1:465-468.
    [14]Qi Song, Zhu Guangxi, Luo Hangjian. Image watermarking based on image normalization. IEEE International Symposium on Communications and Information Technology, 2005,vol.2:1501-1504
    [15]Yang W X, Zhao Y. Multi-bits image watermarking resistant to affine transformations based on normalization. Signal Processing, 2004, 20(3):245-250
    [16]Kim B S, Choi J G, Park K H. Image normalization using invariant centroid for RST invariant digital image watermarking. Lecture Notes in Computer Science, 2003, vol.2613:201-210
    [17]Lee S W, Choi J G, Kang H S. Normalization domain watermarking method based on pattern extraction. Lecture Notes in Computer Science, 2004, vol.2939:390-395
    [18]Puate J, Jordan F. Using Fractal compression scheme to embed a digital signature into an image Proceedings of the SPIE Video Techniques and Software for Full-Service Networks, 1997,vol.2915:108-118
    [19]Voyatzis G, Pitas I. Chaotic watermarks for embedding in the spatial digital image domain. Proceedings of International Conference on Image Processing, Oct. 1998, vol.2:432-436
    [20]Fu M S, Au O C. Data hiding in halftone images by stochastic error diffusion. Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, 2001,vol.3:1965-1968
    [21]谭铁牛,刘瑞祯.基于奇异值分解的数字图像数字水印算法.电子学报,2001,29(2):168-171
    [22]Kutter M, Bhattacharjee S K, Ebrahimi T. Towards second generation watermarking scheme. Proceedings of International Conference on Image Processing, 1999, vol.1:320-323.
    [23]Cox I J, Miller M L. The First 50 years of Electronic watermarking. IEEE Fourth Workshop on Multimedia Signal Processing, 2001, vol.2:126-132
    [24]Ingemar J Cox, Matthew L Miller, Jeffrey A Bloom.数字水印.王颖,黄志蓓等译,北京:电子工业出版社,2003
    [25]Huang Ding; Yan Hong. Interword distance changes represented by sine waves for watermarking text images. IEEE Transactions on Circuits and Systems for Video Technology,2001, 11(12):123-245
    [26]Qadir M A, Ahmad I. Digital text watermarking: secure content delivery and data hiding in digital documents. IEEE Aerospace and Electronic Systems Magazine, 2006, 21(11):18-21
    [27]Micic A, Radenkovic D, Nikolic S. Autentification of Text Documents Using Digital Watermarking. International Conference on Telecommunications in Modem Satellite, Cable and Broadcasting Services, 2005, vol.2:503-505
    [28]Yang H J, Kot A C. Text document authentication by integrating inter character and word spaces watermarking. IEEE International Conference on Multimedia and Expo, 2004,vol.2:955-958
    [29]Podilchuk C I, Zeng W J. Image-adaptive watermarking using visual models. IEEE Journal on Selected Areas in Communications, 1998, 16(4):525-539
    [30]Seto H, Aoki Y, Kang S. An image data watermarking technique using the average of a Fresnel-transformed pattern.International Conference on Image Processing,2001,vol.2:534-537
    [31]Tsai M J, Yu Kuangyao, Yi-Zhang Chen. Wavelet packet and adaptive spatial transformation of watermark for digital image authentication. International Conference on Image Processing,2000, vol.1:450-453
    [32]Liu Quan, Jiang Xuemei. Design and realization of a meaningful digital watermarking algorithm based on RBF neural network. International Conference on Neural Networks and Brain, 2005, vol. 1:214-218
    [33]Zhou Zude, Liu Quan, Jiang Xuemei. Researches on uniform meaningful watermark. International Conference on Signal Processing, 2002, vol.1:128-132
    [34]Huang Chunhsiang, Wu Jaling, Chen Dingyun. A blind watermarking algorithm with semantic meaningful watermarks. Conference Record of the Thirty-Fourth Asilomar Conference on Signals, Systems and Computers, 2000, vol.2:1827-1830
    [35]Tsai Minjen, Yu Kuangyao, Chen Yizhang. Joint wavelet and spatial transformation for digital watermarking. IEEE Transactions on Consumer Electronics, 2000, 46(1):237-242
    [36]Wu Yongdong. On the security of an SVD-based ownership watermarking. IEEE Transactions on Multimedia, 2005, 7(4):624-627
    [37]Mobasseri B G. Direct sequence watermarking of digital video using m-frames. International Conference on Image Processing, 1998, vol.2:399-403
    [38]Gang Litao, Akansu A N, Ramkumar M. Security and synchronization in watermark sequence.IEEE International Conference on Acoustics, Speech, and Signal Processing, 2002, vol.4:3736-3739
    [39]Tefas A, Nikolaidis A, Nikolaidis N. Performance analysis of correlation-based watermarking schemes employing Markov chaotic sequences. IEEE Transactions on Signal Processing, 2003, 51(7):1979-1994
    [40] Wang Hong, Lu Ling, Dashun Que. Adaptive audio digital watermark algorithm based on m-sequence modulation. International Conference on Signal Processing, 2004, vol.3:2401-2404
    [41] Duan Ganglong. A multilevel image-adaptive digital watermarking algorithm based on chaotic sequences and ICA. IEEE International Symposium on Communications and Information Technology, 2005, vol.1:148-151
    [42] Liu Yongliang, Wen Gao, Minghao Cui. General blind watermark schemes. Second International Conference on Web Delivering of Music, 2002, vol.2:143-149
    [43] Zhang Li, Chen Limin, Qian Gong-bin. Self-synchronization adaptive blind audio watermarking. 12th International Conference on Multi-Media Modelling, 2006:381-385
    [44] Karybali I, Berberidis K. Blind image-adaptive watermarking. IEEE International Conference on Electronics, Circuits and Systems, 2003, vol.2:894-897
    [45] Zhang Guannan, Wang Shuxun, Wen Quan. An adaptive block-based blind watermarking algorithm. International Conference on Signal Processing, 2004, vol.3:2294-2297
    [46] Arnold M, Huang Zongwei. Blind detection of multiple audio watermarks. International Conference on Web Delivering of Music, 2001:4-11
    [47] Victor H G, Clara C R, Mariko N M. Watermarking algorithm based on the DWT. IEEE Latin America Transactions, 2006,4(4):257-267
    [48] Cheng Qiang, Huang T S. Robust optimum detection of transform domain multiplicative watermarks. IEEE Transactions on Signal Processing, 2003, 51(4): 906-924
    [49] Arnia F. Perceptual improvement of robust DCT-domain watermarking through wavelets based image fusion. The 9th Asia-Pacific Conference on Communications, 2003, vol.2: 505-509
    [50] Makhloufi A, Ouled Zaid A, Bouallegue A. Wavelet domain watermark embedding strategy using TTCQ quantization. 14th International Conference on Image Analysis and Processing, 2007:831-836
    [51] Nikolaidis A, Pitas I.Optimal detector structure for DCT and subband domain watermarking. International Conference on Image Processing, 2002, vol.3:465-468
    [52] Tang C W, Hang H M. A feature-based robust digital image watermarking scheme. IEEE Transactions on Signal Processing, 2003, 51(4):950-959
    [53] Su K, Kundur D, Hatzinakos D. Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance. IEEE Transactions on Multimedia, 2005, 7(1):52-66
    [54]Su K, Kundur D, Hatzinakos D. Statistical invisibility for collusion-resistant digital video watermarking. IEEE Transactions on Multimedia, 2005, 7(1):43-51
    [55]Cox I J, Miller M L, Bloom J A. Watermarking applications and their properties. International Conference on Information Technology Coding and Computing, 2000:6-10
    [56]Lu Chunshien, Sun Shihwei, Hsu Chaoyong. Media hash-dependent image watermarking resilient against both geometric attacks and estimation attacks based on false positive-oriented detection. IEEE Transactions on Multimedia, 2006, 8(4):668-685
    [57]Zhang Fan, Zhang Hongbin. Image watermarking capacity analysis based on hopfield neural network. Chinese Optics Letters, 2004, 2(11):634-636
    [58]Sugihara R. Practical capacity of digital watermarks. Lecture Notes in Computer Science, 2001, 2137:316-331
    [59]Kim W, Ko I J, Lee N Y. A robust watermarking technique in geometric distortion of digital Image. Lecture Notes in Computer Science, 2003, 2668: 310-320
    [60]Fletcher P A, Larkin K G. Direct embedding and detection of RST invariant watermarks. Lecture Notes in Computer Science, 2003, 2578:129-144
    [61]Wu Yongdong,Deng Robert.Adaptive collusion attack to a block oriented watermarking scheme. Lecture Notes in Computer Science, 2003, 2836:238-249
    [62]邹潇湘,戴琼,黄晃等.知识数字水印验证协议.软件学报,2003, 14(9):1645-1651
    [63]陆正福,叶锐,王国栋.基于移动代理的多播数字水印协议.云南大学学报(自然科学版),2004, 26(4):306-311
    [64]陈政.一种新的交互式买方-卖方数字水印协议.武汉理工大学学报(信息与管理工程版),2005, 27(5):35-38
    [65]邵亚非,吴国威,张利等.数字视频广播中的压缩域数字水印算法.电子学报,2003,31(10):1562-1564
    [66]李乔,毛志刚,叶以正.用于MPEG-2视频的数字水印设计.微处理机,2003, 03:38-41
    [67]Noorkami M, Mersereau R M. A framework for robust watermarking of H.264-encoded video with controllable detection performance. IEEE Transactions on Information Forensics and Security, 2007, 2(1):14-23
    [68]Lian Shiguo, Liu Zhongxuan, Ren Zhen. Commutative encryption and watermarking in video compression. IEEE Transactions on Circuits and Systems for Video Technology, 2007,17(6):774-778
    [69]Liu Ju, Zhang Xingang, Sun Jiande. A new image watermarking scheme based on DWT and ICA. IEEE International Conference Neural Networks & Signal Processing, 2003,vol.2:1489-1492
    [70]张力,韦岗,张基宏.一种小波域自适应鲁棒闭环数字盲数字水印技术.电子学报,2003,31(10):1476-1480
    [71]Wang Shihhao, Lin Yuanpei. Wavelet tree quantization for copyright protection watermarking.IEEE Transactions on Image Processing, 2004, 13(2):154-166
    [72]边杏宾,朱清新.基于相关理论的小波域数字盲数字水印算法.计算机应用,2005,25(6) :1279-1282
    [73]Tsekeridou S, Pitas I. Wavelet-based self-similar watermarking for still images. IEEE International Symposium on Circuits and Systems, 2000, vol.1:220-223
    [74]Hong I, Kim I, Han S S. A blind watermarking technique using wavelet transform. IEEE International Symposium on Industrial Electronics, 2001, vol.3:1946-1950
    [75]Phoom Sagetong, Zhou Wensheng. Dynamic wavelet feature based watermarking for copyright tracking in digital movie distribution systems. International Conference on Image Processing, 2002, vol.3:653-656
    [76]李华,朱光喜,朱耀庭.一种基于人眼视觉感知模型的数字水印隐藏方法.电子学报,2000, 28(10):111-113
    [77]Pan Rong, Gao Youxing. A new wavelet watermarking technique. Proceedings of 4th World Congress on Intelligent Control and Automation, 2002, vol.3:2065-2069
    [78]Kang Xiangui, Huang Jiwu, Shi Yuri Q. A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Transaction on Circuits and Systems for Video Technology, 2003, 13(8):776-786
    [79]Gonzalez R C, Woods R E. Digital image processing. Second Edition, Beijing: Publish House of Electronics Industry, 2002, 154-169
    [80]张旭东,卢国栋,冯健等.图像编码基础和小波压缩技术.北京:清华大学出版社,2003,165-210
    [81]边杏宾,朱清新,杨凡.图像归一化特征区域数字水印方案.中国计算机大会(录用)
    [82]高珍,台莉春,张志浩.数字水印对抗几何攻击方法的研究.计算机工程,2006, 32(5):135-137
    [83]赵征,徐涛.一种抵抗几何变换攻击的数字图像数字水印方法.南京航空航天大学学报,2005, 37(1):70-74
    [84]Seo J S, Yoo C D. Image watermarking based on invariant regions of scale-space representation IEEE Transcations on Signal Processing, 2006, 54 (4):1537-1549
    [85]Song Qi, Zhu Guangxi, Luo Hangjian. Geometrically robust image watermarking based on image normalization. Proceedings of International Symposium on Intelligent Signal Processing and Communication Systems. 2005:333-336
    [86]Ping Dong, Galatsanos N P. Affine transformation resistant watermarking based on image normalization. IEEE International Conference on Image Processing, 2002, vol.3:489-492
    [87]Tang Chihwei, Hang Hsuehming. A feature-based robust digital image watermarking scheme. IEEE Transactions On Signal Processing, 2003, 5 (4):950-959
    [88]Kang H I, Delp E J. An image normalization based watermarking scheme robust to general affine transformation. International Conference on Image Processing, 2004, vol.3:1553-1556
    [89]Rothe I, Susse H, Voss K The method of normalization to determine invariants. IEEE Transcation on Pattern Analysis and Machine Intelligence, 1996, 18 (4):366-376
    [90]Bian Xingbin, Zhu Qingxin. Analysis of moment invariant's stability to gray-level adjustment. IEEE International Conference on Services System and Services Management, 2005,vol.2:1145-1148
    [91]Hu M K Visual pattern recognition by moment invariants. IRE Transactions on Information theory, 1962, 8(1):179-187
    [92]Harris C, Stephens M. A combined corner and edge detector. The Fourth Alvey Vision Conference, 1988:147-152
    [93]Davis K J, Najarian K Maximizing strength of digital watermarks using neural networks. International Joint Conference on Neural Networks, 2001, vol.4:2893-2898
    [94]Shieh C S, Huang H C, Wang F H. Genetic watermarking based on transform domain technique.Pattern Recognition Society, 2004, 37(3):555-565
    [95]Zhang Jun, Wang Nengchao, Xiong Feng. Hiding a logo watermarking into the multiwavelet domain using neural networks. Proceeding of the 14th IEEE Internatinal Conference on Tools with Artificial Intelligence, 2002:477-482
    [96]Vapnik V N. The nature of statistical learning theory. New York: Springer, 1995
    [97]Vapnik V N. Statistical learning theory. New York: John Wiley, 1998
    [98]Campbell C. Kernel methods: A survey of current techniques. Neurocomputing, 2002, 48(1):63-84
    [99]Burges C. A tutorial on support vector machines for pattern recognition. Data Mining and Knowledge Discovery, 1998,2:121-167
    [100] Vapnik V N, Chapelle O. Bounds on error expectation for support vector machines. Neural Computation, 2000,12(9):2013-2036
    [101] Cortes C, Vapnik V N. Support vector networks. Machine Learning, 1995,20:273-297
    [102] Scholkopf B, Smola A J, Williamson R C. New support vector algorithms. Neural Computation,2000,12:1207-1245
    [103] Ma Junshui, Zhao Yi, Ahalt S. OSU SVM Classifier Matlab Toolbox
    [104] Bian Xingbin, Zhu Qingxin. Video protection for MPEG-4 FGS with watermarking. Multimedia Tools and Applications, 2008,40(1):61-87
    [105] Li Weiping. Overview of fine granularity scalability in MPEG-4 video standard. IEEE Circuits and Systems for Video Technology, 2001, 11(3):301-317
    [106] Lian Shiguo, Liu Zhongxuan, Zheng Ren. Secure advanced video coding based on selective encryption algorithms. IEEE Transactions on Consumer Electronics, 2006, 52(2):621-629
    [107] Hzu C T, Wu J L. Digital watermarking for video. 13th International Conference on Digital Signal Processing Proceedings, 1997, vol.l:217-220
    [108] Swanson M D, Zhu B, Tewfik A H. Multiresolution scene based video watermarking using perceptual models. IEEE Selected Areas in Communications, 1998, 16(4):540-550
    [109] Ton K, Geert D, Jaap H. Video watermarking system for broadcast monitoring. SPIE Security and Watermarking of Multimedia Contents, 1999, vol. 3657:103-112
    [110] Vassaux B, Nguyen P, Baudry S. Scrambling technique for video object watermarking resisting to mpeg-4. IEEE International Symposium on Video/Image Processing and Multimedia Communications, 2002:239-44
    [111] Deguillaume F, Csurka G, Ruanaidh J O. Robust 3D DFT video watermarking. SPIE Electronic Imaging'99: Security and Watermarking of Multimedia Contents, 1999, vol.3657:l 13-124
    [112] Alattar A M, Lin E T, Celik M U. Digital watermarking of low bit-rate advanced simple profile MPEG-4 compressed video. IEEE Circuits and Systems for Video Technology, 2003,13(8):787-800
    [113] Barni M, Bartolini F, Checcacci N. Watermarking of MPEG-4 video objects. IEEE Multimedia, 2005,7(l):23-32
    [114] Boulgouris, N V, Koravos F D, Strintzis M G. Self-synchronizing watermark detection for MPEG-4 objects. IEEE International Conference on Electronics, Circuits and Systems, 2001, vol.3:1371-1374
    [115]Kang K P, Choi Y H, Choi T S, Real-Time Video watermarking for MPEG Streams. Lecture Notes in Computer Science, 2004, 3046:348-358
    [116]http://www.chiariglione.org/mpeg
    [117]Watson A B. Visual optimization of DCT quantization matrices for individual images. Proceedings of AIAA Computing in Aerospace 9, 1993:286-291
    [118]Chen B, Wornell G W. Digital watermarking and information embedding using dither modulation. IEEE Workshop on Multimedia Signal Processing, 1998, 47(4):273-278
    [119]Lu Zheming, Wu Haotian, Liu Zhongren. A Multipurpose color image watermarking algorithm for copyright notification and protection. ACTA ELECTRONICA SINICA,2004, 32(5):778-781
    [120]伯晓晨,沈林成,常文森.基于拉普拉斯分布模型的DCT域图像数字水印视觉可见性评估.电子学报,2003, 31(1):1-4
    [121]Berger T. Rate distortion theory. Englewood Cliffs, NJ: Prentice Hall, 1997
    [122]Schmid C, Mohr R, Bauckhage C. Evaluation of interest point detectors. International Journal of Computer Vision, 2000, 37(2):151-172
    [123]Said A. Measuring the strength of partial encryption scheme. IEEE International Conference in Image Processing, 2005, vol.2:1126-1129
    [124]http://www.chiariglione.org/mpeg/standards.htm#Reference_software
    [125]Ju H S, Kim H J, Lee D H. An anonymous buyer-seller watermarking protocol with anonymity control. Lecture Notes in Computer Science, 2003, 2587:421-432
    [126]Lei C L, Yu P L, Tsai P L. An efficient and anonymous buyer-seller watermarking protocol.Transaction on Image Processing, 2004, 13(12):1618-1626
    [127]Zhang J, Kou W, Fan K. Secure buyer-seller watermarking protocol. IEE Information Security,2006, 153(1):15-18
    [128]Memon N, Wong P W. A buyer-seller watermarking protocol. IEEE Transaction on Image Processing, 2001, 10(4):643-649
    [129]Qiao Lintian, Nahrstedt K. Watermarking schemes and protocols for protecting rightful ownerships and customer's rights. Journal of Visual Communication and Image Representation,1998, 9(3):194-210
    [130]边杏宾,朱清新.信息集中存储方式下的数字水印协议.电子科技大学学报,2008, 37(4):614-617
    [131]Cohen J D, Fischer M J. A robust and verifiable cryptographically secure election scheme. 26th IEEE Symposium on Foundations of Computer Science, 1985:372-382
    [132]Li Q, Chang E C. On the possibility of non-invertible watermark schemes. In 6th International Workshop on Information Hiding, 2004, vol.3200:13-24
    [133]Sencar H T, Memon N D. Watermarking and ownership problem: a revisit. Proceedings of the 5th ACM workshop on Digital rights management, 2005:93-101
    [134]Staroverov O V. On a searching problem. Theory of probability and its applications, 1963,8:184-187
    [135]Lee S J, Jung S H. A survey of watermarking techniques applied to multimedia. IEEE Symposium on Industrial Electronics, 2001, vol.1:272-277
    [136]沃焱,韩国强,张波.一种新的基于特征的图像内容认证方法.计算机学报,2005,28(01) :106-112
    [137]Giannoula A, Boulgouris N V. Watermark detection for noisy interpolated images. IEEE transactions on circuits and systems, 2006, 53(5):359-363
    [138]Wu Y T, Shih F Y. An adjusted-purpose digital watermarking technique. Pattern Recognition,2004, 37(12):2349-2359
    [139]Cox I J, Killian J, Leighton T. Secure spread spectrum watermarking for multimedia. IEEE Transaction on Image Processing, 1997, 6(12):1673-1687
    [140]边杏宾,朱清新,杨凡.多数字水印方案的最优数字水印提取策略.中国计算机大会(录用)
    [141]Degroot M H. Optimal statistical decisions. New York: McGraw-Hill, 1970
    [142]Stone L D. Theory of Optimal Search. Mathematics in Science and Engineering. New York:Academic Press, 1975
    [143]Tse C Y. New product introduction and diffusion with costly search. Economics and Finance Workgroup Discussion Paper Series, School of Economics and Finance, University of Hong Kong, 2004
    [144]Rezaiifar R, Makowski A M. From optimal search theory to sequential paging in cellular networks. IEEE Journal On Selected Areas in Communication, 1997, 15(7): 1253-1264
    [145]Urpi A, Bonuccelli M, Giordano S. Modelling cooperation in mobile ad hoc networks: a formal description of selfishness. Proceedings of WiOpt Workshop, 2003

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700