面向数字图像的大容量信息隐藏算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
互联网络和信息科学的飞速发展,为信息的传输和处理带来了极大方便,但是网络在给人们带来便利的同时也暴露出越来越严重的安全问题。信息隐藏作为一种保证信息安全传递的重要手段,引起了人们的极大关注,它通过隐藏信息的“存在性”来保证信息的安全传输,能解决密码学在应用上容易引起攻击的问题。信息隐藏的应用包括隐秘通信、版权保护、数字指纹、多媒体内容篡改认证等军事和民用领域,有重要的理论和应用研究价值。在过去的十多年中,信息隐藏的一大分支数字水印取得了快速的发展,但在隐秘通信和篡改认证方面取得的研究成果相对较少,其主要原因是缺乏对安全性和感知质量客观准确的评价手段,隐藏算法的嵌入容量、安全性、感知失真之间的固有约束存在着一定的难度,尤其是多数隐藏算法的嵌入容量还远未达到隐秘通信的容量要求。本论文的主要工作就是围绕如何提高信息隐藏容量,以满足隐秘通信和篡改认证等应用所需的嵌入容量这个目标展开的,内容涉及信息隐藏的不可感知性评估、数字图像的加密与置乱、大容量的图像信息隐藏算法等方面。论文的主要研究成果与创新性如下:
     (1)分析了峰值信噪比(Peak Signal to Noise Ratio,PSNR)、像素块误差分布(Pixel-Block Error Distribution,PBED)等一些目前常用的视觉不可感知性评价指标的不足之处,根据人类视觉特性提出了一种衡量信息隐藏算法不可感知性的视觉失真感知函数(VisionDistortion Sensitivity Function,VDSF),它反映了人类视觉的四个特性:①人眼对视觉信号变化剧烈的地方(纹理区)的噪声不敏感,对平滑区域的噪声敏感;②人眼对水平方向的变化比对角线方向更为敏感;③低于可感知极限的亮度变化是不可感知的;④相邻位置的像素是相关的,并且相关性与距离有关。VSDF指标计算复杂度低,并且PSNR是它的一种特殊情况。实验证明VDSF与人类视觉感知质量主观评价的一致性明显优于PSNR等传统指标,能更好地衡量隐藏信息的不可感知性。实验还证明VDSF也适用于对二值图像的质量评价,解决了灰度图像与二值图像不能使用同一评价指标的问题。
     (2)研究了基于混沌序列加密和混沌置乱的信息预处理方法,提出了基于Logistic映射的混沌序列产生算法,所产生的序列不再出现Logistic映射所存在的空白窗口和稳定窗等安全问题,并且密钥空间大幅度增加;改进了基于Arnold变换的混沌置乱算法,改进后的算法不再出现Arnold变换的周期性现象,且能有效抵御选择明文的攻击,提高了安全性。
     (3)分析了图像在空间域的位平面分布特性,指出了直接用秘密信息替换最低有效位(LSB)位平面或多个低位位平面可能破坏相应位平面纹理特性而导致的安全问题,提出了基于最高有效位的位平面分解方法,并得出了最高有效位下的某个低位位平面替换成随机二值图像,不会破坏原始图像在固定位平面分解时低层位平面所固有的纹理特性的结论。利用这一结论和人类视觉的亮度掩蔽效应,提出了两种基于图像空间域的自适应信息隐藏算法,算法有非常高的嵌入容量,同以往的空间域算法相比,能有效防止出现破坏低位位平面纹理特性而导致的安全问题,安全性有很大提高。
     (4)针对DCT变换域信息隐藏算法虽然有较好的鲁棒性但嵌入容量小的问题,研究了自然图像的频谱分布特性和JPEG压缩不变性,分别提出基于频谱均匀化和在高频系数中嵌入信息的大容量DCT域隐藏算法。基于频谱均匀化的算法通过对载体图像进行置乱处理实现频谱均匀化,以获得更多的可用于隐藏信息的DCT系数来提高算法的嵌入容量。在高频系数中嵌入信息的隐藏算法主要利用JPEG压缩不变性来实现,在保持不可感知的前提下,该算法的嵌入容量大于在中低频系数嵌入信息的算法,而且对不超过预设质量因子的有损压缩有强鲁棒性。
     (5)根据二值图像非白即黑的特点,提出了基于分块的大容量二值图像信息隐藏算法。通过将二值图像分割成大小为2×2的图像子块,再根据每个子块中黑白像素的个数的不同,自适应地确定可嵌入隐藏信息的比特数及嵌入的位置,每个处于黑白像素交界的子块至少能隐藏2比特信息,嵌入容量比目前同类的盲提取算法高一倍以上。
Along with the rapid development of Internet and information science,which are providing great convenience for information transmission and processing,increasingly severe security problems have emerged gradually.Information hiding,as an important method to guarantee secure information transmission,has attracted great attention all over the world.By hiding the existence of information,hiding communication has solved the easily-being-attacked cryptographic problems in application.Its applications include copyright protection, digital fingerprinting,tamper authentication of multimedia,hiding communication,etc.of military or civil use;therefore,it is of great theoretical and practical importance.In the past decade,digital watermarking,as a branch of information hiding,has been developed rapidly.But achievements in hiding communication and tamper authentication are relatively insufficient because there exists some difficulties like inherent constraints among embedding capacity,security, perceptual distortion with the lack of objective measurement to both security and perceptual quality,especially embedding capacity of most present hiding algorithms can hardly reach the demands of hiding communication.The focus of this dissertation is on the study of evaluating the imperceptibility and security of hiding information and designing embedding algorithms with higher hiding capacity,mainly including imperceptibility evaluation of hiding information,encryption and scrambling of digital images,high capacity image information hiding algorithm,and so on.Some of the conclusions are listed as follows:
     (1) Based on the analysis of the drawbacks of commonly used visual imperceptibility criteria,such as PSNR(Peak Signal to Noise Ratio), PBED(Pixel-Block Error Distribution),a new criterion called VDSF (Vision Distortion Sensitivity Function) is proposed to evaluate the imperceptibility of hiding information algorithm according to human vision properties,which characterizes four aspects of human vision.First, human eyes are not sensitive to noise within violently varying visual signals(such as texture) but sensitive to noise in smoothing area.Second, human eyes are more sensitive to changes in horizontal direction than ones in diagonal direction.Third,brightness variances lower than perceptible limit are imperceptible to human.Fourth,adjacent pixels are correlated with each other,and the relativity depends on their distance. VDSF has lower computational complexity.Especially PSNR belongs to one of its specific cases.Experiments show that VDSF can overcome drawbacks of present visual imperceptibility criteria like PSNR and evaluate better the imperceptibility of hiding information.Moreover,the proposed algorithm is suitable for quality evaluation of binary images to solve the problem that the individual criterion can not be used for both grey image and binary image in the meantime.
     (2) On the basis of chaotic map information preprocessing,a logistic map based algorithm generating chaotic sequences is proposed,which avoids secure problems such as blank windows,stable window,etc. Moreover,the key space is greatly increased.A chaotic scrambling algorithm based on Arnold map is improved.In this scheme the periodicity of Arnold map is eliminated,it can effectively defend chosen plaintext attack.
     (3) Bit plane distribution property of an image in spatial domain is analyzed,and secure problems caused by damaging its bit plane texture characteristics due to replacing least significant bit(LSB) or multiple low bit plane with direct secret messages,is discussed.A bit plane decomposition method based on MSB(most significant bit) is proposed. Moreover,a conclusion that replacing certain low bit plane below MSB with random binary image doesn't damage its inherent texture property when original image is decomposed in fixed bit plane,is drawn.Based on image spatial domain,two adaptive information hiding algorithms are proposed by applying the above conclusion and the brightness masking effect of human visual system.The proposed schemes not only have high capacity but also are effective to protect against damaging texture property of low bit plane so as to improve the security.
     (4) DCT(Discrete Cosine Transform) domain based information hiding algorithm has merits of good robustness but weakness of low embeddable capacity.Based on spectrum analysis of natural images,high capacity DCT hiding information algorithms of both frequency spectrum homogenization and embedding information in high frequency coefficients are presented respectively.In frequency spectrum homogenization algorithm embeddable capacity is improved by using frequency spectrum homogenization processing on original image to obtain more DCT coefficients used for hiding information.Another algorithm uses JPEG invariance property,and information is embedded in high frequency coefficients under the conditions of imperceptibility in order to improve embeddable capacity.Moreover,this method has good robustness to lossy compression within default quality factors.
     (5) High capacity hiding information algorithms in binary host image is developed according to characteristics of binary image.The binary host image is first divided into blocks of size 2×2,and then each sub-block adaptively determines the embedded bits number and their positions according to the difference between its black pixel and white pixel number.Each sub-block in the transitional block between black pixel and white pixel can hide at least two bits messages.Therefore,its embeddable capacity is two times more than that of other presented blind algorithms.
引文
[1]M.Anthony.Learning multivalued multithreshold functions[R].CDMA Report No.LSE-CDMA-2003-03,London School of Economics,2003.
    [2]戴跃伟.信息隐藏技术的理论及应用研究:[博士学位论文].南京:南京理工大学,2002.
    [3]X.Zhu.A semi-fragile digital watermarking algorithm in wavelet transform domain based on Arnold transform[A].In:Proceedings of 9th International Conference on Signal Processing,2008.ICSP 2008[C],p 2217-2220.
    [4]王泽辉.二维随机矩阵置乱变换的周期及在图像信息隐藏中的应用[J].计算机学报,2006,29(12):2218~2224.
    [5]齐东旭,邹建成,韩效宥.一类新的置乱变换及其在图像信息隐藏中的应用[J].中国科学(E辑),2000,30(5):440~447.
    [6]X.Yan,S.Guan,X.Niu.Research on the capacity of Error-Correcting Codes-Based information hiding[A].In:Proceedings of International Conference on Intelligent Information Hiding and Multimedia Signal Processing[C],Harbin 2008,1158~1161.
    [7]王育民,张彤,黄继武.信息隐藏---理论与技术[M].北京:清华大学出版社,2006.
    [8]Z.Wang,A.C.Bovik.A universal image quality index[J].IEEE Signal Processing Letters,2002,9:81~84.
    [9]Z.Wang,G.X.Wu,R.H.Sheikh,et al.Quality-aware images[J].IEEE Transactions on Image on Processing,2006,15(6):1680~1689.
    [10]Y.Yusof,O.O.Khalifa.Imperceptibility and robustness analysis of DWT-based digital image watermarking[A].In:Proceedings of 2008 International Conference on Computer and Communication Engineering[C],Kuala Lumpur,Malaysia,13-15 May 2008,1325~1330.
    [11]X.Kang,J.Huang,W.Zeng.Improving robustness of Quantization-Based image watermarking via adaptive receiver[J].IEEE Transactions on Multimedia,2008,10(6):953~959.
    [12]A.Chamidu,H.Koichi.Perceptible content retrieval in DCT domain and semi-fragile watermarking technique for perceptible content authentication[J].WSEAS Transactions on Signal Processing,2008,4(11):627~636.
    [13]M.Ramkumar,A.N.Akansu.Capacity estimates for data hiding in compressed images[J].IEEE Transactions on Image Processing,2001,10(8):1252~1263.
    [14]袁征.可证安全的数字水印方案[J].通信学报,2008,29(9):91~96.
    [15]毛家发,林家骏,戴蒙.基于图像攻击的隐藏信息盲检测技术[J].计算机学报,2009,32(2):318~327.
    [16]C.Cachin.An information-theoretic model for steganography[J].Information and Computation,2004,192(1):41~56.
    [17]T.Mittelholzer.An Information-theoretic approach to steganography and watermarking[A].Lecture Notes in Computer Science 1768[C],1999,1~16.
    [18]K.J.Kim,K.H.Jung,K.Y.Yoo.A high capacity data hiding method using PVD and LSB[A].2008 International Conference on Computer Science and Software Engineering(CSSE 2008)[C],Hubei,China,Dec.2008,876-879.
    [19]同鸣,闫涛,姬红兵.一种抵抗强剪切攻击的鲁棒性数字水印算法[J].西安电子科技大学学报,2009,40(1):22~27.
    [20]R.J.Anderson.Stretching the limits of steganography[A].In:Proceedings of First International Workshop in Information Hiding,Springer Lecture Notes in Computer Science[C],London:Springer-Vedag,1996,1174:39~48.
    [21]S.Craver.Zero-Knowledge watermark detection[A].In:Proceedings of the Third International Workshop on Information Hiding[C],Springer-Verlag,Berlin,2000,1768:101~116.
    [22]T.Furon and P.Duhamel.An asymmetric watermarking method[J].IEEE Transactions On Signal Processing,2003,51:981~995.
    [23]O.T.C.Chen,W.C.Wu.Highly Robust,Secure,and Perceptual-Quality Echo Hiding Scheme[J].IEEE Transactions on Audio,Speech,and Language Processing,2008,16(3),629~638.
    [24]F.Hartung,M.Kutter.Multimedia watermarking techniques[J].Proceedings of IEEE 1999,87(7):1079~1107.
    [25]胡洋,张春田,苏育挺.基于H.264/AVC的视频信息隐藏算法[J].电子学报,2008,36(4):690~694.
    [26]X.S.Zheng,Y.L.Zhao,N.Li,et al.Research of synchronization robustness in video digital watermarking[A].In:Proceedings of International Colloquium on Computing,Communication,Control,and Management,CCCM 2008[C],2008,1:276~279.
    [27]N.F.Johnson.Steganography Tools[EB/OL].Available from:http://www.jjtc.com/security/stegtools.htm 2005.
    [28]C.H.Yang,C.Y.Weng,S.J.Wang.Adaptive data hiding in edge areas of images with spatial LSB domain systems[J].IEEE Transactions on Information Forensics and Security,2008,3(3):488~497.
    [29]W.N.Lie,L.C.Chang.Data hiding in images with adaptive numbers of least significant bits based on the human visual system[A].In:Proc.IEEE I International Conference on Image Processing[C],Kobe,Japan,Oct.1999,1:286~290.
    [30]R.Z.Wang,C.F.Lin,J.C.Lin.Image hiding by optimal LSB substitution and genetic algorithm[J].Pattern.Recognition,2001,34(3):671~683.
    [31]孙文静,孙亚民,张学梅.基于直接位平面替换的LSB信息隐藏技术[J].计算机科学,2008,35(12):207~209.
    [32]庞晓红.图像数字水印理论与技术研究:[博士学位论文],哈尔滨工程大学,2006.
    [33]V.Aslantas.An optimal robust digital image watermarking based on SVD using differential evolution algorithm[J].Optics Communications,2009,282(5):769~777.
    [34]楼偶俊,钲旋.基于特征点模板的Contourlet域抗几何攻击水印算法研究[J].计算机学报,2009,32(2):308~316.
    [35]肖亮,韦志辉.脊波域稳健性水印嵌入算法与可靠性分析[J].南京理工大学学报(自然科学版),2008,32(4):411~415.
    [36]M.Zhao,Y.Dang.Color image copyright protection digital watermarking algorithm based on DWT & DCT[A].In:Proceedings of 2008 International Conference on Wireless Communications,Networking and Mobile Computing,[C],Scientific Research Publishing,USA,2008:659~662.
    [37]A.B.Watson.DCT quantization matrices visually optimized for individual images[J].Human Vision,Visual Processing,and Digital Display,1993,(1):202~216.
    [38]N.Bi,Q.Sun,D.Huang,et al.Robust image watermarking based on multiband wavelets and empirical mode decomposition[J].IEEE Transactions on Image Processing,2007,16(8):1956~1966.
    [39]蒋铭,孙水发,汪京培,等.视觉自适应灰度级数字水印算法[JJ.武汉大学学报(理学版),2009,55(1):97~100.
    [40]Y.H.Zhang.Blind watermark algorithm based on HVS and RBF neural network in DWT domain[J].WSEAS Transactions on Computers,2009,8(1):174~183.
    [41]I.J.Cox,J.Kilian,F.T.Leighton,et al.Secure spread spectrum watermarking for multimedia[J].IEEE Transactions on Image Processing,1997,6(12):1673~1687.
    [42]B.Chen,C.W.Wornell.Quantization index modulation:a class of provably good methods for digital watermarking and information embedding[J].IEEE Transactions on Information Theory,2001,47(4):1423~1443.
    [43]C.B.Peel.On "Dirty-Paper Coding"[J].IEEE Signal Processing Magazine,2003,No.3:112~113.
    [44]C.C.Chang,T.D.Kieu,Y.C.Chou.Reversible information hiding for VQ indices based on locally adaptive coding[J].Journal of Visual Communication and Image Representation,2009,20(1):57~64.
    [45]H.Kii,J.Onishi,S.Ozawa.The digital watermarking method by using both patchwork and DCT[A].In:Proc.IEEE International Conference on Multimedia Computing and SystemiC],Jun.1999,1:895~899.
    [46]A.Miyazaki,A.Okamoto.Analysis of watermarking systems in the frequency domain and its application to design of robust watermarking systems[A].In:Proc.IEEE International Conference on Acoustics,Speech and Signal Processing[C],Salt Lake City,USA,2001,3:1969~1972.
    [47]H.M.Lin,Z.F.Zhang,J.W.Jiwu,et al.A high capacity distortion-free data hiding algorithm for palotto image[A].In:Proceedings of the 2003 International Symposium on Circuits and Stems,2003,2:916~919.
    [48]A.P.P.Fabien,J.A.Ross,G.K.Markus.Information Hiding---A Survey[J].In:Proc.IEEE Special Issue on Protection of Multimedia Content,1999,87(7):1062~1078.
    [49]J.Kelley.Terror groups hide behind Web encryption[N].USA Today News,2001-02-05.
    [50]吕皖丽,郭玉堂,罗斌.一种基于Tchebichef矩的半脆弱图像数字水印算法[J].中山大学学报(自然科学版),2009,48(1):16~21.
    [51]J.D.Xu,W.H.Qin,M.Y.Ni.A new scheme of image Retrieval Based Upon Digital Watermarking[A].In:Proceedings of 2008 International Symposium on Computer Science and Computational Technology[C],Shanghai,Dec.2008,1:617~620.
    [52]M.Costa.Writing on Dirty Paper[J].IEEE Transactions Inform Theory,1983,29(3):439~441.
    [53]A.Cohen,A.Lapidoth.Generalized Writing on Dirty Paper[A].In:Proceedings of the Intemational.Symposium on Information Theory(ISIT)[C],Lausanne,Switzerland,June 2002:227.
    [54]P.Moulin,J.A.Sullivan.Information theoretic analysis of information hiding[J].IEEE Transactions on Information Theory,2003,49(3):563~593.
    [55]A.Somekh-Baruch,N.Merhav.On the capacity game of public watermarking system[J].IEEE Transactions Information Theory,2004,50(3):511~524.
    [56]A.Somekh-Baruch,N.Merhav.On the error exponent and capacity games of private watermarking systems[J].IEEE Transactions on Information Theory,2003,49(3):537~562.
    [57]Y.Steinberg,N.Merhav.Identifcation in the presence of side information with application to watermarking[J].IEEE Transactions on Information Theory,2001,47(4):1410~1422.
    [58]R.Chandramouli.Data hiding capacity in the presence of an imperfectly known channel[A].In:Proceedings of SPIE International Conference on Security and Watermarking of Multimedia Contents Ⅱ[C],San Jose,California,USA,2001,4314:517~522.
    [59]R.Gallanger.Information theory and reliable communication[M].New York:John Wiley & Sons,1968.
    [60]Y.K.Lee,L.H.Chen.High capacity images steganographic model[J].IEEE Proc.Vision,Image and Signal Processing,2000,147(3):288~294.
    [61]柏森,曹玉强,赵波,等.图象隐藏信息的容量研究[J].中国图象图形学报.2003,8(A):574~577.
    [62]M.Ramkumar,A.N.Akansu.Capacity estimates for data hiding in compressed images[J].IEEE Transactions on Image Processing,2001,10(8):1252~1263.
    [63]M.Barni,R.Bartolini,A.De Rosa,et al.Capacity of full frame DCT image watermarks[J].IEEE Transactions on Image Processing,2000,9(8):1450~1455.
    [64]P.H.W.Wong,O.C.Au.A capacity estimation technique for JPEG-to-JPEG image[J].IEEE Transactions on Circuits and Systems for Video Technology,2003,3(8):746~752.
    [65]M.Barni,F.Bartolini,A.Piva.Improved wavelet-based watermarking through pixel-wise masking[J].IEEE Transactions on Image Processing,2001,10(5):783~791.
    [66]韦学辉,李均利,陈刚.一种图像感知质量评价模型.计算机辅助设计与图 形学学报,2007,19(12):1540~1545.
    [67]Video Quality Expert Group.RRNR-TV Group test plan draft Version 2.0.http://www.vqeg.org,2009.
    [68]Z.Wang,E.P.Simoncelli.Reduced-reference image quality assessment using a wavelet-domain natural image statistic model[A].In:Proceedings of the SPIE:Human Vision and Electronic Imaging[C],Proc,San Jose,CA,2005,5666(1):149~159.
    [69]路文,高新波,王体胜.一种基于小波分析的部分参考型图像质量评价方法[J].电子与信息学报,2009,21(2):335~338.
    [70]V.Monga,M.Mihcak.Robust and secure image hashing via non-negative matrix factorizations[J].IEEE Transcations on Information Forensics and Security,2007.2(3):376~390.
    [71]S.Daly,W.Zeng,J.Li,et al.Visual masking in wavelet compression for JPEG2000[J].In:Proceedings of SPIE:2000 Image and Video Communications and Processing[C],San Jose CA,Jan.2000,3974:66~80.
    [72]A.B.Watson,G.Y.Yang,Y.A.Solomon,et al.Visibility of wavelet quantization noise[J].IEEE Transactions Image Processing.1997,6(8):1164~1175.
    [73]张晓威,赵琳琳,翁志娟.定量控制虚警概率的数字水印算法[J].哈尔滨工程大学学报,2008,29(12):1361~1366.
    [74]I.J.Cox,M.L.Miller,J.A.Bloom.Digital watermarking[M].Morgan Kaufmann Publishers,2002.
    [75]尤新刚,郭云彪,周琳娜.峰值信噪比不宜用来评价信息隐藏技术[A].见:全国第三届信息隐藏学术研讨会(C1HW2000╱2001)论文集[C],西安:西安电子科技大学出版社,2001,51~56.
    [76]A.W.Rix,A.Bourret,M.P.Hollier.Models of human perception[J].BT Technology Journal,1999,17(1):24~34.
    [77]T.A.Wilson,S.K.Rogers,L.R.Myers.Perceptual based hyperspectral image fusion using multiresolution analysis[J].Optical Engineering.1995,34(11):3154~3164.
    [78]Methodology for the subjective assessment of the quality of the television pictures:Recommendation ITU-R BT.500-10[S].ITU Radio communication assembly,2000.
    [79]Z.Wang Z,A.C.Bovik,L.Lu.Why is image quality assessment so difficult?[A].In:Proc.IEEE International Conference on Acoustics,Speech,and Signal Processing[C],Orlando,2002,vol.4:Ⅳ-3 3312~3316.
    [80]Z.Wang,A.C.Bovik,H.R.Sheikh,et al.Image quality assessment:From error visibility to structural similarity[J].IEEE Transactions on Image Processing 2004,13(4):600~612.
    [81]朱里,李乔亮,张婷,等.基于结构相似性的图像质量评价方法[J].光电工程,2007,34(11):108~113.
    [82]杨威,赵剡,许东.基于人眼视觉的结构相似度图像质量评价方法[J].北京航空航天大学学报,2008,34(1):1~4.
    [83]X.Z.Pan,C.L.Yang,S.L.Xie.An improved structural similarity for image quality assessment[A].In:Proceedings of the SPIE:The International Society for Optical Engineering[C],Wuhan,2005,vol.60441 I:1~9.
    [84]M.Cadik,P.Slavik.Evaluation of two principal approaches to objective image quality assessment[A].In:Proceedings of the 8th International Conference on Information Visualisation[C],London:IEEE Computer Society,2004:513~518.
    [85]杨春玲,旷开智,冠豪,等.基于梯度的结构相似度的图像质量评价方法[J].华南理工大学学报(自然科学版),2006,34(9):22~25.
    [86]A.B.Watson.DCT quantization matrices visually optimized for individual images[J].Human Vision,Visual Processing and Digital Display,1993,(1):202~216.
    [87]N.Kaewkameerd,K.R.Rao.Wavelet based image adaptive watermarking scheme[J].Electronic Letters,2000,36(4):312~313.
    [88]张婷,尤新刚,孔祥维.基于像素块误差分布的信息隐藏性能测试[A].见:全国第四届信息隐藏学术研讨会论文集(C1HW2002)[C],北京:机械工业出版社,2002,21~27.
    [89]N.Jayant,J.Johnston,R.Safranek.Signal compression based on models of human perception[J].Proceedings of the IEEE,1993,81(10):1385~1422.
    [90]J.W.Huang,Y.Q.Shi,Y.Shi.Embedding image watermarks in DC components[J].IEEE Transactions on Circuits and Systems for Video Technology.2000,10(6):974~979.
    [91]W.Lu,W.Sun,H.Lu.Robust watermarking based on DWT and nonnegative matrix factorization[J].Computers and Electrical Engineering,2009,35(1):183~188.
    [92]何希平.基于混沌的图像信息安全算法研究:[博士学位论文].重庆:重庆大学,2006.
    [93]W.H.Yeh,J.J.Hwang.Hiding digital information using a novel system scheme[J].Computer and Security,2001,20(6):533~538.
    [94]V.I.Arnold,A.Avez.Ergodic problems of classical mechanics,mathematical physics monograph series[M].New York:Benjamin W A,INC.1968.
    [95]C.T.Hsu,J.L.Wu.Hidden digital watermarks in Images[J].IEEE Transactions On Image Processing,1999,8(1):58~68.
    [96]孙圣和,陆哲明,牛夏牧,等.数字水印技术及应用[M],北京:科学出版社,2004.
    [97]G.Heidaribateni,C.D.Mcgillem.A chaotic direct-sequence spread-spectrum communication system[J].IEEE Transactions on communications,1994,42(2/3/4):1524~1527.
    [98]T.Kong,D.Zhang.A new Anti-Arnold transformation algorithm[J].Journal of Software,2004,15(10):1558~1564.
    [99]卢振泰,黎罗罗.一种新的衡量图像置乱程度的力法[J].中山大学学报:自然科学版,2005;44(6):126~129.
    [100]张健,于晓洋,任洪娥,等.图像置乱程度的衡量方法[J].计算机工程与应用,2007,43(8):34~137.
    [101]黎罗罗.Arnold型置乱变换周期分析[J].中山大学学报(自然科学版),2005,44(2):1~4.
    [102]孔涛,张亶.Arnold反变换的一种新算法[J].软件学报,2004,15(10):1558~1564
    [103]D.X.Qi,D.S.Wang,D.L.Yang.Matrix transformation of digital image and its periodicity[J].Progress in Natural Science,2001,11(7):542~549.
    [104]G.R.Feng,L.G.Jiang,C.He,et al.A novel algorithm for embedding and detecting digital watermarks[A].Acoustics,Speech and Signal Processing 2003Proceedings[C],April 6-10,2003,3:549~552.
    [106]C.H.Yang.Inverted pattern approach to improve image quality of information hiding by LSB substitution[J].Pattern Recognition,2008,41(8):2674~83.
    [106]周琳娜.数字图像盲取证技术研究:[博士学位论文].北京:北京邮电大学,2007.
    [107]J.S.Cho,S.W.Shin.Enhancement of robustness of image watermarks into color image,based on WT and DCT[A].International Conference on Information Technology:Coding and Computing[C],Las Vegas,USA,2000,483~488.
    [108]N.Nikolaidis,I.Pitas.Robust image watermarking in the spatial domain[J].Signal Processing,1998,66(3):385~403.
    [109]Z.Du,Y.Zou,P.Lu.An optimized spatial data hiding scheme combined with convolutional codes and Hilbert scan[A].In:Proceedings of the Third IEEE Pacific Rim Conference on Multimedia:Advances in Multimedia Information Processing[C],2002,2532:97~104.
    [110]刘连山,李人厚,高琦.一种基于彩色图像绿色分量的数字水印嵌入方法[J].西安交通大学学报,2004,38(12):1256~1259.
    [111]M.Kutter,F.Jordan,F.Bossen.Digital signature of color images using amplitude modulation[A].In:Proceedings of the SPIE:Storage and Retrieval for Image and Video Database V[C],San Jose,CA,Feb.1997,3022:518~526.
    [112]M.Kutter,S.Winkler.A vision-based masking model for spread-spectrum image watermarking[J].IEEE Transactions on Image Processing,2002;11(1):16~25.
    [113]刘春庆,梁光岚,王朔中,等.应用二值图像信息隐藏技术实现彩色图像中的安全隐写.应用科学学报[J],2007,25(4):342~347.
    [114]G.Liang,S.Wang,X.Zilang.Steganoyaphy in binary image by checking data-carrying eligibility of boundary pixels[J].Journal of Shanghai University,2007,11(3):205~209.
    [115]B.Watson.DCT quantization matrices visually optimized for individual images[A].In:Proceedings of the SPIE:Human Vision,Visual Processing and Digital Display Ⅳ[C],San Jose,CA:SPIE Press,1993,1913:202~216.
    [116]伯晓晨.图象信息隐藏的理论模型与若干关键技术的研究:[博士学位论文].长沙:国防科技大学,2002.
    [117]W.Q.Yan,W.Ding,D.X Qi.Bit-operation based image scrambling and hiding[A].IFIP/SEC2000:Information Security,Information Security for Global Information Infrastructures[C].Qing,S.H.ed.International Academic Publishers,August,2000:37~40.
    [118]M.S.Hwang,C.C.Chang,K.F.Hwang.A watermarking technique based on one-way hash function[J].IEEE Transactions on Consumer Electronics,1999,45(2):286~294.
    [119]宋琪,朱光喜,容太平,等.一种基于模运算的数字水印隐藏算法[J].电子学报,2002,30(6):890~892.
    [120]陈永红.基于混沌的图像的数字水印隐藏算法[J].计算机仿真,2003, 20(9):63-65.
    [121]朱从旭,陈志刚.一种基于混沌映射的空域数字水印新算法[J].中南大学学报(自然科学版),2005,36(2):272-276.
    [122]M.Yeung,F.Mintzer.An invisible watermarking technique for image verification[A].In:Proc.IEEE International Conference on Image Processing[C],Santa Barbara,USA,1997,2:680-683
    [123]P.Wong,N.Memon.Secret and public key image watermarking schemes for image authentication and ownership verification[J].IEEE Transactions on Image Processing,2001,10(10):1593-1601
    [124]和红杰,张家树.对水印信息篡改鲁棒的自嵌入水印算法[J].软件学报,2009,20(2):437-450.
    [125]M.Holliman,N.Memon.Counterfeiting attacks for block-wise independent watermarking techniques[J].IEEE Transactions on Image Processing,2000,9(3),432-441.
    [126]J.Fridrich,M.Goljan,N.Memon.Further attacks on Yeung-Mintzer fragile watermarking scheme[A].In:Proceedings of the SPIE,Security and Watermarking of Multimedia Contents[C],San Jose,California,January 24-26,2000,428-437.
    [127]M.G.Albanesi.,M.Ferretti,F.Guerrini.A taxonomy for image authentication techniques and its application to the current state of the art[A].In:Proceedings of the 11th International Conference of Image Analysis[C],Palermo,Italy,2001,535-540.
    [128]J.Fridrich,M.Goljan,A.C.Baldoza.New fragile authentication watermark for images[A].In:Proc.IEEE International Conference on Image Processing ICIP[C],Vancouver,Canada,September 10-13,2000,446-449.
    [129]M.Candik,D.Brechlerova.Digital watermarking in digital images[A].In:Proceedings of the 42nd Annual 2008 IEEE International Carnahan Conference on Security Technology[C],Prague,Oct.2008,43-46.
    [130]C.C.Chang,T.S.Chen,L.Z.Chung,A steganographic method based upon JPEG and quantization table modification[J],Information Science,2002,141:123-138
    [131]G.Calvagno,C.Ghirardi.G.A.Mian,et al.Modeling of subband image data for buffer control[J].IEEE Transactions Circuits System for video technology,1997,7(2):402-408.
    [132]G.L.Friedman.Digital camera with apparatus for authentication of images Produced from an Image File[P].United States Patent,(5,499,294),1996.
    [133]I.J.Cox,J.Kiliany,T.Leightonz,et al.A secure robust watermark for multimedia[A].In:Proceedings of the Workshop on Information Hiding,Cambridge,UK,1996,Number 1174 Lecture Notes in Computer Science[C],Berlin:Springer-Vedag,1996,185~206.
    [134]P.Bao,X.Ma.Image adaptive watermarking using wavelet domain singular value decomposition[J].IEEE Transactions on Circuits and Systems for Video Technology,Jan.2005,15(1):96~102.
    [135]X.C.Gao,C.Qi,H.T.Zhou.An adaptive compressed DCT domain watermarking[A].In:Proceedings of the 8th International Conference on Signal Processing[C],Beijing,Apr.2006,4:86~90.
    [136]W.Liu,L.Dong,W.Zeng.Optimum detection of image adaptive watermarking in the DCT domain[A].In:Proc.IEEE 2006 International Conference on Image Processing[C],Atlanta,GA,Oct.2006,2557~2560.
    [137]F.Y.Shih,S.Y.T.Wu.Combinational image watermarking in the spatial and frequency domains[J].Pattern Recognition,2003,36(4):969~975.
    [138]J.Fridrich,P.Lisonek.Grid coloring in steganography[J].IEEE Transactions on Information Theory,2007,53(4):1547~1549.
    [139]C.Munuera.Steganography and error-correcting code.s[J].Signal Processing,2007,87(6):1528~1533.
    [140]夏光升,陈明奇,杨义先,等.基于模运算的数字水印算法[J].计算机学报,2000,23(11):1146~1150.
    [141]黄继武,SHI Y Q.,程卫东.DCT域图象水印:嵌入对策与算法[J].电子学报,2000,28(4):57~60.
    [142]钟桦,张小华,焦李成.数字水印与图像认证---算法及应用[M].西安:西安电子科技大学出版社,2006.
    [143]刘春庆,戴跃伟,王执铨.一种新的二值图像信息隐藏方案[J].东南大学学报(自然科学版),2003.33(z):98~101.
    [144]李赵红,侯建军,宋伟.基于等级结构的二值文本图像认证水印算法[J].自动化学报,2008,34(8):841~848.
    [145]H.Lu,X.Shi,Y.Q.Shi,et al.Watermark embedding in DC components of DCT for binary images[A].In:Proc.IEEE Interataional Workshop on Multimedia Signal Processing[C],US,Virgin Islands,2002,12:300~303.
    [146]周琳娜,杨义先,郭云彪,等.基于二值图像的信息隐藏研究综述[J].中山大学学报(自然科学版),2004,43(s2):71~75.
    [147]徐迎晖.文本载体信息隐藏技术研究:[博士学位论文].北京:信息工程大学,2006.
    [148]J.Brassil,L.O'Gorman.Watermarking document images with bounding box expansion[A].In:Proceedings of the 1st Interataional Workshop on Information Hiding[C],Cambridge,UK,May 1996,227~235.
    [149]M.Wu,E.Tang,B.Liu,Data Hiding in Digital Binary Image[A].In:Proc.IEEE International Conference on Multimedia and Exposition[C],New York,Aug.2000,1:393~396.
    [150]J.Zhao,E.Koch.Embedding robust labels into images for copyright protection[A].In:Proceedings of International Congress on Intellectual Property Rights for Specialized Information,Knowledge and New Technologies[C],Vienna,August21-25 1995:242~251.
    [151]T.Amamo,D.Misaki.Feature calibration method for watermarking of document images[A],In:Proceedings of 5th International Conference on document analysis and recognition[C],Bangalore,India,1999,91~94.
    [152]Q.Mei,E.K.Wong,N.Memon.Data hiding in binary text documents[A].In:SPIE Proc.Security and Watermarking of Multimedia Contents Ⅲ[C].San Jose,CA.,Jan.2001,369-375.
    [153]K.Matsui,K.Tanaka.Video-steganography:how to secretly embed a signature in a picture[J].IMA Intellectual Property Project,1994,1(1):187~206.
    [154]牛少彰,钮心忻,杨义先.半色调图像中数据隐藏算法[J].电子学报,2004,32(7):1180~1183.
    [155]M.S.Fu,O.C.Au.Data hiding for halftone images[A].In:Proceedings of SPIE Conference On Security and Watermarking of Multimedia Contents Ⅱ,2000,3971:228~236.
    [156]M.S.Fu,O.C.Au.Data hiding by smart pair toggling for halftone images[A].IEEE International Conference Acoustics,Speech,and Signal Processing,2000,4:2318~2321.
    [157]M.S.Fu,O.C.Au.Improved halftone image data hiding with intensity selection[A].In:Proc.IEEE International Symposium on Circuits and Systems,2001,5:243~246.
    [158]S.C.Pei,J.M.Guo.High-capacity data hiding in halftone images using minimal error bit searching[A].In:Proc.IEEE International Conference on Image Processing,Singapore,Oct.2004,3463~3466.
    [159]B.Chen,G.W.Wornell.Digital watermarking and information embedding using dither modulation[A].In:Proc.IEEE Multimedia Signal Processing,1998:273~278.
    [160]张军.用遗传算法优化二值图像信息隐藏技术的方法[J].计算机工程,2006,32(9):38~40.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700