新型文本数字水印技术及其典型应用研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
近年来,随着以互联网技术为代表的信息技术的迅猛发展,各种文字、图像、声音、视频等媒体的获取、保存与使用方式发生了很大的变化。这一方面给人们带来了极大的方便,但另一方面,未经版权所有人许可对数字作品的任意复制、修改等盗版行为也日趋严重。因此,如何在互联网环境下进行有效的版权保护等信息安全问题,也就成为了重要的研究课题。
     在此背景下,数字水印技术作为一种新的多媒体信息安全保护技术应运而生。它将隐藏信息嵌入到各种数字媒体中,结合传统的数据加密技术来实现信息的隐藏通信、访问控制、版权保护等功能,当前,该领域的研究与应用已经相当深入。但令人遗憾的是,由于文字媒体本身的一些特点,作为数字水印技术重要组成部分的文本数字水印技术的进展却是相对滞后的,这与文字是人类传播信息最主要方式的现实情况形成了很大的反差。
     本文的工作就是要针对现有文本数字水印技术存在的薄弱环节,进行新型的文本数字水印技术及其典型应用的研究。主要的研究内容涉及文本数字水印嵌入算法、水印检测方法、系统实现框架、抗攻击技术及典型应用等该领域的关键问题,取得了如下创新性成果:
     1)提出了一种基于字符拓扑结构的文本数字水印技术,通过改变字符或者字符串字形的拓扑结构,设计出语义上相同的字符(串)的多种字形,并对这些字形的拓扑结构进行恰当的编码,利用字符(串)的拓扑结构来携带数字水印信息。同时,给出了鲁棒性和视觉影响试验方法、结果,并分析了水印的抗攻击性能。
     2)引入图论作为1)所述的文本数字水印技术的数学基础,将字符字形映射为图论中的“图”,对“图”或者“图”的特征量进行恰当的编码,利用这些编码来表示数字水印。同时,给出了基于图论的水印嵌入、检测方法的数学模型和详细实现过程。
     3)提出了一种以符号的冗余编码表示隐藏信息的隐藏数据通信技术,以及与该方法相关的文本数字水印嵌入、检测技术和载体文件的显示技术。这些技术包括:将符号编码成冗余数字代码的若干方法;隐藏通信的数据加载与分离方法;特定字体文件的设计方法;若干对嵌入水印信息的载体文件进行显示的方法。在此基础上,利用冗余编码的原理,还提出了一种利用索引值嵌入隐藏信息的图像数字水印算法。
     4)结合基于“字符拓扑结构”和“冗余编码”的文本数字水印技术的特点,提出了文本数字水印系统完整解决方案。给出了两种特殊的字体设计方法,重点描述了在统一的框架体系中,实现在电子文件和印刷品文件上嵌入、检测数字水印的技术。
     5)提出了一种新的隐藏通信方法,其原理是改变字符图形与字符编码在各种编码标准规范中已确定的标准映射关系,采用自定义的方法进行字符图形与字符编码的映射,从而使得电子文件显示出的字符图形与电子文件的内在编码分别构成显式通信信道和隐藏通信信道,这两种信道可以独立地进行通信。应用该隐藏通信技术制作成自包含字符图形和编码信息的电子文件,便于利用现有互联网搜索引擎按照文件的属性进行在线搜索。
     6)针对同步攻击这一困扰扩频水印技术的难题,研究了一类基于字符特征的文本数字水印技术的编码映射规则,给出了相应的扩频水印加载与检测模型。利用字符语义在水印加载与检测过程中具备的良好鲁棒性,通过载体字符产生伪随机代码,最终生成具有同步错误修正能力的自适应扩频文本水印,仿真实验表明其抗同步攻击性能得到了显著的提高。
     7)提出了一种新的数字内容网络出版发行机制,其主要特点是用户可免费获取数字内容,但必须强制性地观看广告,广告与数字产品关联绑定。描述了这种机制的系统体系结构及相关技术协议,给出了实现该机制所需的内容加密、水印嵌入、屏幕字符替换等关键技术。该机制为平衡数字内容价值链中各方的利益提供了一种新的解决途径。
In recent years, with the development of information technologies, especially the popularization of Internet, the acquirement, storage and application means of different multimedia such as text, image, music and video have changed greatly. On the one hand, those changes bring us so many conveniences, On the other hand, they also make a great deal of trouble, people can copy and tamper digital products more easily without permission of their copyright owners. Therefore, the problems of information security such as how to protect the copyright effectively on Internet become urgent research subjects.
     Under this condition, the digital watermarking technology, as a new approach which is applied to protect security of multimedia products, comes into being. It can protect the intellect property of copyright owners by embedding hiding informations into digital multimedia products. Digital watermarking technology, combining with traditional encryption technology, can also carry out the functions such as secret communication, access control and digital rights protection etc. At present, the researchs and applications of digital image watermarking technology have already become maturity day by day. But as an important part of watermarking field, the text watermarking develops slowly, because of the generic characteristics of text media. This situation contrasts clearly with the fact that texts are the most popular communication intermedium for us.
     This dissertation aims to research the key issues in both theories and applications of the text watermarking technology, including watermarking embedding algorithms, detecting algorithms, system framework, anti-attacking techniques and critical application mode ,etc. The main contents are as follows:
     1) A novel text digital watermarking technology based on topology of characters or strings is presented. Through changing the topology of a character or string, different structure figures are schemed out, which represent the same semanteme, and these figures should be correctly encoded. With this technology, digital watermarking informations are embedded in different topology of a character or string.
     2) Graph theory is applied to be the mathematic foundation of text digital watermarking technology, which is described in 1). Figures of characters or strings are mapped on graphs in Graph Theory, and the graphs or their properties should be correctly encoded in order to denote the text watermarking information. Furthermore, the mathematic models of embedding and detecting watermarking are also described, as well as the isomorphic algorithm of graph.
     3) A hiding information communication technology based on storing hiding information in redundant codes of symbol is proposed, as well as associated methods of embedding, detecting watermark and showing files in which watermark is embedded. The relational technologies include: encoding Symbol, loading /separating hiding information on/from carrier file, designing the special font library, showing files in which watermark is embedded. Furthermore, according to the theory of redundant-coding, an image watermark algorithm which applies the index of an image to carry hiding information is presented.
     4) Applied to the watermarking technologies based on topologies and redundant codes of alphabetic symbols which are described in 1) and 3), an integrated solution for text digital watermarking system is proposed. Furthermore, the united framework and the methods of designing two special font libraries are emphasized. This integrative system is suitable to embed and detect watermark in both electronic and print files.
     5) A new method of hiding information communication is proposed. That is to create user-defined mapping relationship between a character figure and its inner code, instead of standard-defined mapping in different criterions. So character figures in electronic files constitute the apparent communication channel while inner codes constitute the hiding communication channel, and the two channels can work independently. If the technology is particularly used to make electronic files which themselves include both character figures and inner codes, the files can be found by current Internet search engines, according to the properties of the files.
     6) Synchronization attack is an intractable problem in the spread-spectrum digital watermarking field. To deal with it, the encode-mapping rule of a type of text digital watermark based on symbolic characteristics is proposed, as well as it's embedding and detecting modes of spread-spectrum watermarking. With the excellent robustness of symbolic semanteme during embedding and detecting processes, pseudo-random sequences are generated by carrier symbols of watermarking. Then the adaptive spread-spectrum text digital watermarking which can rectify errors of synchronization is finally created. The experiments show that the spread spectrum watermarking system's performance resisting to synchronization attack is obviously improved.
     7) A novel network publishing mechanism of digital contents is proposed. Readers using the system can get and read digital contents free of charge, but should be forced to browse advertisements which are bound with digital contents. The architecture of the mechanism and the related protocols are described, as well as the key technologies of the mechanism, such as methods of encrypting, algorithms of embedding/detecting watermark and techniques of replacing character on monitor, etc. This mechanism provides a new solution for balancing profits of different entities in the digital content value chain.
引文
[1]I.J Cox,Matt L Miller.The First 50 Years of Electronic Watermarking[J].Journal of Applied Signal Processing,2002,12(2):126-132
    [2]P.Biddle,P.England,M.Peinado.The Darknet and the Future of Content Distribution,Lecture Notes in Computer Science[M].Berlin:Springer-Verlag,2003,597-654
    [3]Terrence A Maxwell.Too Much to Carry? Copyright Laws in the Electronic Environment[C].Proceedings of the 35th Hawaii International Conference on System Sciences,Big Island,Hawaii:IEEE Computer Society,2002,108-117
    [4]W.Rosenblatt,W.Trippe,S.Mooney.Digital Rights Management.business Technology[M].New York:M&T Books,2002,10-68
    [5]俞银燕.支持多种分发模式的数字内容版权管理机制:[博士学位论文].北京:北京大学,2005
    [6]S.Craver,S.Katzenbeisser.Copyright protection protocols based on a symmetric watermarking[C].The ticket concept In Proceedings of the 5th Conference on Communication and Mul-timedia Security(CMS'01),Darmstadt,2001,159-170
    [7]张立和,杨义先,钮心忻等.软件水印综述[J].软件学报,2003,14(2):268-277
    [8]I.J.Cox,Matthew L.Miller,Jeffrey A.Bloom.Digital watermarking[M].Beijing:Publishing House of Electronics Industry,2003,1-64,121-150
    [9]孙圣和,陆哲明,牛夏牧.数字水印技术及应用[M].北京:科学出版社,2004,1-385,536-575
    [10]A.Z.Tirkel,G.A.Rankin,R.M.van.Schyndel.Electronic watermark[C].Digital Image Computing,Technology and Applications(DICTA'93),Macquarie University:Sidney,1993,666-673
    [11]R.G.van Schyndel,A.Z.Tirkel,C.F.Osborne.A digital watermark[C].International Conference on Image Processing,IEEE,U.S.A:Austin,1994,vol.2:86-90
    [12]R.Anderson.Information hiding[M].USA:Springer-Verlag,1996,11-65
    [13]Stefan Katzenbeisser,A.Fabien,P.Petitcolas.Information Hiding Techniques for Steganography and Digital Watermarking[M].USA:Artech House.2002,21-76
    [14]杨义先,钮心析.数字水印理论与技术[M].北京:高等教育出版社,2006,1-83, 350-378
    [15]Petitcolas F A P,Abderson R J,Kuhn M G.Information hiding-a survey[J].Proceedings of IEEE,1999,87(7):1062-1078
    [16]陈晓苏,刘立刚,卢正鼎.网络环境下数字图像版权保护安全协议的设计与分析[J].计算机学报,2006,29(9):1722-1727
    [17]Su J K,Hartung F,Grirod B.Digital Watermarking of Text.Image and Video Documents[J].Computer& Graphics,1998,22(6):687-695
    [18]M.D.Swanson,B.Zhu,A.H.Tewfik,L.Boney.Robust audio watermarking using perceptual masking[J].IEEE Trans on Signal Processing,1998,66(3):337-355
    [19]G.Doerr,J.L.Dugelay.A Guide Tour of Video Watermarking[J].Signal Processing:Image Communication,2003,18(1):263-282
    [20]Wilkins,E.H.A History of Italian Literature[M].Oxford Univedty London:Geoffrey Cumberlege,1954,34-68
    [21]M.Monsignori,P.Nesi,M.B.Spinu.Watermarking Music Sheets while Printing[C].First International Conference on Web Delivering of Music,USA,2001,36-43
    [22]G.B.Rhoads.Steganography System[P].USA Patent,5850481,1998-12-15
    [23]D.Hunter.Handmade Paper and Its Watermarks,A Bibliography[M].New York:B.Franklin,1967,24-78
    [24]E.F.Hembrooke.Identification of Sound and Like Signals[P].United States Patent,3004104,1961-3-12
    [25]W.Szepanski.A Signal Theoretic Method for Creating Forgery-proof Documents for Automatic Verification[C].Carnahan Conference on Crime Countermeasures,USA,1979,101-109
    [26]L.Holt,B.G.Maufe,A.Wiener.Encoded Marking of a Recording Signal[P].U.K.Patent,GB2196167A,1988-9-21
    [27]N.Komatsu,H.Tominaga.Authentication System Using Concealed Images in Telematics[C].Memoirs of the School of Science and Engineering,Waseda University,1988,52:45-60
    [28]Caronni.G.Ermitteln unauthorisierter Verteiler von maschinenlesbaren Daten[C].Technical report,Switzerland,1993,36-42
    [29]R.Anderson.Information Hiding[C].Lecture Notes in Computer Science,Berlin:Springer-Verlag,1996,Vol.1174:81-89
    [30]Digimarc Corporation.http://www.Digimac.com
    [31]Digital Watermarking World.http://www.watermarkingworld.org
    [32]Copy Protection Technical Working Group(CPTWG).http://www.cptwg.org
    [33]Signum Technologies Corporation.http://www.signumtech.com
    [34]The Media Security Company.http://www.mediasec.com
    [35]中国知网.http://www.cnki.net
    [36]上海阿须数码技术有限公司.http://www.assuredigit.com
    [37]成都宇飞信息工程有限责任公司.http://www.yufei.net
    [38]中国知识产权局.http://www.sipo.gov.cn/sipo/zlsq
    [39]Kutter.M,F.A.P.Petitcolas.Fair Benchmarking for Image Watermarking Systems[C].Proceedings of the SPIE 3657:Security and Watermarking of Multimedia Contents,USA,1999,226-239
    [40]Craver S,Memon N,Yeo,et al.Can Invisible Watermarks Resolve Rightful Ownerships?[C].SPIE Electronic Imaging:Storage and Retrieval of Image and Video Databases,USA,1997,vol.22:316-321
    [41]Craver S,Memon N,Yeo,et al.Resolving rightful ownerships with invisible watermarking techniques:limitations,attacks,and implications[J].IEEE Journal on Selected Areas in Communications,1998,16(4):573-586
    [42]I.Cox,J.Kilian,T.Leighton,et al.Secure spread spectrum watermarking for multimedia[J].IEEE Trans on Image Processing,1997,6(12):1673-1687
    [43]Kutter M,Voloshynovskiy S,Herrigel A.Watermark copy attack[C].Proc.SPIE 3971:Security and Watermarking of Multimedia Content Ⅱ,USA,2000,23-28
    [44]Petitcolas F.A.P,Anderson R.J,Kuhn M.G.Attacks on copyright marking systems[C].Information Hiding:2nd Int.Workshop(Lecture Notes in ComputerScience),Germany:Springer-Verlag,1998,vo1.1525:218-238
    [45]I.Cox,Linnartz J.P.Some general methods for tampering with watermarks[J].IEEE Journal on Selected Areas in Communications,1998,16(4):587-593.
    [46]Zeng W,Liu B.A statistical watermark detection technique without usingoriginal image for resolving rightful ownerships of digital images[J].IEEE Trans on Image Processing,1999,8(11):1534-1548
    [47]J.K.Su,B.Giro.On the Imperceptibility and Robustness of Digital Fingerprints[C].Proceedings of the IEEE International Conference on Multimedia Computing and Systems,USA,1999,vol.2:530-535
    [48]D.Boneh,J.Shaw.Collusion-secure Fingerprinting for Digital data[C].Proceedings of Advancs in Cryptology:CRYPTO95, Lecture Notes in Computer science, New York: Springer-Verlag,1995, vol.963:452-465
    [49] N.F.Maxemchuk. Electronic Document Distribution[J]. AT&T Technical Journal, 1994, 73(5):73-80.
    [50] Brassil.J, Low S.H, Maxemchuk.N.F. Copyright Protection for the Electronic Distribution of Text Documents[J]. Proceedings of the IEEE, 1999, 87(7):564-566
    [51] Brassil.J, Low.S.H, Maxemchuk.N.F. Electronic marking and identification techniques to discourage document copying[J]. IEEE Journal on Selected Areas in Communications, 1995,13(11): 1495-1504
    [52] N.F.Maxemchuk, S.Low. Marking Text Documents[C]. International Conference on Image Processing, Santa Barbara Calif, 1997,26-29
    [53] Brassil.J, L.O'Gorman. Watermarking document images with bounding box expansion[C].Infoz-mation Hiding of Lecture Notes in Computer Science, Sprinter-Verlag, 1996, Vol.1174:227-235
    [54] S.H.Low, N.F.Maxemchuk, A.M.Lapone. Document identification for copyright protection using centroid detection[J]. IEEE Trans Communications, 1998,46(3): 372-383
    [55] S. Low, N. F. Maxemchuk. Performance Comparison of Two Text Making Mechods[J]. IEEE Journal on Selected Areas in Communications, 1998, 16(4):561-572.
    [56] Mikhail J Atallah, Victor Raskin, Christian Hempelmann. Natural Language Watermarking and Tamper proofing[C]. In 5th Information Hiding Workshop (IHW) 2002, USA, 2002,196-212
    [57] Mikhail J Atallah, C J McDonough, V Raskin. Natural Language Processing for Information Assurance and Security: An Overview and Implementations[C]. NSPW '2000: Proceedings of Workshop on New Paradigms in Information Security, New York: ACM Press, 2000,51-65
    [58] Mikhail J Atallah, Samuel S. Wagstaff. Watermarking with Quadratic Residues[C]. In: Proc. of IS-T/SPIE Conf. on Security and Watermarking of Multimedia Contents, San Jose: SPIE,1999,283-288
    [59] Mikhail J Atallah, Victor Raskin, Machael Crogan, et al. Natural Language Watermarking:Design, Analysis, and a Proof-of-Concept Implementation[C]. Pre-Proceedings of the 4th Information Hiding Workshop, Pittsburgh: Pittsburgh University, 2001,193-208
    [60] Young-Won Kim, Kyung-Ae Moon, Il-Seok Oh. Watermarking Algorithm based on Word Classification and Inter-word space statistics[C]. Proceedings of the Seventh International Conference on Document Analysis and Recognition, Edinburgh:IEEE Computer Society, 2003, 775-779
    [61]Xingming Sun,Huowang Chen,Changyun Li,et al.Deeper Chinese information processing of open software and its application in Chinese document watermarking[C].Proceedings of International Conference on Machine Learning and Cybernetics,USA,2003,442-446
    [62]Xingming Sun,Gang Luo,Huajun Huang.Component-Based Digital Watermarking of Chinese Texts[C].Proceedings of the Third International Conference on Information Security,Shanghai,2004,76-81
    [63]孙星明,殷建平,陈火旺.汉字的数学表达式研究[J].计算机研究与发展,2002,39(6):707-71
    [64]黄华,齐春,李俊等.文本数字水印[J].中文信息学报,2001,15(5):52-57
    [65]曹卫兵,戴冠中,夏煜等.基于文本的信息隐藏技术[J].计算机应用研究,2003,12(4):39-41
    [66]王慧琴,李人厚.二值文本数字水印技术的研究与仿真[J].系统仿真学报,2004,16(3):521-514
    [67]周亚训,叶庆卫,徐铁峰.一种基于小波多分辩率数据组合的文字水印方案[J].电子学报,2000,28(6):1693-1695
    [68]张静,张春田.用于PDF文档认证的数字水印算法[J].天津大学学报,2003,36(2):215-219
    [69]李庆诚,李瑗珲.网络出版中版权保护技术-文本数字水印的研究[J].计算机工程与应用,2004,40(18):163-165
    [70]张小华,刘芳,焦李成.一种有效的文档水印技术[J].通信学报,2003,24(5):21-28
    [71]黄华,齐春,李俊等.一种新的文本数字水印标记策略和检测方法[J].西安交通大学学报,2002,:36(2):165-168
    [72]钮心忻,杨义先.文本伪装算法研究[J].电子学报,2003,31(3):402-405
    [73]赵东宁,张勇,李德毅.基于云模型的文本数字水印技术[J].计算机应用,2003,23(12):100-102
    [74]弋英民,李人厚,梅时春等.一种基于文本行和对角侧面特性的数字水印方法[J].小型微型计算机系统,2005,26(2):293-296
    [75]K.埃亨.元信息的不可见的编码[P].PCT进入中国专利,00805218.2,2000-12-22
    [76]Keith Ahern.Invisible ENCODING OF Attribute Data in Character Based Documents and Files[P].United States Patent,09/333,632,1999-6-15
    [77]J.zhao,E.Koch.Embedding Robust Labels into Images For Copyright Protection[C]. Proceedings of the International Congress on Intellectual Property Rights for Specialized Information Knowledge and New Technologies,Austria,1995,242-251
    [78]W.Min,E.Tang,B.Lin.Data Hiding in Digital Binary Images[C].IEEE International Conference on Multimedia and Expo,USA,2000,vol.1:393-396
    [79]H.p.Lu,X.X.Shi,Y.Q.Shi,et al.Watermark Embedding in Dc Components of DCT for Binary Images[C].International Workshop on Multimedia Signal Processing(MMSP'02),USA,2002,300-303
    [80]Low S H.Document marking and identification using both line and word shifting[C].Proc.IEEE INFO COM'95,USA,1995,853-860
    [81]Podilchuk C I,Zeng W.Image adaptive watermarking using visual models[J].IEEE Journal on Selected Areas in Communications,1998,16(5):525-539
    [82]Jung Y J,Kang H K,Ro Y M.Novel watermark embedding technique based on human visual system[C].In:Proc.SPIE2001,USA,2001,314:475-482.
    [83]Michael Eysenck,Mark T.Keane.Cognitive Psychology,Fourth Edition[M].USA:Psychology Press,2000,235-358
    [84]郭秀艳.实验心理学[M].北京:人民教育出版社,2004,355-429
    [85]孟庆茂,常建华.实验心理学[M].北京:北京师范大学育出版社,1999,233-246
    [86]郭连骐,李庆芬.利用图论算法识别限制性手写汉字[J].哈尔滨工程大学学报,1998,19(2):86-89
    [87]郭连骐,李庆芬.利用拓扑关系的图形识别方法研究.哈尔滨工程大学学报,1998,19(4):190-193
    [88]Wataru Mayeda.A testing method for isomorphic graphs and its application to character recognition[C].China ICCAS,Beijing,1985,158-161
    [89]徐俊明.图论及其应用(第2版).北京:中国科学技术大学出版社,2004,5-45
    [90]V.N.Kasyanov,V.A.Evstigneev.Graph Theory for Programmers Algorithms for Processing Trees[M].USA:Kluwer Academic Publishers,2000,1-46,223-285,337-342
    [91]Rafael C,Gonzalez,Richard E Woods.Digital Image Processing Second Edition[M].北京:电子工业出版社,2003,51-55,435-437
    [92]刘东.利用字符的字形特征携带水印信息的文本数字水印技术[P],中国专利,200410040853.4,2004-10-18
    [93]刘东.基于字符拓扑结构的文本数字水印技术[P].中国专利,CN200510065893.9,2005-4-20
    [94]刘东.一种隐藏数据通信方法及其在文本数字水印技术中的应用[P].PCT国际专利,PCT/CN2005/001703,2005-10-9
    [95]刘东.以符号的冗余编码携带隐藏信息的文本数字水印技术[P].中国专利,200410040307.0,2004-7-26
    [96]刘东.基于符号冗余编码的文本数字水印技术[P].中国专利,CN200510067146.9,2005-4-18
    [97]C.Berrou,A.Glavieux.Near Optimum Error Correcting and Decoding:Turbo-codes[J].IEEE Transactions on Communication,1996,44(10):1261-1271
    [98]M.George,J.V.Chouinard,N.Georganas.Digital Watermarking of Images and Video Using Direct Sequence Spread Spectrum Techniques[C].IEEE Canadian Conference on Electrical and Computer Engineering,Canada,1999,vol.1:116-121
    [99]Brendan D Mckay.Nauty user's Guide(Version2.2)[EB].Online Document,http://cs.an u.edu.au/-bdm/nauty,2007
    [100]侯启槟,杨小帆,王阳生等.一种基于小波变换和骑士巡游的图像置乱算法[J].计算机研究与发展,2004,41(2):369-375
    [101]Qi Dongxu,Zou Jiancheng,Han Xiaoyou,A new class of scrambling transformation and its application in the image information covering[J].Science in China(series E),2000,43(3):304-312
    [102]Adobe Corporation.Creating Adobe PDF files using Acrobat Distiller[EB].Online Technical Support Document,http://www.adobe.com/support,2006
    [104]刘东,周明天.一种文本数字水印系统解决方案[J].计算机应用.2006,26(1):84-86
    [105]胡云,伍宏涛,张涵钰等.大容量索引图像水印方案的设计与实现[J].北京邮电大学学报,2005,28(1):26-29
    [106]丁玮,闫伟齐,齐东旭.基于Arnold变换的数字图像置乱技术[J].计算机辅助设计与图形学学报,2001,13(4):338-341
    [107]粟塔山,彭维杰,周作益等.最优化计算原理与算法程序设计[M].长沙:国防科技大学出版社,2001,1-98
    [108]卢开澄.组合数学[M].北京:清华大学出版社,1991,286-339
    [109]刘东,周丽晖,周明天,孙明.字符的图形与编码相互独立的隐藏通信方法.中国专利,CN200610020372.6,2006-2-28
    [110]Furon T,Duhamel P.An asymmetric watermarking method[J].IEEE Trans Signal Processing,2003,51(4):981-995.
    [111]Hartung F,Girod B.Digital watermarking of MPEG-2 coded video in the bits stream domain[C].Proc ICASSP IEEE,Germany,1997,2621-2624.
    [112]T.Y.Chung,M.S.Hong,Y.N.Oh,et al.Digital Watermarking for copyright protection of MPEG-2 Compressed Video[J].IEEE Transactions on Consumer Electronics,1998,44(3):895-901
    [113]M.George,J.V.Chouinard,N.Georganas.Digital Watermarking of Images and Video Using Direct Sequence Spread Spectrum Techniques[C].IEEE Canadian Conference on Electrical and Computer Engineering,Canada,1999,vol.1:116-121
    [114]Qadir,M.A,Ahmad I.Digital text watermarking:secure content delivery and data hiding in digital documents[C].2005 IEEE International Carnahan Conference On Security Technology (CCST '05),SPAIN,2005,101-104
    [115]T.Amano,D.Misaki.A Feature Calibration Method for Watermarking of Document Images[C].Proceedings of the Fifth International Conference on Document Analysis and Recognition,USA,1999,91-94.
    [116]A.K.Bhattacharjya,H.Ancin.Data Embedding in Text for A Copier SystemiC].International Conference on Image Processing,USA,1999,vol.2:245-249.
    [117]J.C.Yen.Watermarks Embedded in the Permuted Image[C].The 2001 IEEE International Symposium on Circuits and Systems(ISCA'2001),USA,2001,vol.2:53-56
    [118]Jonker W,Linnartz T P.Digital rights management in consumer electronics products[J].Signal Processing magazine IEEE,2004,21(4):82-91
    [119]Hartung.F,Ramme.F.Digital rights management and watermarking of multimedia content for m-commerce applications[J].Communications magazine IEEE,2000,38(11):78-84
    [120]Regazzi J.The shifting sands of open access publishing,a publisher's view[J].Serials Review,2004,30(4):275-280
    [121]Gass A.Paying to free science:costs of publication as costs of research[J].Serials Review,2005,31(2):103-106
    [122]俞银燕,汤帜.数字版权保护技术研究综述[J].计算机学报,2005,28(12):1957-1968
    [123]俞银燕,汤帜.一种具有硬件适应性的数字内容版权保护机制[J].北京大学学报(自然科学版),2005,41(5):800-808
    [124]Hall R W.Fast parallel thinning algorithms:parallel speed and connectivity preservation[J].Communication of the ACM,1989,32(1):124-131
    [125]郭晶莹,吴晴,商庆瑞.基于Matlab实现的指纹图像细节特征提取[J].计算机仿真,2007,24(3):182-85
    [126]胡向东,魏琴芳.应用密码学教程[M].北京:电子工业出版社,2005,16-19
    [127]Christine I.Podiichuk,Edward J.Delp.Digital watermarking:Algorithms and applications[J].Signal Processing Magazine,2001,14(4):33-46
    [128]尹浩,林闯,邱锋,丁嵘.数字水印技术综述[J].计算机研究与发展,2005,42(7):1093-1099
    [129]G.Voyatzis,I.Pitas.The use of watermarks in the protection of digital multimedia products[]].Proceedings of the IEEE,1999,87(7):1197-1207
    [130]章毓晋.图像工程(中册:图像分析)(第2版)[M].北京:清华大学出版社,2006,73-105
    [131]张立和,米晓莉,杨成,孔祥维.基于水印的移动数字内容权限管理方案[J].计算机应用研究,2007,24(3):125-127
    [132]F.HARTUNG,F.RAMME.Digital rights management and watermarking of multimedia content for m-commerce applications[J].IEEE Communications Magazine,2000,38(11):78-84.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700