数字图像信息隐藏的理论与算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
在现在大多数的通信系统中,人们对通信内容的保密往往求助于密码学。然而,在许多领域,密码学的应用已经越来越明显地暴露出它的局限性:密码学通过密文的不可理解性来保护信息的内容,而密文的不可理解性同时也暴露了信息的重要性。这很容易引起攻击者的注意,从而吸引攻击者采取多种手段对通信的内容进行破译或对通信过程进行破坏,继而造成通信过程的失败。近年来,一种新的信息保密方式成为信息安全领域的一个热门研究课题,这就是信息隐藏。与密码学不同的是,它通过对信息存在的本身或信息存在的位置进行保密,从而提供了比密码学更加可靠的安全性。
     对于信息隐藏技术的研究最为关心的三个主要方面是:抗检测性(不可感知性),隐藏容量和鲁棒性,这三者之间是互相冲突的,不可能同时达到最优。在具体应用时必须在三者之间寻求某种平衡,对于一般信息的隐藏而言(如图像信息),应努力寻求高的不可感知性和隐藏容量,而牺牲其鲁棒性。对于秘密信息的隐藏而言,应努力寻求高的不可感知性(包括不可检测性)和鲁棒性,而牺牲其隐藏容量。本论文在信息隐藏方面的主要工作就是围绕这两种应用展开的,内容涉及图像置乱、图像信息隐藏和隐藏分析和攻击技术等方面。
     本论文在理论上所作的主要工作及所取得的结论如下:
     ①系统地研究了整数的处理技术
     在第4章对可逆的线性变换进行了改造,使之成为整数到整数的变换。首先介绍了三类基本的整数可逆变换,在此基础之上,通过对给定线性变换的矩阵分解,给出了一个可逆线性变换整型化的充要条件及其构造方法,并将变换的应用范围从实数域推广到复数域。变换本身是可逆的,因此非常适合于无失真的数据处理,如语音或图像的无损压缩和加密处理。
     ②研究了仿射模变换的构造问题
     在第3章提出了广义Fibonacci序列的概念,在此基础上,成功地解决了整系数的仿射模变换的构造问题。
     本论文在应用上所作的主要工作及所取得结论如下:
     ①关于图像置乱算法
     简要概述了图像置乱的研究现状及研究意义,给出了图像置乱、置乱周期和图像置乱程度的数学定义。根据对待图像的不同观点,提出了3种新的图像置乱算法:准逆序变换的置乱算法,基于准抖动变换的置乱算法,基于拟仿射变换的置乱算法,并分析了它们在图像置乱中的性能。针对前人提出的仿射模变换的置乱算法,成功地解决了它的构造问题。
    
    重庆大学博士学位论文
     基于准逆序变换和准抖动变换的置乱算法的优点是:如结合颜色空间将灰度
    值同时置乱,则置乱效果与均匀分布的随噪声一样,用于隐藏可增强隐蔽通信的
    抗统计分析的能力。
     基于拟仿射变换置乱算法的优点是:可控参数是5个随机的浮点数,通过变
    换的很少次数的迭代可达到理想置乱效果。
     ②数字图像中信息隐藏的算法
     简要介绍了信息隐藏技术的分类及基本算法,着重研究了两类以数字图像为
    载体的典型信息隐藏系统:图像信息的隐藏算法和一般数据信息的隐藏算法。前
    者要求隐藏算法有较大的隐藏容量,后者对隐藏算法的鲁棒性方面有更高的要求。
     对于图像信息的隐藏系统,除要求有较大的隐藏容量外,“盲提取”是一项十分
    重要的要求。“盲提取”可以使通信过程一次完成,不必依赖其它的通信过程,大大
    简化通信过程。为了实现隐藏信息的“盲提取,,’在研究基本系统的。‘盲提取”性能的
    基础上,对基本系统进行了改进,大大提高了系统的隐藏信息的“盲提取”性能。
     对于一般数字信息的隐藏系统,要求隐藏的数据完全能够提取出来,要有比
    较强的鲁棒性。由于95%以上的图像信息都是以压缩方式进行存储和传输的,所
    以将数据压缩和信息隐藏结合在一起进行研究,提出了基于数据压缩思想的通用
    信息隐藏模型。针对模型中的关键技术进行研究,解决了整型图像数据的可逆浮
    点运算问题,实现了在不增加数据量和不减少信息量的条件下,改变数据的统计
    特性,增强了系统的抗检测性。
     ③信息隐藏分析及攻击技术
     对目前国际国内这方面的研究进行了概述和总结,简要介绍了密码分析技术
    和和隐藏检测技术,介绍了信息隐藏的检测与攻击一般框架以及数字图像信息隐
    藏检测技术和数字水印攻击方法。
    关键词:信息隐藏,图像置乱,图像加密,隐蔽通信,隐藏分析,数字水印
In the most of modern communication systems, the security of the traffic primarily depends on the cryptography, but this has rarely been adequate in practice by merely concealing the content of a message using encryption because the encryption may attract the attacker's attention, and then invokes attack. Information hiding techniques have recently become important in a number of application areas. In contrast to cryptography, it seeks to conceal the sender, the receiver or the very existence of a message, rather than merely concealing its content.The most concerned aspects of information hiding are, as to say, the ability to endure detecting or imperceptibility, the embedding capacity and the robustness, In general, these three aspects of information hiding are inconsistent to each other and can't get perfect performance independently. In practice, the imperceptibility and capacity are more important when you want to embed average information such as a picture, while you want to hide important information such as military applications, the robustness is more important. In this dissertation, we study the technologies and application of these two situations, our attentions focused on image scramble, image hiding, hiding analysis and attack.The contributions of this dissertation in theory include:(1) The integer version of data processing is studied systematically.A method to construct an integer version of the linear transforms is presented so that the integers of input data can be mapped to integers. Based on the introduction of three kinds of basic integer reversible transform, it is proposed by means of matrix decomposition the sufficient and essential condition that a linear transform can be rebuilt into integer version and the corresponding construction method. The transform is reversible, so it is suitable for the lossless data processing such as the lossless digital audio or image compressions.(2) The construction of module affine transformation.The concept of Generalized Fibonacci Queue is presented, based on which, the construction of module affine transformation is resolved.The contributions of this thesis in application include:(1) Digital image scrambling techniquesAs a kind of encryption method, the importance of image scrambling technique in information hiding is explored. The definitions of image scrambling, image scrambling
    
    degree and periods of image scrambling are proposed. Three novel image-scrambling algorithms are proposed, and their performances of scrambling image are analyzed.The quasi-anti-order scrambling and quasi-dither scrambling have ideal scramble performance, and can enhance the anti-analysis performance of an information hiding system.Quasi-Affine Transformation Over Limited Integer Grids (QATLIG) is present, based on the idea of building reversible linear transform that mapping integers to integers. QATLIG has a larger periods and leads to a better result, so it is superior to Arnold transformation, Fibonacci transformation and other geometric transformations.(2) Information hiding technique in digital imageThe classification and the basic algorithms of information hiding are introduced. We focused on two kinds of applications, hiding algorithms for image embedding and algorithms for general important information embedding. In general, the first one request high-embedding capacity but the second demands robustness.In practice, the 'blind extraction' is another demand for image embedding, which ensure the simplicity of the communication procedure. We propose a new algorithm, which enhance the blind performance greatly.As above 95% of images are compressed for storage and transfer, data compression techniques are combined with information hiding algorithms. A general information-hiding model based on data compression is proposed, we researched the key problems in this model, change the statistic properties of embedded data under the restriction of no data inflation and enhance the ability of anti-detection.
引文
[1] 陈克非.信息安全——密码的作用与局限[J].通信学报,2001,22(8):93—99
    [2] Biham E, Shamir A. Differential cryptanalysis of DES-like cryptosystems [J]. Journal of Cryptography, 1991, 4(1): 3—72
    [3] Harpes C, Kramer G, Massey J L. A generalization of linear cryptanalysis and the applicability of matsue's piling-up lemma [A]. Processding of Eurocrypt'95 [C]. Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1995
    [4] Matsui M. Linear cryptanalysis method for DES cipher [A]. Proceedings of Eurocrypt'93 [C]. Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1993
    [5] Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding—a survey [J]. Proceedings of the IEEE [J], 1999, 87(7): 1062—1077
    [6] 葛伟民.9·11与互联网.网络与信息闭,2001,15(11):12—13
    [7] Pfitzman B. Information hiding terminology [A]. First Information Hiding Workshop[C]. 347—350
    [8] 尤新刚,周琳娜,郭云彪.信息隐藏学科的主要分支及术语[A].北京电子技术应用研究所.信息隐藏全国学术研讨会(CIHW2000/2001)论文集[C].西安:西安电子科技大学出版社,2001.43—50
    [9] Stefan Katzenbeisser, Fabien A. P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking [M]. Artech House, Inc. 2000
    [10] Meadows C, Moskowitz I. Convert channels——A context-based review. Information hiding [A]. First Internation Workshop, Proceeding, vol.1174 of Lecture Notes in Computer Science[C], Springer, 1996: 23-38
    [11] Marvel L M, Boncelet C G, Retter C T. Spread Spectrum Image Steganogrphy [EB/OL]. http://citeseer.nj.nec.eom/marv199Spread.html
    [12] 柳保芳,平西建,邓宇虹.基于融合的数据隐藏算法[J].电子学报,2001,29(11):1445—1447
    [13] 李忠源,郭全成,任亚萍.图象中的信息隐含及水印技术[J].电子学报,2000,28(4):61—63
    [14] 林良行,苏中民,王庆,戴一奇.向量量化图象中的信息搭载[J].清华大学学报(自然科学版),1997,37(4):106—109
    [15] 于波,戴一奇,李武军.运动图象中的信息搭载[J].清华大学学报(自然科学版),2001,41(1):85—88
    [16] 江早.信息伪装——一种崭新的信息安全技术[J].中国图象图形学报,1998,3(1):83—86
    
    [17] 张彤,杨波,王育民,李真富.两类信息隐匿技术安全性的信息论分析方法[J].电子学报,2001,29(10):1346—1348
    [18] 陈明奇,钮心忻,杨义先.多址隐像术研究[J].通信学报,1999,20(12):59—64
    [19] 黄继武,谭铁牛.图像隐形水印综述[J].自动化学报,2000,20(12):645—654
    [20] 孙圣和,陆哲明.数字水印处理技术[J].电子学报,2000,28(8):85—90
    [21] 刘瑞祯,谭铁牛.数字图象水印研究综述[J].通信学报,2000,21(8):39—48
    [22] 张春田,苏育挺,管晓康.多媒体数字水印技术[J].通信学报,2000,21(9):46—52
    [23] 陈明奇,钮心忻,杨义先.数字水印的研究进展和应用[J].通信学报,2001,22(5):71—79
    [24] 丁玮,闫伟齐,齐东旭.数字图象水印的Cox方法和Pitas方法综述[J].北方工业大学学报,2000,12(3):1—12
    [25] 张春田,苏育挺.信息产品的版权保护技术——数字水印[J].电信科学,1998,14(12):15—17
    [26] Bender W, Gruhl D, Morimto N, et al. Techniques for data hiding [J]. IBM System Journal, 1996, 35(3&4): 313—335
    [27] Cox I J, Kilian J, Leighton F T, et al. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 1997, 6(12): 1673—1687
    [28] Brassil J, Low S, Maxemchuk N, et al. Electronic marking and identification techniques to discourage document copying [A]. Proceeding of IEEE INFOCOM'94[C]. Toronto, 1994, Vol3: 1278—1287
    [29] Koch E, Zhao J. Towards robust and hidden image copyright labeling [A]. Proceedings of 1995 IEEE Workshop on Nonlinear Signal and Image Processing[C]. Neos Marmaras, Halkidiki, Greece, 1995.
    [30] Cox I, Linnartz M G J. Some general methods for tampering with watermarks [J]. IEEE Journal on Selected on Selected Areas in Communications, 1998, 16(4): 587—593
    [31] Graver S, Memon N, Yeo B L, et al. Resolving rightful ownership with invisible watermarking techniques: limitations, attacks and implication [J]. IEEE Journal on Special Areas in Communications, 1998, 16(4): 573—586
    [32] Podilchuk C I. Image-adaptive watermarking using visual models [J]. IEEE Journal on Selected Areas in Communications, 1998, 16(4): 525—539
    [33] Pao-Ta Yu, Hung-Hsu Tsai, Jyh-Shyan Lin. Digital watermarking based on neural networks for color images [J]. Signal Processing, 2001, 81: 663—671
    [34] 徐军,叶澄清,向辉.基于神经网络分类的图象数字水印算法[J].模式识别与人工智能,2001,14(3):261—265
    [35] 胡臻平,葛孚华,李天牧.基于分形压缩编码的数字水印技术[J].计算机应用,2001, 21(3):34—36
    [3
    
    [36] Johnson N F, Jajodia S. Exploring steganography seeing the uneen[J]. IEEE Computer, 1998, 31(2): 26—34
    [37] Kutter M, Jordan F, Bossen F. Digital signature of color images using amplitude modulation. Proceeding of the SPIE, Ⅷ, 1997: 200—205
    [38] Anderson R J, Needham R M, Shamir A. The steganographic file system [EB/OL]. http://citeseer.nj.nec.com/anderson98thestegano.html
    [39] Wu min, Yu H H. Video access control via multi-level data hiding [EB/OL]. http://citeseer.nj.nec.com/min98video.html
    [40] Cox I J, Kilian J, Leighton T, et al. Secure spread spectrum watermarking for image, auido and video[EB/OL]. http://citeseer.nj.nec.com/cox97-secure.html
    [41] Westfeld A, Wolf G. Steganography in a video conferencing system [EB/OL]. http://citeseer.nj.nec.com/westfed99steganogrphy.html
    [42] Puate J, Jordan F. Using fractal compression scheme to embed a digital signature into an image [EB/OL]. http://citeseer.nj.nec.com/puate98-using.html
    [43] 中国社会科学院语言研究所词典编辑室编.现代汉语词典[M].北京:商务印书馆,1983.438
    [44] Anderson R J, Petitcolas F A P. On the limits of steganography[J]. IEEE Journal of Selected Areas in Communications 1998, 16(4): 474—481
    [45] Craver S. On public-key steganography in the presence of an active warden[J]. Technical Report RC 20931, IBM, 1997
    [46] Cachin C. An information-theoretic model for steganography[J]. Proceeding of the Second International Workshop on Information Hiding. vol.1525 of Lecture Notes in Computer Science, Springer, 1998: 306—318
    [47] 吴秋新,钮心忻,杨义先等译.信息隐藏技术——隐写术与数字水印[M].北京:人民邮电出版社,2001.27—29
    [48] Marvel L M. Image steganography for hidden communication [D]. Delaware: the Faculty of the University of Delaware, 18—25
    [49] Pickholtz R L, Schilling D L, Milstein L B. Theory of spread-spectrum communicaition-a tutorial[J]. IEEE Transaction on Communication, 1982, 30(5): 855—885
    [50] Hartung F, Girod B. Watermarking of uncompressed video[J]. Signal Processing, 1998, 66 (3): 283—301
    [51] Smith J, Comiskey B. Modulation and information hiding in images [EB/OL]. http://citeseer.nj.nec.com/smith97modulation.html
    
    [52] Simmons G J. Subliminal communication is easy using the DSA [J]. In Proc. EUROCRYPT 93—Advances in Cryptology. Berlin, Germany: Springer-Verlag, 1993, 218—232
    [53] Simmons G J. Subliminal channels: past and present [J]. European Transactions on Telecommunications, July/August [J], 1994, 16(4): 459—473
    [54] Simmons G J. The History of subliminal channels [J]. IEEE journal on selected areas in communication, 1998, 16(4): 452—462
    [55] Simmons G J. Results concerning the bandwidth of subliminal channels [J]. IEEE journal on selected areas in communication, 1998, 16(4): 463—473
    [56] Simmons G J. The prisoners' problem and the subliminal channel [J]. Advances in Cryptology: Proc. Crypto'83, New York, Plenum Press, 1984: 51—67
    [57] 张彤,杨波,王育民等.抵御分割选择法的阈下信道及其带宽分析[J].西安电子科技大学学报(自然科学版),2000,27(3):344—347
    [58] Cox I J, Millier M L, Mckellips A L. Watermarking as communications with side information[J]. Proceedings of the IEEE, 1999, 87(7): 1127—1141
    [59] Chen P C, Chen Y S, Hsu W H. A communication system model for digital image watermarking problems[EB/OL], http://citeseer.nj.nec.com/chen99-communication.html
    [60] Lee Y K, Chen L H. High capacity images steganographic model. IEE Proc.-Vis. Images Signal Process. 2000, 147(3): 288—294
    [61] Barni M, Bartolinit F, Rosa A D, et al. Capacity of full frame DCT image watermarks [J]. IEEE Transactions on Image Processing. 2000, 9(8): 1450—1455
    [62] Servetto S D, Podilchuk C I, Ramchandran K. Capacity issues in digital image watermarking [EB/OL]. http://citeseer.nj.nec.com/servtto98capacity.html
    [63] Marvel L M, Boncelet C G. Capacity of the additive steganogrphic channel [EB/OL]. http://citeseer.nj.nec.com/239861.html
    [64] Ramkumar M, Akansu A N. Capacity estimates for data hiding in compressed images. IEEE Transactions on Image Processing. 2001, 10(8): 1252—1263
    [65] Petitcolas F A P, Anderson R J, Kuhn M G. Attacks on copyright marking systems[EB/OL]. http://citeseer.nj.nec.com/petitcolas98attacks.html
    [66] Sowers S, Youssef A. Testing digital watermarking resistance to destruction [EB/OL]. http://citeseer.nj.nec.com/petitcolas98attacks.html
    [67] Linnartz J P, Dijk M V. Analysis of the sensitivity attack against electronic watermarks in images[EB/OL]. http://citeseer.nj.nec.com/linnartz98analy-sis.html
    [68] Maes M. Twin peaks: the histogram attack on fixed depth image watermarks [EB/OL]. http://citeseer.nj.nec.com/maes98twin.html
    
    [69] Johnson N F, Jajodia S. Steganalysis of images created using current steganogrphy software [EB/OL]. http://citeseer.nj.nec.com/johnson98steg-analysis.html
    [70] Johnson N F, Jajodia S. Steganalysis of LSB encoding in color images [EB/OL]. http://citeseer.nj.nec.com/403441.html
    [71] Johnson N F, Jajodia S. Steganalysis: the investigatin of hidden information [EB/OL]. http://citeseer.nj.nec.com/johnson98steganalsis.html
    [72] 尤新刚,郭云彪,周琳娜.峰值信噪比不宜用来评价信息隐藏技术[A].北京电子技术应用研究所.信息隐藏全国学术研讨会(CIHW2000/2001)论文集[C].西安:西安电子科技大学出版社,2001,51—56
    [73] Aura T. Invisible communication [EB/OL]. http://www.tml.hut.fi/0pinnot/tik-110.501/1995/steganography.html
    [74] Bami M, Bartolini F, Piva A. Improved wavelet-based watermarking through pixel-wise masking[J]. IEEE Transaction on Image Processing, 2001, 10(5): 783—791
    [75] Lewis A S, Knowles G. Image compression using the 2-D wavelet transformation. IEEE Transaction on Image Processing, 1992, 1(4): 244—250
    [76] 傅祖芸.信息论——基础理论与应用[M].北京:电子工业出版社,2001.73—111
    [77] Robert J R. Advanced Software Design Techniques. Petrocelli Books, Inc. 1978
    [78] Sara Baase著,朱 洪等译.计算机算法设计和分析引论.上海:复旦大学出版社,1985,99
    [79] 丁玮,闫伟齐,齐东旭.基于Arnold变换的数字图像置乱技术[J].计算机辅助设计与图形学学报[J],2001,13(4):339—341)
    [80] Qi Dong-xu, Zou Jian-chen, Han Xiao-you. A new class of scrambling transformation and its application in the image information covering [J]. Science in China (Series E), 2000, 43(3): 304—312
    [81] 王道顺,杨地莲,齐东旭.数字图像的两类非线性变换及其周期性[J].计算机辅助设计与图形学学报[J],2001,13(9):829—833
    [82] 邹建成,唐旭辉,李国富.数字图象的仿射变换及其周期[J].北方工业大学学报,2000,12(3):13—16
    [83] 齐东旭,邹建成,韩效宥.一类新的置乱变换及其在图象信息隐蔽中的应用[J].中国科学(E辑),2000,30(5):440—448
    [84] 孙伟.关于Arnold变换的周期[J].北方工业大学学报,1999,11(1):29—32
    [85] 邹建成,铁小匀.数字图象的二维Arnold变换及其周期[J].北方工业大学学报,2000,12(1):10—14
    [86] 丁玮,齐东旭.基于生命游戏的数字图像置乱与数字水印技术[J].北方工业大学学报, 2000,12(1):1—5
    [8
    
    [87] 丁玮,闫伟齐,齐东旭.基于置乱与融合的数字图象隐藏技术及其应用[J].中国图象图形学报,2000,5(A,8):643—649
    [88] 丁玮,齐东旭.数字图像变换及信息隐藏与伪装技术[J].计算机学报,1998,21(9):839—843
    [89] 徐桂芳,曹敏谦.纯幻方的构造原理与方法[M].西安:西安交通大学出版社,1994
    [90] 齐东旭.分形及其计算机生成[M].北京:科学出版社,1994
    [91] 王新成.多媒体实用技术(图象分册)[M].成都:电子科技大学出版社,1995
    [92] 沈庭方,方子文.数字图象处理及模式识别[M].北京:北京理工大学出版社,1998
    [93] Ding Wei, Yan Wei-Qi, Qi Dong-Xu. Digital Image Scrambling Technology Based on Gray Code, Proc. of the 6th International Conference on Computer Aided Design & Computer Graphics, Wen Hui Publishers, Dec., 1999, 3: 900-904
    [94] 李国富,宋瑞霞,赵慧.椭圆曲线在数字图象隐藏中的应用[J].北方工业大学学报,2000,12(3):17—20
    [95] 李国富.正交拉丁变换的周期及其在数字图象置乱中的应用[A].北京电子技术应用研究所.信息隐藏全国学术研讨会(CIHW2000/2001)论文集[C].西安:西安电子科技大学出版社,2001,1—7
    [96] 吴昊升,王介生,刘慎权.图像的排列变换[J].计算机学报,1998,21(6):514—519
    [97] 易开祥,孙鑫,石教英.一种基于混沌序列的图像加密算法[J].计算机辅助设计与图形学学报[J],2000,12(9):672—676
    [98] 柏森,曹长修,曹龙汉等.基于骑士巡游变换的图像细节隐藏技术[J].中国图像图形学报,2001,6(11,A):1096—1100
    [99] 柏森,曹长修.一种新的数字图像置乱隐藏算法[J].计算机工程,2001,27(11):18—19,119
    [100] 李勇,曲保章,陈性元.数据置乱算法的分析[J].计算机科学与工程,2001,23(3):70—72
    [101] 张屏生,毕厚杰.图象加密的一种方法[J].通信学报,1984,5(3):85—90
    [102] Hsu C T, Wu J L. Hidden digital watermarks in Images. [J]. IEEE Transactions on Image Processing, 1999, 8(1): 58—68
    [103] 柏森,曹长修.以图象为掩护媒体的阈下信道的抗干扰性[J].计算机工程,2002,28(10):77—78,134
    [104] 金维斌.基于数学形态学的图象信息隐藏检测研究[A].北京电子技术应用研究所.信息隐藏全国学术研讨会(CIHW2000/2001)论文集[C].西安:西安电子科技大学出版社,2001,215—220
    [105] http://idea.dec.dsi.unimi.it/pub/security/crypt/code
    
    [106] 吴伯修,曹秀英.密码学与语言保密通信[M].南京:东南大学出版社,1996,10-20.
    [107] 柏森,杨晓帆,柏林.骑士旅游问题一个猜想的证明[J].重庆大学学报(自然科学版),1998,21(5):85—89
    [108] 北京大学数学力学系.高等代数[M].北京:高等教育出版社,1978,54—55
    [109] 柏森,曹长修.亚仿射变换的性质及应用研究[J].计算机辅助设计与图形学学报,2003,15(2):205—208
    [110] Wu D C, Tsai W H. Spatial-domain hiding using image differencing[J]. IEE Proc. -Vis. Image Signal Process, 2000, 147 (1): 29—36
    [111] Smith J R, Comiskey B O. Modulation and information hiding in images, in proc. of first int. Workshop on Information Hiding, Lecture Notes in Computer Science. 1996 1174: 207—226
    [112] Hern(?)ndez J R, P(?)rez-GonTAlez F, Rodriguez J M, Nieto G. Performance analysis of a 2-D multipulse amplitude modulation scheme for data hiding and watermarking of still images. IEEE Journal of Select Areas on Communication, 1998, 16(5): 510—524
    [113] Provos Niels. Probabilistic methods for improving information hiding [EB/OL]. http://eiteseer.nj.nec.com/Provos99probabilistic.html
    [114] Ramkumar M, Akansu A N. Information theoretic bounds for data hiding in compressed images [EB/OL]. http://citeseer.nj.nec.com/ramkumar99infor-mation.html
    [115] 齐东旭.矩阵变换及其在图象信息隐藏中的应用研究[J].北方工业大学学报,1999,11(1):24—28
    [116] 闫伟齐,丁玮,齐东旭.基于调配函数的一类图象隐藏[J].北方工业大学学报,2001,13(1):1—6
    [117] 闫伟齐,丁玮,齐东旭.一种基于动直线的多幅图象分存方法[J].软件学报,2000,11(9):1176—1180
    [118] 王道顺,杨路.图象的单幅可视隐藏方案[J].计算机学报,2000,23(9):943—948
    [119] 王道顺,齐东旭.一种新的数字图象隐藏方案[J].计算机学报,2000,23(9):949—952
    [120] 闫伟齐,丁玮,齐东旭.基于中国剩余定理的图象分存在方法[J].北方工业大学学报,2000,12(1):6—9
    [121] Flyrm J. A journey within steganos [EB/OL]. http://www.fravia.org/fly-01.htm
    [122] Aura T. Practical invisibility in digital communication. in Information Hiding: First International Workshop, Proceedings, vol.1174 of Lecture Notes in Computer Science, Springer, 1996, 265—278
    [123] 伯晓晨,沈林成,常文森.一种新的盲图像水印检测算法[J].计算机学报,2001,24(12):1279—1280
    [124] 曹志刚,钱亚生.现代通信原理[M].北京:清华大学出版社,1992.20—24
    
    [125] Proakis J G.张力军,张宗橙,郑宝玉等译.数字通信(第三版) [M].北京:电子工业出版社,2001,262—271
    [126] Serveto S D, Podilchuk C I, Ramchandran K. Capacity issues in digital image watermarking [A]. In proc. ICIP'98, IEEE Int. Conf. on Image Processing[C]. 1998, 4-7, October Ⅰ: 445—449, (Chicago, Illionisk, USA)
    [127] 夏良正.数字图像处理[M].南京:东南大学出版社,1999.34—42
    [128] Joshi R L, Fischer T R. Comparison of generalized Gaussian and Laplancian modeling in DCT image coding [J]. IEEE Signal Processing Lett. 1995, 2(5): 81—81
    [129] 陈守吉,张力明.分形与图象压缩[M].上海:上海科技教育出版社,1998,57—58
    [130] 柏森,吴乐华,王田,曹长修等.图像隐藏与伪装技术[J].计算机研究与发展,2000,37(增刊):126—131
    [131] 李均利,陈刚,吴炯锋.基于模糊积分的一类图像度量[J].高校应用数学学报,2001,16(1):8—14
    [132] 孔祥维,尤新刚.信息隐藏技术安全性的攻击框架及方法[A].北京电子技术应用研究所.信息隐藏全国学术研讨会(CIHW2002)论文集[C].机械工业出版社,2002.42—47
    [133] Daubchies I, Sweldens W. Factoring wavelet transforms into lifting steps. Technical Report, Bell Laboratories, Lucent Tchnologies, 1996.
    [134] 闫宇松,石青云.颜色空间之间的可逆变换[J].模式识别与人工智能,1999,12(1):38~44.
    [135] 闫宇松,石青云.可逆的DCT整型变换与无失真图像压缩[J].软件学报,2000,11(5):620~627.
    [136] 王朝瑞,史荣昌.矩阵分析[M].北京理工大学出版社,1987

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700