基于小波和多尺度几何分析的信息隐藏技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
在信息安全和版权保护的驱动下,信息隐藏技术在近几年得到很大的发展,已经在人类生活的许多方面得到广泛应用。目前信息隐藏技术的研究主要集中在隐秘术和数字水印两个方面,隐秘术是研究如何将秘密信息隐藏在不太容易引起注意的消息中,从而使得秘密通信不被觉察;数字水印源于数字媒体作品的版权保护,都已成为信息安全领域的最新研究热点。
     本文从分析传统信息隐藏算法的缺陷和不足出发,有针对性地提出新的信息隐藏算法,并从算法的设计、隐藏信息的检测、容量大小和抗攻击性等方面做了很多研究,主要研究工作包括:
     由于传统的数字水印算法试验都是采用逐点比对隐藏信息来实现,将相似度达到某个阈值作为水印存在的判据,容易导致误判和降低水印识别率,而且算法过于复杂难以实现。针对这些缺陷,提出了基于二代Bandelet图像认证水印算法和基于方向小波几何图像认证算法,并对基于局部统计模型自适应噪声强度算法进行改进。前者应用第二代Bandelet变换生成图像的几何方向流来刻画图像的纹理和几何特征,后者是利用方向小波变换生成图像的几何方向流来刻画图像纹理和几何特征,上述两个算法都是利用改进的统计模型自适应噪声强度算法来筛选出纹理丰富的子图,用于信息隐藏。实验表明上述两个算法不仅能将图像的方向流信息隐藏并检测出,而且还能够抗模糊、JEPG压缩、噪声等典型攻击。
     针对目前已有的纹理图像隐藏DEM数据的算法会对纹理图像产生破坏的缺点,提出了基于小波变换的纹理无损隐藏DEM数据算法。该算法应用基于整数小波变换和极低比特率压缩编码算法,采用直方图平移的无损隐藏算法将压缩的高程数据隐藏到纹理图像中,在提取隐藏信息时采用直方图平移算法可逆地将隐藏在纹理图中的DEM数据提取,并实现了纹理图的无损恢复。
     根据DEM数据的特点,提出了基于方向小波的无损三维地形数据水印签名技术和基于DEM数据可见三维水印技术。前者是利用方向小波变换来检测三维地形的趋势和走向,将其作为认证水印并隐藏其中,通过修改广义直方图的平移算法实现水印信息的隐藏。后者是将三维水印与DEM数据进行三维融合,并记录被三维水印遮蔽的DEM数据信息,利用广义直方图平移方法隐藏了被三维水印遮蔽的信息,然后通过广义直方图平移算法可逆地提取出被三维水印遮蔽的信息,用来替换三维水印恢复出原始DEM数据。实验表明方向小波流能很好地刻画出三维DEM数据地形的特征,在保证较高的峰值性噪比(>40dB)时能嵌入较大隐藏信息量(>16kb),在保证DEM地形数据纹理足够丰富时,可见三维水印越大,隐藏的信息量也就越大。
     为了解决水印与载体融合后视觉不太和谐、信息隐藏量小、可见水印容易破坏载体,以及算法本身安全的问题,提出了基于小波系数相对模糊关系的水印算法和基于模糊关系的无损可见水印。前者是采用带参数的整数小波变换获取载体的小波系数,应用Rabin方法构造的函数生成模糊关系矩阵,通过近似分量和对角分量的量化噪声余量矩阵的相对关系修改对角分量小波系数,最后对小波系数做小波逆变换得到隐含水印的图像。实验证明,该算法在嵌入水印后图像质量仍然很高,具有较强抗攻击能力,在水印提取过程中不需要原始图像的参与。后者是先将载体与可见水印进行模糊融合,然后利用RH算法对遮蔽子图进行加密,最后采用改进的直方图平移方法实现信息隐藏和恢复。该算法具有可见水印的无损自恢复性,不需要可见水印信息就可完全无损地恢复原始图像。由于算法是采用Rinjindael构造的Hash算子加密遮蔽子图,将1位扰动扩散到整个图像,具有较高的安全性。
To protect security and copyright of information, the information hiding technology has been developed greatly in recent years. It has been used widely in many aspects of human life. The research on it currently focused on two things:steganography and digital watermark. The first one is to study how to insert confidential information into messages secretly which will not draw people's attention and make the secret communication hard to be detected. The latter one is proposed for the copyright privacy of digital media. Both of them are the latest hotspot of information security fields.
     Based on the analysis of the defects of the traditional information hiding algorithms, new methods for solving these problems are proposed in this paper. A series of researches on the design of algorithms, detection of the hidden information, its capacity and the ability for defending attacks and so on, have been done. The main original works include:
     As all tests of the traditional digital watermark method are executed by contrasting embedded information point by point. The watermark is detected based on the calculation of the similarity. A watermark is proved to be existed when the similarity reaches a certain threshold. However, it easily leads to wrong judgment and reduction of the discrimination. Furthermore, it is too complex to be realized. Considering these shortcomings, the watermark algorithm for image authentication based on the second generation Bandelet and the one for geometric image authentication based on directional wavelet are proposed here. Moreover, the adaptive noise intensity algorithm based on the statistical models is improved. The former depicts the texture and geometric features of the image by adopting the second generation Bandelet transformation to generate geometric direction flow of the image. The latter realizes the goal by using directional wavelet transformation to generate the flow. Both of the two methods take advantage of the adaptive noise intensity algorithm, to filter out subgraphs owning rich texture for hiding information. The experimental results show that these two algorithms are not only able to embed the information of directional flow of image confidently and then detect it, but also withstand the typical attacks such as fuzzy, JEPG compression, noise and others.
     To fix the weakness that the present texture DEM data hiding algorithms damage that texture, the texture DEM data hiding algorithm without data lost, which is based on wavelet, is proposed. It uses the wavelet-based method of 3d DEM data compression of extreme small bit rate, adopts histogram-shift non-destructive hidden algorithm to embed the compressed elevation data into the texture image, and extracts the hidden DEM data from the image with the reversible histogram-shift algorithm. Moreover, a lossless recovery of the texture image is realized.
     According to the characteristic of DEM data, the non-destructive three-dimensional terrain data watermark signature technology based on directional wavelet, and visible three-dimensional watermark technology based on DEM data are developed. The former is to detect the trend and direction of the 3d terrain by the means of directional wavelet transformation, then hides them as authentication watermark, and inserts the data by modifying the translation algorithm of generalized histogram. The latter is the three-dimensional integration of three-dimensional watermark and DEM data, which embeds the three-dimensional watermark information into DEM data by the translation algorithm of histogram, meanwhile recording the information marked by three-dimensional watermark, replaces three-dimensional watermark with the information marked by three-dimensional watermark, which is extracted by the reversible algorithm of generalized histogram, and then recovers the original DEM data. The experimental results show that the wavelet can describe the feature of three-dimensional DEM data terrain well, when ensuring a high peak noise ratio (>40dB) and a great amount of hidden information can be embedded (>16kb) with the guarantee that the DEM ground texture data is plenty enough. The larger the visible three-dimensional watermark is, the greater the amount of hidden information is.
     To improve visual effects of fused image, and provide illegal user removing the visible watermark, the relative fuzzy relation based on wavelet coefficient and the lossless visible watermark based on fuzzy relation are proposed. Fuzzy relationship matrix is constructed by applying Rabin's function. And diagonal components and approximate components modulo the weight of the quantization noise of wavelet. Relationship of remainder is used to embed watermark. The experiments show that, for the former, its quality is still very high when watermarks are embedded, what's more, the watermarking algorithm has strong attack-resistance ability and the original image doesn't need to be participated in the process of watermark extraction. The later, carrier fused with visible watermark firstly. Secondly, encrypt the block subgrah by applying RH function. Finally, an improved histogram shifting method achieves information hiding and recovery. Because the algorithm adopts Hash operator encipher shading sub-graph which is constructed by Rinj indael, it lets 1 bit diffuse into the whole image, thereby it can protect the image data, so this algorithm has highly security.
引文
[1]Nikolaidis N, Pitas Ⅰ. Copyright protection of images using robust digital signatures.IEEE Int Conf Acoustics, Speech, Signal Processing (ICASSP'96), vol.4, Atlanta,1996.2168-2171
    [2]王炳锡,彭天强.信息隐藏技术.北京:国防工业出版社,2007.1-50
    [3]王丽娜,张焕国,叶登攀.信息隐藏技术与应用(第二版).武汉:武汉大学出版社,2009.1-69
    [4]Celik, M.U., G. Sharm, A.M. Tekalp. Lossless Watermarking for Image Authentication:A New Framework and an Implementation, IEEE Trans. Image Process,2006,15(4):1042-1049
    [5]Ni Z. C, Shi Y. Q., Ansari N., Su W. Reversible Data Hiding, IEEE Trans. Circuits and System for Video Technology,2006,16(3):354~362
    [6]Schyndel Van R. G, Tirkel A. Z, Osborne C. F. A digital watermark, In:IEEE International Conference on Image Processing. Austin,1994.86~90
    [7]王小静,杨高波,朱宁波.基于半脆弱水印的H.264/AVC视频流的内容级认证.通信学报,2009,30(11):71~79
    [8]和红杰,张家树.对水印信息篡改鲁棒的子嵌入水印算法.软件学报,2009,20(2):437~450
    [9]Braudaway G. W., Magerlein K A, Mintzer F. Protecting publicly-available images with a visible image watermark, IBM Research Division, T. J. Watson Research Center, Technical Report 96A000248
    [10]Pereira S., Voloshynovskiy S., Pun T. Optimal transform domain watermark embedding via linear programming. Signal Processing,2001,81(6):1251~1260
    [11]罗永,成礼智,徐志宏.数字高程模型数整数小波水印算法研究.软件学报,2005,16(6):1096~1103
    [12]Voyatzis G., Pitas I. Chaotic watermarks for embedding in the spatial digital image domain, in Proc. ICIP'98, vol.2, Chicago.1998:432-436
    [13]Nikolaidis N., Pitas I. Robust Image Watermarking in the Spatial Domain. Signal Processing,1998,66(3):385~403
    [14]刘旺,姜守达,孙圣和.基于三维DCT变换的体数据鲁棒数字水印嵌入算法.电子学报,2005,33(12):2174~2177
    [15]孙中伟,朱岩,冯登国.DCT域图像水印的局部优化检测性能研究.电子学报,2005,33(5):864~868
    [16]沃焱,韩国强,张见威,等.基于小波变换和形态学的图像内容认证方法.通信学报,2005,26(8):9-15
    [17]Tsai J. M., Yu K. Y., Chen Y. Z. Joint wavelet and spatial transformation for digital watermarking. IEEE Transactions on Consumer Electronics,2000,46(1):241-245
    [18]刘宇新,李衍达.基于重叠式正交变换的自适应图像水印.电子学报,2001,29(10):1368~1372
    [19]周亚训,叶庆卫,徐铁锋.基于小波和余弦变换组合的图像水印方案.电子学报,2001,29(12):1693~1695
    [20]Johnston J., Jayant N., Satranek R. Signal compression based on models of human perception. Proceeding of the IEEE,1993,81(10):518-526
    [21]Watson A. B., Yang G. Y. Visibility of wavelet quantization noise. IEEE Transactions on Image Processing,1997,6(8):1164~1174
    [22]罗永,成礼智,吴翊.带纹理的三维地形数据信息隐藏技术研究.计算机辅助设计与图形学学报,2005,17(5):889~894
    [23]朱从旭.实现图像版权通知、保护和内容认证的多功能水印.通信学报,2009,30(11A):101~106
    [24]Smith J. R., Comiskey B. O. Modulation and Information Hiding in Images, in Anderson R., Ed., Springer-Verlag,1996, Lecture Notes in Computer Science No.1174: 207~296
    [25]Adelsbach A., Pfitzmann B., Sadeghi A. R. Proving Ownership of Digital Content; Information Hiding:Third International Workshop, LNCS 1768, Springer-Verlag, Berlin,2000:117~133
    [26]胡金星,吴焕萍.基于网格划分的海量DEM数据生成.计算机辅助设计与图形学学报,2004,16(1):41~44
    [27]谭兵,蒋定华,许素芹.一种顾及地形特征的DEM内插方法.测绘学院学报,2001,18(增刊):26~28
    [28]Cox I. J., Kilian J., Leighton T, etal. Secure spread spectrum watermarking for images, audio and video. In IEEE Int. Conf. Image Processing.,1996,(3):243~246
    [29]王慧琴,李仁厚.一种模糊自适应图像数字水印的研究.西安交通大学学报,2002,36(2):182~185.
    [30]王丽娜,杨景辉,张焕国,等.基于混沌与细胞自动机的数字水印模式.电子学报,2004,32(4):580~583
    [31]王兴元,石其江.基于图像特征和超混沌迭代的图像认证算法.计算机研究与发展,2005,42(11):1896~1902
    [32]戴跃伟.信息隐藏的优化模型及其应用研究.国家自然科学基金(60374066),2003.
    [33]孙中伟,朱岩,冯登国.DCT域图像水印的局部优化检测性能研究.电子学报,2005,33(5):864~86
    [34]许文丽,王育民.基于差错控制编码的水印检测.电子学报,2005,33(7):1187~1190
    [35]Pennec E. L, Mallat S. Image compression with geometrical wavelets. In Proc. Of ICIP'2000. Vancouver, Canada, September,2000,661~664
    [36]Pennec E. L., Mallat S. Sparse Geometric Image Representation with Bandelets. IEEE Trans. On Image Processing,2005,14(4):423~438
    [37]E J Candes. Monoscale Ridgelets for the Representation of Images with Edges.USA:Department of Statistics,Stanford University,1999.121~145
    [38]C. W. Hongsinger, P. Jones, M. Rabbani, etal. Lossless Recovery of an Original Image Containing Embedded Data. U. S. Patent 6278791B1, Aug.21,2001.
    [39]M. Goljan, J. Fridrich, R. Du. Distortion-free data embedding, in Proc.4th Inf. Hiding Workshop,Pittsburgh,,2001.27~41
    [40]M. U. Celik, G. Sharma, A. M. Tekalp, E. Saber. Reversible data hiding, in Proc. IEEE Intermational Conference on Image Processing,2002,2(2):157~160
    [41]Zhicheng Ni, Yun-Qing Shi, Nirwan Ansari, Wei Su. Reversible Data Hidin. IEEE Transactions on Circuits and Systems for Video Technology,2006,16(3):354~362
    [42]罗永,成礼智,吴翊,等.小波变换结合纠错编码的半透明数字水印.计算机学报,2004,27(11):1533~1539
    [43]崔得龙,凌冰.可无损恢复的小波域可见数字水印算法.西藏大学学报,2008,23(1):111~114
    [44]汪培庄.模糊集合论及其应用.上海:上海科技出版社,1983.23~98
    [45]罗承忠.模糊集引论.北京:北京师范大学出版社,1993.52~167
    [46]Jacquin. An Image Coding Based on a Fractal Theory of Iterated Contractive Image Transformations. IEEE Trans. Image Processing,1992,1(1):18~30
    [47]Servetto S. D., Podilchuk C.I., Ramchandran K. Capacity issues in digital image watermarking. IEEE Intl Conf on Image Processing, Chicago, Illinois, USA, 1998:445-449
    [48]Pereira S., Voloshynovskiy S., Pun T. Optimal transform domain watermark embedding via linear programming. Signal Processing,2001,81(6):1251~1260
    [49]Cohen A, Daubechies I, Feauveau J. Biorthogonal Bases of Compactly supported wavelets [J]. Communication on Pure and Applied Mathematics,1992,45(5): 485~560
    [50]Calderbank R., Daubechies I., Sweldens W.,et al. Wavelet transforms that map integers to integers. Journal of Applied Computational Harmonics Analysis,1998,5(3): 332~369
    [51]Daubechies I., Han B., A. Ron, etal. Framelets:MRA based construction of wavelet frames, Applied Comput. Harmon. Anal.,2004,14(1):1~46
    [52]Do M. N. and Vetterli M., Contourlets, Beyond Wavelets, G. V. Welland ed., Academic Press,2003.11-94
    [53]Donoho D., Huo X. Beamlets and multiscale image analysis, Multiscale and Multiresolution Methods. Springer Lecture Notes in Computational Science and Engineering (Editors T.J. Barth, T. Chan, and R. Haimes),2002, (20):149~196
    [54]Pennec E. L., Mallat S. Bandelet representations for image compression, In Image Processing,2001. Proceedings.2001 International Conference on Volume 1,7~10
    [55]焦李成,王爽.图像多尺度几何分析理论与应用.西安:西安电子科技大学出版社,2008.5~20
    [56]刘明才.小波分析及其应用.北京:清华大学出版社,2005.15-120
    [57]焦李成,谭山.图像的多尺度几何分析:回顾与展望.电子学报,2003,31(12):1975~1982
    [58]Yang Y.X., Cheng L. Z., Luo Y. Bandelet union Optimal Matrix Norms Constructing Lossless Watermarking, IEEE, CISIM07,2007.1123~1126
    [59]Bender W., Gruhl D., Morimoto N. Datahiding Techniques. Proceedings, SPIE 1995,24(20):1132~1135
    [60]Bender W., Gruhl D., Morimoto N., et al. Techniques for Datahiding. IBM System Journal,1996,35(6):654~658
    [61]Petitcolas F. A. Anderson P., R. J., Kuhn M. G. Information Hiding-A Survey. Proc. of the IEEE,_1999,87(7):1062~1078
    [62]Bender W., Gruhl D., Morimoto N., Techniques for data hiding. Technical Report, MIT Media Lab,1994
    [63]Shamos M. I. and Hoey D., Closeset-point problems, Proceeding of the 16th Annual IEEE Symposium on Foundation of Computer Science, Berkeley, CA,1976:208~215
    [64]Lee D. T., Schachter B. J. Tow Algorithms for Constructing a Delaunay Triangulation. Int.J of Computer and Information Science,1980,9(3):219~242
    [65]Dwyer R. A. A fast Divide-and-Conquer Algorithm for Constructing Delaunay Triangulations. Algorithmica,1987,(2):137~151
    [66]王宏武,董士海.一个与视点相关的动态多分辨率地形模型.计算机辅助设计与图像学学报,2000,12(8):575~579
    [67]Adams M. D., Kossentini F. Jasper:A Software-Based JPEG-2000 Codec Implementation. Proc. of IEEE International Conference on Image Processing, Vancouver, BC, Canada,2000, (2):53~56
    [68]Hartung F., Kutter M. Multimedia Watermarking Techniques. Proceedings of the IEEE, 1999,87(7):1079~1107
    [69]彭绪山,秦卫东,吴燕燕.电子商务安全中的数字水印技术分析及应用.软件导刊,2009,08(09):137~139
    [70]王向阳,赵红,左珂可,邹乃建.基于关系矩阵的快速嵌入零树小波编码算法.中国图象图形学报2005,10(11):1368~1372
    [71]Furon T., Duhamel P., An Asymmetric Public Detection Watermarking Technique, Information Hiding:Third International Workshop, LNCS 1768, Springer-Verlag, Berlin,2000:88~100
    [72]武莉莉.一种基于矩阵奇异值分解和奇异值里化的数字水印算法.宁夏师范学院学报,2007,28(03):38-42
    [73]佘维,孙星明,杨恒伏,等.一种结合数据融合与树状小波的鲁棒数字水印算法.计算机应用与软件,2009,26(01):28~31
    [74]郭芳侠,王晅,陈伟伟.基于直方图规定化的抗几何攻击数字水印算法.计算机工程,2009,35(16):130~132
    [75]郭田德.彩色身份证件照片的混合压缩算法.计算机学报,2002,23(3)252~256
    [76]王琪.一种结合量化的零树小波图像编码器.清华大学学报,2000,40(7)631~635
    [77]Moffat A., Neal R. M., Witten I. H. Arithmetic Coding Revisited. ACM Transactions on Information System,1998,16(3):256~294
    [78]Witten I. H., Neal R. M., Cleary J. G. Arithmetic coding for data compression. Communications for the ACM,1987,30(6):520~540
    [79]Daeman J, Rijmen V. AES Proposal:Rijndael (2nd Version). AES submission.
    [80]Ohbuchi R., Masuda H., Aono N. Watermarking three-dimensional polygonal models, In:Proceeding of ACM Multimedia 97. New York:ACM press,1997:261~272
    [81]Ohbuchi R, Masuda H, Aono N. Watermarking three-dimensional polygonal models. In:Proceedings of ACM Multimedia 97[C1. New York:ACM Press, 1997:261~272
    [82]Ohbuchi R, Masuda H, Aono M. Watermarking three-dimensional polygonal models through geometric and topological modifications. IEEE Journal on Selected Areas in Communications,1998; 16(4):551~560
    [83]Ohbuchi R, Masuda H, Aono M. Watermarking multiple object types in three-dimensional models. In:Proceedings of the Workshop on Multimedia &Security at ACM Multimedia'98, Bristol U K,1998,12~13,
    [84]Ohbuchi R, Masuda H, Aono M. Data embedding algorithms for geometrical. Communication,1998,21(15):1344~1354.
    [85]Benedens. Geometry-based watermarking of 3D models. IEEE Computer Graphics and Application.1999,19(1):46~55
    [86]Benedens O, Busch C. Towards blind detection of robust watermarks in polygonal models. Computer Graphics Forum,2000,19(3):199~208
    [87]Praun E, Hoppe H, Finkelstein A. Robust mesh watermarking. SIGGRAPH'99 Proceedings. New York:ACM Press,1999.49~56
    [88]Iehikawa S, Chiyama H, Akabane K. Redundancy in 3D polygon models and its application to digital signature. International Journal of Algorithms, DataStructures and Techniques for Computer Graphics and Visualization,2002,10(1):225-232
    [89]Jae-Won Cho, Rdmy Prost, Ho-Youl Jung. An oblivious watermarking for 3-Dpolygonal meshes using distribution of vertex norms. IEEE Transactions on Signal Processing,2007; 55(1):142~155
    [90]S. Kanai, H.Date, and T.Kishinami, Digital Watermarking for 3D Polygons Using Multiresolution Wavelet Decomposition, Proc.of the Sixth IFIP WG 5.2 International Workshop on Geometric Modeling:Fundamentals and Applications(GEO-6) Tokyo, Japan,1998.296~307
    [91]Ohbuchi R, Miyazawa S T. Watermarking 3D Polygonal Meshes in the Mesh Spectral Domain. In:Proceedings of the Graphics Inter Face, Morgan Kaufman Publisher,2001:9-17
    [92]尹康康,潘志庚,石教英。一种强壮的网格水印算法.计算机辅助设计与图形学学报,2001,13(2):102~107
    [93]周听.三维几何模型数字水印技术及算法研究:[硕士学位论文].杭州:浙江大学,2002
    [94]戴敏雅.三维网格数字水印与图像数字水印攻击技术研究:[硕士士学位论文].杭州:浙江大学,2003
    [95]李黎.数字图像和三维几何模型水印技术研究:[博士学位论文].杭州:浙江大学博士学位论文,2009
    [96]万杰.三维数字水印算法研究:[硕士学位论文].合肥:合肥大学,2009
    [97]赵华,王志坚,袁盾韬.基于小波系数关系的半脆弱水印方案.微电子学与计算,2007,24(7):53~~57
    [98]Tian J. Reversible Watermarking by Difference Expansion, in Proceedings of Workshop on Multimedia and Security:Authentication, Secrecy, and Stegannalysis, 2002, pp.19-22
    [99]杜耀刚,蔡安妮,孙景鳌.DCT域下采样视频水印技术.电子学报,2005,33(12):2219~2221
    [100]伍绍权,黄继武,黄达人.基于小波变换的自动步音频水印算法.计算机学报,2004,27(3):365~370
    [101]Xiong Z., Guleryuz O., Orchard M. T. A DCT-based embedded image coder. IEEE Trans. Signal Processing Letters,1996, (3):289~290
    [102]Craver S. Zero Knowledge Watermark Detection. Information Hiding, Third International Workshop, LNCS 1768, Springer-Verlag, Berlin,2000:101~116
    [103]Cox I. J., Kilian J., Leighton T., etal. A Secure, Robust Watermark for Multimedia. Information Hiding, LNCS 1174, Springer-Verlag, Berlin,1996:185~206
    [104]Craver S., Memon N., Yeo B. L., etal. Resolving Rightful Ownerships with Invisible Watermarking Techniques:Limitations, Attacks, and Implications. IEEE Journal on Selected Areas in Communications,1998,16(4):573~586
    [105]Cox I. J., Paul J., Linnartz M. G. Some General Methods for Tampering with Watermarks. IEEE Journal on Selected Areas in Communications,1998,16(4): 587~593
    [106]Eggers J. J., Su J. K., Girod B. Asymmetric Watermarking Schemes, Sicherheit in Mediendaten, Berlin, Germany, Springer Reihe:Informatik Aktuell, September 2000
    [107]Tao B., Dickinson B. Adaptive watermarking in the DCT domain, ICASSP'97: 2985~2988
    [108]Baudry S., Delaigle J. F., Sankur B.,etal. Analyses of error correction strategies for typical communication channels in watermarking. Signal Proc.,2001,81(6): 1239~1250
    [109]Paul J., Linnartz M. G., Dijk M. V. Analysis of the Sensitivity Attack against Electronic Watermarks in Images, Information Hiding:Second International Workshop, LNCS 1525, Springer-Verlag, Berlin 1998:258~272
    [110]Qiao L., Nahrsted K. Watermarking Methods for MPEG Encoded Video: Towards Resolving Rightful Ownership, International Conference on Multimedia Computing and Systems, Austin, Texas, USA,1998:276~285
    [Ill]Swanson M. D., Kobayashi M., Tewfik A. H. Multimedia Data-Embedding and Watermarking Technologies. Proceedings of the IEEE,1998,86(6):1064~1087
    [112]Voyatzis G. Ipitas, The use of watermarks in protection of digital multimedia products. Proceeding of IEEE,1999,87(7):1197~1207
    [113]Wu C. F., Hsieh W. S. Digital watermarking using zero-tree of DCT. IEEE Transactions on Consumer Electronics,2000,46(1):8793
    [114]何密,罗永,成礼智.数字高程模型数据的无损数字水印.计算机工程与应用,2007,43(30):40~43
    [115]R. C. Merkle, One-way hash functions and DES. In Advances Cryptology, CRYPTO'89. Lecture Notes in Computer Science,1989, (435):428~466
    [116]Lee D T, Schachter B J. Tow Algorithms for Constructing a Delaunay Triangulation. Int.J of Computer and Information Science,1980,9(3):219~242
    [117]胡金星,吴焕萍,潘懋.基于格网划分的海量DEM数据生成.计算机辅助设计与图形图像学报,2004,16(1):41~44
    [118]李永荣,张继贤,黄国满,等.用星载合成孔径雷达(SAR)立体影像生成DEM的方法研究.测绘科学,2005,30(6):28~29
    [119]罗永,成礼智,徐志宏,等.基于带参数整数小波变换可见数字水印.软件学报,2004,15(02):238~249
    [120]苏静,刘跃军.一种基于离散小波变换的信息隐藏算法的实现.安阳师范学院学报,2010,16(02):043~046
    [121]杨智,王运琼,冯乔生,等.一种有关DWT与SVD相结合的多功能水印新方案.计算机技术与发展,2010,20(7):140~144
    [122]赵彦涛.可逆信息隐藏技术及其在鲁棒数字水印中的应用研究:[博士学位论文].秦皇岛:燕山大学,2010
    [123]张金辉.基于图像分割和SVD的数字水印算法.武汉理工大学学报,2010,32(02):146~150
    [124]李幼名,唐明,王丽娜,等.用于数字水印的时间戳方案.计算机工程,2009,35(13):141~143
    [125]贾隽峰,侯兴松,薛琴.基于小波系数奇异值分解关系的数字水印算法. 陕西科技大学学报,2009,27(01):135-139
    [126]周长英,曹锋.基于数字水印的电子印章解决方案.自动化学报,2010,32(07):243~245
    [127]吕建勋,贾世杰.基于图像的数字水印技术.计算机技术与发展,2009,19(02):173~175
    [128]刘润涛,孙中喜,倪金霞,等.基于奇异值分解的小波域灰度数字水印算法.哈尔滨工业大学学报,2009,41(11):193~196
    [129]M.,J. Lee, K.S. Kim, H. K. Lee. Forensic Tracking watermarking against In-theater Piracy, Information Hiding:11th International Workshop, IH 2009, Darmstadt, Germany,2009.323~356
    [130]M. Arnold, P. G. Baum, W. Voebing. A Phase Modulation Audio Watermarking Technique Information Hiding:11th International Workshop, IH 2009, Darmstadt, Germany,2009.1114~1153

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700