指纹肖像加密与印刷品信息隐藏技术及其应用研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着各种数字图像处理软件的出现以及高分辨率打印、扫描、照相等硬件设备的升级,使得证件、文档等的仿造、印刷品的盗版变得更加容易,图像的真伪及版权鉴定已经成为一种社会需求。而长于处理”模拟图像”的光学技术与数字图像处理技术相结合,是解决这一问题的有效途径之一。
     本文以纸质载体上的证件人像和指纹两类特殊图像为研究对象,针对实用中防伪造、防篡改的需要,对三种水印方案进行了探索:第一种方案是不用传统的计算机技术而是利用照相法直接将水印加在照片上;第二种方案是抗打印扫描攻击水印技术;第三种方案是多水印嵌入技术,包括证件人像的多水印嵌入和指纹图像的多水印嵌入技术。
     主要研究内容包括:
     1、基于傅立叶变换原理,通过在摄影现场投射加密光束,给彩色肖像照片嵌入肉眼不可辨识的防伪标记。
     本文试验出一种给肖像(印刷品)添加水印的新方法,利用液晶投影仪与照相机组合,以加密照明光束的方法替代传统的计算机图像处理软件,向彩色照片中嵌入“模拟水印”,其特点是在曝光时刻给摄影作品直接嵌入水印图案。
     抗攻击实验表明,使用光学(模拟)/数字混合技术可在傅立叶域给彩色图片嵌入防伪识别标记,该标记具有较强鲁棒性,不仅对打印-扫描等传统攻击方式具有抵抗性,而且具备抗污损、抗局部缺失等性能。
     2、借鉴光学双随机相位编码技术,基于分数傅立叶变换的光学实现原理,编制了分数傅立叶变换程序,提出一种指纹图像加密的新方法,将指纹图像经过灰度映射,以下述两种方式之一打印成加密标签。
     第一种方式是对二值指纹图像先进行Arnold置乱,再施加分数傅立叶变换,得到该指纹的灰度加密图形,将该图形的实部和虚部灰度图案打印生成“不暴露原指纹轮廓”的防伪图案。实验表明,在破损或污损1/4面积的情况下,仍能够从残缺标记中提取清晰的指纹图案。
     另一种方式是将两幅图像(分别为指纹图像和个人信息文本)的不同阶分数傅立叶谱加权叠加在一张图上,打印成防伪标识。实验表明在破损或污损1/4面积的情况下,指纹图案和文本图像都能够被提取和辨识(由于两幅图像的相互干扰,提取的水印残留宿主底纹)。
     3、单图嵌入多重水印
     (a)基于分数傅立叶变换原理,在肖像中嵌入指纹、文本等水印图案。
     将二至三个二值(或灰度)图像水印转换为一维序列,添加到宿主图像不同分数阶数的傅立叶变换域,得到嵌入多个水印的图像,提取水印时不需要原始图像信息。此项技术可用于多人持密钥,共享版权的情况,也可用于嵌入描述图像作品不同特征的多个水印。
     (b)基于小波变换和分数傅立叶变换原理,在灰度指纹图像中嵌入肖像及文本等水印图案。
     以指纹图像为载体,嵌入水印的实验有两个难点:(1)由于指纹的原始图像简单,嵌入水印后易于被人眼察觉;(2)嵌入水印后,指纹的几何形状有可能失真。
     本文采用小波、分数傅立叶变换与最低有效位结合的方法解决上述两个技术难点,使得嵌入肖像水印后的指纹纹理特征受到较小的干扰。
     4、基于分数傅立叶变换和小波变换原理,结合奇异值分解和最低有效位技术实现在人像中嵌入多个水印。检测时,根据图像中水印的提取情况以及二次离散分数傅立叶变换的幅度谱,判断被检测图像是否是赝品(例如,是否是印刷图像的扫描-打印副本),此方法相对于已有文献报道的方法有所创新。
     经验证,本文提供的技术可解答“印刷品真伪或版权归属、是否被篡改、打印-扫描以及复印”等问题,在图像信息安全、个人身份验证等领域具有实用价值。
With new kinds of digital image processing software appeared, and the print,scanning, photographic equipment are to be upgraded every years, the certificate andtrademark counterfeit, the fake prints piracy are more easier. There are growing demandfor copyright identification of an image.The combination of optical technology and thedigital watermarking technique is one way of solving this problem.
     The copyright identification technology of two special kinds of image like the faceimage and fingerprints was discussed in this paper. Four kinds of watermarking schemehave been explored. The first is embeding invisible anti-counterfeiting mark byprojecting encryption beam instead of traditional digital watermarking technique intocolor portrait photo.The second is print-scan resilient watermarking technology.Thethird is multiple watermarks embeddeing technology including embeddeing multiplewatermarks into portrait and embeddeing multiple watermarks into fingerprint image.
     The research contents include:
     1. Embeding invisible anti-counterfeiting mark based on Fourier transform byprojecting encryption beam into color portrait photo.
     This paper gives a new method of adding watermark into portraiture photography(printed). The combination of liquid crystal display(LCD) projectors and camera,instead of traditional computer image encryption procedures, was used for embedding a"simulation watermark" to the color photos. The characteristic is embedding watermarkdirectly at the moment of exposure.
     The experimental results show that by using analog/digital mixing technology,security identification markers can be embedded in Fourier domain of the color image.The watermark is resistant after printing, scanning and being local damaged.
     2. Transforming fingerprint image into encryption graphics basing on double phaseencryption and discrete fractional Fourier transform(DFRT) principle is used for thecertificate security.
     The first method: After scrambling binary fingerprint image through Arnoldtransform. and additional fractional Fourier transform, the gray encryption graphicsconsidering fingerprint information can be got. Experimental results show that thefingerprint mark still can be extracted from1/4area damage or dirty.
     The second method: weighted-type fractional Fourier transform amplitudespectrums of two images including fingerprint image and personal information imageare added. Experimental results show that the fingerprint mark and personal informationimage still can be extracted from1/4area damage or dirty (as a result of two of theimage mutual interference, the watermark extraction was mixed with the background).
     3. Embeddeing multiple watermarks in an image is presented.
     (a) Embeddeing multiple fingerprint watermarks into portrait based on fractionalFourier transform principle.
     A new method of multiple watermarks embedding simultaneously based ondiscrete fractional Fourier transform is presented. The different watermarks areconverted one-dimension sequences and embedded simultaneously on differentpositions of one-dimension fractional Fourier transform middle part amplitude spectrumbase on different orders. We get the corresponding watermark image through two keys:the orders and the positions. When one of them is not correct, the watermark image can'tbe obtained. And the technology needn't the original image when we extractivewatermark images, so it is an blind watermark images embedding technology. Whenseveral people have the rights of the image work, the different fractional Fouriertransform orders and the different positions are distributed to different people. And italso can be used for embedding different characteristic watermark images in an image.
     (b) Embeddeing multiple watermarks including portrait image into fingerprintimage based on wavelet transform and fractional Fourier transform principle.
     The fingerprint image watermark embedding technology has two great difficulties:(1) The original fingerprint image is simple, it is perceive easily after embedding thewatermark;(2) The geometric distortion caused by the watermark fingerprint can lead toits original identity authentication function failure.
     We solve preliminarily the two technical difficulties based on wavelet transform,fractional Fourier transform principle and the least significant bit(LSB) technology, andmake the embedded watermark smaller interference.
     4. Embeddeing multiple watermarks simultaneously for identifying image statusbased on wavelet transform, singular value decomposition(SVD) technology、LSBtechnology and DFRT principle is presented. According to the extracting situation ofwatermarks from an image and the twice DFRT amplitude spectrum, we can identify theimage situation including copyright ownership, and whether is tampered, printed orscanned.
引文
[1] Junji Ohtsubo. Holograms-Recording Materials and Applications [M]. InTech,1985:317~340.
    [2] Hiroyuki Suzuki, Masahiro Yamaguchi, Masuyoshi Yachida, Nagaaki Ohyama,Hideaki Tashima, Takashi Obi. Experimental evaluation of fingerprint verificationsystem based on double random phase encoding [J]. Opt. Express,2006,(14):1755~1766.
    [3] Juan M Vilardy, Cesar O Torres, Lorenzo Mattos. Fingerprint encryption usingfractional Fourier Transform [C]∥8th. World Congress on Computational Mechanics(WCCM8) and the5th. European Congress on Computational Methods in AppliedSciences and Engineering (ECCOMAS2008),Venice, Italy,2008.
    [4]张毅刚,焦玉华,牛夏牧.基于指纹特征数字水印算法的身份认证技术研究[J],电子学报,2003,31(12):2131~2134.
    [5] Hsieh S L,Huang H C,Tsai I J.A copyright protection scheme for gray-levelimages using human fingerprint[C].Proceedings of IEEE International Conference onInformation Technology, Las Vegas,Nevada,USA,2006:482~289.
    [6] Tawfiq A. Al-Asadia, Ali Abdul Azzez Mohammad Baker. Face Image Hidingin Fingerprint Image[C]∥Proceedings of International Conference on Engineering andInformation Technology (ICEIT2012). Toronto, Canada,2012:199~204.
    [7] Anil K. Jain, Umut Uludag and Rein-Lien Hsu. Hiding a Face in a FingerprintImage, Pattern Recognition [C]∥Proceedings.16th International Conference on PatternRecognition.2002:756~759.
    [8] Dajun He, Qibin Sun. A practical print-scan resilient watermarking scheme [C]∥Proceedings of the2005International Conference on Image Processing(ICIP2005),2005:257~260.
    [9]戴跃伟,施燕,工执铨.一种用于证件防伪的鲁棒图像水印算法[J].机器人技术与应用,2002(6):41~46.
    [10]梁华庆,钮心忻,杨义先.基于数字水印的证件防伪技术信号处理[J].2004,20(2):143~146.
    [11]张静,张春田.能抗打印一扫描过程的数字图像水印算法[C].第三届信息隐藏学术会议论文集,西安,2001:151~157.
    [12]宋玉杰,刘瑞祯,谭铁牛.数字水印技术在印刷品防伪中的应用[J].中国图像图形学报,6(5),2001:450~454.
    [13] C. Y. Lin. Public watermarking surviving general scaling and cropping:Anapplication for print-and-scan process [C]∥Multimedia and Security Workshop atACM Multimedia99, Orlando,FL,USA,1999.
    [14]刘昕,马金涛.基于嵌入式小波编码的印刷图文防伪算法研究[J].西安理工大学学报,20(3),2004:268~271.
    [15]牛少彰,钮心忻,杨义先等.半色调图像中数据隐藏算法[J].电子学报,32(7),2004:1181~1184.
    [16]张丽强.印刷图像数字水印技术研究[D].长沙:国防科技大学,2005
    [17]陈海生.印刷图像水印防伪算法的研究[D].西安:西安理工大学,2005
    [18]孙刘杰,庄松林.双随机相位加密同轴傅里叶全息水印防伪技术,光学学报》,Vol.27~4.P621,2007
    [19]廖丹.印刷二维条码防伪新技术[D].长沙:国防科技大学,2005.
    [20]郭宏瑞.印刷品防伪新技术研究[D].长沙:国防科技大学,2006.
    [21]谭吉春,唐新怀,贾辉,周朴,王晓峰,郭宏瑞,刘莉,张丽强.给照片嵌入可机读水印的方法和装置[P].中国专利:200610031217,2006-09-27.
    [22]谭吉春,唐新怀,郭宏瑞,贾辉,周扑,廖丹,何新,张丽强,王晓峰,刘莉,文贝.增强可机读标签中文字与图形的抗损性方法和装置[P].中国专利:200610031494,2006-04-13.
    [23]周羽.准考证(指纹肖像数码加密防伪)[P].中国专利:200930244788,2006-04-13.
    [24]冯军,田新.一种嵌入指纹水印信息的方法和装置[P].中国专利:200510135689.X,2005-12-31.
    [25]车晓镭,王乃丹.用于证件防伪的彩色图像数字水印实现方法[P].中国专利:201010254328.8,2010-08-11.
    [26]陈伟.多重水印算法研究[D].武汉:武汉理工大学.2009.
    [27] A.Mohamed Mohamed,Diab.Implementation of fast Digital watermarkingtechniques[C]∥Computer Engineering and Systems (ICCES2008).2008,(11):419~426.
    [28] Boato G, Natale F.G.B, Fontanari, C. Digital Image Tracing by SequentialMultiple Watermarking[J], IEEE Transactions on Multimedia,2007,9(4):677~686.
    [29]马义德.陆福相.一种多重数字水印技术研究[J].计算机工程与应用,2004,(4):162~163.
    [30] Deyun Peng, Jiazhen Wang, Sumin Yang. CDMA Based Multiple-UserDigital Watermarking[J].Proceedings of the2006International Conference onIntelligent Information Hiding and Multimedia,2006,(12):75~78.
    [31] Cong Jin,Ting Su,Liang—Gang Pan.Multiple Digital Watermarking SchemeBased on ICA[J].Proceedings of the Eight International Workshop on Image Analysisfor Multimedia Interactive Services,2007,(6):70~70.
    [32]唐明,王丽娜,张焕国.动态多重数字水印设计方案[J].计算机应用研究,2006,3:28~30.
    [33] Yen-Chung Chiu,Wen-Hsiang Tsai. Copyright Protection againstPrint-and-Scan Operations by Watermarking for Color Images Using Coding andSynchronization of Peak Locations in Frequency Domain [J]. Journal of InformationScience and Engineering,2006,22(3):483~496.
    [34] Anthony T S Ho, Feng Shu. A print-and-scan resilient digital watermark forcard authentication [C]∥IEEE ICICS-PCM2003, Singapore,2003,1149~1152.
    [35] Emir Ganic,Scott D. Dexter,Ahmet M. Eskicioglu.Embedding MultipleWatermarks in the DFT Domain Using Low and High Frequency Bands [C]∥Security,Steganography, and Watermarking of Multimedia Contents, USA,2005:175~184.
    [36] Ante Poljicak, Lidija Mandic, Darko Agic. Discrete Fourier transform–basedwatermarking method with an optimal implementation radius [J]. Journal of ElectronicImaging,2011,20(3).
    [37] V Solachidis,I Pitas.Circularly Symmetric Watermark Embedding in2-D DFTDomain [C]∥ICASSP1999,1999,(6):3469~3472.
    [38] V Licks, R Jordan.On Digital Image Watermarking Robust to GeometricTransformations[C]∥Proceedings of2000International Conference Image Processing(ICIP2000), Vancouver, BC, Canada,2000,3:690-693.
    [39] Solank K, Madhow U, Manjunath B S. Modeling the print-scan process forresilient data hiding[C]//Security, Steganogra2phy, and Watermarking of MultimediaContents V II,2005:418~429.
    [40] Ching-Yung Lin, Min Wu, Jeffrey A Bloom, Ingemar J Cox,Matt LMiller,Yui Man Lui.Rotation,scale,and translation resilientwatermarking for images[J].IEEE Transaction on Image Processing,2001,10(5):767~782.
    [41] Kaushal Solanki, Shiv Chandrasekaran,Ibrahim El-Khalil.’Print and Scan’Resilient Data Hiding in Images[J].IEEE Transactions on information forensics andSecurity,2006,1(4):464~478.
    [42] Castleman K R. Digital Image processing[M]. Prentice-Hall, Jew Jersey, USA,1996.
    [43] Pereira S, Pun T. Robust Template Matching for Affine Resistant ImageWatermarks[J].IEEE Transactions in Image processing,2000,9(6),1123~1129.
    [44] Lee J S, Kim W Y. A Robust Image Watermarking Scheme to GeometricalAttacks for Embedment of Multibit Information[C]∥Proc. of Advances in MultimediaInformation Processing,5th Pacifc Rim Conference on Multimedia (PCM2004), Tokyo,Japan,2004:348~355.
    [45] Pramila A. Watermark synchronization in camera phones and scanning[D].Oulu: University of Oulu,2007.
    [46]吴克难,胡家升,乌旭.信息安全中的光学加密技术[J].激光与光电子学进展,2008,45(7):30~38.
    [47] V Solachidis, I Pitas. Circularly Symmetric Watermark Embedding in2-DDFT Domain.[C]∥ICASSP1999,1999,(6):3469~3472.
    [48]葛秀慧,田浩,郭立甫.信息隐藏原理及应用[M].北京:清华大学出版社,2008.
    [49] Tan Yi-zhou, Liu Hai-bo, Huang Shui-hua, Sheng Ben-jian, Pan Zhong-ming.An Optical Watermarking Solution for Color Personal Identification Pictures[J].J.Opt.Soc.Am.(A).,1998,37(11):2130~2141.
    [50] Thomas J Grycewicz, Brian E Evans, Cheryl S Lau. Joint transform opticalcorrelation applied to sub-pixel image registration [J]. Proceedings of the SPIE,2005,(5908):282~290.
    [51] David Abookasis, Joseph Rosen.Digital correlation holograms implementedon a joint transform correlator[J].Optics Communications2003,(225),31~37.
    [52] Mohammed Nazrul Islam, Mohammad A. Karim. Distortion-invariant colorpattern recognition using multiple phase-shifted-reference-based joint transformcorrelation incorporating synthetic discriminant function [J]. Proceedings of SPIE inOptical Pattern Recognition XXI,2011.
    [53] Takanori Nomura, Bahram Javidi, Optical encryption using a joint transformcorrelator architecture[J]. Opt. Eng.2010,39(8):2031~2035.
    [54] Ding Lu,Weimin Jin.Fully phase color image encryption based on jointfractional Fourier transform correlator and phase retrieval algorithm[J]. Chinese OpticsLetters,2011,9(2):021002-1~021002-3.
    [55] Edgar Rueda,John F Barrera,Rodrigo Henao,Roberto Torroba. Opticalencryption with a reference wave in a joint transform correlator architecture[J].OpticsCommunications.2009,(282),3243~3249.
    [56] E Rueda, M Tebaldi, R Torroba, N Bolognini. Three-dimensional key in amodified joint transform correlator encryption scheme[J].Optics Communications,2011,(284):4321~4326.
    [57] Refergier P, Javidi B. Optical image eneryption based on input Plane andFourier plan random eneoding[J].Optics Letters,1995,20(7):767~769.
    [58]刘铁根.光学防伪检测技术[M].北京:电子工业出版社,2008.
    [59]吴克难,胡家升,乌旭.信息安全中的光学加密技术[J].激光与光电子学进展,2008,45(7):30~38.
    [60]彭翔,位恒政,张鹏.光学信息安全导论[M].北京:科学出版社,2008.
    [61] S KishK,B Javidi.Information hiding technique using double phaseencoding[J]. Appl.Opt.2002,41(26):5462~5470.
    [62] Wei-Chia Su, Bor Wang, Ching-Cherng Sun, Ming-Wen Chang. Improvementof the signal-to-noise ratio of a double random phase encoding encryptionsystem[J].Proceedings of SPIE.2000,4113.
    [63] B Javidi, N Towghi. Fully phase encoded techniques for optical security andencryption[J]. Part of the SPIE Conference on Enabling Photonic Technologies forAerospace Applications.1999,3714:40~47.
    [64]王仕瑶.信息光学理论与应用[M].北京:北京邮电大学出版社,2004.
    [65]刘吉英,朱炬波,严奉霞,张增辉.基于压缩感知理论的稀疏遥感成像系统设计[J].系统工程与电子技术.2010,32(8):1618~1623.
    [66] B Javidi, N Towghi, N Maghzi, S C Verrall,“Error reduction techniques anderror analysis for fully phase-and amplitude-based encryption,” Appl. Opt.2000,39:4117~4130.
    [67] John Fredy Barrera, Roberto Torroba. Efficient encrypting procedure usingamplitude and phase as independent channels to display decoy objects [J].Appl. Opt.2009,48:3120~3128.
    [68] Lohmann A W. Image rotation,Wigner rotation,and the fractional FourierTransform[J]. J.Opt.Soc.Am.(A),1993,10(10):2181~2186.
    [69]陶然,齐林,王越.分数阶傅立叶变换的原理与应用[M].北京:清华大学出版社,2004.
    [70] Lohmann A W, Mendlovic D, Zalevsky Z. Status Report on: The FractionalFourier Transform[R]. Faculty of Engineering, Tel-Aviv University,1995.
    [71] Mendlovic D, Ozaktas H M, Lohmann A W. Self Fourier functions andfractional Fourier transform[J]. Opt. Commun.1994,105:36~38.
    [72]宋菲君.近代光学信息处理[M].北京:高等教育出版社,2004.
    [73] B Hennelly,J T Sheridan.Optical image encryption by random shifting infractional Fourier domains, Opt. Lett.,2003,28:269~271.
    [74]于力,朱邦和,刘树田.用于光学图象加密的分数傅里叶变换双相位编码[J].光子学报,2001,30(7):904~907.
    [75] N K Nishchal, J Joseph, K Singh, Fully phase encryption using fractionalFourier transform, Opt. Eng.42(2003)1583~1588.
    [76] XIN Yi, TAO Ran, WANG Yue. Fractional Fourier transform-based opticalencryption with treble random phase-encoding[C]∥International Symposium onPhotoelectronic Detection and Imaging2007: Related Technologies and Applications,2008,6625:662518-1~662518-9.
    [77]方靖岳,周朴,康强.基于空域-分频域混合编码的光学图像加密[J].红外与激光工程,2005,34(3):345~347.372.
    [78]李俊昌.信息光学理论与计算[M].北京:科学出版社,2009.
    [79]郭小爱,陈家璧.菲涅耳衍射和分数傅里叶变换[J].大学物理,2002,21(2):8~14.
    [80]周朴,方靖岳,谭吉春.基于基本光学单元的分数傅里叶变换算法[J].激光杂志,2004,25(6):31~33.
    [81]刘正君.MATLAB科学计算与可视化仿真宝典[M].北京:电子工业出版社,2009.
    [82] Meng X F,Cai L Z,He M Z,Dong G Y,Shen X X.Cross-talk-freeDouble-image Encryption and Watermarking with Amplitude-phase SeparateModulations[J]. J.Opt.A:Pure Appl.Opt.,2005,7(11):624~631.
    [83] LIU Zhengjun,LIU Shutian.Double image encryption based on iterativefractional Fourier transform[J].Opt Comm,2007,275:324~329.
    [84] Li Huijuan,Wang Yurong.Double-image encryption by iterative phaseretrieval algorithm in fractional Fourier domain[J]. Journal of Modern Optics,2008,55(21):3599~3607.
    [85]贾丽娟,刘正君.基于随机分数傅里叶变换的双图像加密算法[J].光子学报.2009,38(4):1020~1024.
    [86] LIU Zhengjun, LIU Shutian. Random fractional Fourier transform[J].Opt Lett,2007,32(15):2088~2090.
    [87]张贞凯,于凤芹,杨慧中,李江.基于分数傅立叶变换生成序列多样性的图像加密算法[J].东南大学学报(自然科学版),2006,36:31~34.
    [88] Anil K. Jain, Umut Uludag. Hiding Biometric Data[J].IEEE Transactions onPattern Analysis and Machine Intelligence,2003,25(11):1494~1498.
    [89] Afzel Noore, Richa Singh, Mayank Vatsa, Max M Houck. Enhancing securityof fingerprints through contextual biometric watermarking [J]. Forensic scienceinternational,2007,169(2-3):188~194.
    [90]张德丰.Matlab小波分析与工程应用[M].北京:国防工业出版社,2008.
    [91]冉启文.小波变换与分数Fourier变换理论及应用[M].哈尔滨:哈尔滨工业大学出版社,2001.
    [92]徐鑫,田逢春,姬艳丽,龙红梅.基于小波系数层间相关性的图像噪声方差估计[J].计算机应用,2009,29(10):2674~2678.
    [93]杨艺,李建勋,柯熙政.小波方差在信号特征提取中的应用[J].传感器世界,2006,12(1):33~35.
    [94] L Ghouti,A Bouridane.Date hiding in fingerprint images[C]∥14th EuropeanSignal Processing Conference (EUSIPCO2006), Florence, Italy:2006.
    [95] Rajlaxmi Chouhan,Pritee Khanna. Robust Minutiae Watermarking in WaveletDomain for Fingerprint Security[C]∥World Academy of Science, Engineering andTechnology2011,5:1106~1113.
    [96]叶天语.基于图像LSB的秘密信息隐藏技术[J].计算机与现代化,2005,11:28~31.
    [97] S.Brindha,Ila.Vennila.Hiding Fingerprint in Face using Scattered LSBEmbedding Steganographic Technique for Smart card based Authenticationsystem[J].International Journal of Computer Applications,2011,26(10):51~55.
    [98] FabienA P Petitcolas, Ross JAnderson, MarkusG Kuhn. Information hiding-Asurvey[C]//Proceedings of the IEEE,1999,87(7):1062~1078.
    [99]刘瑞祯,谭铁牛.基于奇异值分解的数字图像水印方法[J].电子学报,2001,29(2):168~171.
    [100]杨红颖,王向阳,赵岩.基于纹理子块的小波变换数字水印算法[J].微电子学与计算机,2004,21(7):106~109.
    [101]陈明举,陈善学.一种基于小波变换与奇异值分解的图像水印算法[J].信息与电子工程,2007,5(1):57~61.
    [102] Liu R, Tan T. An SVD-based watermarking scheme for protecting rightfulownership [J]. IEEE Transaction on Multimedia,2002,4(1):121~128.
    [103]雍士华,马小虎.一种基于DWT和SVD的双重水印算法[J].南京师范大学学报(工程技术版).2008,8(4):103~105.
    [104]裴树军,王宇,石福斌.一种鲁棒性水印和易损性水印复合算法[J].哈尔滨理工大学学报,2008,13(2):57~59.
    [105]陈隽.基于DWT和SVD的鲁棒-脆弱双重图像水印算法[J].苏州大学学报(工科版),2011,31(6):42~47.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700