光学信息处理技术在鲁棒数字水印中的应用研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
计算全息和数字水印相结合的全息水印是一种信息隐藏新技术,由于全息图的不可撕毁性等特点,全息水印具有很强的鲁棒性,为保护图像、音频、视频等知识产权提供新的有效手段。本文以信息光学为理论基础,研究计算全息的数字水印新方法,以获得比国际上典型的计算全息数字水印法更高的鲁棒性,得到性能优良的全息水印新方案。
     论文研究了一种基于纯相位干涉的计算全息图像信息隐藏技术。分析了相位在变换中的重要性,并采用纯相位替代传统傅里叶变换全息中的频谱复振幅与参考光波发生干涉,从而得到高对比度的计算全息图。为提高安全性,采用密钥将全息图进行加密,并通过离散余弦变换在频域嵌入宿主图像中完成信息隐藏。信息提取时先用密钥对提取的全息图进行解密,然后完成光学或计算全息再现过程。理论分析和仿真实验表明,纯相位的傅里叶变换计算全息信息隐藏技术对有损压缩、剪切和滤波等多种图像处理操作均具有很高的稳健性,并且比传统傅里叶变换全息信息隐藏的稳健性有很大提高。
     论文提出了基于相位恢复和计算全息技术的图像水印方法。该方法采用相位恢复算法将需要隐藏的水印图像编码为纯相位,然后用该纯相位代替传统的傅里叶变换全息中的物光波频谱与参考光波发生干涉,得到理论对比度为100%的傅里叶变换全息图。理论分析和数值计算实验表明了改进后的方法具有更好的稳健性和实用价值。
     论文基于信息光学理论提出了一种非线性限幅傅里叶计算全息的数字水印方法,使数字水印具有更好的鲁棒性。在传统傅里叶变换全息基础上提取计算全息图的振幅和相位,将相位信息作为输入函数,振幅信息转换成偏置函数,经过非线性限幅处理后得到二元傅里叶计算全息图。由于二元全息图比普通全息图具有更强的抗噪性能,从而大大提高了数字水印的鲁棒性。为了提高水印的抗压缩能力,通过离散余弦变换在频域嵌入宿主图像中。理论分析和仿真实验证实了在适当降低了初始提取水印精度的情况下,该方法比传统傅里叶计算全息水印的鲁棒性有很大提高。
     论文提出了一种新的基于相位恢复和非线性限幅的图像信息隐藏技术。该方法采用相位恢复算法将秘密信息编码为纯相位,然后用平行波前作为载波,运用非线性限幅模型处理得到二元全息干涉图,并给出理论推导公式。该全息图比普通非线性限幅的二元全息图包含更多的原始图像信息,提高了再现波前的衍射效率,从而大大提高了该技术的鲁棒性。采用密钥将此全息图进行加密后,结合JPEG系统基本原理运用双极性量化算法在频域嵌入载体图像中完成信息隐藏。信息提取时不需要原始载体图像的参与,通过密钥将提取的全息图进行解密,再进行数字再现即可完成。理论分析和对标准测试图像实验表明,该技术对多种图像处理操作稳健性有很大提高,具有很高的实用价值。
     论文提出了一种在计算全息技术中引入相位恢复算法的音频水印方法。用水印图像经相位恢复处理形成虚拟物光波与参考光波干涉,得到高对比度的傅里叶变换全息图。利用量化算法和离散余弦变换把计算全息图嵌入音频信号中,在水印提取过程中不需要原始音频信号的参与,并且采用密钥加强了水印的安全性。数值计算实验表明:该算法对有损压缩、重采样、低通滤波、噪音干扰等常用音频信号攻击均具有很好的稳健性。
CGH digital watermarking is a new information hiding technique that combined with computer-generated hologram and digital watermarking. The watermark has strong robustness because of non-tear of holograms, etc. It provides new effective means for protect intelligent property, such as image medium, audio medium and video medium, etc. We study the new approach of digital watermarking using CGH based on information optics theory, which in order to acquire a good project and higher robustness than the international typical method.
     We study the approach of image information hiding based on CGH of phase-only interference holography. The importance of phase in the transformation is analyzed. Instead of the complex amplitude of the traditional Fourier-transformed object wave, the phase-only wave is used to interfere with the reference wave, and a high contrast Fourier-transformed CGH is obtained. Hologram is embedded into host image by discrete-cosine-transform algorithm and encrypted by the security key. The original information is retrieved by reconstruction of optics or computer-generated hologram with the security key. Theoretical analysis and simulation experiments show that the algorithm has more robustness to image lossy compression, cropping and filtering, comparing with the algorithm based on general computer-generated hologram.
     In the next part of the dissertation, a new approach of digital watermarking based on phase retrieval algorithm and computer-generated hologram is proposed. The watermarking image is transformed into virtual object wave after phase retrieval algorithm. Then use the virtual object wave take the place of traditional Fourier- transformed object wave. It interfered with the reference wave to form Fourier- transformed computer-generated hologram and the contrast is 100% in theory. Theoretical analysis and numerical experiments show that the algorithm has more robustness and practical value.
     We proposed a new approach of Fourier CGH digital watermarking with nonlinear amplitude limiting based on information optics,which realizes better robustness. The amplitude and phase are extracted on the basis of traditional Fourier transform holography. Binary Fourier hologram was formed by nonlinear amplitude limiting algorithm when the phase information as input function and the amplitude information transferred into a bias function. Because the binary hologram has stronger anti-interference property than the normal hologram, the digital watermarking obtains much better robustness. To improve the watermark's resistance to compression, hologram is embedded in the frequency domain through discrete cosine transform. Theoretical analysis and numerical experiments show that the algorithm has more robustness under the situation that reduce initial watermark accuracy within limits, comparing with the algorithm based on traditional Fourier CGH watermarking.
     A new approach of information hiding technology based on phase retrieval algorithm and nonlinear amplitude limiting is proposed. The secret information is encoded into a pure phase by phase retrieval algorithm, and using parallel wave as the carrier. Then we obtain binary hologram by nonlinear amplitude limiting model. The theoretical derivation formula is given. The hologram contains more original image information than the hologram getting from average nonlinear amplitude limiting model and improves the diffraction efficiency when reconstruction, and which greatly improves the robustness of the technology. Hologram is encrypted by security key and embedded into host image in the frequency domain by the basic principles of JPEG and bipolar quantization algorithm. Information extraction does not require the participation of original image. It can be extracted with the security key and the secret information is retrieved by digital reconstruction. Theoretical analysis and experiments on standard test images show that the algorithm has more robustness and practical value to a variety of image processing operations comparing with the algorithm based on general digital holography.
     A new approach of audio watermarking by use of phase retrieval algorithm and computer-generated hologram is proposed. The watermarking image is transformed into virtual object wave after phase retrieval algorithm. It interferes with the reference wave to form high contrast Fourier-transformed CGH. And the hologram is embedded into audio signal by quantification process and discrete-cosine-transform .The watermark can be extracted without the original audio signal and the security key provides a good security. Numerical experiments show that the algorithm is robust against common signal manipulations and attacks, such as lossy compression, re-sampling, low pass filter, noise, and so on.
引文
[1] Pankanti, S., Bolle, R.M., Jain, A. Biometrics:The future of identification [J]. IEEE Computer, 2000,33(2):46~49
    [2]孙圣和,陆哲明,牛夏牧.数字水印技术及应用[M] .北京:科学出版社, 2004,1~56
    [3]彭翔,位恒政,张鹏.光学信息安全导论[M] .北京:科学出版社, 2008,1~16
    [4] Swanson, M.D., Kobayashi, M., Tewfik, A.H. Multimedia data-embedding and watermarking technologies [J]. Proceedings of the IEEE, 1998,86(6):1064~1087
    [5] Macq, B.M., Quisquater, J.-J. Cryptology for digital TV broadcasting [J]. Proceedings of the IEEE, 1995,83(6):944~957
    [6] Mauro Barni, Franco Bartolini, Vito Cappellini et al.. Copyright protection of digital images by embedded unperceivable marks [J]. Image and Vision Computing, 1998,16(12-13):897~906
    [7] Van Schyndel, R.G.., Tirkel, A.Z., Osborne, C.F. A digital watermark [J]. IEEE International Conference of Image Processing, 1994,2:86~90
    [8] Hartung, F., Kutter, M. Multimedia watermarking techniques [J]. Proceedings of the IEEE, 1999,87(7):1079~1107
    [9] Zhao Jian, Eckhard, K. A generic digital watermarking model [J]. Computer and Graphics, 1998,22(4):397~403
    [10] Nikolaidis, N., Pitas, I. Robust image watermarking in the spatial domain [J]. Signal Processing, 1998,66(3):385~403
    [11] Hartung, F., Ramme, F. Digital rights management and watermarking of multimedia content for M-commerce applications [J]. IEEE Communication Magazine, 2000,38(11):78~84
    [12] Vizireanu, D.N., Preda, R.O. A new digital watermarking scheme for image copyright protection using wavelet packets [J]. Telecommunications in ModernSatellite, Cable and Broadcasting Services, 2005. 7th International Conference on, 2005,2:518~521
    [13] Longjiang Yu, Xiamu Niu, Shenghe Sun. Print-and-scan model and the watermarking countermeasure [J]. Image and Vision Computing, 2005,23(9):807~814
    [14] Delaigle, J. F., De Vleeschouwer, C., Macq, B. Watermarking algorithm based on a human visual model [J]. Signal Processing, 1998,66(3):319~335
    [15] Santa Agreste, Guido Andaloro, A new approach to pre-processing digital image for wavelet-based watermark [J]. Journal of Computational and Applied Mathematics, 2008,221(2):274~283
    [16]苏显渝,李继陶.信息光学[M].北京:科学出版社,1999
    [17]钟丽云,张以谟,吕晓旭.数字全息图再现像的分析计算[J].中国激光,2004,31(5):570~574
    [18]刘诚,李良钰,朱健强等.无直透光和共轭像的数字全息[J].光学学报,2002,22(4):427~431
    [19]赵建林,谭海蕴,电子学全息干涉术用于温度场测量[J].光学学报,2002,22(12):1447~1451
    [20]熊秉衡,王正荣,张永安等.实时全息术检测透明物的一种新方法[J].光学学报,2001,21(7):841~845
    [21] Enrique Tajahuerce , Bahram Javidi. Shift-invariant three dimensional object recognition by means of digital holography [J]. Applied Optics, 2001,40(23):3877~3886
    [22] Brown, B. R., Lohmann, A. W. Complex spatial filtering with binary masks [J]. Applied Optics, 1966,5(6):967~969
    [23] Lohmann, A. W., Paris, D. P . Binary fraunhofer holograms, generated by computer,applied optics [J]. 1967,6(10):1739~1748
    [24] Lohmann, A W., Paris, D. P. Computer generated spatial filters for coherent optical data processing [J]. Applied Optics, 1968,7(4):651~655
    [25]金洪震,李勇,王辉等.数字全息图微缩输出系统设计[J].仪器仪表学报,2006,27(3):233~236
    [26] Sakata, H., Sakamoto, Y. J. Fast computation method for a Fresnel hologram using three-dimensional affine transformations in real space [J]. Applied Optics, 2009,48(34):H212~H221
    [27] Kim, S. C., Kim, E. S. Effective generation of digital holograms of three-dimensional objects using a novel look-up table method [J]. Applied Optics, 2008,47(19):D55~D62
    [28] Kim, S. C., Yoon, J. H., Kim, E. S. Fast generation of three-dimensional video holograms by combined use of data compression and lookup table techniques [J]. Applied Optics, 2008,47(32):5986~5995
    [29] Ahrenberg, L., Benzie, P., Magnor, M. et al.. Computer generated holography using parallel commodity graphics hardware [J]. Optics Express, 2006,14(17):7636~7641
    [30] Masuda, N., Ito, T., Tanaka, T. et al.. Computer generated holography using a graphics processing unit [J]. Optics Express, 2006,14(2):603~608
    [31] Pan, Y., Xu, X., Solanki, S. et al.. Fast CGH computation using S-LUT on GPU [J]. Optics Express, 2009,17(21):18543~18555
    [32] Ito, T., Masuda, N., Yoshimura, K. et al.. Special-purpose computer HORN-5 for a real-time electroholography [J]. Optics Express, 2005,13(6):1923~1932
    [33] Ichihashi, Y., Nakayama, H., Ito, T. et al.. HORN-6 special-purpose clustered computing system for electroholography [J]. Optics Express, 2009, 17(16):13895~13903
    [34] Cai X., Wang H. On holographic information content and its compression [J]. International Journal for Light and Electron Optics, 2006,117(3):131~137
    [35]柴晓冬,韦穗.基于离散衍射光的全息光栅的带宽压缩[J].光学学报,2004,24(3):304~308
    [36] Matsushima, K., Schimmel, H., Wyrowski, F. Fast calculation method for optical diffraction on tilted planes by use of the angular spectrum of plane waves [J]. JOSAA, 2003,20(9):1755~1762
    [37] Matsushima, K. Computer-generated holograms for three-dimensional surface objects with shade and texture [J]. Applied Optics, 2005,44(22):4607~4614
    [38] Ritter, A., B?ttger, J., Deussen, O. et al.. Hardware-based rendering of full-parallax synthetic holograms [J]. Applied Optics, 1999,38(8):1364~1369
    [39] Ahrenberg, L., Benzie, P., Magnor, M. et al.. Computer generated holograms from three dimensional meshes using an analytic light transport model [J]. Applied Optics, 2008,47(10):1567~1574
    [40] Kim, S., Kim, E. Fast computation of hologram patterns of a 3D object using run-length encoding and novel look-up table methods [J]. Applied Optics, 2009,48(6):1030~1041
    [41]黄素娟,王朔中,于瀛洁.共轭对称延拓傅里叶计算全息[J].物理学报,2009,58(2):952~958
    [42] Refregier, P., Javidi, B. Optical image encryption based on input plane and Fourier plane random encoding [J]. Optics Letters, 1995,20 (7):767~769
    [43] Matoba, O., Javidi, B. Encrypted optical memory system using three-dimensional keys in the Fresnel domain [J]. Optics Letters, 1999,24(11):762~764
    [44] Rosen, J., Javidi, B. Hidden images in halftone pictures [J]. Applied Optics, 2001,40(20):3346~3353
    [45] Cai, L. Z., He, M. Z., Liu, Q. et al.. Digital image encryption and watermarking by phase-shifting interferometry [J]. Applied Optics, 2004,43(15):3078~3084
    [46] Xiao, Y. L., Zhou X., Wang, Q. H. et al.. Optical image encryption topology [J]. Optics Letters, 2009,34(20):3223~3225
    [47] Javidi, B., Nomura, T. Securing information by use of digital holography [J]. Optics Letters, 2000,25(1):28~30
    [48] Kishk, S., Javidi, B. Information hiding technique with double phase encoding [J]. Applied Optics, 2002,41(26):5462~5470
    [49] Kishk, S., Javidi, B. Watermarking of three-dimensional objects by digitalholography [J]. Optics Letters, 2003,28(3):167~169
    [50] Kishk, S., Javidi, B. 3D object watermarking by a 3D hidden object [J]. Optics Express, 2003,11(8):874~888
    [51] Javidi, B., Zhang, G.., Li, J. Encrypted optical memory using double-random phase encoding [J]. Applied Optics, 1997,36(5):1054~1058
    [52] Monaghan, D. S., Situ, G., Gopinathan, U. et al.. Role of phase key in the double random phase encoding technique: an error analysis [J]. Applied Optics, 2008,47(21):3808~3816
    [53] Alfalou, A., Mansour, A. Double random phase encryption scheme to multiplex and simultaneous encode multiple images [J]. Applied Optics, 2009,48(31):5933~5947
    [54] Nobukatsu Takai, Yuto Mifune. Digital watermarking by a holographic technique [J]. Applied Optics, 2002,41(5):865~873
    [55] Chang, H.T., Tsan, C.L. Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain [J]. Applied Optics, 2005,44(29):6211~6219
    [56] Cheng, C. J., Lin, L. C., Dai,W. T. Construction and detection of digital holographic watermarks [J]. Optics Communications, 2005,248(1-3):105~116
    [57]刘福民,翟宏琛,杨晓苹.基于相息图迭代的随机相位加密[J].物理学报, 2003,52(10):2462~2465
    [58]杨晓苹,翟宏琛,王明伟.一种应用相息图对灰度图像信息进行隐藏的方法[J].物理学报, 2008,57(2):847~852
    [59]彭翔,张鹏,牛憨笨.基于虚拟光学的三维空间数字水印系统[J].光学学报, 2004,24(11):1507~1510
    [60]尉迟亮,顾济华,刘薇等.基于数字全息及离散余弦变换的图像数字水印技术[J].光学学报, 2006,26(3):355~361
    [61]孙刘杰,庄松林.双随机相位加密同轴傅里叶全息水印防伪技术[J].光学学报, 2007,27(4):621~624
    [62]黄清龙,刘建岚.基于光学菲涅耳衍射的“盲数字水印”技术[J].光学学报,2006,26(8):1145~1149
    [63]位恒政,彭翔,张鹏.基于菲涅耳数字全息的水印技术[J].系统仿真学报,2007,19(22):5351~5360
    [1]苏显渝,李继陶.信息光学[M].北京:科学出版社,1999
    [2]黄婉云.傅里叶光学教程[M].北京:北京师范大学出版社,1985
    [3] Unnikrishnan, G., Joseph, J., Singh, K. Optical encryption by double-random phase encoding in the fractional Fourier domain [J]. Optics Letters, 2000,25(12):887~889
    [4] Seo, D.H., Kim, S.J. Interferometric phase-only optical encryption system that uses a reference wave [J]. Optics Letters, 2003,28(5):304~306
    [5] Glückstad, J., Daria, V. R., Rodrigo, P. J. Comment on Interferometric phase-only optical encryption system that uses a reference wave [J]. Optics Letters, 2003,28(13):1075~1076
    [6] Seo, D.H., Kim, S.J. Reply to Comment on Interferometric phase-only optical encryption system that uses a reference wave [J]. Optics Letters, 2003,28 (13):1077~1077
    [7] Tao, R., Lang, J., Wang, Y. Optical image encryption based on the multiple-parameter fractional Fourier transform [J]. Optics Letters, 2008,33 (6):581~583
    [8] Zhang, Y., Wang, B. Optical image encryption based on interference [J]. Optics Letters, 2008,33(21):2443~2445
    [9] Xiao, Y.L., Zhou, X., Yuan S. et al.. Multiple-image optical encryption: an improved encoding approach [J]. Applied Optics, 2009,48(14):2686~2692
    [10] Zhu, N., Wang, Y.T., Liu, J. et al.. Optical image encryption based on interference of polarized light [J]. Optics Express, 2009,17(16):13418~13424
    [11] Alfalou, A., Brosseau, C. Optical image compression and encryption methods [J]. Advances in Optics and Photonics, 2009,1(3):589~636
    [12] He, M.Z., Tan, Q.F., Cao, L.C. et al.. Security enhanced optical encryption system by random phase key and permutation key [J]. Optics Express, 2009,17(25):22462~22473
    [13] Alfalou, A., Brosseau, C. Exploiting root-mean-square time-frequency structure for multiple-image optical compression and encryption [J]. Optics Letters, 2010,35(11):1914~1916
    [14] Clemente, P., Durán, V., Torres-Company, V. et al.. Optical encryption based on computational ghost imaging [J]. Optics Letters, 2010,35(14):2391~2393
    [15] Javidi, B., Horner, J. L., Walkup, J. F. An optical pattern recognition system for validation & security verification [J]. Optics and Photonics News, 1994,5(9):13~18
    [16] Wang, H.J., Su, P.C., Kuo, C-C J. Wavelet-based digital image watermarking [J]. Optics Express, 1998,3(12):491~496
    [17] Kim, H., Lee, Y. Optimal watermarking of digital hologram of 3-D object [J], Optics Express, 2005,13(8):2881~2886
    [18] Meng, X.F., Cai, L.Z., Yang, X.L. et al.. Digital color image watermarking based on phase-shifting interferometry and neighboring pixel value subtraction algorithm in the discrete-cosine-transform domain [J], Applied Optics, 2007,46(21):4694~4701
    [19] Shi, Y.S., Situ, G.H., Zhang, J.J. Multiple-image hiding in the Fresnel domain [J], Optics Letters, 2007,32(13):1914~1916
    [20] Shi, Y.S., Situ, G.H., Zhang, J.J. Multiple-image hiding by information prechoosing [J], Optics Letters, 2008,33(6):542~544
    [21] Deng, S.G., Liu, L., Lang, H.T. et al.. Watermarks encrypted in the cascaded Fresnel digital hologram [J], International Journal for Light and Electron Optics, 2007,118(6):302~305
    [22]盖琦,孙云峰,王晓雷等.基于离散四元数余弦变换的彩色图像数字水印技术[J].光电子.激光, 2009,20(9):1193~1197
    [23]樊亚春,周明全,王醒策等.应用提升格式小波变换的数字水印算法[J].光学精密工程, 2009,17(7):1722~1729
    [24]陈木生,基于数字全息与小波变换的图像数字水印技术[J].光学技术, 2009,35(5):678~681
    [25]杨涛,徐建锋,杨国光等.基于数字全息和离散余弦变换的数字水印技术[J].光电工程, 2009,36(12):91~96
    [26]黄清龙,刘建岚,陈瑾.用菲涅耳变换和相位密码板实现盲数字水印[J].光电子.激光, 2008,19(5):667~670
    [27]王沛,蒋慧钧,李莉等.基于RS纠错码和奇异值分解的多功能数字水印技术[J].光学精密工程, 2008,16(6):1127~1132
    [28]孙云峰,翟宏琛,杨晓苹等.傅立叶计算全息数字水印在彩色图像印刷防伪中的应用[J].光电子.激光, 2008,19(7):952~955
    [29]黄清龙,刘建岚,陈瑾.用多重菲涅耳衍射变换实现盲信息隐藏[J].光电工程, 2007,34(9):35~40
    [30]赵雅晶,钟金钢.全数字全息术在图像信息隐藏中的应用[J].光学技术, 2005,31(6):854~857
    [31]金聪.数字水印理论与技术[M].北京:清华大学出版社,2008
    [32]王炳锡,陈琪,郑峰森.数字水印技术[M].西安:西安电子科技大学出版社,2003
    [1] Nobukatsu Takai, Yuto Mifune. Digital watermarking by a holographic technique [J]. Applied Optics, 2002,41(5):865~873
    [2] Chang, H.T., Tsan, C.L. Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain [J]. Applied Optics, 2005,44(29):6211~6219
    [3]尉迟亮,顾济华,刘薇等.基于数字全息及离散余弦变换的图像数字水印技术[J].光学学报, 2006,26(3):355~361
    [4] Ishikawa, Y., Uehira, K., Yanaka, K. Practical evaluation of illumination watermarking technique using orthogonal transforms journal of display technology [J]. Journal of Display Technology, 2010,6(9):351~358
    [5] Okman, O. E., Akar, G. B. Quantization index modulation-based image watermarking using digital holography [J]. JOSA A, 2007,24(1):243~252
    [6]何文奇,彭翔,祁永坤等.基于非线性级联傅里叶变换的光学Hash函数构造[J].物理学报, 2010,59(3):1762~1768
    [7]黄清龙,刘建岚.基于光学菲涅耳衍射的“盲数字水印”技术[J].光学学报, 2006,26(8):1145~1149
    [8]孙刘杰,庄松林.基于加密傅里叶变换全息印刷防伪技术研究[J].光学仪器, 2006,28(1):69~73
    [9]聂守平,王鸣.图像纯位相编码分析[J].激光杂志, 2002,23(5):35~36
    [10] Wang, R K, Watson, I A, Chatwin, C. Random phase encoding for optical security[J]. Optical Engineering, 1996,35(9):2464~2469
    [11] Guohai Situ, Zhang Jingjuan. Image hiding with computer generated phase codes for optical authentication[J]. Optics Communications, 2005,245(1-6):55~65
    [12]杨晓苹,高丽娟,王晓雷等.基于双相位编码的单通道彩色图像加密[J].物理学报, 2009,58(3):1662~1666
    [13]刘福民,翟宏琛,杨晓苹.基于相息图迭代的随机相位加密[J].物理学报, 2003,52(10):2462~2465
    [14]李榕,李萍.基于随机相位实值编码的光学图像加密[J].光子学报, 2004,33(5):605~608
    [15]季瑾,黄飞,王亮等.利用数字全息和相位恢复算法实现信息加密[J].中国激光, 2007,34(10):1408~1412
    [16]孙云峰,王晓雷,王明伟等.相位密钥型傅立叶计算全息数字水印方法[J].光电子.激光, 2009,20(8):1077~1081
    [1] Wang, R.K., Watson,I.A., Chatwin, C. Random phase encoding for optical security [J]. Optical Engineering, 1996,35(9):2464~2469
    [2] Guohai Situ,Zhang Jingjuan.Image hiding with computer-generated phase codes for optical authentication [J].Optics Communications, 2005,245(1-6):55~65
    [3] Chang, H.T., Tsan, C.L. Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain [J]. Applied Optics, 2005,44(29):6211~6219
    [4] Nobukatsu Takai, Yuto Mifune. Digital watermarking by a holographic technique [J]. Applied Optics, 2002,41(5):865~873
    [5]尉迟亮,顾济华,刘薇等.基于数字全息及离散余弦变换的图像数字水印技术[J].光学学报, 2006,26(3):355~361
    [6]彭翔,张鹏,牛憨笨.基于虚拟光学的三维空间数字水印系统[J].光学学报, 2004,24(11):1507~1510
    [7]彭翔,白伟东,田劲东.半色调编码计算全息图的数字水印方法[J].光学学报, 2007,27(6):1011~1017
    [8]孙刘杰,庄松林.双随机相位加密全息标识防伪技术研究[J].光学学报, 2007,27(1):31~34
    [9]黄清龙,刘建岚.基于光学菲涅耳衍射的“盲数字水印”技术[J].光学学报, 2006,26(8):1145~1149
    [10]陈林森,周小红,邵洁.一种基于二元位相加密的大信息量数字全息水印[J].光子学报, 2005,34(4):616~620
    [11]杨晓苹,翟宏琛,王明伟.一种应用相息图对灰度图像信息进行隐藏的方法[J].物理学报, 2008,57(2):847~852
    [12]刘福民,翟宏琛,杨晓苹.基于相息图迭代的随机相位加密[J].物理学报, 2003,52(10):2462~2465
    [13]王永瑛,王玉荣,杨永斌.用迭代傅里叶变换算法实现光学分级图像加密[J].中国激光, 2006,33(10):1360~1364
    [14]孙刘杰,庄松林.加密同轴全息数字水印[J].光学精密工程, 2007,15(1):131~137
    [15]刘诚,刘志刚,薄峰等.数字全息中再现像分离问题的研究[J].光子学报, 2003,32(5):588~591
    [16]彭翔,位恒政,张鹏.光学信息安全导论[M] .北京:科学出版社,2008,163~183
    [1] Nobukatsu Takai, Yuto Mifune. Digital watermarking by a holographic technique [J]. Applied Optics, 2002,41(5),865~873
    [2] Chang, H.T., Tsan, C.L. Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain [J]. Applied Optics, 2005,44(29),6211~6219
    [3]尉迟亮,顾济华,刘薇等.基于数字全息及离散余弦变换的图像数字水印技术[J].光学学报, 2006,26(3):355~361
    [4] Smirnov, M. V. Holographic approach to embedding hidden watermarks in a photographic image [J]. Journal of Optical Technology, 2005,72(6):464~468
    [5] Meng, X.F., Cai, L.Z., Yang, X.L. et al.. Digital color image watermarking based on phase-shifting interferometry and neighboring pixel value subtraction algorithm in the discrete-cosine-transform domain [J]. Applied Optics, 2007,46(21):4694~4701
    [6]黄清龙,刘建岚.用多重菲涅耳衍射变换和相位密码板实现图像加密的技术[J].光子学报, 2008,37(10):2118~2123
    [7]孙刘杰,庄松林.基于同轴菲涅耳全息的标识印刷防伪技术[J].中国激光, 2007,34(3):402~405
    [8]赫明钊,曹良才,谭峭峰等.基于级联分数傅里叶变换系统的数字水印技术[J].光学学报, 2009,29(10):2709~2715
    [9]陈大庆,顾济华,周皓等.基于相位恢复的傅里叶变换全息图像数字水印[J].光学学报, 2009,29(12):3310~3316
    [10]孟祥锋,彭翔,蔡履中等.优化的两步相移算法在图像加密中的应用研究[J].物理学报, 2010,59(9):6118~6124
    [11]杨晓苹,翟宏琛,王明伟.一种应用相息图对灰度图像信息进行隐藏的方法[J].物理学报, 2008,57(2):847~852
    [12]杨晓苹,翟宏琛,梁艳梅等.基于二元相息图的信息隐藏[J].物理学报, 2008,19(1):111~114
    [13]王永瑛,王玉荣,杨永斌.用迭代傅里叶变换算法实现光学分级图像加密[J].中国激光, 2006,33(10):1360~1364
    [14]苏显瑜,李继陶.信息光学[M] .北京:科学出版社,1999,180~183
    [15]彭翔,位恒政,张鹏.光学信息安全导论[M] .北京:科学出版社,2008,109~112
    [1] Delaigle, J. F., De Vleeschouwer, C., Macq, B. Watermarking algorithm based on a human visual model [J]. Signal Processing, 1998,66(3):319~335
    [2] Longjiang Yu, Xiamu Niu, Shenghe Sun. Print-and-scan model and the watermarking countermeasure [J]. Image and Vision Computing, 2005,23(9):807~814
    [3]王秋生,孙圣和.基于量化数字音频信号频域参量的水印嵌入算法[J].声学学报, 2002,27(4):379~385
    [4] He, M.Z., Cai, L.Z., Liu, Q. et al.. Phase-only encryption and watermarking based on phase-shifting interferometry[J]. Applied Optics, 2005,4(13):2600~2606
    [5] Tian, H.W., Zhao, Y., Ni, R.R. et al.. Geometrically robust image watermarking by sector-shaped partitioning of geometric-invariant regions [J]. Optics Express, 2009,17(24):21819~21819
    [6] Li, J.Z, Zhang, X.S., Liu, S. et al.. A daptive watermarking scheme using a gray-level computer generated hologram [J]. Applied Optics, 2009,48(26):4858~4865
    [7] Zhu, S.M., Liu, J.M. An optimal adaptive quantization index modulation watermarking algorithm [J]. Chinese Optics Letters, 2009,7(7):580~584
    [8] Wang, S.Z., Huang, S.J., Zhang, X.P. et al.. Hologram-based watermarking capable of surviving print-scan process [J]. Applied Optics, 2010,49(7):1170~1178
    [9] Kishk, S., Javidi, B. Information hiding technique with double phase encoding [J]. Applied Optics, 2002,41(26):5462~5470
    [10] Nobukatsu Takai, Yuto Mifune. Digital watermarking by a holographic technique [J]. Applied Optics, 2002,41(5),865~873
    [11] Chang, H.T., Tsan, C.L. Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain [J]. Applied Optics, 2005,44(29),6211~6219
    [12]尉迟亮,顾济华,刘薇等.基于数字全息及离散余弦变换的图像数字水印技术[J].光学学报, 2006,26(3):355~361
    [13]陈大庆,顾济华,周皓等.基于相位恢复的傅里叶变换全息图像数字水印[J].光学学报, 2009,29(12):3310~3316
    [14]彭翔,张鹏,牛憨笨.基于虚拟光学的三维空间数字水印系统[J].光学学报, 2004,24 (11) :1507~1510
    [15]孙刘杰,庄松林.双随机相位加密全息标识防伪技术研究[J].光学学报, 2007,27(1):31~34
    [16]黄清龙,刘建岚.基于光学菲涅耳衍射的“盲数字水印”技术[J].光学学报, 2006,26(8):1145~1149
    [17]季瑾,黄飞,王亮等.利用数字全息和相位恢复算法实现信息加密[J].中国激光, 2007,34(10):1408~1412
    [18]苏显瑜,李继陶.信息光学[M] .北京:科学出版社,1999,180~183
    [1] Wang, R K, Watson, I A, Chatwin, C. Random phase encoding for optical security[J]. Optical Engineering, 1996,35(9):2464~2469
    [2] Zhu, S.M., Liu, J.M. A novel fragile watermarking scheme for image tamper detection and recovery [J]. Chinese Optics Letters, 2010,8(7):661~665
    [3] Abookasis, D., Montal, O., Abramson, O. et al.. Watermarks encrypted in a concealogram and deciphered by a modified joint-transform correlator [J]. Applied Optics, 2005,44(15):3019~3023
    [4]刘晓珂,苏显渝.基于图像部分加入的计算全息水印技术[J].光子学报, 2008,37(4):740~744
    [5]黄清龙,刘建岚.基于菲涅耳全息图和离散余弦变换的“盲数字水印”技术[J].光子学报, 2007,36(12):2261~2265
    [6]尹忠海,简剑锋,韩毅娜等.以影像逼真度为约束条件的变换域指纹嵌入强度[J].光子学报, 2007,36(8):1557~1560
    [7]张鹏,彭翔,牛憨笨.一种结合随机模板编码的虚拟光学三维数字水印系统[J].光子学报, 2005,34(8):1220~1223
    [8]刘薇,顾济华,尉迟亮等.一种基于数字全息技术的盲音频水印算法[J].光子学报, 2006,35(11):1788~1792
    [9]陶智,赵鹤鸣,顾济华等.基于心理声学模型和临界频带子波变换的数字声频水印[J].声学学报, 2006,31(2):114~119
    [10]宿富林,马国强,李明江.一种新的图像灰度数字水印嵌入算法[J].系统工程与电子技术, 2001,23(8):88~91
    [11]王秋生,孙圣和.基于量化数字音频信号频域参量的水印嵌入算法[J].声学学报, 2002,27(4):379~385

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700