基于图像的无损信息隐藏技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着信息技术的发展,信息的存储、加工、复制、传送变得越来越方便快捷。然而,在开放的网络环境中传输的各种信息很容易被窃听或遭到拦截;所有数字化信息很容易被复制、删除、剪切、拼接、篡改甚至伪造。因此,保障信息的安全就成为了人们不得不面对的一个巨大挑战。作为一种基本的信息安全工具,信息隐藏技术在信息安全领域中发挥着重要作用。
     然而,通常意义下的信息隐藏技术,由于其在载体中嵌入了机密信息,会导致原始载体永久性的失真,这些技术在数字媒体内容保护领域没有优势。因为如果嵌入一些信息使得这些数字媒体永久失真的话,就会导致这些媒体失去原有价值。因此,如何能够在原始媒体没有明显降质的情况下嵌入机密信息,并且当提取出机密信息后,原始媒体能够完全复原就显得十分必要。满足这种特性的技术称为无损信息隐藏技术。另外,如果这些能够复原的隐秘图像在遭到一些并无恶意的改变(比如:图像有损压缩或在噪声环境中无意添加了噪声)之后,仍能够精确地提取出嵌入的信息,将进一步扩大这种技术的应用范围,使这种技术能够从无损的应用环境扩展到有损的应用环境中去。满足这种特性的技术称为鲁棒无损信息隐藏技术。
     本文以图像为主要研究对象,重点研究了当前信息隐藏领域的新热点:大容量无损信息隐藏技术和鲁棒无损信息隐藏技术。本文主要取得以下研究成果。
     (1)提出了一种基于块固定参照像素的大容量无损信息隐藏方案。该方案能实现高嵌入和低失真。另外,该方案简单易行,除了机密信息长度之外,无须任何额外信息就可以从隐秘图像中提取出机密信息同时无失真地恢复出原始载体图像。实验结果表明,在所有隐秘图像没有明显降质(PSNR均超过30 dB)的前提下,8幅常用的标准灰度图像的平均纯嵌入容量超过0.97bpp。
     (2)提出了一种基于扫描路径的大容量无损信息隐藏方案。通过定义九种基本的扫描路径并计算各路径的相邻像素差,可以获得全方位的相邻像素差,选择最优路径的差直方图移位可以产生大量的冗余空间,因此能实现大容量信息的无损嵌入。实验结果表明,在8幅常用的标准灰度图像的测试中,在所有隐秘图像的PSNR均超过30 dB的前提下,平均纯嵌入容量超过1.0 bpp。
     (3)在块固定参照像素方案的基础上提出了一种基于块动态参照像素的无损信息隐藏方案。改进的方案利用块内排序后的中间像素作为参照像素,克服了块固定参照像素方案的不足。在保持了原方案的优点外,新方案大大地提高了嵌入容量。实验结果表明,块动态参照像素方案明显好于块固定参照像素方案。在含有1338幅灰度图像的UCID图像库(第2版)的测试中,在平均PSNR达到30.8 dB的前提下,块动态参照像素方案的平均嵌入容量超过了1.1 bpp。
     (4)提出了一种基于统计量移位的鲁棒无损信息隐藏方案。该方案通过引入一个统计量,并且使这个统计量产生一定的位移来嵌入信息。由于位移量及移位规则固定,所以这种方案是可逆的。另一方面,由于信息1和信息0分隔在不同的区以及统计量固有的特性,由有损压缩等非恶意攻击所产生的某种改变不会导致嵌入信息发生变化,因此,这种方案又是鲁棒的。实验结果表明,该方案与传统的方案相比有明显的优势。
     (5)提出了一种改进的基于统计量移位的鲁棒无损信息隐藏方案。原方案的嵌入机制仅允许块内一组像素发生改变,这会导致两个不利的影响。其一,要将统计量移位到不同的区以实现信息嵌入,往往要将其中的一组像素改变很大,影响了图像的质量。其二,对隐秘图像进行有损压缩时,机密信息抗压缩的能力降低,影响了算法的鲁棒性。改进的方案采用新的嵌入机制,让块内两组像素均发生改变。实验结果表明,与原方案相比,无论图像质量还是鲁棒性,改进的方案均有明显的提高。
With the continuing advancements in information technology, information storage, processing, reproduction, transmission becomes more and more convenient. However, all kinds of information in an open network environment can be easily eavesdropped and intercepted; all digital information can easily be copied, deleted, cut, spliced, tampered or forged. Therefore, information security is faced with enormous challenges that we have to face. As a basic information security tool, information/data hiding plays an important role in many critical areas of information security.
     However, in most cases of data hiding, the cover media may suffer some permanent distortions as a result of data hiding and can not be inverted back to the original one. These techniques have no advantages in the field of digital media content protection because the images processed by these techniques will lose their values. Therefore, in some applications, such as media content protection, it is desirable to reverse the stego-image back to the original cover image without any distortion after data extraction, i.e., the technique not only can embed secret data into a cover image, but also the original cover image can be recovered from the stego-image with no distortion after the hidden data have been extracted. Techniques with this property are referred to as lossless data hiding. Furthermore, the robustness of a lossless data hiding algorithm against non-malicious changes such as lossy compression or sometimes unavoidable addition of random noise which is below a certain level and does not change the content of an image can be useful in the context of reversible data hiding. It might enlarge the application scope of lossless data hiding technique as it enables the lossless data hiding to convey information in a lossy environment. Techniques with this property are referred to as robust lossless data hiding or lossless robust data hiding.
     According to the problems mentioned above, this dissertation, after a deep study on related works, mainly focused on images and launched the research in two aspects: high embedding capacity lossless data hiding and robust lossless data hiding. The main contributions are as follows.
     (1) A reversible data hiding scheme based on fixed reference pixel of block is proposed. The proposed scheme can offer high embedding capacity and keep low distortion. Furthermore, the proposed scheme can be implemented easily and no extra information except message length is needed to extract data and restore image. Experimental results show that the average pure payload among eight commonly used images can be greater than 0.97 bits per pixel (bpp) while maintaining all the PSNR values of the stego-images above 30 dB.
     (2) A lossless data hiding scheme based on scan path is proposed. Nine basic scan paths are defined, and this means all-directional adjacent pixel differences can be obtained. The proposed scheme can offer high embedding capacity and keep low distortion by choosing the best scan path and the optimized pixel difference. As experimental results have shown, the average pure payload among eight commonly used images can be greater than 1.0 bits per pixel (bpp) while all the PSNR values of the stego images remain larger than 30 dB.
     (3) An improved reversible data hiding scheme using dynamic reference pixel of block instead of the fixed reference pixel of block is proposed. The improved scheme uses the reference pixel whose value is the median value of the whole sorting sequence of block. The improved scheme can offer higher embedding capacity while mantaning the advantages of the original version. Experimental results have shown that the performance of the dynamic reference pixel of block outperforms that of the fixed reference pixel of block. The improved scheme has been applied to all of the 1338 images in UCID-Image Database (v2) which includes many different types of images, and the experimental results show that the average payload among these images is larger than 1.1 bits per pixel (bpp) while keeping the average PSNR values 30.8 dB.
     (4) A robust lossless data hiding scheme based on statistic shifting is proposed, in which a statistic is introduced and bits can be embedded by shifting the statistic. The shift quantity and shifting rule are fixed for all blocks, and reversibility is achieved. On the other hand, owing to the separation of bit-0-zone and bit-1-zone as well as the particularity of the statistic, minor alteration applying to the stego-image generated by non-malicious attacks such as JPEG compression will not cause the bit-0-zone and the bit-1-zone to overlap, and robustness is achieved. Experimental results show that, compared with previous works, the performance of the proposed scheme is significantly improved.
     (5) An improved robust lossless data hiding scheme based on statistic shifting is proposed. In the original version, the embedding mechanism lets only one group of pixels of block change, leading to two disadvantages. First, to shift a statistic to different zones cause a group of pixels to be altered greatly, leading to a low image quality. Second, the hidden data can not resist the JPEG compression at high compression levels during lossy compression, leading to a weak robustness. The improved scheme uses a new embedding mechanism to block and two groups of pixels of block can be changed. Experimental results show that, compared with the previous version, the performance of new scheme is significantly improved in terms of image quality and robustness.
引文
[1]Katzenbeisser, S., Petitcolas, A.P.,2000. Information Hiding Techniques for Steganography and Digital Watermarking.Artech House Inc., Norwood, MA, USA.
    [2]Petitcolas F. A. P., Anderson R. J., Kuhn M. G Information hiding-A survey. Proceedings of the IEEE,1999,87(7):1062-1078.
    [3]Johnson N.F., Jajodia S. Exploring steganography:Seeing the unseen. IEEE Computer,1998,31(2):26-34.
    [4]D. Swanson M., M. Kobayashi, H. Tewfik A. Multimedia data-embedding and watermarking technologies. Proceedings of the IEEE,1998,86(6):1064-1087.
    [5]Provos N., Honeyman P. Hide and seek:An introduction to steganography.IEEE Security and Privacy Magazine,2003,1(3):32-44.
    [6]Moulin P., O'Sullivan J.A. Information-Theoretic Analysis of Information Hiding. IEEE Transactions on Information Theory,2003,49(3):563-593.
    [7]Lam E.Y., Goodman J.W. Reliable communication under channel uncertainty. IEEE Transactions on Information Theory,1998,6(44):2148-2177.
    [8]Johnson N.F., Katzenbeisser S., A survey of steganographic techniques. In Information Hiding, S. Katzenbeisser and F. Petitcolas, Eds., Artech House, Norwood, MA,2000:43-78.
    [9]W. Bender, D. Gruhl, N. Morimoto, A. Lu. Techniques for data hiding. IBM Systems Journal,1996,35(3-4):313-336.
    [10]Anderson R. J., Petitcolas F. A. P. On the limits of steganography. IEEE Journal on Selected Areas in Communications,1998,16(4):474-481.
    [11]JJK ORuanaidh, WJ Dowling, FM Boland. Watermarking digital images for copyright protection. IEE Proceedings-Vision Image And Signal Processing,1996, 143(4):250-256.
    [12]Langelaar G C., Setyawan I., Lagendijk R. L. Watermarking digital image and video data-A state-of-the-art overview. IEEE Signal Processing Magazine,2000, 17(5):20-46.
    [13]F. Hartung, M. Kutter. Multimedia watermarking techniques. Proceedings of the IEEE,1999,87(7):1079-1107.
    [14]B Wolfgang R., I Podilchuk C., J Delp E. Perceptual watermarks for digital images and video. Proceedings of the IEEE,1999,87(7):1108-1126.
    [15]D. Kundur, D. Hatzinakos. Digital watermarking for telltale tamper proofing and authentication. Proceedings of the IEEE,1999,87(7):1167-1180.
    [16]J. Fridrich, M. Goljan, Du R. Lossless data embedding-New paradigm in digital watermarking. EURASIP Journal on Applied Signal Processing,2002,2002(2): 185-196.
    [17]Dekun Zou, Chai Wah Wu, Guorong Xuan, Shi Y. Q. A content-based image authentication system with lossless data hiding, Proceedings of 2003 International Conference On Multimedia And Expo, Vol II:213-216.
    [18]Simmons GJ. The prisoner's problem and the subliminal channel. Proceedings of the CRYPTO'83,1984:51-67.
    [19]Cachin C. An Information-Theoretic Model for Steganography. Proceedings of the 2nd International Workshop on Information Hiding, LNCS 1525, Heidelberg, Springer-Verlag,1998:306-318.
    [20]Lin C.Y, Chang S.F. Semi-fragile watermarking for authenticating JPEG visual content. Proceedings of the Conference on Security and Watermarking of Multimedia Contents Ⅱ, Jan 24-26,2000, CA:140-151.
    [21]Barni M., Bartolini F., Cox I. J., Hernandez J., Perez-Gonzalez F. Digital watermarking for copyright protection:A communications perspective. IEEE Communications Magazine,2001,39(8):90-91.
    [22]Barni Mauro, Bartolini Franco, Cappellini Vito, Piva Alessandro. A DCT-domain system for robust image watermarking. Signal Processing,1998,66(3):357-372.
    [23]C. Lopez. Watermarking of digital geospatial datasets-a review of technical, legal and copyright issues. International Journal of Geographical Information Science,2002,16(6):589-607.
    [24]Cox I. J., Miller M. L., McKellips A. L. Watermarking as communications with side information. Proceedings of the IEEE,1999,87(7):1127-1141.
    [25]J Fridrich, AC Baldoza, RJ Simard. Robust digital watermarking based on key-dependent basis functions. Information Hiding,1998:143-157.
    [26]Malvar H. S., Florencio D. A. F. Improved spread spectrum:A new modulation technique for robust watermarking. IEEE Transactions on Signal Processing, 2003,51(4):898-905.
    [27]Cox I. J., Kilian J., Leighton F. T., Shamoon T. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing,1997, 6(12):1673-1687.
    [28]Solanki K., Jacobsen N., Madhow U., Manjunath B. S., Chandrasekaran S. Robust image-adaptive data hiding using erasure and error correction. IEEE Transactions on Image Processing,2004,13(12):1627-1639.
    [29]Cheddad Abbas, Condell Joan, Curran Kevin, Mc Kevitt Paul. Digital image steganography:Survey and analysis of current methods. Signal Processing,2010, 90(3):727-752.
    [30]尹浩.数字水印技术综述.计算机研究与发展,2005,42(7):1093-1099.
    [31]夏煜, 郎荣玲,曹卫兵,戴冠中.基于图像的信息隐藏检测算法和实现技术研究综述.计算机研究与发展,2004,41(4):728-736.
    [32]齐东旭.一类新的置乱变换及其在图像信息隐蔽中的应用.中国科学(E辑),2000,30(5):440-447.
    [33]罗永.数字高程模型数据整数小波水印算法.软件学报,2005,16(6): 1096-1103.
    [34]钮心忻.基于小波变换的数字水印隐藏与检测算法.计算机学报,2000,23(1):21-27.
    [35]钮心忻,杨义先.信息隐藏与检测算法的特性分析.电子学报,2002,30(7):952-955.
    [36]胡军全 黄继武 张龙军 黄达人.结合数字签名和数字水印的多媒体认证系统.软件学报,2003,14(6):1157-1163.
    [37]宋玉杰,谭铁牛.基于易碎性数字水印的图像完整性验证研究.中国图像图形学报,2003,8(1):1-7.
    [38]丁玮,齐东旭.数字图像变换及信息隐藏与伪装技术.计算机学报,1998,21(9):838-843.
    [39]张涛,平西建.基于差分直方图实现LSB信息伪装的可靠检测.软件学报.2004,15(1):151-159.
    [40]易开祥,石教英,孙鑫.数字水印技术研究进展.中国图像图形学报,2001,6(2):11-17.
    [41]孙星明,黄华军,王保卫,孙光,黄俊伟.一种基于等价标记的网页信息隐藏算法.计算机研究与发展,2007,44(5):756-760.
    [42]罗向阳, 陆佩忠,刘粉林.一类可抵御SPA分析的动态补偿LSB信息隐藏方法.计算机学报,2007,30(3):463-473.
    [43]罗永,杨岳湘,成礼智,徐志宏.数字高程模型数据的信息伪装和信息隐藏技术.软件学报,2007,18(3):739-745.
    [44]赵慧民,康显桂,黄继武.基于非对称数据结构实现信息隐藏通信的方法研究.电子学报,2009,37(6):1362-1366.
    [45]肖俊,王颖.基于多级离散余弦变换的鲁棒数字水印算法.计算机学报,2009,32(5):1055-1061.
    [46]王祖喜,赵湘媛.用于图像认证的可恢复半易碎数字水印.中国图像图形学报,2008,13(7):1258-1264.
    [47]王泽辉.二维随机矩阵置乱变换的周期及在图像信息隐藏中的应用.计算机学报,2006,29(12):2218-2225.
    [48]Marvel L. M., Boncelet C. G, Retter C. T. Spread spectrum image steganography. IEEE Transactions on Image Processing,1999,8(8):1075-1083.
    [49]Huang Chun-Hsian, Chuang Shang-Chih, Wu Ja-Ling. Digital-invisible-ink data hiding based on spread-spectrum and quantization techniques. IEEE Transactions on Multimedia,2008.10(4):557-569.
    [50]Lin C. Y, Wu M., Bloom J. A., Cox I. J., Miller M. L., Lui Y. M. Rotation, scale, and translation resilient watermarking for images. IEEE Transactions on Image Processing,2001.10(5):767-782.
    [51]Fridrich J., Goljan M. Practical steganalysis of digital images—state of the art. Proceedings of SPIE Photonics West, San Jose, CA,2002,4675:1-13.
    [52]Lie W.N., Lin GS. A Feature-Based Classification Technique for Blind Image Steganalysis. IEEE Transactions on Multimedia, December 2005,7(6): 1007-1020.
    [53]何军辉,黄继武.基于DCT系数分布的彩色图像隐写分析.电子学报,2005,33(12A):251-257.
    [54]Mcbride B.T., Peterson GL., Gustafson S.C. A new blind method for detecting novel steganography. Digital Investigation,2005,2(1):50-70.
    [55]Fridrich I, Goljan M., Hogea D. Steganalysis of JPEG images:Breaking the F5 algorithm. Proceedings of the 5th International Workshop on Information Hiding, Noordwijkerhout, Netherlands,2002, LNCS 2578:310-323.
    [56]Avcibas I, Memon N., Sankur B. Steganalysis using image quality metrics.IEEE Trans on Image Processing,2003,12(2):221-229.
    [57]Pevny T., Fridrich J. Merging Markov and DCT Features for Multi-Class JPEG Steganalysis. Proceedings of the 9th Conference on Security, Steganigraphy, and Watermarking of Multimedia Contents, vol6506,2007:50503-50503.
    [58]Moulin P., Liu J. Analysis of multiresolution image denoising schemes using generalized Gaussian and complexity priors. IEEE Transactions on Information Theory,1999,45(3):909-919.
    [59]Fridrich J., Goljan M., Hogea D., Soukal D. Quantitative steganalysis of digital images:Estimating the secret message length. ACM Multimedia Systems Journal, Special issue on Multimedia Security,2003,9(3):288-302
    [60]Farid H. Detecting Steganographic Messages in Digital Images. Technical Report, TR2001-412, Dartmouth College, Computer Science,2001.
    [61]Hayat Khizar, Puech William, Gesquiere Gilles. Scalable 3-D Terrain Visualization Through Reversible JPEG2000-Based Blind Data Hiding. IEEE Transactions on Multimedia,2008,10(7):1261-1276.
    [62]Hiuk Jae Shim, Jinhaeng Ahn, Byeungwoo Jeon. DH-LZW:lossless data hiding in LZW compression, Proceedings of International Conference on Image Processing (ICIP 2004):2195-2198.
    [63]Kim Kyung-Su, Lee Min-Jeong, Lee Hae-Yeoun, Lee Heung-Kyu. Reversible data hiding exploiting spatial correlation between sub-sampled images. Pattern Recognition,2009,42(11):3083-3096.
    [64]Lee Jia-Hong, Wu Mei-Yi. Reversible data-hiding method for palette-based images. Optical Engineering,2008,47(4).
    [65]Liao Ping-Sung, Pan Jeng-Shyang, Chen Yen-Hung, Liao Bin-Yih. A lossless watermarking technique for halftone images. Proceedings of the 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems,2005:593-599.
    [66]Lin Ching-Chiuan, Hsueh Nien-Lin, Shen Wen-Hsiang. High-performance reversible data hiding. Fundamenta Informaticae,2008,82(1-2):155-169.
    [67]M Awrangjeb, MS Kankanhalli. Lossless watermarking considering the human visual system. Digital Watermarking,2004:581-592.
    [68]Ono Michihiko, Han Seungwu, Fujiyoshi Masaaki, Kiya Hitoshi. A location map-free reversible data hiding method for specific area embedding. IEICE Electronics Express,2009,6(8):483-489.
    [69]Pan Jeng-Shyang, Luo Hao, Lu Zhe-Ming. Look-up table based reversible data hiding for error diffused halftone images. Informatica,2007,18(4):615-628.
    [70]Saleh N. A., Boghdady H. N., Shaheen S. I., Darwish A. M. An Efficient Lossless Data Hiding Technique for Palette-Based Images with Capacity Optimization. Proceedings of the 14th International Workshop On Systems, Signals,& Image Processing,2007:443-446.
    [71]Sang Jun, Alam Mohammad S. A neural network based lossless digital image watermarking in the spatial domain. Proceedings of the 2nd International Symposium on Neural Networks,2005:'772-776.
    [72]Shu-Kei Yip, Au O. C., Hoi-Ming Wong, Chi-Wang Ho. Generalized lossless data hiding by multiple predictors. Proceedings of IEEE International Symposium on Circuits and Systems, vols 1-11,2006:1426-1429.
    [73]Shu-Kei Yip, Au O. C., Hoi-Ming Wong, Chi-Wang Ho. Block-Based Lossless Data Hiding in Delta Domain. Proceedings of 2006 IEEE International Conference on Multimedia and Expo-ICME 2006, Vols 1-5,:857-860.
    [74]Tsai Chang-Lung, Chiang Huei-Fen, Fan Kuo-Chin, Chung Char-Dir. Reversible data hiding and lossless reconstruction of binary images using pair-wise logical computation mechanism. Pattern Recognition,2005,38(11):1993-2006.
    [75]Tseng Hsien-Wen, Hsieh Chi-Pin. Prediction-based reversible data hiding. Information Sciences,2009,179(14):2460-2469.
    [76]Wang Jen-Tse, Wang Peng-Cheng, Yu Shyr-Shen. Reversible fragile watermarking scheme for three-dimensional models. Optical Engineering,2009,48(9): 97004-97011.
    [77]Wang XiaoTong, Shao ChengYong, Xu XiaoGang, Niu Xiamu. Reversible data-hiding scheme for 2-D vector maps based on difference expansion. IEEE Transactions on Information Forensics And Security,2007,2(3):311-320.
    [78]Weng Shaowei, Zhao Yao, Pan Jeng-Shyang. A novel reversible data hiding scheme. International Journal of Innovative Computing Information and Control, 2008,4(2):351-358.
    [79]Weng Shaowei, Zhao Yao, Pan Jeng-Shyang, Ni Rongrong. Reversible Watermarking Based on Invariability and Adjustment on Pixel Pairs. IEEE Signal Processing Letters,2008:721-724.
    [80]Xuan Guorong, Zheng Junxiang, Yang Chengyun, Shi Yun Q., Zou Dekun, Liansheng Liu, Weichao Bai. A secure Internet-based personal identity verification system using lossless watermarking and fingerprint recognition. Digital Watermarking,2005:55-65.
    [81]Yamuna G, Sivakumar D. Secured and Lossless Watermarking Technique for Patent Infringement. Procedings of the 5th International Conference on Information Technology-New Generations,2008:1295-1296.
    [82]Yang Ying, Sun Xingming, Yang Hengfu, Li Chang-Tsun, Xiao Rong. A Contrast-Sensitive Reversible Visible Image Watermarking Technique. IEEE Transactions on Circuits and Systems for Video Technology,2009,19(5):656-667.
    [83]Zhao Hong, Wang Hongxia, Khurram Khan Muhammad. Statistical analysis of several reversible data hiding algorithms. Multimedia Tools and Applications, 2009.
    [84]C.W. Honsinger, P. Jones, M. Rabbani, and J.C. Stoffel. Lossless recovery of an original image containing embedded data. U.S. Patent application, Docket No: 77102/E-D,1999.
    [85]B. Macq. Lossless multiresolution transform for image authenticating watermarking. Proceedings of EUSIPCO, Tampere, Finland, September 2000.
    [86]J. Fridrich, M. Goljan, and R Du. Invertible authentication. Proceedings of SPIE Security and Watermarking of Multimedia Contents, San Jose, CA, Jan,2001: 197-208.
    [87]A. A. C. M. Kalker and F. M. J. Willems. Capacity bounds and constructions for reversible data-hiding. Proceedings of the 14th International Conference on Digital Signal Processing, Jul.2002, vol.1:71-76.
    [88]Celik, M.U., Sharma, G, Tekalp, A.M., Saber, E. Lossless Generalized-LSB Data Embedding, IEEE Transactions on Image Processing.14(2),2005:253-266.
    [89]Celik M. U., Sharma G, Tekalp A. M. Lossless watermarking for image authentication:A new framework and an implementation. IEEE Transactions on Image Processing,2006,15(4):1042-1049.
    [90]J. Tian. Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):890-896.
    [91]AM Alattar. Reversible watermark using the difference expansion of a generalized integer transform. IEEE Transactions on Image Processing,2004,13(8): 1147-1156.
    [92]D. M. Thodi and J. J. Rodriguez. Prediction—error based reversible watermarking. Proceedings of 2004 IEEE International Conference on Image Processing (ICIP 2004):1549-1552.
    [93]Thodi Diljith M., Rodriguez Jeffrey J. Expansion embedding techniques for reversible watermarking. IEEE Transactions on Image Processing,2007.16(3): 721-730.
    [94]L. Kamstra, HJAM Heijmans. Reversible data embedding into images using wavelet techniques and sorting. IEEE Transactions on Image Processing,2005. 14(12):2082-2090.
    [95]Chang Chin-Chen, Lu Tzu-Chuen. A difference expansion oriented data hiding scheme for restoring the original host images. Journal Of Systems And Software, 2006,79(12):1754-1766.
    [96]Hu Yongjian, Lee Heung-Kyu, Chen Kaiying, Li Jianwei. Difference Expansion Based Reversible Data Hiding Using Two Embedding Directions. IEEE Transactions on Multimedia,2008,10(8):1500-1512.
    [97]Kim Hyoung Joong, Sachnev Vasiliy, Shi Yuri Qing, Nam Jeho, Choo Hyon-Gon. A novel difference expansion transform for reversible data embedding. IEEE Transactions on Information Forensics and Security,2008,3(3):456-465;
    [98]Lee Chih-Chiang, Wu Hsien-Chu, Tsai Chwei-Shyong, Chu Yen-Ping. Adaptive lossless steganographic scheme with centralized difference expansion. Pattern Recognition,2008.41(6):2097-2106.
    [99]Lin Ching-Chiuan, Hsueh Nien-Lin. A lossless data hiding scheme based on three-pixel block differences. Pattern Recognition,2008,41(4):1415-1425.
    [100]Lin Ching-Chiuan, Yang Shun-Ping, Hsueh Nien-Lin. Lossless Data Hiding Based on Difference Expansion without a Location Map. Proceedings of the 1st International Congress on Image and Signal Processing, vol.2,2008:8-12.
    [101]Lu Tzu-Chuen, Chang Chin-Chen. Lossless nibbled data embedding scheme based on difference expansion. Image and Vision Computing,2008,26(5): 632-638.
    [102]Tseng Hsien-Wen, Chang Chin-Chen. An extended difference expansion algorithm for reversible watermarking. Image And Vision Computing,2008, 26(8):1148-1153.
    [103]Wu Hsien-Chu, Lee Chih-Chiang, Tsai Chwei-Shyong, Chu Yen-Ping, Chen Hung-Ruei. A high capacity reversible data hiding scheme with edge prediction and difference expansion. Journal of Systems and Software,2009,82(12): 1966-1973.
    [104]Hu Yi; Song Wei; Hou Jianjun. Improved reduced difference expansion based reversible data hiding scheme for digital images. Proceedings of the 9th International Conference on Electronic Measurement & Instruments,2009. ICEMI'09:315-318.
    [105]Lou Der-Chyuan, Hu Ming-Chiang, Liu Jiang-Lung. Multiple layer data hiding scheme for medical images. Computer Standards & Interfaces,2009,31(2): 329-335.
    [106]Ni Z. C., Shi Y. Q., Ansari N., Su W. Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology,2006,16(3):354-362.
    [107]Chang Chin-Chen, Tai Wei-Liang, Chen Kuo-Nan. Lossless Data Hiding Based on Histogram Modification for Image Authentication. Proceedings of 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2008,1:506-511.
    [108]Fallahpour M., Sedaaghi M. H. High capacity lossless data hiding based on histogram modification. IEICE Electronics Express,2007,4(7):205-210.
    [109]Liang Xiaoping, Wu Xiaoyun, Huang Jiwu. Reversible data hiding for image based on histogram modification of wavelet coefficients. Proceddings of Computational Intelligence And Security,2005:573-580.
    [110]Lin Chia-Chen, Tai Wei-Liang, Chang Chim-Chen. Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recognition, 2008.41(12):3582-3591.
    [111]SK Lee, YH Suh, YS Ho. Lossless data hiding based on histogram modification of difference images. Proceddings of Advances in Multimedia Information Processing-PCM 2004:340-347.
    [112]Tai Wei-Liang, Yeh Chia-Ming,Chang Chin-Chen. Reversible Data Hiding Based on Histogram Modification of Pixel Differences. IEEE Transactions on Circuits and Systems for Video Technology,2009,19(6):904-908.
    [113]Tseng H. W, Hsieh C. P. Reversible data hiding based on image histogram modification. Imaging Science Journal,.2008,56(5):271-278.
    [114]G Xuan, J. Zhu, J. Chen, Y. Q. Shi, Z. Ni, and W. Su. Distortionless data hiding based on integer wavelet transform. IEE Electron Letters, vol.38,2002: 1646-1648.
    [115]Chang Chin-Chen, Chou Yung-Chen, Lin Chih-Yang. Reversible data hiding in the VQ-compressed domain. IEICE Transactions on Information and Systems, 2007, E90D(9):1422-1429.
    [116]Chang Chin-Chen, Lin Chih-Yang. Reversible steganography for VQ-compressed images using side matching and relocation. IEEE Transactions On Information Forensics And Security,2006,1(4):493-501.
    [117]Chang Chin-Chen, Lin Chih-Yang, Hsieh Yi-Pei. Three-phase lossless data hiding method for the VQ index table. Fundamenta Informaticae,2008,82(1-2): 1-13.
    [118]Chang Chin-Chen, Tai Wei-Liang, Lin Chia-Chen. A reversible data hiding scheme based on side match vector quantization. IEEE Transactions on Circuits and Systems for Video Technology,2006,16(10):1301-1308.
    [119]Chan Yung-Kuan, Chen Wen-Tang, Yu Shyr-Shen, Ho Yu-An, Tsai Chwei-Shyong, Chu Yen-Ping. A HDWT-based reversible data hiding method. Journal of Systems and Software,2009,82(3):411-421.
    [120]Chen Chi en-Chang, Kao De-Sheng. DCT-Based Zero Replacement Reversible Image Watermarking Approach. International Journal of Innovative Computing Information and Control,2008,4(11):3027-3036.
    [121]Lu Zhe-Ming, Wang Jun-Xiang, Liu Bei-Bei. An improved lossless data hiding scheme based on image VQ-index residual value coding. Journal Of Systems And Software,2009,82(6):1016-1024.
    [122]Ohyama S., Niimi M., Yamawaki K., Noda H. Lossless Data Hiding Using Bit-Depth Embedding for JPEG2000 Compressed Bit-Stream. Proceddings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing,2008:151-154.
    [123]Usman Imran, Khan Asifullah, Ali Asad, Choi Tae-Sun. Reversible Watermarking Based on Intelligent Coefficient Selection and Integer Wavelet Transform. International Journal of Innovative Computing Information and Control,2009,5(12A):4675-4682.
    [124]Wang Jun-Xiang, Lu Zhe-Ming. A path optional lossless data hiding scheme based on VQ joint neighboring coding. Information Sciences,2009,179(19): 3332-3348.
    [125]Yang Cheng-Hsing, Lin Yi-Cheng. Reversible data hiding of a VQ index table based on referred counts. Journal of Visual Communication and Image Representation,2009,20(6):399-407.
    [126]Lee Sunil, Yoo Chang D., Kalker Ton. Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Transactions on Information Forensics and Security,2007,2(3):321-330.
    [127]Awrangjeb Mohammad, Kankanhalli Mohan S. Reversible watermarking using a perceptual model. Journal of Electronic Imaging,2005.14(1):13014-13018
    [128]Chang Chin-Chen, Lu Tzu-Chuen, Chang Ya-Fen, Lee Chia-Tung. Reversible data hiding schemes for deoxyribonucleic acid (DNA) medium. International Journal of Innovative Computing Information And Control,2007,3(5): 1145-1160.
    [129]Chou Ding, Jhou Chang-Yun, Chu Shu-Chuan. Reversible Watermark for 3D Vertices Based on Data Hiding in Mesh Formation. International Journal of Innovative Computing Information and Control,2009,5(7):1893-1901.
    [130]邵承永,王孝通,徐晓刚, 牛夏牧.矢量地图的无损数据隐藏算法研究.中国图像图形学报,2007,12(2):206-211.
    [131]谢于明, 程义民, 王以孝, 郭志川.基于线性预测的图像无损信息隐藏方法.计算机辅助设计与图形学学报,2006,18(4):585-591.
    [132]郭志川,程义民,王以孝,谢于明.一种基于视频的无损信息隐藏方法.中 国科学院研究生院学报,2006,23(2):165-173.
    [133]J. Dittmann,Benedens. Invertible authentication for 3D-meshes. Proceedings of SPIE,2003, vol:5020:653-664.
    [134]J. Fridrich, R. Du. Lossless authentication of MPEG-2 video.Proceedings of IEEE Conference on Image Processing, Sep.2002, vol.2:893-896.
    [135]M. Van der Veen, F. Bruekers, A. Van Leest, S. Cavin. High capacity reversible watermarking for audio. Proceedings of SPIE,2003,vol.5020:1-11.
    [136]De Vleeschouwer C., Delaigle J. F., Macq B. Circular interpretation of bijective transformations in lossless watermarking for media asset management. Multimedia, IEEE Transactions on Multimedia,2003,5(1):97-105.
    [137]Zou Dekun, Shi Yun Q., Ni Zhicheng, Su Wei. A semi-fragile lossless digital watermarking scheme based on integer wavelet transform. IEEE Transactions on Circuits and Systems for Video Technology,2006,16(10):1294-1300.
    [138]Ni, Z.C., Shi, Y.Q., Ansari, N., Su, W., Sun, Q., Lin, X. Robust Lossless Image Data Hiding. IEEE Int. Conf. on Multimedia and Expo,3(6),2004:2199-2202.
    [139]Ni Zhicheng, Shi Yun Q., Ansari Nirwan, Su Wei, Sun Qibin, Lin Xiao. Robust lossless image data hiding designed for semi-fragile image authentication. IEEE Transactions on Circuits and Systems for Video Technology,2008,18(4): 497-509.
    [140]Schaefer, G., Stich, M. UCID-An Uncompressed Colour Image Database, Proceedings of SPIE, Storage and Retrieval Methods and Applications for Multimedia, San Jose, USA,2004:472-480.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700