鲁棒性数字图像与视频水印算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
计算机和网络技术的快速发展极大地便利了数字多媒体数据的生成、存储和传播,提高了信息利用的效率,但与此同时也带来了知识产权保护方面的隐患。因此,迫切需要一种能有效保护个人权益的技术。在这种背景下,数字水印技术凸显出其重要作用。
     数字水印技术是信息隐藏技术一个极其重要的分支,通过在多媒体内容如图像、视频等中嵌入特定信息达到产权保护的目的,而且已经被扩展应用于多个领域。数字水印技术的技术要求较多,其中鲁棒性是非常关键的指标,然而,目前鲁棒性数字图像与视频水印技术还未得到充分的研究,有很多技术方面的难题亟待解决,给研究工作带来了挑战和机遇。
     本文主要围绕鲁棒性数字图像与视频水印算法的关键技术进行展开。文中针对抗信号处理攻击的鲁棒性数字图像水印算法、抗几何攻击的鲁棒性数字图像水印算法、抗共谋攻击的鲁棒性数字视频水印算法以及抗空时攻击的鲁棒性数字视频水印算法等进行阐述和研究。
     本文的研究工作及主要贡献如下:
     (1)提出了基于Contourlet变换和SVD的联合域抗信号处理攻击的鲁棒性图像水印算法
     Contourlet变换具有良好的多方向性和多尺度性,可以稀疏表达纹理和亮度信息。传统的Contourlet域水印算法没有很好的结合宿主载体的自身特性,影响了算法整体性能。而图像的奇异值分解(Singular Value Decomposition, SVD)体现了其内容的内在稳定性不随一般信号处理的操作而发生重大变化,有利于增强水印系统的抗信号处理攻击能力。根据Contourlet变换系数的能量值区分宿主的纹理性,并选取方向子带作为水印嵌入区域。图像在Arnold置乱后,由其中最大的若干个Contourlet系数构建矩阵,并对其进行SVD。结合人类视觉系统(Human Visual System, HVS)特性,采用自适应的嵌入强度,水印被嵌入到其奇异值中。水印信息在Contourlet逆变换中影响到低频子带,使水印分布到整个载体的高频和低频区域。实验结果表明,该算法获得了良好的视觉不可感知性和抵抗滤波、JPEG压缩等信号处理攻击的鲁棒性。
     (2)提出了基于Harris特征点的抗几何攻击的鲁棒性图像水印算法
     基于空间特征点可以增强图像水印的鲁棒性的思想,提出了一种基于离散余弦变换(Discrete Cosine Transform, DCT)域Harris特征点的图像水印算法。检测Harris特征点作为待选嵌入参考点,搜索其邻域确定具有最大响应值的特征点作为局部最稳定的Harris特征点,并形成方形特征区域,选取具有最大响应值的非重叠特征区域作为嵌入区域。利用改进的奇偶量化方法将水印嵌入到ZigZag扫描后的中频系数中。实验结果表明,本算法确保了较高的峰值信噪比(Peak Signal Noise Ratio, PSNR),而且对旋转、缩放等几何攻击具有鲁棒性。
     (3)提出了基于空时域HVS和STDM的抗共谋攻击的鲁棒性视频水印算法
     帧内共谋攻击是视频水印系统经常遇到的攻击类型。传统的扩展变换抖动调制(Spread Transform Dither Modulation, STDM)基于固定量化步长,不能充分利用视频内容特征,抵抗共谋攻击的能力较差。空时联合域的掩蔽效应可以表征人眼在时间和空间方面的感知冗余,对于低于掩蔽值的视频内容,人眼通常不敏感。空时掩蔽模型不仅采用了空间对比度敏感函数、亮度掩蔽函数、对比度掩蔽函数,而且采用了时间的掩蔽函数来解释人眼对快速运动和低速运动对象的感知能力。建立了空时域的HVS模型,确定了模型参数,进而确定了自适应的STDM量化步长。实验结果表明,本算法不仅保证了较高的PSNR,而且改善了算法抵抗时间共谋攻击的鲁棒性。
     (4)提出了基于3维SIFP的抗空时攻击的鲁棒性视频水印算法
     空时特征点代表了视频中重大的变化,在空间和时间攻击下不会发生很大改变,因此,可以用于改善视频水印算法的鲁棒性。提出了基于尺度不变特征点(Scale Invariant Feature Points, SIFP)的视频水印算法。构造了3维高斯金字塔体,并依据扩展的Hessian矩阵,提出了3维SIFP的检测方法,检测的特征点表征了三维体内的尺度不变点,而且体现了空时联合域内重大变化的内在特征。以该特征点为中心生成方形区域,该区域被转换到DCT-SVD联合域内,通过修改最大奇异值的范数将水印嵌入到分段的中频系数中。实验结果表明,该算法没有明显降低视觉质量,而且在抵抗空时域内各种攻击方面更加鲁棒,包括时间域的帧操作以及空域的缩放、JPEG压缩等。
     综上所述,本文以提高数字图像与视频水印算法的鲁棒性为核心,系统地研究了数字图像与视频水印中抗信号处理攻击的鲁棒性、抗几何攻击的鲁棒性、抗共谋攻击的鲁棒性、抗空时攻击的鲁棒性等关键问题。通过鲁棒性水印算法关键问题的理论建模及分析,提出了相应的解决方案,并通过仿真验证了本文算法的性能。基于以上解决方案,可以有效地改善现有数字图像与视频水印算法的鲁棒性问题。本文的研究工作对于进一步开展面向不同业务需求的鲁棒性数字图像与视频水印算法研究提供了基础,对于数字水印技术的研究发展和实际应用具有积极的推动作用。
The rapid development of computer and network technology has greatly facilitated the generation, storage and transmission of digital multimedia data, improved the efficiency of the use of the information, but at the same time, it also brings out intellectual property protection risks. Therefore, it is urgent to need a technology which can effectively protect the rights of individuals. Under this background, the digital watermarking technology highlights the important role.
     Digital watermarking technology is a very important branch of information hiding technology, in which specific information is embedded into multimedia contents such as images, videos, etc. to protect the property rights. It has been widely applied in many fields. There are many technical requirements for the digital watermarking technology and robustness is one of the most critical factors. However, robust digital image and video watermarking technique have not been researched sufficiently. There are many technical puzzles to be solved, which brings the challenges and opportunities to the researchers.
     This paper mainly focuses on the key technologies of robust digital image and video watermarking algorithm. Robust digital image watermarking algorithm against signal processing attacks, robust digital image watermarking algorithm against geometric attacks, robust digital video watermarking algorithm against collusion attacks and robust digital video watermarking algorithm against spatio-temporal attacks have been described and researched extensively.
     In this paper, the research work and the main contributions are as follows:
     (1) The robust image watermarking algorithm based on the Contourlet Transform and SVD against signal processing attacks is proposed.
     Contourlet transform has good performance in multi-direction and multi-scale, and can sparsely express the texture and luminance information. Conventional watermarking algorithms in Contourlet domain are not well combined with the internal characteristics of the host, which decreases the overall performance of the algorithm. On the other hand, the SVD (Singular Value Decomposition) of image reflects the inherent stability of content, and does not change significantly with the operation of general signal processing, which is beneficial to enhance the anti-signal processing attacks capability of the watermarking system. According to the energy distribution in the host, texture is classified. As a result, the specific directional subband in Contourlet domain is selected as the watermark embedding region. After the Arnold scrambling, the matrix built by several larger Contourlet coefficients is decomposed by SVD. Combined with HVS (Human Visual System), the adaptive embedding strength factor is adopted and the watermark is embedded into the host by modifying the singular value. Due to the influence of inverse Contourlet transform of the watermark to low-frequency band, the watermark spreads throughout the range from the high-frequency to the low-frequency. The experimental results show that the proposed scheme guarantees the high visual imperceptibility and robustness against the signal processing attacks including filtering, JPEG compression, etc.
     (2) The robust image watermarking algorithm based on Harris feature points against geometric attacks is proposed.
     A novel image watermarking algorithm based on Harris feature points in DCT (Discrete Cosine Transform) domain is proposed, due to the idea that the spatial feature points can enhance the robustness of image watermarking scheme. Each detected Harris feature point is considered as the candidate embedded reference, and we search its neighborhoods to determine the feature point with the maximum response value as the local most stable feature point, and generate the square feature region, where the non-overlapping feature region with the maximum response value is selected as the embedded region. Modified odd-even quantization method is applied to embed the watermark into the ZigZag scanned mid-frequency coefficients. The experimental results show that the proposed scheme ensures the high PSNR (Peak Signal Noise Ratio), and is robust against geometric attacks such as rotation, scaling, etc.
     (3) The robust video watermarking algorithm based on space-time HVS and STDM against collusion attacks is proposed.
     Collusion attacks are one of the most common types that video watermarking system encounters. Conversional STDM (Spread Transform Dither Modulation) is based on fix-length quantization step, which do not exploit content characteristics of video sufficiently. As a result, the robustness against collusion attacks is relatively weak. Spatio-temporal masking represents visual perceptual redundancies under which human eyes are usually not sensitive. We adopts not only the spatial CSF (contrast sensitivity function), the luminance masking function, the contrast masking function but also the spatio-temporal masking function to account for the model of human eyes to rapid motion and the slow motion in the video, establishes the HVS in the spatio-temporal domain, determines the parameters and the adaptive embedding strength factor and quantization step for STDM. Experimental results show that the proposed scheme guarantees high PSNR and improves the robustness against collusion attacks.
     (4) The robust video watermarking algorithm based on3-dimensional SIFP against spatio-temporal attacks is proposed.
     Spatio-temporal feature points represent the great variation in the video, and do not change significantly under spatial and temporal attacks. Therefore, they can be used to improve the robustness of the video watermarking algorithm. The video watermarking scheme based on3-dimensional SIFP (Scale Invariant Feature Points) is proposed. We construct a3-dimensional Gaussian pyramid cube, and in accordance with the extended Hessian matrix, the3-dimensional SIFP detection method is presented, where detected feature points embody not only the scale invariant points, but also reflect the intrinsic characteristics of the significant change in the joint spatio-temporal domain. The feature points are considered as the center to generate the square region. The region is transformed into DCT-SVD domain, and the watermark information is embedded into the segmented mid-frequency coefficients by modifying the norm of the maximum singular value. The experimental results show that the algorithm does not significantly reduce the visual quality, but also is more robust against the variety of attacks, including the frame operations in temporal domain and scaling, JPEG compression in spatial domain.
     In summary, the target of the dissertation is to improve the robustness of the digital image and video watermarking algorithm. The key issues such as the robustness against signal processing attacks, robustness against geometric attacks, robustness against collusion attacks and robustness against spatio-temporal attacks are researched in detail. By modeling and analyzing of the key problems in robust digital image and video watermarking scheme, corresponding solutions are put forward, and the performance are verified through the simulation results. Based on the above solutions, the robustness in existed watermarking schemes can be improved. The research of this dissertation provides a basis for the further research of robust digital image and video watermarking scheme in the different business requirements environments and plays a positive role in promoting the development and practical application of digital watermarking technology.
引文
[1]Stefan Katzenbeisser, Fabien A. P. Petitcolas著.吴秋新,钮心忻,杨义先等译.信息隐藏技术一一隐写术与数字水印.北京:人民邮电出版社,2001,pp.4-15.
    [2]Tirkel A. Z., Rankin G. A., Van Schyndel R. M. et al., "Electronic watermark", Digital Image Computing, Technology and Applications (DICTA'93).1993, pp. 666-673.
    [3]Van Schyndel R. G., Tirkel A. Z., Osborne C. F., "A digital watermark", In Proceedings of the IEEE International Conference on Image Processing,1994,2, pp.86-90.
    [4]Matsui K, Tanaka K., "Video-steganography:How to secretly embed a signature in a picture", IMA Intellectual Property Project Proceedings,1994,1(1), pp. 187-205.
    [5]Cox I. J., Kilian J., Leighton F. T., et al., "Secure spread spectrum watermarking for multimedia", IEEE Transactions on Image Processing,6(12), Dec.1997, pp. 1673-1687.
    [6]Kundur D, Hatzinakos D., "Digital watermarking for telltale tamper-proofing and authentication", In Proceedings of the IEEE,87(7), Jul.1999, pp.1167-1180.
    [7]G. Doerr, J.-L. Dugelay., "A guide tour of video watermarking", Signal Processing:Image Communication,18(4), Apr.2003, pp.263-282.
    [8]刘瑞祯,谭铁牛.基于奇异值分解的数字图像水印算法.电子学报.29(2),2001.2,pp.168-171.
    [9]陆哲明,姜守达,董寒丽.基于人类视觉系统的自适应水印嵌入算法.哈尔滨工业大学学报(自然科学版).35(2),2003.2,pp.138-141.
    [10]牛少彰,钮心忻,杨义先等.半色调图像中数据隐藏算法.电子学报.32(7),2004.7,pp.1180-1183.
    [11]ZhangX, WangS, "Efficient steganographic embedding by exploiting modification direction", IEEE Communications Letters,10(11), Nov.2006, pp. 781-783.
    [12]李春,黄继武.一种抗JPEG压缩的半脆弱图像水印算法.软件学报.17(2),2006.2,pp.315-324.
    [13]王向阳,陈利科.一种新的自适应半脆弱水印算法.自动化学报.33(4),2007.4,pp.361-366.
    [14]桑茂栋,赵耀.抵抗几何攻击的数字图像水印.电子与信息学报.26(12),2004.12,pp.1875-1881.
    [15]凌贺飞,卢正鼎,邹复好等.基于watson视觉感知模型的能量调制水印算法.软件学报.17(5),2006.5,pp.1124-1133.
    [16]李海峰,宋巍巍,王树勋.基于contourlet变换的稳健性图像水印算法.通信学报.27(4),2006.4,pp.87-94.
    [17]楼偶俊,王相海,王钲旋.抗几何攻击的量化鲁棒视频水印技术研究.计算机研究与发展.44(7),2007.7,pp.1211-1218.
    [18]徐达文,王让定,鲍吉龙.小波变换域互补鲁棒性视频多水印算法.光电工程.34(9),2007.9,pp.41-45.
    [19]Al-Otum H A, Al-Taba'a A O, "Adaptive color image watermarking based on a modified improved pixel-wise masking technique", Computers & Electrical Engineering,35(5), May.2009, pp.673-695.
    [20]Xinbo Gao, Lingling An, Yuan Yuan, "Lossless Data Embedding Using Generalized Statistical Quantity Histogram", IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY,21(8), Aug.2011, pp.1061-1070.
    [21]Jayalakshmi M, Merchant S N, Desai U B, "Digital watermarking in contourlet domain", Pattern Recognition,2006, ICPR 2006,18th International Conference on. IEEE,2006,3, pp.861-864.
    [22]Bas P, Chassery J M, Macq B, "Geometrically invariant watermarking using feature points", IEEE Transactions on Image Processing,11(9), Sep.2002, pp. 1014-1028.
    [23]李雷达,郭宝龙,表金峰.基于奇偶量化的空域抗几何攻击图像水印算法.电子与信息学报.31(1),2009.1,pp.134-138.
    [24]张翼,唐向宏.基于图像归一化的抗几何攻击水印技术.电路与系统学报.14(6),2009.12,pp.54-58.
    [25]景丽,肖慧敏.基于SIFT特征的小波域数字图像鲁棒水印方法.计算机应用研究.26(2),2009.2,pp.766-774.
    [26]楼偶俊,王钲旋.基于特征点模板的Contourlet域抗几何攻击水印算法研究.计算机学报.32(2),2009.2,pp.308-317.
    [27]Y. T. Lin, C. Y. Huang, G. C. Lee, "Rotation, scaling, and translation resilient watermarking for images", IET Image Processing,,5(4), Apr.2011, pp.328-340.
    [28]Nasir, F. Khelifi, J. Jiang et al., "Robust image watermarking via geometrically invariant feature points and image normalization", IET Image Processing,6(4), Apr.2012, pp.354-363.
    [29]綦科,谢冬青.基于第二代Bandelet变换的抗几何攻击图像水印.自动化学报.38(10),2012.10,pp.1646-1653.
    [30]Hartung F, Girod B., "Watermarking of uncompressed and compressed video", Signal Processing:Special issue on copyright protection and access control for multimedia services,66(3), Mar.1998, pp.283-301.
    [31]Swanson M. D., Zhu Bin, Ahmed H. Tewfik, "Multiresolution scene-based video watermarking using perceptual models", IEEE Journal on Selected Areas in CommunicatioNs,16(4), Apr.1998, pp.540-550.
    [32]Alper Koz, A. Aydin Alatan, Oblivious Spatio-Temporal Watermarking of Digital Video by Exploiting the Human Visual System, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY,18(3), Mar.2008, pp.326-337.
    [33]Young-Yoon Lee, Sang-Uk Park, Chang-Su Kim et al., "Temporal Feature Modulation for Video Watermarking", IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY,19(4), Apr.2009, pp.603-608.
    [34]Karen Su, Deepa Kundur, Dimitrios Hatzinakos, "Spatially Localized Image-Dependent Watermarking for Statistical Invisibility and Collusion Resistance", IEEE TRANSACTIONS ON MULTIMEDIA,7(1), Jan.2005, pp. 52-66.
    [35]刘绍辉,韩路,姚鸿勋.抗共谋攻击的视频水印算法.通信学报.31(1),2010.1,pp.14-19.
    [36]Mauro Barni, Franco Bartolini, Alessia De Rosa et al., "Optimum Decoding and Detection of Multiplicative Watermarks", IEEE TRANSACTIONS ON SIGNAL PROCESSING,51(4), Apr.2003, pp.1118-1123.
    [37]Yong Bian, Steve Liang, "Locally Optimal Detection of Image Watermarks in the Wavelet Domain Using Bessel K Form Distribution", IEEE TRANSACTIONS ON IMAGE PROCESSING,22(6), Jun.2013, pp.2372-2384.
    [38]凌洁,刘琚,孙建德等.基于视觉模型的迭代AQIM水印算法.电子学报.38(1),2010.1,pp.151-155.
    [39]赵耀.基于小波变换的抵抗几何攻击的鲁棒视频水印.中国科学E辑信息科学.36(2),2006.2,pp.137-152.
    [40]李静,结合Harris检测与仿射变换的视频水印新方案.华北电力大学学报.38(2),2011.3,pp.95-107.
    [41]同鸣,许婷,张建龙.一种抵抗几何攻击的视频低维流形双水印方法.西安电子科技大学学报.38(3),2011.6,pp.13-19.
    [42]Lei-Da LI, Bao-Long GUO, Jeng-Shyang PAN, "Video Watermarking by Space-Time Interest Points", IEICE TRANS. FUNCAMENTALS, E91-A(8), Aug.2008, pp.2252-2256.
    [1]DO M. N., VETTERLI M., "Contourlets:a directional multiresolution imge representation", In Proc ICIP,2002, pp.357-360.
    [2]刘瑞祯,谭铁牛.数字图像水印研究综述.通信学报.21(8),2000.8,pp.39-48.
    [3]张家树,田蕾.一种新的基于密钥的混沌数字水印方法.通信学报.25(8),2004.8,pp.96-101.
    [4]李海峰.基于Contourlet变换的稳健性图像水印算法.通信学报.27(4),2006.4,pp.87-94.
    [5]A. Briassouli, M. G. Strintzis, "Locally optimum nonlinearities for DCT watermark detection", IEEE Trans. on Image Processing,13(12), Dec.2004, pp. 1604-1617.
    [6]Hongbo BI, Xueming LI, Yubo ZHANG et al., "A robust CT-SVD composite watermarking scheme", Journal of Computational Information System,6(3), Mar. 2010, pp.873-880.
    [7]Hongbo BI, Xueming LI, Yubo ZHANG et al., "A Blind Robust Watermarking Scheme Based on CT and SVD", International Conference on Signal Processing, Beijing, China, Beijing,2010, pp.881-884.
    [8]焦李成,谭山.图像的多尺度几何分析:回顾和展望.电子学报.31(12A),2003.12,pp.1975-1981.
    [9]D. L. Donoho, "Wedgelets:Nearly-minimax Estimation of Edges", Ann. Statist., 1999,27, pp.859-897.
    [10]E. J. Candes, D. L. Donoho, "Ridgelets:a Key to Higher-Demensional Intermittency", Phil. Trans. R. Soc. Lond. A.,1999, pp.2495-2509.
    [11]隆刚,肖磊,陈学俭.Curvelet变换在图像处理中的应用综述.计算机研究与发展.42(8),2005.8,pp.1331-1337.
    [12]Starck J L, Candes E, Donoho D. L., "The Curvelet Transform for Image Denoising", IEEE Trans. Image Processing,11(6), Jun.2002, pp.670-684.
    [13]M. N. Do, M. Vetterli, "The Finite Ridgelet Transform for Image Representation", IEEE Trans, on Image Processing,12(1), Jan.2003, pp.16-28.
    [14]E. J. Candes, D. L. Donoho, "Curvelet-A surpisingly effective non-adaptive representation for objects with edges", In:Curves and Surfaces. Nashville, TN: Vanderbilt Univ. Press,2000, pp.105-120.
    [15]焦李成,谭山,刘芳.脊波理论:从脊波变换到Curvelet变换.工程数学学报.22(5),2005.5,pp.761-773.
    [16]M. N. Do, M. Vetterli, "The Contourlet transform:an efficient directional multiresolution image representation", IEEE Trans. On Image Processing,14(6), Jun.2005, pp.760-769.
    [17]ESLAMI R, HAYDER R. "On low bit-rate coding using the contourlet transform", In Proceedings of the Thirty-Seventh Asilomar Conference on Signals, Systems and Computers,2003, pp.1524-1528.
    [18]颜小虎.基于H.264和JND模型的视频水印研究.广东,华南理工大学,2010.
    [19]潘良刚.基于人类视觉系统的小波域自适应图像水印算法研究.湖北,华中科技大学,2008.
    [20]江东明.视觉模型在JPEG2000中的应用研究.计算机工程.29(4),2003.4,pp.130-133.
    [21]陈斌.视觉掩蔽研究现状及展望.心理科学进展.17(6),2009.6,pp.1146-1155.
    [22]D. H. Kelly, "Motion and vision. II. Stabilized spatio-temporal threshold surface", J. Opt. Soc. Am.,69(10), Oct.1979, pp.1340-1349.
    [23]连凤宗.JND模型及其在视频编码中的应用.黑龙江,哈尔滨工业大学,2011.
    [24]王睿智.基于人类视觉系统的Contourlet域数字水印算法研究.陕西,西安电子科技大学,2012.
    [25]C.-H. Chou, Y.-C. Li, "A perceptual tuned subband image coder based on the measure of just-noticeable-distortion profile", IEEE Trans. Circuits Syst. Video Technol.,5(6), Dec.1995, pp.467-476.
    [26]Y.-J. Chin, T. Berger, "A software-only video codec using pixel wise conditional differential replenishment and perceptual enhancements", IEEE Trans. Circuits Syst. Video Technol.,9(3), Apr.1999, pp.438-450.
    [27]A. B. Watson, "DCTune:A technique for visual optimization of DCT quantization matrices for individual images", In Soc. Inf. Display Dig. Tech. Papers XXIV,1993, pp.946-949.
    [28]C. I. Podilchuk, W. Zeng, "Image-adaptive watermarking using visual models", IEEE J. Sel. Areas Commun.,16(5), May.1998, pp.525-539.
    [29]Barni M, Bartolini F, Piva A, "Improved wavelet based watetmarking through pixel wise masking", IEEE Transactions on Image processing,10(5), May.2001, pp.783-79.
    [30]肖尚勤.鲁棒数字水印算法研究.湖北,华中科技大学.2008.
    [31]Shao-min Zhu, Jian-ming Liu, "A Novel Blind Watermarking Scheme in Contourlet Domain Based on Singular Value Decomposition", Second International Workshop on Knowledge Discovery and Data Mining,2009, pp. 672-675.
    [1]M. Kutter, S. K. Bhattacharjee, T. Ebrahimi, "Towards Second Generation Watermarking Schemes", In Proceedings of International Conference on Image Processing,1999, (1), pp.320-323.
    [2]C. Harris, M. Stephens, "A Combined Corner and Edge Detector," In Proceedings of the 4th Alvey Vision Conference,1988, pp.147-151.
    [3]S.M. Smith, J.M. Brady, "SUSAN-A New Approach to Low Level Image Processing," International Journal of Computer Vision,23(1), Jan.1997, pp. 45-78.
    [4]Ivan Laptev, Tony Lindeberg, "Interest point detection and scale selection in space-time", Scale-Space'03,2003,2695, pp.372-387.
    [5]D.G. Lowe, "Distinctive Image Features from Scale-invariant Keypoints", International Journal of Computer Vision,60(2), Feb.2004, pp.91-110.
    [6]P. Scovanner, S. Ali, M. Shah, "A 3-dimensional SIFT descriptor and its application to action recognition", In ACM International Conference on Multimedia,2007, pp.357-360.
    [7]D. Ni, Y. Chui, Y. Qu, et al., "Reconstruction of volumetric ultrasound panorama based on improved 3D SIFT", Computerized Medical Imaging and Graphics, 33(7), Jul.2009, pp.559-566.
    [8]Greg Flitton, Toby P. Breckon, Najla Megherbi, "Object Recognition using 3D SIFT in Complex CT Volumes", BMVC 2010,2010, pp.1-12.
    [9]Yubo ZHANG, Hongbo BI, Haiyan ZHANG, "Robust Watermarking Scheme by Harris Interest Regions", Journal of Computational Information Systems,8(20), May.2012, pp.8421-8429.
    [10]刘九芬,黄达人,黄继武.图像水印抗几何攻击研究综述.电子与信息学报.26(9),2004.9,pp.1495-1503.
    [11]Pereira S, Pun T, "Robust template matching for affine resistant image watermarks", IEEE Trans Image Process,9(6), Jun.2000, pp.1123-1129.
    [12]V. Licks, R. Jordan, "Geometric attacks on image watermarking systems," IEEE Multimedia,12(3), Mar.2005, pp.68-78.
    [13]D. Zheng, Y. Liu, J. Zhao et al., "A Survey of RST Invariant Image Watermarking Algorithms," ACM Computing Surveys,39(2), Feb.2007, pp. 1-91.
    [14]A. Nikolaidis, I. Pitas, "A Robust Feature-Based Technique for Watermarking Frontal Face Images", In Proceedings of IEEE-EURASIP Workshop on Nonlinear Signal and Image Processing,1999,1, pp.341-345.
    [15]Lin CY, Wu M, Bloom JA, "Rotation, scale, and translation resilient watermarking of images", IEEE Trans Image Process,10(5), May.2001, pp. 767-782.
    [16]P. Bas, J.M. Chassery, B. Macq, "Geometrically Invariant Watermarking Using Feature Points", IEEE Transactions on Image Processing,11(9), Sep.2002, pp. 1014-1028.
    [17]C.W. Tang, H.M. Hang, "A Feature-based Robust Digital Image Watermarking Scheme", IEEE Transactions on Signal Processing,51(4), Apr.2003, pp. 950-959.
    [18]Alghoniemy M, Tewfik AH, "Geometric invariance in image watermarking", IEEE Trans Image Process,13(2), Feb.2004, pp.145-153.
    [19]邓峰森,王炳锡.基于特征点的抗几何失真数字图像水印.信号处理.21(1),2005.1,pp.12-16.
    [20]C. Jin, "Affine Invariant Watermarking Algorithm Using Feature Matching", Digital Signal Processing,16(3), Mar.2006, pp.247-254.
    [21]J.S. Seo, C.D. Yoo, "Image Watermarking Based on Invariant Regions of Scale-Space Representation", IEEE Transactions on Signal Processing,54(4), Apr.2006, pp.1537-1549.
    [22]H.Y. Lee, H.S. Kim, H.K. Lee, "Robust Image Watermarking Using Local Invariant Features," Optical Engineering,45(3), Mar.2006, pp.1-11.
    [23]X.J. Qi, J. Qi, "A Robust Content-based Digital Image Watermarking Scheme", Signal Processing,87(6), Jun.2007, pp.1264-1280.
    [24]王向阳,侯丽敏,邬俊.基于图像特征点的强鲁棒数字水印嵌入方案.自动化学报.34(1),2008.1,pp.1-6.
    [25]X.Y. Wang, L.M. Hou, and J. Wu. "A Feature-based Image Watermarking Scheme Robust to Geometric Attacks," Image and Vision Computing,26(7), Jul. 2008, pp.980-989.
    [26]LI Chuan-mu, HONG Lian-xi, WAN Chun, "An image watermarking scheme robust to geometric distortion based on SIFT feature", Journal of Optoelectronics Laser,20(6), Jun.2009, pp.802-806.
    [27]李雷达.数字水印抗几何攻击理论及应用研究.陕西,西安电子科技大学.2009.
    [1]M. D. Swanson, B. Zhu, A. H. Tewfik, "Transparent robust image watermarking", In Proc. SPIE Conf. Visual Commun. Image Process.,1996, pp.211-214.
    [2]M. Barni, F. Bartolini, A. Piva. "Improved wavelet-based watermarking through pixel-wise masking", IEEE Trans. on Im. Proc.,10(5), May.2001, pp.783-791.
    [3]P. Campisi, A. Neri, "Video watermarking in the 3D-DWT domain using perceptual masking", IEEE Int. Conference on Image Processing 2005, Genoa, Italy, Sept.2005.
    [4]Alper Koz, A. Aydin Alatan, "Oblivious Spatio-Temporal Watermarking of Digital Video by Exploiting the Human Visual System", IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY,18(3), Mar.2008, pp.326-337.
    [5]S. Dally, "Engineering observations from spatio velocity and spatiotemporal visual models", in Proc. SPIE,1998,3299, pp.180-191.
    [6]Zhenyu Wei, King N. Ngan, "Spatio-Temporal Just Noticeable Distortion Profile for Grey Scale Image/Video in DCT Domain", IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY,19(3), Mar.2009, pp.337-346.
    [7]Yubo ZHANG, Hongbo BI, "Transparent Video Watermarking Exploiting Spatio-Temporal Masking in 3D-DCT Domain", Journal of Computational Information Systems,7(5), May.2011, pp.1706-1713.
    [8]A. Ahumada and H. Peterson, "Luminance-model-based DCT quantization for color image compression", In Proc. SPIE Human Vision, Visual Process., Digit. Display Ⅲ,1992,1666, pp.365-374.
    [9]Y. Jia, W. Lin, A. A. Kassim, "Estimating just-noticeable distortion for video", IEEE Trans. Circuits Syst. Video Technol.,16(7), Jul.2006, pp.820-829.
    [10]C. J. van den, B. Lambrecht, M. Kunt, "Characterization of human visual sensitivity for video imaging applications", Signal Process.,67(3), Mar.1998, pp. 255-269.
    [11]G. Doerr, J. L. Dugelay, "A guide tour of video watermarking", Signal Process.: Image Commun., (18), Apr.2003, pp.263-282.
    [12]Karen Su, Deepa Kundur, Dimitrios Hatzinakos, "Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance", IEEE TRANSACTIONS ON MULTIMEDIA,7(1), Feb.2005, pp. 52-66.
    [13]Tomas KANOCZ, Tamas TOKAR, Dusan LEVICKY, "Robust frame by frame video watermarking resistant against collusion attacks", RADIOELEKTRONIKA2009.19th International Conference,2009, pp.99-102.
    [14]R. Caldelli, A. Piva, M. Barni, et al., "Effectiveness of ST-DM Watermarking Against Intra-video Collusion", Lecture Notes in Computer Science,3710, Sep. 2005, pp.158-170.
    [15]Chen B, Wornell G W, "Quantization index modulation:A class of provably good methods for digital watermarking and information embedding", Information Theory, IEEE Transactions on,47(4), Apr.2001, pp.1423-1443.
    [16]Perez-Gonzalez F, Barni M, Abrardo A, et al., "Rational dither modulation:a novel data-hiding method robust to value-metric scaling attacks", Multimedia Signal Processing,2004 IEEE 6th Workshop on. IEEE,2004, pp.139-142.
    [17]Li Q, Cox I J., "Using perceptual models to improve fidelity and provide resistance to valumetric scaling for quantization index modulation watermarking", Information Forensics and Security, IEEE Transactions on,2(2), Feb.2007, pp.127-139.
    [18]Moulin P, Briassouli A., "A stochastic QIM algorithm for robust, undetectable image watermarking", Image Processing,2004. ICIP'04.2004 International Conference on. IEEE,2004,2, pp.1173-1176.
    [19]许君一,熊昌镇,齐东旭,黄继武.量化水印算法分析.通信学报.27(3),2006.3,pp.15-27.
    [20]肖俊,王颖,李象霖.带失真补偿的抖动调制水印算法中的补偿因子研究.电子学报.35(4),2007.4,pp.786-790.
    [21]高智慧,肖俊,王颖等.一种含边信息的小波域视频水印算法.计算机工程.35(21),2009,pp.122-130.
    [22]王津申.基于量化的水印研究.江苏,南京理工大学,2007.
    [23]凌洁,刘琚,孙建德等.基于视觉模型的迭代AQIM水印算法.电子学报.38(1),2010.1,pp.151-155.
    [24]Sofiane Braci, Remy Boyer, Claude Delpha, "ANALYSIS OF THE RESISTANCE OF THE SPREAD TRANSFORM AGAINST TEMPORAL FRAME AVERAGING ATTACK", ICIP2010,2010, pp.213-216.
    [1]Hongbo BI, Yubo ZHANG, Xueming LI, "Video Watermarking Robust Against Spatio-Temporal Attacks", Journal of Networks,6(6), Jun.2011, pp.932-936.
    [2]YANG Xiaoyuan, NIU Ke, WEI Ping, WANG Yumin, "A Video Watermark Scheme Resistant to Geometric Attacks", Computer Engineering,33(8), Aug. 2007, pp.142-144.
    [3]Leida Li, Baolong Guo, Jeng-Shyang Pan, "Video watermarking by space-time interest points", IEICE Transactions on Fundamentals on of Electronics, Communications and Computer Sciences, E91-A(8), Aug.2008, pp.2252-2256.
    [4]Ivan Laptev, Tony Lindeberg, "Space-time Interest Points", In Proceedings of the Ninth IEEE International Conference on Computer Vision (ICCV'03),2003.
    [5]Warren, Cheung, Hamarneh, Ghassan, "N-SIFT:N-DIMENSIONAL SCALE INVARIANT FEATURE TRANSFORM FOR MATCHING MEDICAL IMAGES",2007 4th IEEE International Symposium on Biomedical Imaging: From Nano to Macro,2007, pp.720-723.
    [6]Greg Flitton, Toby P. Breckon, Najla Megherbi, "Object Recognition using 3D SIFT in Complex CT Volumes", BMVC 2010,2010, pp.1-12.
    [7]LOWE D G, "Distinctive image features from scale-invariant keypoints", Int. J. Computer Vision,60(2), Feb.2004, pp.63-86.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700