数字水印的鲁棒性评测建模和算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数字水印的鲁棒性是水印技术实用化的一个重要指标。与加密技术不同,数字水印技术并不严格要求内容无失真传输,只要人们在视觉或听觉上感知无变化,允许内容使用时和原始内容存在一定程度的失真。这就要求隐藏在数字内容中的水印信息在传输和处理后能幸存(被有效检测),这种幸存能力称为数字水印的鲁棒性。论文结合鲁棒水印的研究需求,从理论和算法设计两个方面开展研究。
     理论上要设计符合鲁棒性要求的水印算法必须首先确定鲁棒性的描述方式和评价标准。论文在这一领域的主要研究成果如下:
     (1)将数字水印看作一个通信过程,将参与水印系统的各方看作随机统计量,以接收的数字内容和水印信息之间的互信息为代价函数,建立水印系统鲁棒性描述和度量的一般模型——互信息度量模型。该模型可作为一般水印系统鲁棒性分析的框架。
     (2)论文在互信息度量模型框架下,按照数字水印透明性和鲁棒性的要求,对具有典型代表意义的扩频水印和量化水印进行性能分析。
     i.在扩频水印分析中,从一般加性扩频方案和改进的扩频方案两个方面,分析推导了度量鲁棒性的互信息函数求解方式,仿真计算了高斯噪声和JPEG压缩情景下鲁棒性函数随水印噪声比或压缩强度的变化关系,并通过实验测量和统计误比特率来验证鲁棒性评测结果的有效性。实验结果表明互信息函数评测的鲁棒性能与实验误码率评估的结果很好地匹配,且水印噪声比越大,互信息函数值越大,水印系统越鲁棒,相应的误码率越小。
     ii.针对量化水印范式,论文分析了量化索引调制(Quantization Index Modulation:QIM)水印和失真补偿量化索引调制(Distortion Compensated Quantization Index Modulation:DC-QIM)水印之间性能差异,运用互信息度量模型评测它们在不同条件下的鲁棒性,并通过仿真实验检验该模型在高斯噪声和均匀噪声以及JPEG压缩条件下的鲁棒性估计,实验结果表明,互信息度量模型评测的鲁棒性随水印噪声比增大而增大,且与实验检测的误码率之间是匹配的,两者对水印系统可靠性的评测结果是一致的。
     (3)算法研究方面,在DCT域水印的嵌入策略分析中,以互信息度量模型对鲁棒性评测结论为指导,确定水印嵌入位置的选择方法,指出在兼顾透明性和鲁棒性要求的前提下DCT域DC系数是一种较优的嵌入位置。实验仿真表明,基于DC系数的水印方案和低频、高频AC系数相比,具有较好的鲁棒性,且其PSNR或SNR是可接受的感知范围。
     (4)论文以互信息度量模型对鲁棒性的评测结论为指导,结合独立分量分析(Independent Component Analysis:ICA)方法提出一种DCT域上的图像水印算法。在算法实现时,以视觉掩蔽门限系数为参数调制水印的嵌入强度,以公开传播渠道获取的公共参照图像,作为ICA算法的一个参考输入,提取水印。在鲁棒性测试实验中,算法表现出较好的鲁棒性。由于参与ICA运算的公共参照图像由密钥控制生成,无需作为隐秘参数,因此不占用水印系统的传输信道,从这个意义上认为是个盲检测的水印算法。
Robustness is one of the most important requirements when digital watermarking is applied. Different from encryption, digital watermarking doesn't strictly require distortion-free transmission. Before people's visual or auditory signals come into being, the host data can tolerate some distortion from signal processing. This requires the embedded watermark can be effectively detected after some signal processing have taken place. The detected ability is known as robustness of digital watermarking. To meet the R&D requirements of robust watermarking, the theory about robustness and algorithm design of watermarking are studied.
     In order to design the robust watermarking algorithm, the description method and evaluation criteria must be created beforehand. In this regard the main results and contributions of this dissertation are as follows:
     1. Digital watermarking is viewed as a communication process. The paties participating in the watermarking system are seen as random statistic. A mutual information function between the watermak and the observation is defined as a criterion measuring the robustness of watermarking algorithm. The mutual information metric model can be used as a general framework of watermarking system robustness analysis.
     2. In the framework of mutual information metric model, robustness of spread spectrum watermarking and quantization watermarking are analyzed with the consideration of transparency and robustness requirements.
     (1) Spread-spectrum watermarking is divided into simple additive spread-spectrum watermarking and improved spread-spectrum watermarking. The calculation formulas of mutual information function are derived to evaluate the robustness of algorithm. In the experiment, spread spectrum watermarking is implemented in discrete cosine transform (DCT) and the statistic Bit Error Rate (BER) is derived against Gaussian distribution noise and JPEG compression. Experiment results show that evaluation conclusion of mutual information method is in accord with empiric BER. The greater the mutual information function is, the more robust watermarking system is, and the smaller corresponding BER is.
     (2) The performance analysis of another watermarking paradigm, quantization watermarking is given, which includes Quantization Index Modulation (QIM) watermarking and Distortion Compensated QIM (DC-QIM) watermarking. With the use of mutual information measurement model, their robustnesses are analyzed. Simulation experiments are done to validate the model in Gaussian noise, uniform noise and JPEG compression. Evaluation of the robustness based on the mutual information metric model is matched with the empiric BER. Two evaluation results for reliability of system are consistent.
     3. When digital watermarking is applied, system performance constraints and convenient implementation scheme are the important consideration. In this dissertation watermark embedding position is selected in DCT domain and realization methods of blind watermarking are studied. Based on the result of mutual information measurement, a method to determine the optimal embedding location is given. In view of robustness, compared with low frequency AC coefficient and high frequency AC coefficient, DC coefficient is a better location. And its PSNR or SNR is acceptable limitation of perception.
     4. Considering the convenience, the blind watermark detection is a good idea. Taking advantage of Independent Component Analysis's (ICA's) blind source separation characteristics, a blind watermark extraction algorithm is designed in DCT domain. In order to obtain the larger WNR, the visual masking threshold parameter is used to modulate the watermark embedding strength. When the original image and the original watermark are unavailable, a legal user can select the watermarked image and the public reference image as inputs to ICA, and then extract the watermark by ICA algorithm. The public reference image is generated by the key image and original image, but it can be delivered by public transmission channel. So it is not Hidding parameter and does not share the watermarking channel. In this sense, it is a blind watermarking sheme.
引文
[Amari96]Amari S, Cichocki A, Yang HH. A new learning algorithm for blind signal separation, in Advances in Neural Information Processing Systems [M]. Cambridge, MA:MIT Press, 1996:657-663.
    [And96]Ross J. Anderson. Stretching the limits of steganography. In 1st International Workshop on Information Hiding, IH'96, pages 39-48, Cambridge, UK, May 1996. Springer-Verlag.
    [Bal03]F.Balado, Digital Image Data Hiding Using Side Information, PhD Thesis,Universidade de Vigo,2003.
    [Baras04]C.Baras,N.Moreau and P.Dymarski,"An audio watermarking scheme based on an embedding strategy with maximized robustness to perturbations,"In:Proc.Of IEEE International Conference on Acoustics,Speech and Signal Processing, Montreal, Quebec, Canada,May 2004.
    [Baras05]C.Baras and N.Moreau,"An audio spread-spectrum data hiding system with an embedding strategy adapted to a wiener filtering based receiver,"In:Proc.of IEEE International Conference on Multimedia and Expo,Amsterdam,Holland,Jul.2005.
    [Barni97]Mauro Barni, Franco Bartolini, Vitto Cappellini, and Alessandro Piva. Robust watermarking of still images for copyright protection. In 13th International Conference on Digital Signal Processing, DSP'97, volume 2, pages 499-502, Santorini, Greece,2-4 July 1997.
    [Barni01]M.Barni,F.Bartolini,A.De Rosa and A.Piva, A new decoder for the optimum recovery of nonadditive watermarks, IEEE Trans.Image Processing,vol.10,no.5,pp.755-766,May 2001.
    [Barni03]Mauro Barni, Franco Bartolini, and Teddy Furon. A general framework for robust watermarking security. Signal Processing,83(10):2069-2084, October 2003. Special issue on Security of Data Hiding Technologies, invited paper.
    [Barni03b]M.Barni, F. Bartolini, A. De Rosa and A.Piva, Optimum decoding and detection of multiplicative watermarks, IEEE Trans.Signal Processing, vol.51, no.4, pp.1118-1123, Apr.2003.
    [Bart04]F.Bartolini,M.Barni and A.Piva, Performance analysis of ST-DM watermarking in presence of non-additive attacks, IEEE Trans.Signal Processing, vol.52, no.10, pp.2965-2974, Oct.2004.
    [Ben96]Walter Bender, Daniel Gruhl, Norishige Morimoto, and Aiguo Lu. Techniques for data hiding. IBM Systems Journal,35(3-4):313-336,1996.
    [Bid03]P. Biddle, REngland, M. Peinado. The Darknet and the Future of Content Distribution, Lecture Notes in Computer Science[M]. Berlin:Springer-Verlag,2003,597-654.
    [Bla00]D. Black, Differentiated Services and Tunnels, Internet Engineering Task Force, RFC 2983, Oct.2000.
    [Blo99]Jeffrey A. Bloom, Ingemar J. Cox, Ton Kalker, Jean-Paul M.G. Linnartz,Matthew L. Miller, and C. Brendan S. Traw. Copy protection for DVD video.Proceedings of the IEEE, 87(7):1267-1276, July 1999. Special Issue on Identification and Protection of Multimedia Information.
    [Bol95]F. M. Boland, Joseph J. K. O'Ruanaidh, and C. Dautzenberg. Watermarking digital images for copyright protection. In 5th IEE International Conference on Image Processing and its Applications, pages 326-330, Edimburg, July 1995.
    [Bri04]A.Briassouli and M.G.Strintzis, Locally optimum nonlinearities for DCT watermark detection, IEEE Trans. Image Processing, vol.13,no.12,pp.1604-1617,Dec.2004.
    [Bri05]A.Briassouli,P.Tsakalides and A.Stouraitis, Hidden messages in heavy-tails:DCT-domain watermark detection using Alpha-Stable models, IEEE Trans.Multimedia,vol.7,no.4,pp.700-715,Aug.2005.
    [Bon98]Dan Boneh and James Shaw. Collusion-secure fingerprinting for digital data.IEEE Transactions on Information Theory,44(5):1897-1905, September 1998.
    [Buc99]Buccigrossi R W, Simoncelli P. Image compression via joint statistical characterization in the wavelet domain[J]. IEEE Transaction on Image Processing,1999,8(12):1688-1701
    [Cac98]Christian Cachin. An information-theoretic model for steganography. In David Aucsmith, editor,2nd International Workshop on Information Hiding, IH'98, volume 1525 of Lecture Notes in Computer Science, pages 306-318, Portland, OR, USA, April 1998. Springer Verlag.
    [Cac04]C. Cachin. An information-theoretic model for steganography. Information and Computation, vol.192, pp.41-56,July 2004.
    [Cac05]C. Cachin. Digital Steganography. Encyclopedia of Cryptography and Security,2005,2.
    [Cal02]Roberto Caldelli, Franco Bartolini, and Vito Cappellini. Metadata hiding tightly binding information to content. In International Conference on Dublin Core and Metadata Applications, DCMI'02, page 199, Florence, Italy,13-17 October 2002. Dublin Core Metadata Initiative.
    [Cao96]X. Cao, R. Liu. General approach to blind source sepration. IEEE Transactions on Signal Processing,1996,44:562-571.
    [Cao06]曹晋华,程侃著.可靠性数学引论[专著]:第2版/2版北京:高等教育出版社,2006.
    [Car93]Caranni G., http://www.google.com..
    [Cay05]Fran.cois Cayre, Caroline Fontaine, and Teddy Furon. Watermarking security:theory and practice. IEEE Transactions on Signal Processing,53(10):3976-3987, October 2005.
    [Chen99]Chen B., G. W. Wornell. Dither modulation:a new approach to digital watermarking and information embedding[C]. Proceedings of SPIE Security and Watermarking of Multimedia Contents,1999:342-353.
    [Chen00]Chen B., Design and analysis of digital watermarking, information embedding, and data hiding systems. Ph. D. Dissertation,2000, Cambridge, USA:Massachusetts Institute of Technology.
    [Chen01]Chen B, Wornell G Quantization index modulation:A class of provably good methods for digital watermarking and information embedding[J]. IEEE Transactions on Information Theory,2001,47(4):1423-1443.
    [Cheng03]Q.Cheng and T.S.Huang, Robust optimum detection of transform domain multiplicative watermarks, IEEE Trans.Signal Processing,vol.51,no.4,pp.906-924,Apr.2003.
    [Clarke85]Clarke R J. Transform Coding of Images[M]. New York:Academic,1985.
    [Com05]Pedro Comesa'na, Luis P'erez-Freire, and Fernando P'erez-Gonz'alez. Fundamentals of data hiding security and their application to spread-spectrum analysis. In 7th International Workshop on Information Hiding, IH'05, volume 3727 of Lecture Notes in Computer Science, pages 146-160, Barcelona, Spain, June 2005. Springer Verlag.
    [Com06]P.Comesana and F.Perez-Gonzalez, The impact of the cropping attack on scalar STDM data hiding, IEEE Signal Processing Letters,vol.13,no.6,pp.353-356,Jun.2006.
    [Comon94]Comon P. Independent component analysis, a new concept [J]. Signal Processing,1994, 36(3):287-314.
    [Costa83]M. H. M. Costa, Writing on dirty paper, IEEE Trans.Information Theory, vol.29, no.3, pp.439-441, May 1983.
    [Cover91]T. M. Cover and J. A. Thomas, Elements of Information Theory.New York:Wiley,1991.
    [Cover06]Cover T M, and Thomas J A. Elements of Information Theory[M]. New York:Wiley, 2006:140-165.
    [Cox97]I. J. Cox, J. Kilian, T. Leighton, T. Shamoon. Secure spread spectrum watermarking for multimedia[J]. IEEE Transactions on Image Processing,1997,6(12):1673-1687.
    [Cox99]I.J.Cox,M.L.Miller and A.L.McKellips,"Watermarking as communications with side information,"Proc.of the IEEE,vol.87,no.7,pp.1127-1141,Jul.1999.
    [Cox02]I.J Cox,Matt L Miller. The First 50 Years of Electronic Watermarking[J]. Journal of Applied Signal Processing,2002,12(2):126-132.
    [Cox03]Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom. Digital Watermarking著,王颖,黄志蓓等译.北京:电子工业出版社,2003,7.
    [Cox07]I. J. Cox, Miller M, Bloom J 2007 Digital Watermarking and Steganography (2nd ed) (Morgan Kaufmann).
    [Del98]J.F.Delaigle,C.D.Vleeschowuwer and B.Macq, Watermarking algorithm based on a human visual model, Signal Processing,vol.66,no.3,pp.319-335,May 1998.
    [Del00]Jean-Francois Delaigle. Protection of intellectual property of images by perceptual watermarking. PhD thesis, Universit'e Catholique de Louvain,2000.
    [Dep99]Geert Depovere, Ton Kalker, Jaap Haitsma, Maurice Maes, Lieven de Strycker,Pascale Termont, Jan Vandewege, Andreas Langell, Claes Alm, Per Norman, Gerry O'Reilly, Bob Howes, Henk Vaanholt, Rein Hintzen, Pat Donnelly, and Andy Hudson. The VIVA project: digital watermarking for broadcast monitoring. In IEEE International Conference on Image Processing, ICIP'99, volume 2,pages 202-205,24-28 October 1999.
    [Dong03]P.Dong,N.P.Galatsanos, Geometric robust watermarking through watermark pattern shaping.ICIP(1)2003:493-496.
    [Ear103]J.Earl and N.Kingsbury, Spread transform watermarking for video sources, In:Proc.of IEEE International Conference on Image Processing,Barcelona,Catalonia,Spain,Sep.2003.
    [Eggers00]J. J. Eggers, B. Girod. Quantization watermarking[C]. Proceedings of SPIE Security and Watermarking of Multimedia Contents,2000.
    [Eggers02]J.J.Eggers and B.Girod,Informed Watermarking.Norwell,MA:Kluwer Academic Publishers,2002.
    [Erez05]Uri Erez, Simon Litsyn, and Ram Zamir. Lattices which are good for (almost) everything. IEEE Transactions on Information Theory,51(10):3401-3416, October,2005.
    [Fan08]樊晓华,肖俊,王颖.结合网格编码的固定鲁棒性嵌入水印算法[J],中国图象图形学报,2008,13(10):1979-1982.
    [Fei01]Fei C, Kundur D, Kwong R. The Choice of Watermark Domain in the Presence of Compression[A]. Proceedings international Confer-ence on Information Technology: Coding and Computing[C]. Las Vegas, NV, USA,2001:79-84.
    [Forney89]G. David Forney. Multidimensional constellations-Part Ⅱ:Voronoi constellations. IEEE Journal of Selected Areas in Communications,7(6):941-958, August,1989.
    [Fre05a]Luis P'erez-Freire, Pedro Comesa-na, and Fernando P'erez-Gonz'alez. Information theoretic analysis of security in side-informed data hiding. In 7th International Workshop on Information Hiding, IH'05, volume 3727 of Lecture Notes in Computer Science, pages 131-145, Barcelona, Spain, June 2005. Springer Verlag.
    [Fre05b]Luis P'erez-Freire, Pedro Comesa-na, and Fernando P'erez-Gonz'alez. Detection in quantization-based watermarking:Performance and security issues. In Edward J. Delp III and Ping W. Wong, editors, Security, Steganography, and Watermarking of Multimedia Contents VII, pages 721-733, San Jose, California, USA, January 2005. SPIE.
    [Fre06]Luis P'erez-Freire, Pedro Comesa-na, Juan Ram'on Troncoso-Pastoriza, and Fernando P'erez-Gonz'alez. Watermarking security:a survey. Transactions on Data Hiding and Multimedia Security 1,4300:41-72,2006.
    [Fre06b]L.Perez-Freire,F.Perez-Gonzalez and S.Voloshynovskiy, An accurate analysis of scalar quantization-based data-hiding, IEEE Trans.Information Forensics and Security,vol.1,no.1,pp.80-86,Mar.2006.
    [Fre07]Luis P'erez-Freire, Pierre Moulin, and Fernando P'erez-Gonz'alez. Security of spread-spectrum-based data hiding. In Edward J. Delp III and Ping W. Wong, editors, Security, Steganography, and Watermarking of Multimedia Contents IX, volume 6505, San Jose, California, USA, January 2007. SPIE.
    [Fre08a]Luis P'erez-Freire and Fernando P'erez-Gonz'alez. Security of lattice-based data hiding against the watermarked only attack. IEEE Transactions on Information Forensics and Security,2008. Accepted for publication.
    [Fre08b]Luis P'erez Freire. Digital watermarking security. Ph.D Thesis, University of Vigo,Spain,2008.
    [Fri01]Jessica Fridrich, Miroslav Goljan, and Rui Du. Detecting LSB steganography in color, and gray-scale images. IEEE Multimedia,8(4):22-28,2001.
    [Fri02]Fridrich J., Goljan M., Du R., Lossless data embedding for all image formats, Proa SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents, San Jose, California, January,2002,pp.572-583.
    [Fur02]Teddy Furon et al. Security Analysis. European Project IST-1999-10987 CERTIMARK, Deliverable D.5.5,2002.
    [Gel80]S. I. Gel'fand and M. S. Pinsker, Coding for channel with random parameters, Problems Control Inf. Theory, vol.9, no.1, pp.19-31,1980.
    [Gonz03]
    [Gonz03]F.Perez-Gonzalez,F.Balado,and J.R.Hernandez, Performance analysis of existing and new methods for data hiding with known-host information in additive channels, IEEE Trans.Signal Processing,vol.51,no.4,pp.960-980,Apr.2003.
    [Gray98]Gray R M, Neuhoff D L. Quantization[J]. IEEE Transactions on Information Theory,1998, 44 (6):2325-2383.
    [Han96]T. G. Handel, M. T. Sandford. Data hiding in the OSI network model[C]. Proc. of First International Workshop on Information Hiding,1996,1174:23-38.
    [Han03]S.J.Han,I.S.Chang,R.H.Paik, Semi-fragile watermarking for tamper proofing and authentication of still images.International Workshop on Digital Watermarking.(2003)347-358.
    [He99]He Zhenya, Liu Ju, Yang Luxi. Blind separation of images using edge worth expansion based ICA algorithm [J]. Chinese Journal of Electronics,1999,8(3):278-282.
    [Hem61]E.F.Hembrooke, Identification of sound and like signals,United States Patent, 3,004,104,1961.
    [Her98]Juan R. Hern'andez and Fernando P'erez-Gonz'alez. Throwing more light on image watermarks. In D. Aucsmith, editor,2nd International Workshop on Information Hiding, IH'98, volume 1525 of Lecture Notes in Computer Science, pages 191-207, Portland, OR, USA, April 1998. Springer-Verlag.
    [Her00]J.R.Hernandez,M.Amado and F.Perez-Gonzalez, DCT-domain watermarking techniques for still images:detector performance analysis and a new structure, IEEE Trans.Image Processing,vol.9, no.1,pp.55-68,Jan.2000.
    [Hsu99]C. T. Hsu, J. L. Wu. Hidden digital watermarks in images[J]. IEEE Transactions on Image Processing.1999,8(1):58-68.
    [Huang98]J. Huang, L. Chen, and Y. Q. Shi, In integrated classifier in classified coding, in Proc. IEEE ISCAS'98 Moterey, CA, May 1998, vol.Ⅳ, pp.146-149.
    [Huang98]黄继武,Yun Q. Shi,程卫东.DCT域图像水印:嵌入对策与算法.[J],电子学报,2000,28(4):57-60.
    [Hvy00]A. Hyvarinen, E. Oja, Independent Component Analysis:algorithms and applications. Neural Networks,2000,13(4):411-430.
    [Hvy01]A. Hyvarinen, J, Karhunen, E. Oja, Independent Component Analysis, John Wiley & Sons, Inc,2001.
    [John99]John H. Conway and Neil J. A. Sloane. Sphere packings, lattices and groups, volume 290 of Comprehensive Studies in Mathematics. Springer-Verlag, New York,3rd edition,1999.
    [Kal99]Ton Kalker. System issues in digital image and video watermarking for copy protection. In IEEE International Conference on Multimedia Computing and Systems, volume 1, pages 562-567, Florence, Italy,7-11 June 1999.
    [Kara03]D.Karakos and A.Papamarcou, A relationship between quantization and watermarking rates in the presence of additive Gaussian attacks, IEEE Trans.Information Theory, vol.49,no.8,pp.1970-1982,Aug.2003.
    [Kat02]Stefan Katzenbeisser and Fabien A. P. Petitcolas. Defining security in steganographic systems. In Edward J. Delp Ⅲ and Ping W. Wong, editors, Security, Steganography, and Watermarking of Multimedia Contents Ⅳ, volume 4675, pages 50-56, San Jose, California, USA, January 2002. SPIE.
    [Kat05]Stefan Katzenbeisser. Computational security models for digital watermarks. In Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS'05, Montreux, Switzerland, April 2005.
    [Keshia02]N. L. Keshia. A survey paper on independent component analysis. Proceedings of the Thirty-fourth Southeastern Symposium on System Theory,2002,239-242.
    [kir08]Mark Kirstein. Beyond traditional DRM:Moving to digital watermarking & fingerprinting in media monetization, January 2008. Available at http://www.multimediaintelligence.com.
    [Koch95]E. Koch, J. Zhao, Towards robust and hidden image copyright labeling, in:Proc. IEEE Int. Workshop Nonlinear Signal Image Process.,Marmaras, Greece,1995, pp.452-455.
    [Kov05]O.Koval,S.Voloshynovskiy,F.Deguillaume,F.Perez-Gonzalez and T.Pun, Robustness improvement of known-host-state watermarking using host statistics, In:Proc.of SPIE on Security, Steganography,and Watermarking of Multimedia Contents VII,vol.5681,San Jose,USA,Jan.2005.
    [Kutter98]Kutter M., Jordan F.. Bossen F., Digital signature of color images using amplitude modulation, Journal of Electronic Imaging, vol.7, no.2, pp.326-332, April,1998.
    [Kut02]M.Kutter and S.Winkler, A vision-based masking model for spread-spectrum image watermarking, IEEE.Trans.Image Processing,vol.11,no.1,pp.16-25,Jan.2002.
    [Lem06]A.Lemma,M.Van Der Veen and M.Celik, A new modulation based watermarking technique for video, In.Proc.of SPIE on Security,Steganography,and Watermarking of Multimedia Contents VIII,vol.6072,San Jose,CA,USA,Jan.2006.
    [Li00]李忠源,郭全成,任亚萍.图像中的信息隐含及水印技术[J].电子学报,2000,28(4):61-63.
    [Li05]Q.Li and I.J.Cox, Using perceptual models to improve fidelity and provide invariance to valumetric scaling for quantization index modulation watermarking, In:Proc.of IEEE International Conference on Acoustics,Speech and Signal Processing, Philadelphia, PA, USA, Mar.2005.
    [Lin01]C. Y. Lin, M.Wu, J. A. Bloom, I. J. Cox, M. L. Miller, Y. M. Lui. Rotation, scale, and translation resilient watermarking for images[J]. IEEE Trans, on Image Processing.2001, 10(5):767-782.
    [Lin99]E.T.Lin, E.J.Delp. A Review of Fragile Image Watermarks,Proc.of the Multimedia and Security Workshop(ACM Multimedia'99),Orlando,pp.25-29,1999.
    [Liu01]R. Z. Liu, T. N. Tan. SVD based digital watermarking method[J]. Chinese Journal of Electronics.2001,29(2):168-171.
    [Liu01b]Liu Ju, Nie Kaibao, He Zhenya. Blind separation by redundancy reduction in a recurrent neural network [J]. Chinese Journal of Electronics,2001,10(3):415-419.
    [Liu07]刘东.新型文本数字水印技术及其典型应用研究:[博士学位论文].成都:电子科技大学,2008.
    [Mal03]H. S. Malvar, D. A. F. Florencio. Improved spread spectrum:a new modulation technique for robust watermarking[J]. IEEE Transactions on Signal Processing,2003,51(4): 898-905.
    [Max03]Terrence A Maxwell. Too Much to Carry? Copyright Laws in the Electronic Environment[C]. Proceedings of the 35th Hawaii International Conference on System Sciences, Big Island, Hawaii:IEEE Computer Society,2002.108-117.
    [Mee01]P. Meerwald, Digital watermarking in the wavelet transform domain, Master's thesis, University Salzburg, Austria,2001.
    [Mer08]Merhav N, Sabbag E. Optimal watermark embedding and detection strategies under limited detection resources[J]. IEEE Transactions on Information Theory,2008,54(1): 255-274.
    [Mem01]Nasir Memon and Ping Wah Wong. A buyer-seller watermarking protocol. IEEE Transactions on Image Processing,10(4):643-649, April 2001.
    [Miller99a] Miller M., Cox I., Linnartz J. P., and Kalke:A review of watermarkingp rinciples and practices.In Parhi,K.and N ishitani,editors,Digital Signal Processing in Multimedia Systems,p461-485.Marcell Dekker Inc.1999.
    [Miller00]M.L.Miller,I.J.Cox and J.A.Bloom, Informed embedding exploiting image and detector information during watermark insertion, In:Proc.IEEE International Conference on Image Processing, Vancouver,BC,Canada,Sep.2000.
    [Miller04]M.L.Miller,G.J.Doerr and I.J.Cox, Applying informed coding and embedding to design a robust high-capacity watermark, IEEE Trans.Image Processing,vol.13,no.6,pp.792-807,Jun.2004.
    [Mit96]Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik. Robust data hiding for images. In IEEE Digital Signal Processing Workshop, pages 37-40, Loen, Norway, September 1996.
    [Mit99]Thomas Mittelholzer. An information-theoretic approach to steganography and watermarking. In A. Pfitzmann, editor,3rd International Workshop on Information Hiding, IH'99, volume 1768 of Lecture Notes in Computer Science, pages 1-17, Dresden, Germany, September 1999. Springer Verlag.
    [Moo09]Mooney A, Keating J G, Heffernan D M. Performance analysis of chaotic and white watermarks in the presence of common watermark attacks[J].Chaos, Solitons & Fractals, 2009,42(1):560-570.
    [Mou02]Pierre Moulin, and M. K. Mihcak. IEEEA Framework for Evaluating the Data-Hiding Capacity of Image Sources,IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 11, NO.9, SEPTEMBER 2002,pp 1029-1044.
    [Mou03]Pierre Moulin and Aleksandar Ivanovi'c. The zero-rate spread-spectrum watermarking game. IEEE Transactions on Signal Processing,51(4):1098-1117, April 2003.
    [Mou03b]P.Moulin and J.A.O'Sullivan, Information-theoretic analysis of information hiding, IEEE Trans. Information Theory,vol.49,no.3,pp.663-593,Mar.2003.
    [Mou04]P.Moulin and A.Briassouli, A stochastic QIM algorithm for robust,undetectable image watermarking, In:Proc.of IEEE International Conference on Image Processing,Singapore,Oct.2004.
    [Mou05]Pierre Moulin and Ralf Koetter. Data hiding codes. Proceedings of IEEE, 93(12):2083-2126, December 2005.
    [Mou05]P.Moulin and Y.Wang, Improved QIM strategies for Gaussian watermarking, In:Proc.of International Workshop on Digital Watermarking,LNCS 3710,Siena,Italy,Sep.2005.
    [Mou07]Moulin P, Wang Y. Capacity and random-coding exponents for channel coding with side information[J],IEEE Transations on Information Theory,2007,53(4):1326-1347.
    [Nak02]Taiga Nakamura, Ryuki Tachibana, and Seiji Kobayashi. Automatic music monitoring and boundary detection for broadcast using audio watermarking. In Edward J. Delp Ⅲ and Ping Wah Wong, editors, Security and Watermarking of Multimedia Contents Ⅳ, volume 4675, pages 170-180, San Jose, CA, USA, January 2002. SPIE.
    [Ng05]T. M. Ng and H. K. Garg, Maximum-likelihood detection in DWT domain image watermarking using Laplacian modeling, IEEE Signal Processing Letters, vol.12, no.4, pp.285-288,Apr.2005.
    [Ni01]倪蓉蓉,阮秋琦.一种新的数字水印算法的研究[J].信号处理,2001.
    [Noo06]M.Noorkami and R.M.Mersereau, Towards robust compressed-domain video watermarking for H.264, In:Proc.of SPIE on Security,Steganography,and Watermarking of Multimedia Contents Ⅷ,vol.6072,San Jose,CA,USA,Jan.2006.
    [Oos00]J.Oostveen,T.Kalker and J.P.Linnartz, Optimal detection of multiplicative watermarks, In:Proc.Tenth European Conference on Signal Processing,Tampere,Finland,Sep.2000.
    [Oost04]J.Oostveen, T. Kalker and M. Staring, Adaptive quantization watermarking, In:Proc.of SPIE on Security, Steganography, and Watermarking of Multimedia Contents Ⅶ,vol.5306,San Jose, CA, USA, Jan.2004.
    [O'Rua95]J. J. K. O'Ruanaidh, W. J. Dowling. Watermarking digital images for copyright protection[C].Proc. Int. Conf. Image Processing and Its Applications,1995,410.
    [O'Rua96]J. J. K. O'Ruanaidh, W. J. Dowling, F. M. Boland. Phase watermarking of digital images[C].Proceedings of ICIP'96,1996:239-242.
    [Our05]F.Ourique,V.Licks,R.Jordan and F.Perez-Gonzalez, Angle QIM:A novel watermark embedding scheme robust against amplitude scaling distortions, In:Proc.of IEEE International Conference on Acoustics,Speech and Signal Processing, Philadelphia, PA, USA, Mar.2005.
    [Pet98]Petitcolas F. A, Anderson R J, Kuhn M G 1998 Proceedings of 2nd International Workshop on Information Hiding Portland, Oregon, USA, April 14-17 p218.
    [Pet99]Petitcolas F. A., Anderson R J, Kuhn M G. Information Hiding:A Survey. Proceedings of the IEEE special issue on protection of multimedia content, July 1999,87(7):1062-1078.
    [Piva97]A.Piva,M.Barni and F.Bartolini,DCT-based watermark recovering without resorting to the uncorrupted original image. in:Proc.of IEEE International Conference on Image Processing,Santa Barbara,CA,USA,Oct.1997.
    [Pod98]C.I.Podilchuk and WZeng, Image adaptive watermarking using visual models, IEEE Journal on Selected Areas in Communications,vol.16,no.4,pp.525-539,May 1998.
    [Poor98]Poor H V. An introduction to signal detection and estimation[M]. second edition, New York: Springer,1998
    [Rad02]R.Radhakrishnan and N.Memon, Audio content authentication based on psycho-acoustic model, In:Proc.of SPIE on Security and Watermarking of Multimedia Contents Ⅳ,vol.4675,San Jose,CA, USA,Jan.2002.
    [Ros02]W. Rosenblatt, W. Trippe, S.Mooney.Digital Rights Management, business Technology[M]. New York:M&T Books,2002,10-68.
    [Sch94]R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne. A digital watermark. In IEEE International Conference on Image Processing, ICIP'94, volume 2, pages 86-89, Austin, Texas, USA,1994.
    [Sen06]Sencar H T, Ramkumar M, Akansu A N. An overview of scalar quantization based data hiding methods[J]. signal processing,2006,86(5):893-914.
    [Shi06]D. K. Zou, Y. Q. Shi, Z. C. Ni, W. Su. A semi-fragile lossless digital watermarking scheme based on integer wavelet transform[J]. IEEE Transactions on Circuits and Systems for Video Technology,2006,16(10):1294-1300.
    [Shi08]Z. C. Ni, Y. Q. Shi, N. Ansari, W. Su, Q. B. Sun, X. Lin. Robust lossless image data hiding designed for semi-fragile image[J]. IEEE Transactions on Circuits and Systems for Video Technology,2008,18 (4):497-509.
    [Slep73]D. Slepian and J. K. Wolf, Noiseless coding of correlated information sources, IEEE Trans. Inf. Theory, vol. IT-19, no.4, pp.471-480, Jul.1973.
    [Song01]宋玉杰,刘瑞祯,谭铁牛,王蕴红.数字水印技术在印刷品防伪中的应用,中国图象图形学报,Vo1.6(5A),M ay 2001,pp.450-455.
    [Su99]P. C. Su, H. J. Wang, C. J. Kuo, Digital image watermarking in regions of interest. In the IS&T Image Processing, Image Quality, Image Capture, Syustems Conference, PICS, Savannah, GA., USA,1999. pp.295-300.
    [Sun05]孙中伟,冯登国.DCT变换域乘嵌入图像水印的检测算法[J].软件学报,2005,16(10):1798-1804.
    [Swa97]M.D.Swanson,B.Zhu and A.Tewfik, Data hiding for video in video, In:Proc.of the IEEE International Conference on Image Processing,Piscataway,NJ,USA,Oct.1997.
    [Swa98]M. D. Swanson, B. Zhu, A. H. Tewfik and L.Boney, Robust audio watermarking using perceptual masking, Signal Processing,vol.66,no.3,pp.337-355,May 1998.
    [Swa06]A.Swaminathan,S.He and M.Wu, Exploring QIM based anti-collusion fingerprinting for multimedia, In:Proc.of SPIE on Security,Steganography,and Watermarking of Multimedia Contents Ⅷ,vol.6072,San Jose,CA,USA,Jan.2006.
    [Tan86]谭维康编著.可靠性理论.[专著]北京:北方交通大学,1986.1.
    [Tan90]Tanaka K.,Nakamura Y.,MatsuiK.,Embedding secret information into a dithered multi-level image", In Proc.1990 IEEE Military Commun. Conf, Sept.1990.216-220.
    [Tir93]Tirkel A.,Rankin G,Schyndel R.V., et al, Electronic water mark, In Proc. DICTA 1993, Dec. 1993:666-672.
    [Tir94]A. Z. Tirkel, R. V. Schyndel, C. F. Osborne. A digital watermark[C]. Proceedings of IEEE International Conference on Image Processing.1994,2:86-90.
    [Tong91]L. Tong, R. Liu, V. Soon, et al. Indeterminancy and identifiability of blind identification. IEEE Transactions on Circuits and Systems,1991,38(5):499-509.
    [Tra03]Wade Trappe, Min Wu, Z. Jane Wang, and K. J. Ray Liu. Anti-collusion fingerprinting for multimedia. IEEE Transactions on Signal Processing,51(4):1069.1087, April 2003.
    [Tse01]S. Tsekeridou, et al. Statistical analysis of a watermarking system based on Bernoulli chaotic sequence[J]. Signal Processing,2001,81(6):1273-1293.
    [URL01]http://www.kepu.com.cn/gb/technology/printing/evolve/ev1315_02.html.
    [URL03]http://www.digimarc.com/.
    [URL04]http://www.alpvision.com.
    [URL05]http://www.demcom/
    [URL06]http://www.yufei.net/
    [URL07]http://www.westsec.com.cn/showcorp.php?id=24
    [URL08]http://www.assuredigit.com/default.htm
    [URL09]http://www.cptwg.org/
    [URL10]http://www.digitalwatermarkingalliance.org
    [URL11]http://www.intec.rug.ac.be/Research/Groupsfhfhsdesign/viva/index.htm
    [URL12]http://www.yufei.net/
    [URL13]http://www.westsec.com.cn/showcorp.php?id=24
    [URL14]http://www.watermarkingworld.org/checkmark/checkmark.html
    [URL15]http://www.watermarkingworld.org/optimark/index.html
    [URL16]http://www.mathworks.com/access/helpdesk/help/toolbox/vipblks/2ddct.htmli.
    [Vila08]Vila-Force J E, Voloshynovskiy S, Koval O. Quantization-based methods:additive attacks performance analysis[J]. LNCS,2008,4920:70-90.
    [Vlee03]VleeschouwerC. D.,Delaigle J. F., Macq B., Circlar interpretation of bijective transformation in lossless watermarkingf or media asset management,IEEE Trans. On Multimedia, vo 1.5, No.l March,2003,pp.97-105.
    [Wang05]王明祥.独立分量分析方法及在图像处理中的应用研究:[博士学位论文].上海:上海大学,2005.
    [Wang06]J.Wang,I.D.Shterev and R.L.Lagendijk, Scale estimation in two-band filter attacks on QIM watermarks, In:Proc.of SPIE on Security,Steganography,and Watermarking of Multimedia Contents Ⅷ,vol.6072,San Jose,CA,USA,Jan.2006.
    [Watson93]A.B.Watson, DCT quantization matrices optimized for individual images, In:Proc.of the SPIE on Human Vision, Visual Processing,and Digital Display IV,vol.1913,Bellingham,USA,Feb.1993.
    [Wolf99]R.B.Wolfgang,C.I.Podilchuk,and E.J.Delp, Perceptual watermarks for digital images and video, Proc.of the IEEE,vol.87,no.7,pp.1108-1126,Jul.1999.
    [Wyner76]A. D. Wyner and J. Ziv, The rate-distortion function for source coding with side information at the decoder, IEEE Trans. Inf.Theory, vol.22, no.1, pp.1-10,1976.
    [Xiao07]肖俊,王颖,李象霖.带失真补偿的抖动调制水印算法中的补偿因子研究[J].电子学报,2007,35(4):786-790.
    [Xiao09]肖俊,王颖.自适应抖动调制图像水印算法[J].电子与信息学报.2009,31(3):552-555.
    [Yang06]杨福生,洪波编著,独立分量分析的原理与应用[M]北京:清华大学出版社,2006.
    [Yu05]俞银燕.支持多种分发模式的数字内容版权管理机制:[博士学位论文].北京:北京大学,2005.
    [Zeng97]W.Zeng and B.Liu. On resolving rightful ownerships of digital images by invisible watermarks. In:Proc.of IEEE International Conference on Image Processing,Santa Barbara,CA,USA,Oct.1997.
    [Zeng99]W.Zeng and B.Liu,A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images, IEEE Trans.Image Processing,vol.8,no.11,pp.1534-1548,Nov.1999.
    [Zeng2010]曾高荣,裘正定,章春娥.失真补偿量化索引调制水印的性能分析[J].电子与信息学报,2010,32(1):86-91.
    [Zhang03]J. Zhang, A. T. S. Ho. An efficient digital image-in-image watermarking algorithm using the integer discrete cosine transform (IntDCT)[C].Watermarking and Security II, IEEE ICICS-PCM2003, Singapore,2003,15-18:1163-1167.
    [Zhang06]Chun-e ZHANG,Zhengding QIU, Simplex Image Watermarking Resistant to RST Based on Radon Transform,ICICIC2006, Beijing,China, vol.1,30-01 Aug.2006,pp.488-491.
    [Zhao04]Y. Zhao, P. Campisi, D. Kundur. Dual domain watermarking for authentication and compression of cultural heritage images[J]. IEEE Transactions on Image Processing.2004, 13(3):430-448.
    [Zhong06]钟计东.水印嵌入与检测,[博士学位论文],上海:上海交通大学,2006.
    [Zol98]Jan Zollner, Hannes Federrath, Herbert Klimant, Andreas Pfitzmann, Rudi Piotraschke, Andreas Westfeld, Guntram Wicke, and Gritta Wolf. Modeling the security of steganographic systems. In David Aucsmith, editor,2nd International Workshop on Information Hiding, IH'98, volume 1525 of Lecture Notes in Computer Science, pages 344-354, Portland, OR, USA, April 1998. Springer-Verlag.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700