基于感知内容的人脸图像认证技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
人脸图像是数字图像的一个重要子集,在社会生产生活的许多方面都有着广泛而重要的应用。然而数字图像处理技术的进步给人脸图像带来的诸多安全问题已经影响到公共安全等许多重要领域,这使得针对人脸图像的认证成为一个亟待解决的问题。
     人脸图像的安全问题主要在于人脸图像在应用过程中的真实性、完整性的保证以及传输过程中必要的保密性,传统的数据认证和加密手段很难满足其应用需求。人脸图像作为视觉信息的载体,其信息更多的以人类视觉感知系统所接受的感知信息的形式被传递、接收和评价,人脸图像认证本质上关注的是图像所传达的感知信息而非图像载体本身,因此如何定义、描述、提取人脸图像的感知信息,并且利用感知特征实现不同形式、不同粒度的人脸图像认证,是解决目前人脸图像安全问题的一种有效途径。
     本文从人类视觉感知系统的原理和特性出发,探讨了人脸图像感知特征的数字化表达方式及相应的鲁棒提取算法,进而分别从鲁棒Hash和数字水印两条技术路线,提出了一组能够实现不同方式和粒度的人脸图像认证及篡改感知内容恢复算法,为进一步增强人脸图像应用系统的安全性和灵活性,提出了一种基于感知内容的人脸图像分级加密方法,并将其应用在人脸图像安全传输系统。本文的主要研究工作和创新点在于:
     (1)通过对人类视觉感知系统中选择注意机制和感受野的层次、叠加特性等特性及其数学描述及模型的分析,提出了一组适合计算机处理的人脸图像感知特征表示方法,及两种感知特征提取算法:基于多尺度框架的感知点提取算法和基于Gabor函数的结构略图提取算法,分别实现了对人类视觉感知系统中心型感受野及其初级叠加的感受特性、视皮层简单细胞的感受特性的算法模拟,达到了较好的鲁棒性和感知内容描述性;
     (2)从数据集合映射的角度探讨了Hash概念从密码学到多媒体领域中的发展和变革,归纳了图像鲁棒Hash的典型模型。提出了三种人脸图像鲁棒Hash认证算法:基于结构略图的人脸图像鲁棒Hash认证算法、基于统计特征的人脸图像鲁棒Hash认证算法和基于感知点的人脸图像鲁棒Hash认证算法,针对不同的应用需求,实现了基于阈值匹配和精确匹配两种模式的人脸图像认证,以及像素块和扇形区域两种形式的篡改定位;
     (3)研究了基于数字水印的人脸图像感知内容认证技术,提出了利用鲁棒水印进行图像认证和利用多重水印实现语义层次篡改提示的人脸图像认证方法。提出了一种基于鲁棒水印的人脸图像认证技术,把基于Gabor特征的结构略图做为水印信息嵌入图像中,利用结构略图对内容变化的察觉能力和鲁棒水印对信息的隐藏和携带能力,构造了一个可以抵抗恶意篡改的鲁棒人脸图像认证方案;进而提出了一种结合鲁棒水印和半脆弱水印的多重水印认证算法,将反映人脸图像几何结构信息的特征点嵌入鲁棒水印,并利用半脆弱水印的定位能力发现篡改位置,最后结合这两方面的信息实现了语义层的人脸图像篡改提示;
     (4)研究了受篡改人脸图像的感知内容恢复技术与人脸图像感知内容分级加密技术,提出了一种基于整数小波分解的人脸图像篡改恢复算法,结合多重水印模型,实现了人脸图像内容的篡改定位与恢复;针对人脸图像分级加密问题,提出了一种针对索引图像的人脸图像分级加密算法,实现了依赖不同密钥的两级人脸图像加密,最后,根据分级加密算法的特点,结合公开密钥体制,提出了一种基于公开密钥体制的安全图像传输系统方案。
Facial images are an important subset of digital images which have gained variousand critical applications in our society. However, many major fields such as public se-curity have been suffered threaten from the security issue of facial images brought bythe development of digital image processing techniques, which made the facial imageauthentication techniques turns to an urgently issues to be solved.
     The key issues of the security of facial image lie on the authenticity and integrityduring the use and the confidentiality during the transmission, the conventional methodsof authentication and encryption no longer satisfy these requirements. As a carrier ofvision information, the content of facial images is transmitted, received and evaluatedas the perceptual information which relays on the human vision perceptual system. Theimage authentication techniques should take more concern about the perceptual informa-tion transmitted by the image rather than the bit stream of the image file. So it would bean efficient approach to deal with the security issues of facial image that to define, de-scribe and extract the perceptual information of facial image, and to achieve facial imageauthentication with different pattern and granularity by use of the extracted perceptualfeatures.
     In this dissertation, the point of view that the facial image authentication techniquesshould focus on the”perceptual information”conveyed by the image rather than the car-rier itself is put forward by referring the principles and the characters of human visionperceptual system. Then, the expression and robust extraction methods of facial images’perceptual features are discussed. Further, two technical routers of facial image authenti-cation, the robust hashing way and the digital watermarking way, are investigated basedon the perceptual features of facial images. And the proposed algorithms achieve tamperrecovery based on the results of image authentication and tamper detection. To enhancethe security and ?exibility of facial image authentication system, a hierarchical encryp-tion algorithm is proposed.
     The major works of this dissertation is described as follow:
     Firstly, two most significant characters of human vision perceptual system, the se-lective attention machine and the hierarchical combination machine of receptive fields,and their mathematical descriptions or models are summarized and analyzed from thepoint of view of the constitute and the structure of human vision perceptual system. Then a set of perceptual features of facial image including their expressing methods andcorresponding extraction algorithms are derived. The multi-scale based perceptual pointsextraction algorithm simulates the center perceptual fields and their simple superimpos-ing. The Gabor function based structure skeleton simulates the simple cell’s perceptualfield.
     Secondly, the facial image authentication techniques based on robust hash are inves-tigated. The typical model of image robust hash is proposed. And three robust hash algo-rithms for facial image authentication are proposed, which include the structure skeletonbased algorithm, the perceptual point based algorithm and the statistical feature basedalgorithm. The threshold based matching method and accurate matching method for au-thentication are implemented in these algorithms. The block based tamper detection isachieved in the structure skeleton based algorithm and circle section based tamper detec-tion is realized in the feature point based algorithm.
     Thirdly, the digital watermarking based facial image authentication techniques areinvestigated. A novel robust digital watermarking based facial image authentication al-gorithm is proposed, which brings the robust digital watermarking into the field of imageauthentication. And then a multiple watermarking authenticating algorithm is proposedwhich embed the geometrical information into the robust watermarking and localize thetamper by embedding a semi-fragile watermarking in the interest region of the image– the face region. And a semantic report message about tamper could be drawn bycombining the two part information from the robust watermarking and the semi-fragilewatermarking.
     Fourthly, the recovering of tampered facial image and hierarchical encryption offacial image are investigated. To enhance the security and ?exibility of facial imageauthentication system, a tamper recovering algorithm and a hierarchical encryption al-gorithm are proposed. The tamper recovering algorithm based on the integer waveletdecomposition and the multiple watermarking model achieve the detection and recoveryof facial image. And the hierarchical encryption algorithm which aims to the palette im-age uses two keys to achieve partial and complete encryption. Further, the hierarchicalencryption algorithm is combined with a public key protocol to build a secure imagetransmission system.
引文
1 A. Elouardi, S. Bouaziz, A. Dupret, et al. Image Processing Vision Systems: Stan-dard Image Sensors Versus Retinas[J]. IEEE Transactions on Instrumentation andMeasurement, 2007, 56(5):1675–1687.
    2 N. Zheng, Q. You, G. Meng, et al. 50 Years of Image Processing and PatternRecognition in China[J]. IEEE Intelligent Systems, 2008, 23(6):33–41.
    3张真诚,黄国峰,陈同孝.电子影像技术[M].台北:旗标出版股份有限公司,2003:1–16.
    4 C. Busch, K. Nahrstedt, I. Pitas. Image Security[J]. IEEE Computer Graphics andApplications, 1999, 19(1):16–17.
    5 G. Medioni, J. Choi, C.-H. Kuo, et al. Identifying Noncooperative Subjects ata Distance Using Face Images and Inferred Three-dimensional Face Models[J].IEEE Transactions on Systems, Man and Cybernetics, Part A, 2009, 39(1):12–24.
    6 A. Lanitis, C. Taylor, T. Cootes. Automatic Interpretation and Coding of FaceImages Using Flexible Models[J]. IEEE Transactions on Pattern Analysis andMachine Intelligence, 1997, 19(7):743–756.
    7周琳娜,王东明.数字图像取证技术[M].北京:北京邮电大学出版社,2008:1–17.
    8 Q. Zheng, R. Chellappa. A Computational Vision Approach to Image Registra-tion[J]. IEEE Transactions on Image Processing, 1993, 2(3):311–326.
    9 M. Schneider, S.-F. Chang. A Robust Content Based Digital Signature for ImageAuthentication[C]// Proceedings of International Conference on Image Processing.IEEE: Lausane, Switzerland, 1996, 3:227–230 vol.3.
    10 S. Bhattacharjee, M. Kutter. Compression Tolerant Image Authentication[C]// Pro-ceedings of International Conference on Image Processing. Chicago, IL, USA:IEEE, 1998, 1:435–439.
    11 J. Fridrich. Robust Bit Extraction from Images[C]// IEEE International Conferenceon Multimedia Computing and Systems. Florence, Italy: IEEE, 1999, 2:536–540.
    12 M. P. Queluz. Authentication of Digital Images and Video: Generic Modelsand a New Contribution[J]. Signal Processing: Image Communication, 2001,16(5):461–475.
    13 H. Kobayashi, H. Kiya. Robust Image Authentication Using Hash Function[C]//Proceedings of IEEE Region 10 Conference. Chiang Mai, Thailand: IEEE, 2004,A:435–438.
    14 C. De Roover, C. De Vleeschouwer, F. Lefebvre, et al. Robust Image HashingBased on Radial Variance of Pixels[C]// Proceedings of IEEE International Con-ference on Image Processing. Genoa, Italy: IEEE, 2005, 3:77–80.
    15 S. El-Din, M. Moniri. Image Authentication Using Generalised Finite Au-tomata[J]. IEE Proceedings Vision, Image and Signal Processing, 2006,153(4):493–500.
    16叶卫国,韩水华.基于内容的图像hash算法及其性能评估[J].东南大学学报(自然科学版), 2007, 37:109–113.
    17张维克,孔祥维,尤新刚.安全鲁棒的图像感知哈希技术[J].东南大学学报(自然科学版), 2007, 37.
    18 C.-S. Chan, C.-C. Chang. An Efficient Image Authentication Method Based onHamming Code[J]. Pattern Recognition, 2007, 40:681–690.
    19 S. zhong Wang, X. peng Zhang. Recent Development of Perceptual Image Hash-ing[J]. Journal of Shanghai University(English Edition), 2007, 11(4):323–331.
    20 R. C.-W. Phan. Tampering with a Watermarking-based Image AuthenticationScheme[J]. Pattern Recognition, 2008, 41(11):3493–3496.
    21 D. song WANG, J. ping LI, X. yang WEN. Biometric Image Integrity Authenti-cation Based on Svd and Fragile Watermarking[C]// Proceedings of Congress onImage and Signal Processing. Sanya, Hainan, China: IEEE, 2008.
    22牛夏牧,黄文军,吴迪,等.基于二维条码的信息隐藏技术[J].中山大学学报(自然科学版), 2004, 43(2):21–25.
    23刘磊,袁国桃,张锲石,等.基于二维条码的身份证防伪认证系统[J].西安理工大学学报, 2003, 19(3):276–278.
    24 L. O’Gorman, I. Rabinovich. Secure Identification Documents via Pattern Recog-nition and Public-key Cryptography[J]. IEEE Transactions on Pattern Analysisand Machine Intelligence, 1998, 20(10):1097–1102.
    25 R. Hietmeyer. Biometric Identification Promises Fast and Secure Processing ofAirline Passengers[J]. The International Civil Aviation Organization Journal,2000, 55(9):10–11.
    26 S. Z. Li, A. K. Jain. Handbook of Face Recognition[M]. New York, USA: Springer,2004.
    27 U. Park, Y. Tong, A. K. Jain. Face Recognition with Temporal Invariance: A
    3d Aging Model[C]// Proceedings of the 8th IEEE International Conference onAutomatic Face and Gesture Recognition. Amsterdam, Netherlands: IEEE, 2008.
    28 A. K. Jain, K. Nandakumar, A. Nagar. Biometric Template Security[J]. EURASIPJournal on Advances in Signal Processing, Special Issue on Biometrics, 2008,2008:1–17.
    29 O. B. Adamo. Vlsi Architecture and Fpga Prototyping of a Secure Digital Camerafor Biometric Application[D]. Denton, Texas, USA:University of North Texas,2006.
    30 T. Kevenaar, G. Schrijen, M. van der Veen, et al. Face Recognition with Renew-able and Privacy Preserving Binary Templates[C]// Proceedings of the Fourth IEEEWorkshop on Automatic Identification Advanced Technologies. Alghero, Italy:IEEE, 2005:21–26.
    31 Z. Zeng, P. A. Watters. A Novel Face Hashing Method with Feature Fusion forBiometric Cryptosystems[C]// Proceedings of the Fourth European Conference onUniversal Multiservice Networks. Toulouse, France: IEEE, 2007:439–444.
    32 B. Zhu, M. Swanson, A. Tewfik. When Seeing Isn’t Believing[J]. IEEE SignalProcessing Magazine, 2004, 21(2):40–49.
    33曾璜,任悦.图片编辑手册(第二版)[M].北京:中国摄影出版社, 2006.
    34 B. Schneier,吴世忠等译.应用密码学–协议算法与c源程序[M].北京:机械工业出版社, 2003.
    35 M. Johnson, K. Ramchandran. Dither-based Secure Image Hashing Using Dis-tributed Coding[C]// Proceedings of International Conference on Image Process-ing. Barcelona, Spain: IEEE, 2003, 2:751–754.
    36张小华.基于数字水印的图像认证技术研究[D].西安:西安电子科技大学,2004.
    37 G. Friedman. The Trustworthy Digital Camera: Restoring Credibility to the Photo-graphic Image[J]. IEEE Transactions on Consumer Electronics, 1993, 39(4):905–910.
    38 C.-Y. Lin, S.-F. Chang. Generating Robust Digital Signature for Image/videoAuthentication[C]// Multimedia and Security Workshop at ACM Multimedia’98.Bristol, U.K.: ACM, 1998.
    39 R. Venkatesan, S.-M. Koon, M. Jakubowski, et al. Robust Image Hashing[C]//Proceedings of International Conference on Image Processing. Vancouver, BC,Canada: IEEE, 2000, 3:664–666.
    40 E. McCarthy, F. Balado, G. Slvestre, et al. A Framework for Soft Hashing and itsApplication to Robust Image Hashing[C]// Proceedings of International Confer-ence on Image Processing. Singapore: IEEE, 2004, 1:397–400 Vol. 1.
    41 F. Ahmed, M. Siyal. A Secure and Robust Hashing Scheme for Image Authentica-tion[C]// Proceedings of the Fifth International Conference on Information, Com-munications and Signal Processing. Bangkok, Thailand: IEEE, 2005:705–709.
    42 S. zhong Wang, X. peng Zhang. Recent Development of Perceptual Image Hash-ing[J]. Journal of Shanghai University(English Edition), 2007, 11(4):323–331.
    43 Y. Mao, M. Wu. Unicity Distance of Robust Image Hashing[J]. IEEE Transactionson Information Forensics and Security, 2007, 2(3):462–467.
    44牛夏牧,焦玉华.感知哈希综述[J].电子学报, 2008, 36(7):1405–1411.
    45 S.-H. Yang, C.-F. Chen. Robust Image Hashing Based on Spiht[C]// Proceedingsof the 3rd International Conference on Information Technology: Research andEducation. Hsinchu, Taiwan, China: IEEE, 2005:110–114.
    46 A. Swaminathan, Y. Mao, M. Wu. Robust and Secure Image Hashing[J]. IEEETransactions on Information Forensics and Security, 2006, 1(2):215–230.
    47 M. Wu, Y. Mao, A. Swaminathan. A Signal Processing and Randomization Per-spective of Robust and Secure Image Hashing[C]// Proceedings of the IEEE/SP14th Workshop on Statistical Signal Processing. Madison, WI, USA: IEEE,2007:166–170.
    48 V. Monga, M. Mihcak. Robust Image Hashing via Non-negative Matrix Factor-izations[C]// Proceedings of IEEE International Conference on Acoustics, Speechand Signal Processing. Toulouse: IEEE, 2006, 2:225–228.
    49 B. Yang, F. Gu, X. Niu. Block Mean Value Based Image Perceptual Hashing[C]//Proceedings of International Conference on Intelligent Information Hiding andMultimedia Signal Processing. Pasadena, CA, USA: IEEE, 2006:167–172.
    50 H. Zhang, H. Zhang, Q. Li, et al. A Multi-channel Combination Method of ImagePerceptual Hashing[C]// Proceedings of the Fourth International Conference onNetworked Computing and Advanced Information Management. Gyeongju, SouthKorea: IEEE, 2008, 2:87–90.
    51 H. Zhang, H. Zhang, Q. Li, et al. Predigest Watson’s Visual Model as PerceptualHashing Method[C]// Proceedings of Third International Conference on Conver-gence and Hybrid Information Technology. Busan, Korea: IEEE, 2008, 2:617–620.
    52 H. Zhang, Y. Wang, X. Niu. A Cyclic Coding Based Perceptual Hashing Algo-rithm[C]// Proceedings of the Eighth International Conference on Intelligent Sys-tems Design and Applications. Kaohsuing, Taiwan: IEEE, 2008, 2:96–99.
    53 R. van Schyndel, A. Tirkel, C. Osborne. A Digital Watermark[C]// Proceedingsof IEEE International Conference Image Processing. Austin, Texas, USA: IEEE,1994, 2:86–90.
    54 J. Brassil, S. Low, N. Maxemchuk, et al. Electronic Marking and IdentificationTechniques to Discourage Document Copying[J]. IEEE Journal on Selected Areasin Communications, 1995, 13(8):1495–1504.
    55 H. Berghel, L. O’Gorman. Protecting Ownership Rights Through Digital Water-marking[J]. Computer, 1996, 29(7):101–103.
    56 R. Wolfgang, E. Delp. A Watermark for Digital Images[C]// Proceedings of In-ternational Conference on Image Processing. Lausane, Switzerland: IEEE, 1996,3:219–222.
    57 M. Barni, F. Bartolini, V. Cappellini, et al. Copyright Protection of Digital Im-ages by Embedded Unperceivable Marks[J]. Image and Vision Computing, 1996,16:897–906.
    58 F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn. Information Hiding– a Survey[J].Proceedings of the IEEE, 1999, 87(7):1062–1078.
    59 F. A. P. Petitcolas. Watermarking Schemes Evaluation[J]. IEEE Signal ProcessingMagazine, 2000, 17(5):58–64.
    60 A. K. Jain, U. Uludag, R. lien Hsu. Hiding a Face in a Fingerprint Image[C]//Proceedings of International Conference on Pattern Recognition. Quebec, Canada:IEEE, 2002:756–759.
    61 X.-M. Niu, Z.-M. Lu, S.-H. Sun. Digital Watermarking of Still Images with Gray-level Digital Watermarks[J]. IEEE Transactions on Consumer Electronics, 2000,46(1):137–145.
    62 X. Niu, S. Sun, W. Xiang. Multiresolution Watermarking for Video Based onGray-level Digital Watermark[J]. IEEE Transactions on Consumer Electronics,2000, 46(2):375–384.
    63李赵红.基于数字水印的图像认证及其关键问题研究[D].北京:北京交通大学, 2008.
    64华先胜,石青云.易损数字水印若干问题的研究[J].中国图象图形学报,2001, 6(11):1089–1095.
    65叶登攀.图像认证及视频数字水印的若干算法研究[D].南京:南京理工大学,2005.
    66 J.-P. Boyer, P. Duhamel, J. Blanc-Talon. Scalar Dc-qim for Semifragile Authentica-tion[J]. IEEE Transactions on Information Forensics and Security, 2008, 3(4):776–782.
    67 X. Zhu, A. T. Ho, P. Marziliano. A New Semi-fragile Image Watermarking withRobust Tampering Restoration Using Irregular Sampling[J]. Signal Processing:Image Communication, 2007, 22(5):515–528.
    68 S.-H. Liu, H.-X. Yao, W. Gao, et al. An Image Fragile Watermark Scheme Basedon Chaotic Image Pattern and Pixel-pairs[J]. Applied Mathematics and Computa-tion, 2007, 185:869–882.
    69 P. W. Wong. A Public Key Watermark for Image Verification and Authentica-tion[C]// Proceedings of International Conference on Image Processing. Chicago,USA: IEEE, 1998, 1:455–459.
    70 P. W. Wong, N. Memon. Secret and Public Key Image Watermarking Schemes forImage Authentication and Ownership Verification[J]. IEEE Transactions on ImageProcessing, 2001, 10(10):1593–1601.
    71 J. Fridirch, M. Goljan, M. N. Further Attacks on Yeung-mintzer Watermark-ing Scheme[C]// Proceedings of SPIE Electronic Imaging. San Jose, USA: SPIE,2000:24–26.
    72 M. Holliman, M. N. Counterfeiting Attacks on Oblivious Block-wise Indepen-dent Invisible Watermarking Schemes[J]. IEEE Transactions on Image Processing,2000, 19(3):432–441.
    73 J. Fridrich, M. Goljan, A. Baldoza. New Fragile Authentication Watermark for Im-ages[C]// Proceedings of International Conference on Image Processing. Vanouver,Canada: IEEE, 2000, 1:446–449.
    74 M. Celik, G. Sharma, E. Saber, et al. A Hierarchical Image Authentication Water-mark with Improved Localization and Security[C]// Proceedings of InternationalConference on Image Processing. Thessaloniki, Greece: IEEE, 2001, 2:502–505.
    75 J. Fridrich. Methods for Detecting Changes in Digital Images[C]// Proceedings ofthe 6th IEEE International Workshop on Intelligent Signal Processing and Com-munication System. Melbourne, Australia: IEEE, 1998:173–177.
    76 C. Rey, J. L. Dujelay. Blind Detection of Malicious Alterations on Still ImagesUsing Robust Watermarks[C]// Proceedings of IEE Secure Images and Image Au-thentication Colloquium. London, UK: IEE, 2000.
    77 C.-Y. Lin, S.-F. Chang. A Robust Image Authentication Method DistinguishingJpeg Compression from Malicious Manipulation[J]. IEEE Transactions on Circuitsand Systems for Video Technology, 2001, 11(2):153–168.
    78 C. Y. Lin, S. F. Chang. Semi-fragile Watermarking for Authentication Jpeg VisualContent[C]// Proceedings of SPIE Conference on Security and Watermarking ofMultimedia Contents II. San Jose, USA: SPIE, 2000:140–151.
    79李春,黄继武.一种抗jpeg压缩的半脆弱图像水印算法[J].软件学报, 2006,17(2):315–324.
    80李旭东.抗几何攻击的空间域图像数字水印算法[J].自动化学报, 2008,34(7):832–837.
    81张静,张春田.用于jpeg2000图像认证的半脆弱性数字水印算法[J].电子学报, 2004, 32(1):157–160.
    82 Q. Sun, S.-F. Chang. A Secure and Robust Digital Signature Scheme for Jpeg2000Image Authentication[J]. IEEE Transactions on Multimedia, 2005, 7(3):480–494.
    83 T.-S. Chen, J. Chen, J.-G. Chen. A Simple and Efficient Watermarking TechniqueBased on Jpeg2000 Codec[C]// Proceedings of the Fifth International Symposiumon Multimedia Software Engineering. Taichung, Taiwan, China: IEEE, 2003:80–87.
    84李晓强.数字图像水印研究[D].上海:复旦大学, 2004.
    85桑军.几类数字图像水印技术及其应用研究[D].重庆:重庆大学, 2005.
    86 F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn. Attacks on Copyright MarkingSystems[C]// Proceedings of Second International Workshop on Information Hid-ing. Portland, Oregon, U.S.A., 1998:218–238.
    87 F. A. P. Petitcolas. Watermarking Schemes Evaluation[J]. IEEE Signal ProcessingMagazine, 2000, 17(5):58–64.
    88 J. J. O. Ruanaidh, T. Pun. Rotation, Scale and Translation Invariant Spread Spec-trum Digital Image Watermarking[J]. Signal Processing, 1998, 66:303–317.
    89俞龙江,牛夏牧,孙圣和.一种旋转、尺度变换和平移鲁棒水印算法[J].电子学报, 2003, 31(12A):2071–2073.
    90 P. Blythe, J. Fridrich. Secure Digital Camera[C]// Digital Forensic Research Work-shop. Baltimore, Maryland, USA, 2004:17–19.
    91罗四维.视觉感知系统信息处理理论[M].北京:电子工业出版社, 2006:1–6.
    92丁艺芳.基于小波变换和视觉系统的图像质量综合评价新算法[D].上海:上海大学, 2004.
    93章毓晋.图像工程[M].第2版.,北京:清华大学出版社, 2005.
    94周明全,耿国华,韦娜.基于内容的图像检索技术[M].北京:清华大学出版社, 2007.
    95 R. Gonzalez, R. E. Woods,阮秋琦等译.数字图象处理[M].第2版.,北京:电子工业出版社, 2003.
    96杨雄里.视觉的神经机制[M].上海:上海科学技术出版社, 1996:1–3.
    97朱淼良.计算机视觉[M].杭州:浙江大学出版社, 1997.
    98刘传才.图像理解与计算机视觉[M].厦门:厦门大学出版社, 2002.
    99寿天德.视觉信息处理的脑机制[M].上海:上海科技教育出版社, 1997.
    100孙剑,徐宗本.计算机视觉中的尺度空间方法[J].工程数学学报, 2005,22(6):951–962.
    101 R. W. Rodieck, J. Stone. Analysis of Receptive Fields of Cat Retina GanglionCells[J]. Journal of Neurophysiology, 1965, 28:833–849.
    102吴立德.计算机视觉[M].上海:复旦大学出版社, 1993.
    103 J. G. Daugman. Uncertainty Relation for Resolution in Space, Spatial Frequency,and Orientation Optimized by Two-dimensional Visual Cortical Filters[J]. Journalof the Optical Society of America, A, 1985, 2(7):1160–1169.
    104 J. G. Daugman. Complete Discrete 2-D Gabor Transforms by Neural Networksfor Image Analysis and Compression[J]. IEEE Transactions on Acoustics, Speechand Signal Processing, 1988, 36(7):1169–1179.
    105 G. C. DeAngelis, I. Ohzawa, R. D. Freeman. Receptive-field Dynamics in theCentral Visual Pathways[J]. Trends Neurosci, 1995, 18:451–458.
    106 F. Attneave. Some Informational Aspects of Visual Perception[J]. PsychologicalReview, 1954, 61:183–193.
    107 H. B. Barlow. Possible Principles Underlying the Transformation of Sensory Mes-sages[M]// E. W. A. Rosenblith. Sensory Communication. Cambridge, MA, USA:MIT Press, 1961.
    108 J. J. Atick, A. N. Redlich. What Does the Retina Know about Natural Scenes?[J].Neural Computation, 1992, 4:196–210.
    109 D. L. Ruderman, W. Bialek. Statistics of Natural Images: Scaling in the Woods[J].Physical Review Letters, 1994, 73(6):814–817.
    110 D. J. Field. Relations between the Statistics of Natural Images and the ResponseProperties of Cortical Cells[J]. Journal of the Optical Society of America A, 1987,4(12):2379–2394.
    111 W. E. Vinje, J. L. Gallant. Sparse Coding and Decorrelation in Primary VisualCortex During Natural Vision[J]. Science, 2000, 287:1273–1276.
    112 C. H. Lee, J. S. Kim, K. H. Park. Automatic Human Face Location in a ComplexBackground Using Motion and Color Information[J]. Pattern Recognition, 1996,29(11):1877–1889.
    113 E. Osuna, R. Freund, F. Girosi. Training Support Vector Machines: An Appli-cation to Face Detection[C]// Proceedings of IEEE Computer Society Confer-ence on Computer Vision and Pattern Recognition. San Juan, Puerto Rico: IEEE,1997:130–136.
    114 K. C. Yow, R. Cipolla. Feature-based Human Face Detection[J]. Image and VisionComputing, 1997, 15:713–735.
    115 S.-H. Jeng, H. Y. M. Liao, C. C. Han, et al. Facial Feature Detection UsingGeometrical Face Model: An Efficient Approach[J]. Pattern Recognition, 1998,31(3):273–282.
    116 H. A. Rowley, S. Baluja, T. Kanade. Neural Network-based Face Detection[J].IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLI-GENCE, 1998, 20(1):23–38.
    117 K.-K. Sung, T. Poggio. Example-based Learning for View-based Human Face De-tection[J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINEINTELLIGENCE, 1998, 20(1):39–51.
    118 C. Garcia, G. Tziritas. Face Detection Using Quantized Skin Color Regions Merg-ing and Wavelet Packet Analysis[J]. IEEE TRANSACTIONS ON MULTIMEDIA,1999, 1(3):264–277.
    119 H. Wu, Q. Chen, M. Yachida. Face Detection from Color Images Using a FuzzyPattern Matching Method[J]. IEEE TRANSACTIONS ON PATTERN ANALYSISAND MACHINE INTELLIGENCE, 1999, 21(6):557–563.
    120 A. Albiol, L. Torres, C. Bouman, et al. A Simple and Efficient Face Detection Al-gorithm for Video Database Applications[C]// Proceedings of International Con-ference on Image Processing. Vancouver, BC, Canada: IEEE, 2000, 2:239–242.
    121 E. Hjelmas, B. K. Low. Face Detection: A Survey[J]. Computer Vision and ImageUnderstanding, 2001, 83:236–274.
    122 O. Jesorsky, K. J. Kirchberg, R. W. Frischholz. Robust Face Detection Using theHausdorff Distance[C]// Proceedings of Third International Conference on Audio-and Video-based Biometric Person Authentication. Halmstad, Sweden: Springer,2001:90–95.
    123 P. Viola, M. Jones. Rapid Object Detection Using a Boosted Cascade of SimpleFeatures[C]// Proceedings of the IEEE Computer Society Conference on ComputerVision and Pattern Recognition. Hawaii, USA: IEEE, 2001, 1:511–518.
    124 R. E. Schapire. The Strength of Weak Learnability[J]. Machine Learning, 1990,5(2):197–227.
    125 Y. Freund. Boosting a Weak Learning Algorithm by Majority[J]. Information andComputation, 1995, 121(2):256–285.
    126 Y. Freund, R. E. Schapire. A Short Introduction to Boosting[J]. Journal of JapaneseSociety for Artificial Intelligence, 1999, 14(5):771–780.
    127 Y. Freund, R. E. Schapire. A Decision-theoretic Generalization of On-line Learn-ing and an Application to Boosting[C]// Proceedings of the Second EuropeanConference on Computational Learning Theory. London, UK: Springer-Verlag,1995:23–37.
    128 Y. Freund, R. E. Schapire. A Decision-theoretic Generalization of On-line Learn-ing and an Application to Boosting[J]. Journal of computer and system sciences,1997, 55(1):119–139.
    129 R. Lienhart, J. Maydt. An Extended Set of Haar-like Features for Rapid Ob-ject Detection[C]// Proceedings of International Conference on Image Processing.Rochester, New York, USA: IEEE, 2002, 1:900–903.
    130 C. Papageorgiou, M. Oren, T. Poggio. A General Framework for Object Detec-tion[C]// Proceedings of the Sixth International Conference on Computer Vision.Bombay, India: IEEE, 1998:555–562.
    131黄雄栋.人脸识别系统中的特征检测算法研究[D].哈尔滨:哈尔滨工业大学,2007.
    132 M.-J. Chen, M.-C. Chi, C.-T. Hsu, et al. Roi Video Coding Based on H.263+with Robust Skin-color Detection Technique[J]. IEEE Transactions on ConsumerElectronics, 2003, 49(3).
    133吴证,周越,杜春华,等.彩色图像人脸特征点定位算法研究[J].电子学报,2008, 36(2):309–313.
    134 T. Iijima. Basic Theory of Pattern Observation[J]. Papers of Technical Group onAutomata and Automatic Control, IECE, Japan, 1959.(In Japanese).
    135 T. Iijima. Basic Theory on Normalization of Pattern (in Case of Typical One-dimensional Pattern)[J]. Bulletin of the Electrotechnical Laboratory, 1962,26:368–388.(In Japanese).
    136 J. Weickert, S. Ishikawa, A. Imiya. Linear Scale-space Has First Been Proposed inJapan[J]. Journal of Mathematical Imaging and Vision, 1999, 10:237–252.
    137 A. P. Witkin. Scale-space Filtering[C]// Proceedings of the Eighth InternationalJoint Conference on Artificial Intelligence. Karlsruhe, Germany: AAAI, 1983,2:1019–1022.
    138 J. J. Koenderink. The Structure of Images[J]. Biological cybernetics, 1984,50(5):363–370.
    139 T. Lindeberg. Discrete Scale-space Theory and the Scale-space Primal Sketch[D].Stockholm, Sweden:Royal Institute of Technology, 1991.
    140 T. Lindeberg. Scale-space for Discrete Signals[J]. IEEE Transactions on PatternAnalysis and Machine Intelligence, 1990, 12(3):234–254.
    141 T. Lindeberg. Feature Detection with Automatic Scale Selection[J]. InternationalJournal of Computer Vision, 1998, 30(2):77–116.
    142 T. Lindeberg. Scale-space Theory in Computer Vision[M]. Dordrecht, Nether-lands: Kluwer Academic Publishers, 1994.
    143张澶,陈刚.基于偏微分方程的图象处理[M].北京:高等教育出版社, 2004.
    144 G. Loy, A. Zelinsky. Fast Radial Symmetry for Detecting Points of Inter-est[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003,25(8):959–973.
    145 D. G. Lowe. Object Recognition from Local Scale-invariant Features[C]// Proceed-ings of International Conference on Computer Vision. Corfu, Greece, 1999:1150–1157.
    146 D. G. Lowe. Distinctive Image Features from Scale-invariant Keypoints[J]. Inter-national Journal of Computer Vision, 2004, 60(2):91–110.
    147 Y. Ke, R. Sukthankar. Pca-sift: A more Distinctive Representation for Local ImageDescriptors[C]// Proceedings of IEEE Computer Society Conference on ComputerVision and Pattern Recognition. Washington, DC USA: IEEE, 2004, 2:506–513.
    148 K. MIKOLAJCZYK, T. TUYTELAARS, C. SCHMID, et al. A Comparison ofAffine Region Detectors[J]. International Journal of Computer Vision, 2006,1(60):63–86.
    149 J. Bauer, N. Su¨nderhauf, P. Protzel. Comparing Several Implementations of TwoReently Published Feature Detectors[C]// Proceedings of the International Confer-ence on Intelligent and Autonomous Systems. Toulouse, France, 2007.
    150 H. Wang, M. Brady. Real-time Corner Detection Algorithm for Motion Estima-tion[J]. Image and Vision Computing, 1995, 13(9):695–703.
    151 W.-Y. Liu, H. Li, G.-X. Zhu. A Fast Algorithm for Corner Detection Using theMorphologic Skeleton[J]. Pattern Recognition Letters, 2001, 22(8):891–900.
    152 M. Trajkovic′, M. Hedley. Fast Corner Detection[J]. Image and Vision Computing,1998, 16(2):75–87.
    153 D. S. Guru, R. Dinesh. Non-parametric Adaptive Region of Support Useful forCorner Detection: A Novel Approach[J]. Pattern Recognition, 2004, 37(1):165–168.
    154张小洪,李博,杨丹.一种新的harris多尺度角点检测[J].电子与信息学报,2007, 29(7):1735–1738.
    155 C. Harris, M. Stephens. A Combined Corner and Edge Detector[C]// Proceedingsof The Fourth Alvey Vision Conference. Manchester, UK: Wiley, 1988:147–151.
    156 C. Schmid, R. Mohr. Local Grayvalue Invariants for Image Retrieval[J]. IEEETransactions on Pattern Analysis and Machine Intelligence, 1997, 19(5):530–535.
    157 H. Moravec. Rover Visual Obstacle Avoidance[C]// Proceedings of Interna-tional Joint Conference on Artificial Intelligence. Vancouver, British Columbia,1981:785–790.
    158 H. Moravec. Obstacle Avoidance and Navigation in the Real World by a SeeingRobot Rover[R]. Tech. rep., Carnegie-Mellon University, Robotics Institute, Pitts-burghers,Pennsylvania,USA, 1980.
    159汪云九.神经信息学—神经系统的理论和模型[M].北京:高等教育出版社,2006.
    160李世雄.小波变换及其应用[M].北京:高等教育出版社, 1997.
    161 J. G. Daugman. Two-dimensional Spectral Analysis of Cortical Receptive FieldProfiles[J]. Vision Research, 1980, 20(10):847–856.
    162于秀林,任雪松.多元统计分析[M].北京:中国统计出版社, 1999.
    163 R. J. Anderson,蒋佳等译.信息安全工程[M].北京:机械工业出版社, 2003.
    164 F. Lefebvre, J. Czyz, B. Macq. A Robust Soft Hash Algorithm for Digital Im-age Signature[C]// Proceedings of International Conference on Image Processing.Barcelona, Spain: IEEE, 2003, 2:495–498.
    165 F. Ahmed, M. Siyal. Image Authentication Using Soft Hashing Technique[C]//Proceedings of the 6th International Conference on Information, Communications& Signal Processing. Singapore: IEEE, 2007:1–5.
    166 F.-X. Standaert, E. Lefebvre, G. Rouvroy, et al. Practical Evaluation of a RadialSoft Hash Algorithm[C]// Proceedings of International Conference on InformationTechnology: Coding and Computing. Las Vegas, Nevada, USA: IEEE, 2005, 2:89–94.
    167 M. K. Mihcak, R. Venkatesan. New Iterative Geometric Methods for Robust Per-ceptual Image Hashing[C]// Proceedings of the ACM CCS-8 Workshop on Secu-rity and Privacy in Digital Rights Management. Philadelphia, PA, USA: Springer-Verlag, 2001:13–21.
    168 S. Kozat, R. Venkatesan, M. Mihcak. Robust Perceptual Image Hashing via Ma-trix Invariants[C]// Proceedings of International Conference on Image Processing.Singapore: IEEE, 2004, 5:3443–3446.
    169 V. Monga, B. Evans. Robust Perceptual Image Hashing Using Feature Points[C]//Proceedings of International Conference on Image Processing. Singapore: IEEE,2004, 1:677–680.
    170李琼,牛夏牧,孙圣和.基于生物信息的模糊密钥绑定算法研究[J].测试技术学报, 2004, 18(z1):61–65.
    171 Q. Li, X. Niu, S. Sun. A Novel Biometric Key Scheme[J]. Chinese Journal ofElectronics, 2006, 15(1):99–102.
    172 P. J. Phillips, H. Moon, S. A. Rizvi, et al. The Feret Evaluation Methodologyfor Face-recognition Algorithms[J]. IEEE Transactions on Pattern Analysis andMachine Intelligence, 2000, 22(10):1090–1104.
    173 J. Wu, Z.-H. Zhou. Face Recognition with One Training Image Per Person[J].Pattern Recognition Letters, 2002, 23(14):1711–1719.
    174 M. A. Turk, A. P. Pentland. Face Recognition Using Eigenfaces[C]// Proceedingsof the IEEE Conference on Computer Vision and Pattern Recognition. Hawaii,USA: IEEE, 1991:586–591.
    175 H. Chui, A. Rangarajan. A New Point Matching Algorithm for Non-rigid Regis-tration[J]. Computer Vision and Image Understanding, 2003, 18(2-3):114–141.
    176 A. Jain, H. Lin, S. Pankanti, et al. An Identity-authentication System Using Fin-gerprints[J]. Proceedings of the IEEE, 1997, 85(9):1365–1388.
    177孙圣和,陆哲明,牛夏牧.数字水印技术及应用[M].北京:科学出版社, 2004.
    178 W.-Y. Chen, C.-H. Chen. A Robust Watermarking Scheme Using Phase Shift Key-ing with the Combination of Amplitude Boost and Lowamplitude Block Selec-tion[J]. Pattern Recognition, 2005, 38:587–598.
    179黄继武, Y. Q. Shi,程卫东. Dct域图像水印:嵌入对策和算法[J].电子学报,2000, 28(4):57–60.
    180 L. Cox, T. Leighton, T. Shamoon. Secure Spread Spectrum Watermarking forMultimedia[J]. IEEE Transactions on Image Processing, 1997, 6(12):1673–1687.
    181 J. Hu, J. Huang, Y. Shi. Image Fragile Watermarking Based on Fusion of Multi-resolution Tamper Detection[J]. Electronics Letters, 2002, 38(24):1512–1513.
    182 P. L. Lin, C.-K. Hsieh, P.-W. Huang. Ahierarchical Digital WatermarkingMethod for Image Tamper Detection and Recovery[J]. Pattern Recognition, 2005,38:2519–2529.
    183 S.-S. Wang, S.-L. Tsai. Automatic Image Authentication and Recovery UsingFractal Code Embedding and Image Inpainting[J]. Pattern Recognition, 2008,41:701–712.
    184李昌刚,韩正之.图像加密技术新进展[J].信息与控制, 2003, 32:339–343.
    185 A. Yekkala, N. Udupa, N. Bussa, et al. Lightweight Encryption for Images[C]//Proceedings of International Conference on Consumer Electronics, 2007. SanFrancisco, USA: IEEE, 2007:1–2.
    186 D. Engel, E. Pschernig, A. Uhl. An Analysis of Lightweight Encryption Schemesfor Fingerprint Images[J]. IEEE Transactions on Information Forensics and Secu-rity, 2008, 3(2):173–182.
    187 A. K. Jain, R. P. Duin, J. Mao. Statistical Pattern Recognition: A Review[J].IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLI-GENCE, 2000, 22(1):4–37.
    188 T. Amornraksa, S. Tachaphetpiboon. Fingerprint Recognition Using Dct Fea-tures[J]. ELECTRONICS LETTERS, 2006, 42(9).
    189钱振兴,程义民,田源,等. Lsb扩展的图像自嵌入方法[J].光电工程, 2007,34(6):92–96.
    190钱振兴,程义民,王以孝,等.一种图像自嵌入方法[J].电子学报, 2006,34(7):1347–1350.
    191 S.-B. Che, Z.-G. Che, B. Ma, et al. Image Self-embedding Technology ResearchBased on Singular Value Decomposition[C]// Proceedings of the 4th InternationalConference on Wireless Communications, Networking and Mobile Computing.Dalian, China: IEEE, 2008:1–7.
    192 P. P. Dang, P. M. Chau. Image Encryption for Secure Internet Multimedia Appli-cations[J]. IEEE Transactions on Consumer Electronics, 2000, 46(3):395–403.
    193 S. Sudharsanan. Shared Key Encryption of Jpeg Color Images[J]. IEEE Transac-tions on Consumer Electronics, 2005, 51(4):1204–1211.
    194李昌刚,韩正之,张浩然.图像加密技术综述[J].计算机研究与发展, 2002,39:1317–1324.
    195 J. Rodrigues, W. Puech, A. Bors. Selective Encryption of Human Skin in JpegImages[C]// Proceedings of IEEE International Conference on Image Processing.Atlanta, GA, USA: IEEE, 2006:1981–1984.
    196胡云,伍宏涛,张涵钰,等.大容量索引图像水印方案的设计与实现[J].北京邮电大学学报, 2005, 28(1):26–29.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700