多媒体数字水印若干关键算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着电力信息化程度的不断提高和多媒体技术的广泛普及,电力生产、运行和管理过程中产生大量的图像、音频、视频、三维模型等多媒体信息。保证这些多媒体信息安全正成为电力信息安全研究与发展中亟待解决的难题之一。数字水印技术是解决多媒体信息安全的一种新型、有效和可靠的方法。随着智能电网的深入建设,数字水印将在电力系统信息安全领域发挥更加重要的作用。
     本文主要围绕多媒体信息的版权保护和内容认证的数字水印技术展开研究,分别选取数字图像和三维网格模型作为多媒体信息的典型代表和水印算法的研究对象。对涉及的图像和图形特征分析、人眼视觉特性、模式识别和智能计算等相关技术进行了深入研究,为多媒体水印技术的理论发展和实际应用提供有效的解决方案。本文的主要工作和创新点有:
     (1)提出了一种数字图像空间域自适应可恢复脆弱水印算法
     在可恢复脆弱水印算法的特性、关键问题和研究进展的基础上,提出了一种基于图像块自适应聚类关联机制的安全可恢复脆弱水印算法。该算法基于扩展的Torus变换生成数字图像的分块映射,由图像块的空间域视觉掩蔽特性组成特征向量,利用智能聚类算法建立水印嵌入块之间的关联关系,将由认证水印和恢复水印组成的特征水印通过混沌加密后,可靠地嵌入到映射块像素的最低有效位之中。实验结果表明该算法不仅篡改检测能力强,篡改定位准确度高,而且能够对篡改区域进行有效地图像内容恢复。
     (2)提出了一种数字图像变换域的优化鲁棒水印算法
     针对现有数字图像变换域鲁棒水印算法在水印不可见性和鲁棒性之间难以平衡的问题,提出了一种基于图像变换域差分进化的优化鲁棒水印算法。文中通过分析图像块离散余弦变换下的亮度特征和纹理特征,结合变换域下人眼视觉模型,建立图像块量化步长模型。利用差分进化算法的最优选择性质对模型参数寻优,建立水印嵌入强度的统计优化模型,实现鲁棒水印的自适应嵌入。大量实验结果表明,将智能计算寻优技术与变换域水印嵌入和检测策略有机结合不仅增强了算法的不可见性,而且提高了水印的整体鲁棒性能。
     (3)提出一种基于微分估算的三维网格视觉掩蔽模型
     为了获得稳定且独立的三维网格模型视觉特征,提出了一种基于微分几何的三维网格模型视觉掩蔽模型。详细地分析了三维网格模型一阶和二阶微分估算方法,将模型顶点法向量和粗糙度引入其中,为嵌入水印的网格顶点加入一个局部强度函数,使水印嵌入强度根据网格局部特征自适应变化。将该模型应用于复杂度不同的三维模型和不同的水印嵌入策略,实验结果证明了该掩蔽模型具有广泛适应性和较好稳定性。
     (4)提出了一种基于脐点的三维网格模型鲁棒水印算法
     三维网格模型中脐点反应了模型内在特征,是三维网格模型特征点。提出了一种基于三维网格脐点的自适应鲁棒水印算法。利用三维网格模型顶点测地邻域的矩阵特征值和特征向量,提取模型中脐点位置。利用模型视觉掩蔽特征,沿着脐点主方向自适应地修改脐点坐标实现水印嵌入。大量的实验结果表明这种算法能够很好地抵抗三维网格模型常规处理攻击和连通性攻击,与已有算法的性能比较也进一步验证了算法的优越性。
     (5)提出了一种基于自适应量化的三维网格模型盲水印算法
     为了实现水印算法的盲检测,将数字图像水印算法中的量化索引调制机制引入到图形水印算法研究中,提出了一种基于自适应量化三维网格模型全局几何特征的盲水印算法。利用三维网格模型预处理将模型变换到仿射不变空间,从而实现三维水印系统抵抗几何攻击的目的;结合所提出视觉掩蔽特性,自适应地确定水印量化强度,并实现水印盲检测。与同类算法相比,该算法水印嵌入容量大,不可见性好,且抵抗三维网格模型同拓扑攻击的能力强。
     (6)提出了一种三维网格模型变换域零水印算法
     三维网格模型相比其他多媒体水印载体具有复杂度高,敏感性强的特点,一种新的不用改变原始模型数据,而达到三维模型版权保护目的零水印机制日益受到人们广泛重视。提出了一种基于三维网格模型变换域的零水印算法。在深入分析三维网格模型顶点之间距离矩阵的基础上,利用拉普拉斯频谱分析的方法将三维网格模型的点面信息转变为变换域下的频谱系数;利用差值量化中频功率谱系数值的方式,从而得到三维网格模型变换域下的零水印。与同类算法相比,该算法水印唯一性好,且抵御多种三维网格模型攻击的能力强。
     本论文的研究得到国家电网公司科技项目“多屏同步3D显示技术的研究”和“新一代电力信息通信(ICT)网络模式研究”的资助,同时还得到国网信息通信有限公司科技自建项目“三维网格模型数字水印技术的研究”的资助。项目研究成果对提高电力信息网多媒体信息安全水平有积极的意义,已获得国网信息通信有限公司科技进步一等奖。
With the rapid development of the electric power information and multimedia digital technologies, a large number of digital products such as digital image, audio, video and three dimensional (3D)models are produced and used during the process of the electric power production, operation, and management. Therefore, how to protect the copyright and content authentication of digital media in open networks has been a challenging issue and also has become a hot topic in electric power system. The digital watermarking technique appears accordingly and has been regarded as a promising way to protect the information security of digital products. With the construction of the smart grid, the digital watermarking is playing a more important role in network security for electric power system.
     Under the framework of watermarking system, this paper takes still images and three dimensional mesh models as main research objects and presents several watermarking algorithms by incorporating the advantages of the image and graphic characteristic analysis, human visual system, pattern recognition and intelligent computing. The main achievements of this paper are summarized as follows.
     (1)A novel fragile watermarking scheme capable of image tamper detection and recovery with a block-wise dependency mechanism is proposed. Combining the image spatial domain local properties with human visual system, the authentication data is acquired by computing class membership degree of each image block properties, which is generated by applying k-means clustering technique to cluster all the image blocks. Then the recovery data is composed of the average intensity by truncating the two least significant bits (LSBs) of each pixel within each block. Finally, the Logistic chaotic encrypted feature watermark comprising 2-bit authentication data and 6-bit recovery data of image block is embedded into the two LSBs of each pixel within its corresponding mapping block. The experimental results demonstrate that the proposed algorithm not only achieves superior tamper detection and locates tiny tampered positions in images accurately, but also has good capability of recovering the tampered regions effectively.
     (2) The robustness and the invisibility are important properties in an efficient image watermarking system. Since they conflict with each other, a watermarking system is difficult to satisfy them at same time. One good scheme to resolve this dilemma is to apply intelligent computing to obtain the optimized solution. An optimal robust image watermarking method based on discrete cosine transform (DCT) is proposed. The proposed algorithm is presented that the encrypted watermark is embedded into singular values vector of the embedding block by applying quantization index modulation technique. Taking the image's characteristics of texture and luminance into account, the quantization step for each embedding block is set combining statistical model with differential evolution optimization. Compared with the original method based on DCT domain, this new approach evidently improves the performance in terms of robustness.
     (3) Taking 3D mesh mode differential geometry estimation into account, this paper proposes a novel mesh visual masking model for mesh watermarking references. Our measure is based on the normal computation and curvature analysis in order to the watermarking embedding strength adaptive to the local geometry characteristic of the vertex. Experimental results show that this masking model is not only suitable for different types of 3D model, but also is stable under various watermarking embedding methods.
     (4) In feature-based 3D mesh watermarking, we firstly detect the mesh umbilical points as feature points for watermarking embedding vertexes. Combing the designed masking model, the watermark is adaptively embedded into 3D mesh model by projecting the vertex position of robust umbilical points along the principal direction. Extensive experimental results confirm that this algorithm enhances not only the overall robustness but also the watermarking invisibility.
     (5) In order to realize 3D mesh model blind watermarking, the quantization index modulation mechanism is used for 3D mesh watermarking. Firstly, the 3D mesh model is transformed into an affine invariant space. Combing the designed human visual masking model, the robust watermark is adaptively embedded into the 3D mesh model. Experimental results show that the proposed watermarking algorithm can resist various mesh attacks such as additive noise, affine transform, mesh compression, and mesh filtering.
     (6) Because the 3D mesh model is more sensitive and complex than audio and image, a 3D mesh zero watermarking system is developed based on spectral decomposition of mesh geometry. By analyzing the characteristics of the model adjacency matrix, Laplacian operator is used to obtain spectra or pseudo-frequencies. After that, the sum of the powers of the signal over the three pseudo-frequency axis defines the power spectrum of the Laplacian of 3D model. The zero watermarking is generated by difference quantizing the intermediate power spectrum coefficients This scheme is a zero watermarking scheme so that it causes no degradation on 3D mesh quality. Besides, it has better watermarking uniqueness and can resist various mesh attacks.
     This paper is supported by the technology projects of the state grid corporation and the state grid information & telecommunication co.,ltd. Work in this paper owns positive effect on multimedia information security of power grid and the first award for the state grid information & telecommunication co.,ltd science development.
引文
[1]王颖,肖俊,王蕴红.数字水印原理与技术[M].北京:科学技术出版社,2007.
    [2]胡炎,谢小荣,韩英铎,等.电力信息系统安全体系设计方法综述[J].电网技术,2005,29(1):35-39.
    [3]胡炎,谢小荣,辛耀中.一种定量化的电力信息系统安全体系设计方法[J].电网技术,2006,30(2):7-13.
    [4]傅书逿.2007年IEEE PES学术会议电网调度自动化部分综述与讨论[J].电网技术,2008,32(5):31-37.
    [5]刘岩,伍祥生,郑东,等.基于相位信息的旋转、缩放、位移不变的图像水印技术[J].中国电机工程学报,2005,25(10):89-96.
    [6]涂蓉晖,赵继英.基于小波变换和量化理论的半脆弱数字声音水印算法及在电力系统中的应用[J]中国电机工程学报,2005,25(12):78-85.
    [7]王先培,游文霞,王泉德,等.数字水印技术在电力系统文档可信传输中的应用[J].电力系统自动化,2002,26(18):61-64.
    [8]吴军基,盛琪,贺济峰,等.小波数字水印在电力系统信息安全中的应用[J].电力自动化设备,2004,24(12):40-42.
    [9]尹成群,李丽,吕安强,等.视频水印技术在电力系统中的应用[J].继电器,2007,35(20):40-42.
    [10]唐蕾,陈维荣,刘会平,等.变电站多媒体视频监控系统中的电话语音报警技术[J].电力系统自动化,2002(26)18:57-60.
    [11]汪琳瑛,何胜伟.语音合成技术在电力调度自动化系统中的应用[J].广东电力,2006,19(12):61-63.
    [12]朱全胜,刘娆,李卫东.语音识别技术应用于EMS人机交互初探[J].电力系统自动化,2008,32(13):45-48.
    [13]韩璞,张欣,王兵,等.基于神经网络的交互式炉膛火焰图像识别[J].中国电机工程学报,2008,28(20):22-26.
    [14]张浩,王玮,徐丽杰,等.图像识别技术在电力设备监测中的应用[J].电力系统保护与控制,2010,38(6):88-91.
    [15]孙凤杰,郭凤顺,范杰清,等.基于图像处理技术的表盘指针角度识别研究[J].中国电机工程学报,2005,16(8):73-78.
    [16]祁兵,唐良瑞,张晶,等.绝缘子憎水性图像检测方法研究[J].中国电机工程学报,2008,28(31):120-124.
    [17]王斌,张宇,贲飞,等.基于虚拟现实技术的(?)5.5m电力电缆隧道内部布置方案研究[J].华东电力,2010,38(4):540-542.
    [18]贺庆,龚庆武.虚拟现实技术在输电网络GIS中的应用[J].高电压技术,2006,32(10):94-97.
    [19]李刚,田冬梅.配电网三维仿真培训系统研究[J].广东电力,2008,21(3):28-31.
    [20]鲁强.基于Web的电力通信网络管理中三维监控界面的应用[J].电力系统通信,2003,21(3):28-31.
    [21]林向义.虚拟现实技术在电力培训中的应用[J].计算机仿真,2005,22(4):214-243.
    [22]杨光.电网可视化技术[J].国际电力,2004,8(2):45-47.
    [23]沈国辉,佘东香,孙湃,等.电力系统可视化技术研究及应用[J].电网技术,2009,33(17):31-36.
    [24]沈国辉,李立新,狄方春,等.特高压电网调度自动化系统的数据集成和可视化展示[J].电力系统自动化,2009,33(23):94-97.
    [25]单业才,朱传柏,郭创新,等.城市电网空间三维可视化信息平台技术构架[J].电网技术,2007,31(3):29-34.
    [26]高艳平,杨本渤,杨宗霄,等.输电网线路规划的可视化实验[J].电网技术,2009,33(2):51-55.
    [27]李倩,王建功,王浩.电网可视化技术及其在N-1静态安全分析中的应用[J].电网技术,2009,33(8):108-111.
    [28]刘志强.电力应急管理走向可视化[J].中国计算机用户,2010,(1):48.
    [29]Cox I.J.,Miller M.L.,Bloom J.A. Digital watermarking[M].Morgan Kaufmann Publisher,2002.
    [30]Smith J.R.,Comiskey B.O.Modulation and information hiding in images[C].In:Proceedings of Information Hiding Workshop,1996:207-226.
    [31]孙圣和,陆哲明,牛夏牧.数字水印技术及应用[M].北京:科学技术出版社,2004.
    [32]王金伟.鲁棒与半脆弱的数字水印研究[D].博士学位论文,南京理工大学,2006.
    [33]ITU-R Rec.BT.500-2002.Methodology for the subjective assessment of the quality of television pictures,2002.
    [34]ITU-T Rec.P.910-1999.Subjective video quality assessment methods for multimedia applications,1999.
    [35]M.Barni,F.Bartolini,A.D.Rosa and A.Piva.Capacity of the watermark-channel:how many bits can be hidden within a digital Image?[C].In:Proceeding of SPIE Security and Watermarking of Multimedia Contents,San Jose,CA,USA,1999,3657:437-448.
    [36]M.Ramkumar and A.N.Akansu.Capacity estimates for data hiding in compressed images[J]. IEEE Transactions on Image Processing,2001,10(8):1252-1263.
    [37]P.Moulin.The role of information theory in watermarking and its application to image watermarking[J].Signal Processing,2001,81(6):1121-1139.
    [38]A.Cohen and A.Lapidoth.The gaussian watermarking game[J].IEEE Transactions on Information Theory,2002,48(6):1639-1667.
    [39]A.Somekh-Baruch and N.Merhav.On the error exponent and capacity games of private watermarking systems[J].IEEE Transactions on Information Theory,2003,49(3):537-562.
    [40]Zheng D.,Liu Y.,Zhao J.A survey of RST invariant image watermarking algorithms[J].ACM Computer Survery,2007.39(2):1-91.
    [41]陈明奇,钮心忻,杨义先.数字水印的攻击方法[J].电子与信息学报,2001,23(7):705-711.
    [42]王志雄,王慧琴,李人厚.数字水印应用中的攻击和对策综述[J].通信学报,2002,23(11):74-79.
    [43]I.J.Cox,J.Kilian,T.Leighton.Secure spread spectrum watermarking for multimedia[J].IEEE Transactions on Image Processing,1997,6(12):1673-1687.
    [44]Hong Z.,Min W.,Wang Z.J.,et al.Nonlinear collusion attacks on independent fingerprints for multimedia[C].In:Proceeding of IEEE Acoustics,Speech and Signal Processing,2003,5:664-667.
    [45]Huang C.H.,Wu J.L.Attacking visible watermarking schemes [J]. IEEE Transactions on Multimedia,2004,6(1):16-30.
    [46]刘九芬,黄达人,黄继武.图像水印抗几何攻击研究综述[J].电子与信息学报,2004,26(9):1495-1503.
    [47]Craver S.,Memon N.,Yeo B.L.Resolving rightful ownerships with invisible watermarking of multimedia techniques:limitations, attacks and implications[J].IEEE J.Sel. Areas Commun, 1998,16(4):573-586.
    [48]李庆诚,窦毅.数字水印的解释攻击与关联性特征[J].计算机应用研究,2005,22(5):115-117.
    [49]季智,戴旭初.数字水印攻击技术及其对策分析[J].测控技术,2005,24(5):14-17.
    [50]O'Ruanaidh J.J.K.,Dowling W.J.,Boland F.M.Watermarking digital images for copyright protection[J].IEE Proc.Vis.Image Signal Process.,1996,143(4):250-256.
    [51]Zhao J.,Koch E.A digital watermarking system for multimedia copyright protection[C]. In:Proceedings of ACM Int.Conf.Multimedia,1997:443-444.
    [52]Wong A.,Sorell M.Transaction tracking for multimedia content from a mutual distrust perspective[C].In:Proceedings of Intelligent Multimedia,Video and Speech Processing,2004:89-92.
    [53]Emmanuel S.,Vinod A.P.An authentication watermarking scheme with transaction tracking enabled[C].In:Proceedings of Digital EcoSystems and Technologies Conference,2007:481-486.
    [54]M.Yeung and F.Mintzer, Invisible watennarking for image verification[J].Electronic Imaging, 1998(7)3:578-591.
    [55]M.Wu and B.Liu.Watennarking for image authentication[C].In:Proceedings of IEEE International Conference on Image Processing,1998:437-441.
    [56]Tachibana T,Fujiyoshi M.A watermarking scheme without reference images for broadcast monitoring[J].Electron.Commun.Jpn.:Fundamental Electronic Science,2004,87(9):22-32.
    [57]Kalker T.,Depovere G.,Haitsma J.,et al.Video watennarking system for broadcast monitoring[C].In:Proceedings of SPIE Video and Multimedia Watermarking,1999,3657:103-112.
    [58]Bloom J.A.,Cox I.J.Copy protection for DVD video[J].Proc.IEEE,1999,87(7):1267-1276.
    [59]Schyndel R G van,Tirkel A Z,Osborne C F.A digital watermark[C]. In:Proceedingsof IEEE International Image Processing Conference,1994,2,pp:86-90.
    [60]爱国者数字水印相机[OL]:http://www.aigo.com/huodong/421/shuiyin.htm.
    [61]保护知识产权,爱国者发布数字水印相机[OL]:http://dcdv.zol.com.cn/130/1304980.html.
    [62]Christian Rey,Jean-Luc Dugelay.A survey of watermarking algorithms for image authentication[J].EURASIP Journal on Applied Signal Proeessing,2002.6:613-621.
    [63]和红杰.数字图像安全认证水印算法及其统计检测性能分析[D].博十学位论文,西南交通大学,2008.
    [64]J.Fridirich,M. Goljan.Protection of digital images using self embedding[C].In:Proceedings of Symposium on Content Security and Data Hiding in Digital Media,1999,32-38.
    [65]J.Fridrich,M. Goljan.Images with self-correcting capabilities[C].In:Proceedings of IEEE International Conference on Image Processing,1999,792-796.
    [66]Jiang Xuemei,Liu Quan.Semi-fragile watermarking algorithm for image tampers localization and recovery[J].Journal of Electronics(China),2008,25(3):343-351.
    [67]Phen-Lan Lin, Chung-Kai Hsieh,Po-Whei Huang. A hierarchical digital watermarking method for image tamper detection[J].Pattern Recognition,2005,38(11):2519-2529.
    [68]和红杰,张家树,陈帆.种高定位精度的可恢复水印算法[J].中国科学E辑:信息科学,2008.4,38(4):315-328.
    [69]郑江滨,冯大淦,张艳宁,等.可恢复的脆弱数字图像水印[J].计算机学报,2004.27(4):371-376.
    [70]Chin-Chen Chang,Yi-Hsuan Fan,Wei-Liang Tai. Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery[J].Pattern Recognition, 2008,41(2):654-661.
    [71]Ming-Shi Wang and Wei-Che Chen,Wei-Liang Tai. A majority-voting based watermarking scheme for color image tamper detection and recovery[J].Computer Standards & Interfaces, 2007,29(5):561-570.
    [72]Hongjie He,Jiashu Zhang,Hengming Tai.Self-recovery fragile watermarking using block-neighborhood tampering characterization[C].In:Proceedings of the 11th International Workshop on Information Hiding,Germany,2009:132-145.
    [73]杨淑莹.模式识别与智能计算-Matlab技术实现[M].北京:电子工业出版社,2008.
    [74]Minqiang Li, Jin Tian,Fuzan Chen.Improving multiclass pattern recognition with a co-evolutionary RBFNN[J].Pattern Recognition Letters,2008,29(4):392-406.
    [75]Zhu Jiang,Yong-Xuan Huang.Parametric calibration of speed-density relationships in mesoscopic traffic simulator with data mining[J]. Information Sciences,2009,179(12):2002-2013.
    [76]Ran-Zan Wang,Yao-De Tsai.An image-hiding method with high hiding capacity based on best-block matching and k-means clustering[J].Pattern Recognition,2007,40(2):398-409.
    [77]蔡亨光,陈建华.基于k-均值算法的数字图像水印技术[J].福州大学学报(自然科学版),2004,32(3):280-284.
    [78]J Han,Kamber M范明,孟小峰,等译.数据挖掘概念与技术[M].北京:机械工业出版社.2006.
    [79]余松煜,张文军,孙军.现代图像信息压缩技术[M].北京:科学出版社,1998.
    [80]Mohan Kankanhalli, Ramakrishnan, Rajmohan.Content based watermarking of images[C]. In:Proceedings of ACM International Conference on Multimedia.1998,61-70.
    [81]MacqB M, Quisquater J J.Cryptology for digital TV broadcasting[J].Proceedings of the IEEE,1995,83(6):944-957.
    [82]Wu Jian-zhen,Xie Jian-ying,Yang Yu-pu.An adaptive blind watermarking scheme utilizing neural network for synchronization [J] Journal of Harbin Institute of Technology, 2007,14(2):281-286.
    [83]Wei-Che Chen and Ming-Shi Wang. A fuzzy c-means clustering-based fragile watermarking scheme for image authentication[J].Expert Systems with Applications,2009,36(2):1300-1307.
    [84]李赵红,侯建军.基于Logistic混沌映射的DCT域脆弱数字水印算法[J].电子学报,2006,34(12):2134-2137.
    [85]Ali Kanso and Nejib Smaoui, Logistic chaotic maps for binary numbers generations[J].Chaos, Solitons and Fractals,2009,40(5):2557-2568.
    [86]M.Holliman,N.Memon.Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes[J].IEEE Trans on Image Proeessing.2000,3(9):432-441.
    [87]Proenca.H,Alexandre.UBIRIS:A noisy iris image database[C].In:Proceedings of the 13th International Conference on Image Analysis and Processing,Italy,2005:970-977.
    [88]R.Storn,K.Price.Differential evolution-a simple and efficient adaptive scheme for global optimization over continuous spaces.Technical report International Computer Science Institute,Berkley,1995.
    [89]K Price.Differential evolution a fast and simple numerical optimizer[C].In:Proceedings of Biennial Conference of the North American Fuzzy Information Processing Society.New York,1996,524-527.
    [90]S Rainer,K Price. Differential evolution-a simple and efficient heuristic for global optimization over continuous spaces[J]Journal of Global Optimization,1997,11(4):341-359.
    [91]K Price.Differential evolution vs.the functions of the 2nd ICEO[C].In:Proceedings of IEEE International Conference on Evolutionary Computation.Indianapolis,1997,153-157.
    [92]Vesterstrom J, Thomsen R. A comparative study of differential evolution, particle swarm optimization and evolutionary algorithms on numerical benchmark problems[C].In:Proceedings of Congress on Evolutionary Computation,2004,1980-2987.
    [93]Tea Robic, Bogdan Filipi.DEMO:Differential evolution for multi-objective optimization[C]. In:Proceedings of the 3rd International Conference on Evolutionary Multi-Criterion Optimization,2005,Page(s):520-533.
    [94]Feng Xue, Sanderson A C, Bonissone P P, Graves R J. Fuzzy logic controlled multi-objective differential evolution[C].In:Proceedings of the 14th IEEE International Conference on Fuzzy Systems,2005,Page(s):720-725.
    [95]Paterlini,Krink.High performance clustering with differential evolution[C].In:Proceedings of IEEE Congress on Evolutionary Computation,2004,Page(s):2004-2011
    [96]Ajith Abraham.Document clustering using differential evolution[C].In:Proceedings of IEEE Congress on Evolutionary Computation,2006,Page(s):1784-1791.
    [97]王钧炎,黄德先.基于差分进化算法和HYSYS机理模型的催化重整过程优化[J].化工学报,2008,59(7):1755-1759.
    [98]王琰,毛志忠,田慧欣,等.基于自适应变异差分进化算法的电弧时域模型[J].仪器仪表学报,2009,30(3):554-558.
    [99]Zhang Hao,Huang Zhanhua,Yu Daoying.Registration of image feature points using differential evolution[J].Optoelectronics Letters,2005,1(1):69-71.
    [100]潘兵,谢惠民.基于差分进化的数字图像相关方法[J].光电子.激光,2007,18(1):100-103.
    [101]Veysel Aslantas.An optimal robust digital image watermarking based on SVD using differential evolution algorithm[J].Optics Communications,2009,282,769-777.
    [102]Yan Xing,Jieqing Tan.Mistakes in the paper entitled "A singular-value decomposition-based image watermarking using genetic algorithm"[J].AEU-Int.Electron. Commun,2010,64:80-81.
    [103]Yongdong Wu.On the security of an SVD-based ownership watermarking[J].IEEE Trans. Multimedia,2005,7(4):624-627.
    [104]Rykaczewski R. Comments on an SVD-based watermarking scheme for protecting rightful ownership[J]. IEEE Trans. Multimedia,2007,9(2):421-423.
    [105]刘波,王凌,金以慧.差分进化算法研究进展[J].控制与决策,2007,22(7):721-729.
    [106]Price V.An introduction to differential evolution[J].New Ideas in Optimization,1999:79-108.
    [107]孙继广.矩阵扰动分析(第二版)[M].北京:科学出版社,2001.
    [108]冯玮.数字图像水印新方法研究[D].硕士学位论文,西安电子科技大学,2009.
    [109]胡谋法,董文娟,王书宏,等.奇异值分解带通滤波背景抑制和去噪[J].电子学报,2008,36(2):111-116.
    [110]董梅,高康林.矩阵奇异值分解和Arnold置乱技术在图像隐藏中的应用[J].山东大学学报(理学版),2005,40(3):71-75.
    [111]Vladimir. Gorodetski,Leonard J.Popyack. SVD-based approach totransparent embedding data into digital images[C[.In:Proceedings of MMM-ACNS 2001,263-274.
    [112]Bao.P.,Ma.X.Image adaptive watermarking using wavelet domain singular value decomposition[J].IEEE Transactions on Circuits and Systems for Video Technology,2005,15(1):96-102.
    [113]李旭东,张振跃.图像双层划分和奇异值分解的数字水印算法[J].浙江大学学报(工学版),2006,40(12):2088-2092.
    [114]骞森,朱剑英.基于奇异值分解的图像质量评价[J].东南大学学报(自然科学版),2006,36(4):643-646.
    [115]严云洋,郭志波,杨静宇.基于多尺度奇异值特征的人脸识别[J].清华大学学报(自然科学版),2008,48(10):1688-1691.
    [116]Chin-chen Chang,Piyu Tsai,Min-Hui Lin.SVD-based digital image watermarking scheme[J]. Pattern Recognition Letter,2005,26(10):1577-1586.
    [117]孔涛张亶Arnold反变换的一种新算法[J].软件学报,2003,15(10):1558-1564.
    [118]B.Watson.:DCT Quantization matrices visually optimized for individual images[J].SPIE: Human Vision,Visual Processing and Digital DisplayⅣ.1993,1913:202-216.
    [119]黄继武,SHI Yun Q,程卫东.DCT域图像水印:嵌入对策和算法[J].电子学报,2000,28(4):57-60.
    [120]陆哲明,姜守达,董寒丽.基于人类视觉系统的自适应水印嵌入算法[J].哈尔滨工业大学学报,2003,35(2):138-141.
    [121]刘宏伟,谢维信,喻建平.基于人类视觉系统的自适应数字水印算法[J].上海交通大学学报,2008,42(7):1144-1148.
    [122]Chin-Shiuh Shieh,Hsiang-Chen Huang,Feng-Hsing Wang et al.Genetic watermarking based on transform-domain techniques[J].Pattern Recognition,2004,37:555-565.
    [123]C.H.Wu,Y.Zheng,W.H.Ip et al. A flexible H.264/AVC compressed video watermarking scheme using particle swarm optimization based dither modulation[J].AEU-Int. J. Electron. Commun,2010, doi:10.1016/j.aeue.2010.02.003.
    [124]Wang Z,Bovik A.C,Sheikh'H.R, and Eero P. Simoncelli, Image quality assessment:from error visibility to structural similarity[J].IEEE Transaction Signal Processing.2004,13(4): 600-612
    [125]Gamperle R, Dmuller S, Koumoutsakos P. A parameter study for differential evolution[C]. In:Proceedings of International Conference on Advances in Intelligent Systems,Fuzzy Systems, Evolutionary Computation,2002,293-298.
    [126]Cheng-Fa Tsai, Wen-Yi Yang. Real-Time color image watermarking based on D-SVD algorithm[C].In:Proceedings of Pacific-Rim Symposium on Image and Video Technology,2007,LNCS vol.4872:289-297.
    [127]孙家广.计算机图形学[M].北京:清华大学出版社,1998.
    [128]Requicha A,Voelcker H.Solid modeling:current status and research directions[J].Computer Graphics and Applications,1983,3(7):25-37.
    [129]J.D.Foley,D.A.Van,S.K.Fainer.Computer graphics principles and practice[M].Second Edition in C,Pearson Education,1996.
    [130]Goldfeather J,Hultquist JPM,Fuchs H.Fast constructive-solid geometry display in the pixel-powers graphics system [C]. In Proceedings of ACM SIGGRAPH Computer Graphics,1986,20(4):107-116.
    [131]Marc A,Johannes B,Daniel C.Computing and rendering point set surfaces[J].IEEE Transactions on Visualization and Computer Graphics,2003,9(1):3-15.
    [132]Pauly M,Keiser R,Kobbelt L.Shape modeling with point-sampled geometry[C]. In:Proceedings of ACM SIGGRAPH International Conference on Computer Graphics and Interactive Techniques,2003:641-650.
    [133]Anders A,Marc A.Ray tracing point set surfaces[C].In:Proceedings of the Shape Modeling International,2003:272.
    [134]Praun E,HoPPeH, Finkelstein A. Robust mesh watermarking[C].In:Proceedings of ACM SIGGRAPH,1999:49-56.
    [135]Ohbuchi R,Masuda H,Aono M. Watermarking three dimensional polygonal models[C].In:Proceedings of ACM Multimedia,1997:261-272.
    [136]Ohbuchi R,Masuda H,Aono M.Embedding data in 3D models[C].In:Proceedings of the European Workshop on Interactive Distributed Multimedia Systems and Tele-communication Services,1997:1-10.
    [137]Ohbuchi R,Masuda H,Aono M.Watermarking three-dimensional polygonal models through geometric and topological modifications[J].IEEE Journal on Selected Areas in Communication,1998,16(4):551-560.
    [138]Ohbuchi R,Masuda H,Aono M.Data embedding algorithms for geometrical and on geometrical targets in three-dimensional polygonal models[J]. Computer Communications,1998,21(15):1344-1354.
    [138]潘志庚,孙树森,李黎.三维模型数字水印综述[J].计算机辅助设计与图形学学报,2006,18(8):1103-1110.
    [139]廖学良,王璃屏.一种新的三维模型水印嵌入空域算法[J].计算机学报,2008,31(10):1848-1856.
    [140]Wang Yuping,Hu Shimin.A new watermarking method for 3D models based on integral invariants[J].IEEE Transactions on Visualization and Computer Graphics,2009,15(2):1-10.
    [141]O.Benedens.Watermarking of 3D polygon based models with robustness against mesh simplification[C].In:Proceedings of SPIE:Security and Watermarking of Multimedia Contents,1999:329-340.
    [142]M.G.Wagner.Robust Watermarking of polygonal meshes[C].In:Proceedings of Geometric Modeling and Processing,Hong Kong,2000:201-208.
    [143]Zhiqiang Yu,Horace H S Ip,L F Kwok.A robust watermarking scheme for 3D triangular mesh models[J].Pattern Recognition,2003,36(11):2603-2614.
    [144]S.Zafeiriou,A.Tefas,I.Pitas.Blind robust watermarking schemes for copyright protection of 3D mesh objects[J].IEEE Transactions on Visualization and Computer Graphics, 2005,11(5):596-607.
    [145]F.Cayre,B.Macq.Data hiding on 3D triangle meshes[J].IEEE Transaction on Signal Processing,2003,51 (4):939-948.
    [146]S.Kanai,H.Date,T.Kishinami.Digital watermark for 3D polygons using multiresolution wavelet decomposition [C]. In Proceedings of International Workshop on Geometric Modeling: Fundamentals and Applications.1998:296-307.
    [147]F.Uccheddu,M.Corsini,M.Barni. Wavelet-Based blind watermarking of 3D models, In:Proceedings of Workshop on Multimedia and Security,2004:143-154.
    [148]谢守江,张鸿宾,刘波.基于小波变换的3维网格水印[J].中国图象图形学报,2006,11(10):1387-1394.
    [149]Jin Jianqiu,Dai Minya,Bao Hujun,Peng Qunsheng.Watermarking on 3D mesh based on spherical wavelet transform[J].Journal of Zhejiang University Science,2004,5(3):251-258.
    [150]R.Ohbuchi,S.Takahashi,T.Miyazawa and A.Mukaiyama.Watermarking 3D polygonal meshes in the mesh spectral domain[C].In:Proceedings of Graphics Interface,Morgan Kaufmann Publishers,2001:9-17.
    [151]Cayre F,Rondao-Alface P,Schmitt F.Application of spectral decomposition to compression and watermarking of 3D triangle mesh geometry [J].Signal Processing,2003,18 (4):309-319.
    [152]Li L, Zhang D, Pan Z, et al.Watermarking 3D mesh by spherical parameterization [J].Computers & Graphics,2004,28(6):981-989.
    [153]K.Murotani,K.Sugihara.New spectral decomposition for 3D polygonal meshes and its application for watermarking[C].In:Proceedings of International Conference in Central Europe on Computer Graphics,Visualization and Computer Vision,2005:95-102.
    [154]Loop C. Smooth subdivision surfaces based on triangles[D].USA:University of Utah,1987.
    [155]Kobbelt L. Sqrt(3)-subdivision[C].In:Proceeding of ACM SIGGRAPH.USA:2000:103-112.
    [156]T.Harte,A.G.Bors. Watermarking graphic objects[C].In:Proceeding of the 14th International Conference on Digital Signal Processing,Hellas,Greece,2002,2:709-712.
    [157]张朝辉,刘文予,郑玉婷,等.局部集的3D模型水印方法[J].中国图象图形学报,2009,14(7):1298-1306.
    [158]Kalivas A,Tefas A, Pitas I. Watermarking of 3D models using principal component analysis[C].In:Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing,2003,New York:676-679.
    [159]王新宇,詹永照.3D模型数字水印研究进展[J].计算机工程与应用,2005,41(27):25-29.
    [160]尹康康,潘志庚,石教英.一种强壮的网格水印算法[J].计算机辅助设计与图形学学报,2001,13(2):102-110.
    [161]刘旺,孙圣和.基于DCT的三维网格模型数字水印算法[J].测试技术学报,2007,21(4):329-335.
    [162]刘旺,赵春晖.三维网格模型盲提取水印算法[J].仪器仪表学报,2009,30(12):2635-2639.
    [163]Woods K.Generating ROC curves for artificial neural networks[J].IEEE Transactions on medical imaging,1997,16 (3):329-337.
    [164]A.Khodakovsky,P.Schroder,W.Sweldens.Progressive geometry compression[C].In: proceedings of ACM SIGGRAPH,USA,2000:271-278.
    [165]孙树森.三维模型数字水印技术及防重构技术研究[D].博士学位论文,浙江大学,2006.
    [166]张朝辉.三维网格模型数字水印方法研究[D].硕士学位论文,华中科技大学,2008.
    [167]苏步青,胡和生,沈纯理等.微分几何[M].北京:高等教育出版社,1979.
    [168]方慧兰,王国瑾.三角网格曲面上离散曲率估算方法的比较与分析[J].计算机辅助设计与图形学学报,2005,17(11):2500-2507.
    [169]Petitjean S. A survey of methods for recovering quadrics in triangle meshes[J].ACM Comput Surv,2002,34(2):211-262.
    [170]Sander P T, Zucker S W. Inferring surface trace and differential structure from 3-D images [J].IEEE Trans Pattern Anal MachIntell,1990,12(9):833-854.
    [171]Goldfeather J, Interrante V. A novel cubic-order algorithm for approximating principal direction vectors [J]. ACM Trans Graph,2004,23(1):45-63.
    [172]Theisel H, Rossl C, Zayer R. Normal based estimation of the curvature tensor for triangular meshes[C].In:Proceeding of the 12th Pacific Conference Computer Graphics and Applications,Washington,2004.288-297.
    [173]Do Carmo M. Differential geometry of curves and surfaces[M].London:Prentice-Hall,1976.
    [174]沈庆云,范彦斌,沈自林,等.一种Trimmed曲面的半自适应立三方法[J].航空学报,2001,22(3):240-243.
    [175]神会存,周来水.基于离散曲率计算的三角网格模型优化调整[J].航空学报,2006,27(2):318-324.
    [176]Moreton H P, Sequin C H. Functional optimization for fair surface design[C]. In:Proceeding of 19th ACM Annual Conference on Computer Graphics and Interactive Techniques,1992,New York:167-17.
    [177]Taubin G, Kobbelt L.Geometric signal processing on large polygonal meshes[C]. In: Proceeding of ACM Conference on Computer Graphics,2001,Log Angeles:Course 17.
    [178]S.Petitjean.A survey of methods for recovering quadrics in triangle meshes[J].ACM Computing Surveys,2002,34(2):211-262.
    [179]D.Cohen-Steiner,J.-M.Morvan. Restricted delaunay triangulations and normal cycle[C]. In: Proceeding of 19th ACM Annual Symposium in Computational Geometry,2003,San Diego:237-246.
    [180]Ashourian M, Enteshary R. A new masking method for spatial domain watermarking of three-dimensional triangle meshes[C].In:Proceeding of IEEE Conference on Convergent Technologies for the Asia-Pacific Region,2003,Bangalore:428-431.
    [181]Dazhi Han, Xingqiang Yang,Caiming Zhang.A novel robust 3D mesh watermarking ensuring the human visual system[C].In:Proceeding of Second International Workshop on Knowledge Discovery and Data Ming,2009:705-709.
    [182]Guillaume Lavoue.A local roughness measure for 3D meshes and its application to visual masking[J].ACM Transactions on Applied Perception,2009,5(4):21:1-21:23.
    [183]P.Rondao Alface,B.Macq.Blind watermarking of 3D meshes using robust feature points detection[C].In:Proceeding of IEEE Conference on Image Processing,2005,Italy:693-696.
    [184]赵静,周明全.一种适用于数字考古的三维数字水印算法[J].计算机应用,2004,24(12):92-96.
    [185]Besl P J, McKay N D.A method for registration of 3-D shape[J].IEEE Transaction on Pattern Analysis and Machine Intelligence,1992,14(2):239-256.
    [186]Jerome Maillot, Hussein Yahia, Anne Verroust. Interactive texture mapping[C].In: Proceedings of 20th ACM Annual Conference on Computer Graphics and Interactive Techniques,1993,Anaheim:27-34.
    [187]Guillaume Lavoue, E. D. Gelasca, F. Dupont,et al. Perceptually driven 3D distance metrics with application to watermarking[J].SPIE Electronic Imaging,2006,5(4):21:1-21:23.
    [188]Kai Wang,Guillaume Lavoue, Florence Denis,et al.Hierarchical watermarking of semiregular meshes based on wavelet transform [J]. IEEE Transaction on Information Forensics and Security,2008,3(4):620-634.
    [189]周听.三维几何模型数字水印技术及算法研究[D].硕十学位论文,浙江大学,2002.
    [190]Zhen Li,Zhe-Ming Lu,Wei-Min Zheng. A robust geometry-based watermarking scheme for 3D meshes [C].In:Proceedings of IEEE International Conference on Innovative Computing, Information and Control,2006,253-256.
    [191]张静,郑国勤.基于几何特征的三维网格数字水印算法[J].计算机辅助设计与图形学学报,2005,17(4):739-747.
    [192]刘辉,胡敏.基于几何特征的鲁棒三维网格数字水印算法[J].计算机工程与应用,2009,45(9):98-101.
    [193]刘旺,孙圣和.基于DFT的鲁棒三维网格模型数字水印算法[J].计算机工程与应用,2006,42(14):192-196.
    [194]王向阳,陈利科.一种新的自适应半脆弱水印算法[J].自动化学报,2007,33(4):361-366.
    [195]刘振亚.特高压电网[M].北京:中国经济出版社,2005:1-109.
    [196]舒应彪,张文亮.特高压输电若干关键技术研究[J].中国电机工程学报,2007,27(31):1-6.
    [197]Kai Wang, Guillaume Lavoue, Florence Denis,et al. Hierarchical blind watermarking of 3D triangular meshes[C].In:Proceedings of IEEE International Conference on Multimedia and Expo,2007,1235-1238.
    [198]温泉,孙锬锋,王树勋.零水印的概念与应用[J].电子学报,2003,31(2):214-216.
    [199]林洪文,涂丹,李国辉.基于统计背景模型的运动目标检测方法[J].计算机工程,2003,29(16):97-99.
    [200]赵怀勋,王丽娜,季称利.基于零水印和认证水印的双水印方案[J].计算机工程,2006,7(22):48-51.
    [201]胡裕峰,朱善安.基于PCA和混沌置乱的零水印算法[J].浙江大学学报(工学版),2008,42(4):593-597.
    [202]Ning Chen, Jie Zhu. A robust zero-watermarking algorithm for audio[J].EURASIP Journal on Advances in Signal Processing.2008,Volume2008,Article ID:453580.
    [203]吴翔,杨晓元,张敏情,等.基于逼近信号特征抗MP3攻击的音频零水印[J].计算机工程,2009,35(7):147-149.
    [204]张君瑾.三维网格模型的零水印算法研究[D].硕士学位论文,天津大学,2008.
    [205]徐涛,张艳宁.三维网格模型零水印技术[J].吉林大学学报(工学版),2007,37(4):901-904.
    [206]徐涛,张艳宁,孙瑾秋,等.基于几何特征的3维网格模型零水印算法[J].中国图象图形学报,2009,14(9):1819-1824.
    [207]王新宇.三维网格模型数字水印算法研究[D].硕士学位论文,江苏大学,2006.
    [208]孙媛媛,胡敏.一种三维网格模型零水印算法[J].微电子学与计算机,2010,27(3):170-176.
    [209]齐越,舒军,沈旭昆,等.一种基于八叉树的三维网格盲水印算法[J].北京航空航天大学学报,2008,34(3):331-335.
    [210]王颖,郑雪峰,刘海燕.一种鲁棒的三维水印方案[J].计算机科学,2009,36(6):262-264.
    [211]Karni Zachi,Gotsman Craig.Spectral compression of mesh geometry[C].In:Proceedings of SIGGRAPH 2000. New Orleans,USA:ACM,2000,279-286.
    [212]邓绍江,王方晓,张岱固,等.基于直方图量化和混沌系统的感知图像Hashing算法[J].计算机应用,2008,28(11):2804-2807.
    [213]李旭东.评价数字水印相似程度的公式分析及改进[J].自动化学报,2008,34(2):208-210.
    [214]Khaled Tarmissi,A.Ben Hamza.Information-theoretic hashing of 3D objects using spectral graph theory[J].Expert System with Application,2009,36(5):9409-9414.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700