基于特征的第二代图像与视频水印技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
图像与视频水印技术在抗几何攻击和水印嵌入信息量等方面存在缺陷。针对这些问题,本文在载体特征的提取、使用和水印嵌入策略上展开研究。主要研究内容如下:
     1.提出了一种基于Discrete Wavelet Transform(DWT)域的抗几何攻击水印算法。使用Harris-Laplace算子从图像中提取出具有几何攻击鲁棒性的特征点模板,水印则自适应地嵌入到图像DWT低频系数上,提高了水印嵌入的信息量,具有较强的抗几何攻击能力。
     2.提出了一种基于仿射不变特征点的抗几何攻击水印算法。水印被自适应地嵌入到由Harris-Affine算子从载体图像中提取出的、被归一化的特征区域中,提高了抗合成几何攻击的鲁棒性。
     3.提出了两种Contourlet变换域的鲁棒性水印算法。首先,提出了一种基于Contourlet变换域的自适应水印算法。在水印嵌入位置的选择上折中了鲁棒性与透明性之间矛盾,提高了水印嵌入的鲁棒性与透明性。其次,提出了一种基于特征点模板的Contourlet变换域的抗几何攻击水印算法。对传统的Harris-Laplace算子进行改进,提高了Harris-Laplace算子的时间效率。在水印嵌入的策略上结合了特征点模板与Contourlet变换域特性,提高了水印嵌入的透明性与抗几何攻击鲁棒性。
     4.提出了一种基于特征区域的抗几何攻击视频水印算法。算法全面考虑了时间上和空间上的几何攻击问题,具有实时检测性和很好的抗几何攻击鲁棒性。在水印嵌入策略上利用点的平面空间性,提高了水印嵌入的信息量。
With continuous progress of multimedia technology and increasing prevalence of computer network, the application of digital media gains rapid development. All kinds of multimedia work (digital image, video and audio, etc.) can be downloaded on the Internet. This brings conveniences to our working and daily lives. But as a byproduct, it makes those multimedia data be easily copied, altered and redistributed without any permission from the copyright owner. This could lead to great loss of copyright owner and producer. So, it is an urgent subject to safeguard information and intellectual property of digitized multimedia products.
     As an important mean to protect copyright of multimedia information, watermarking technique has been widely researched and applied. Digital Watermarking can embed copyright information into original data without any effects on its use. It cannot be easily removed without special extraction algorithm. Digital watermarking can be used to identify the product which has been illegally copied or consumed. Therefore, digital watermarking has received considerable attention from both research and industrial field.
     Through the development of approximately one decade, digital watermarking is still in its early age. There remain some problems to be tackled before its practical application. State-of-the-art watermarking algorithms have good robustness against some common attacks such as compression, filtering, noise, and etc. They lack, however, effective resistance to geometrical attacks such as rotation, scaling, cropping, translation, local random distortion, and etc. Compared with image watermarking, video watermarking algorithm has to satisfy blind detection and real-time requirement in addition to basic robustness and imperceptibility requirements. Meanwhile, video watermarking may suffer spatial synchronization attacks, as well as temporal synchronization attacks. Thus, how to solve the synchronization problem of image and video in watermarking embedding and detecting is a still popular research topic.
     Through thorough analysis the effect of geometrical attacks on watermarking robustness and host image, this paper focuses on the feature-based image and video watermarking techniques against geometrical attacks, which is named“second generation digital watermarking”. Image features are covariant to geometrical deformation and robust, to some extent, to geometrical attacks. Employing image features as template, we propose several excellent watermarking schemes against geometrical attacks. Moreover, we present an adaptive watermarking scheme based on contourlet transform which provides better representation than wavelet for images. Combining contourlet with image features, we further propose a contourlet-domain watermarking against geometrical attacks. Finally, a robust video watermarking scheme is presented based on statistical feature invariability in circular area. By reasonably analyzing the inherent characteristics of image and video, and fully utilizing state-of-the-art techniques, this paper presents robust watermarking schemes against common image processing and de-synchronization attacks. The proposed schemes provide effective solutions to the development and practical application of digital watermarking.
     The innovation and main contributions are listed as follows.
     1. A blind image watermarking scheme in wavelet domain against geometrical attacks is proposed based on feature point.
     Considering the covariance of feature points with geometry deformation and the spatial-frequency localization property of wavelet, we propose an image watermarking scheme in wavelet domain using feature points as template. First, according to the tree structure of the wavelet coefficients, the proposed scheme selects the root of the directional subtree with the highest texture as the embedded points from each wavelet tree. Second, this paper proposes an adaptive embedding strategy according to the energy of the low frequency coefficient corresponding to the embedded point and the texture characteristics of the highest frequency coefficients of the subtree. Finally, the proposed scheme uses the improved Harris-Laplace operator to extract the feature points robust to the geometrical attacks, and forms a template of feature points. During detection, the proposed scheme restores the attacked image by linear transformation using the feature template, and then verifies the watermarking through statistical correlation. The detection process does not need the original host image. Experimental results show that the proposed algorithm has good transparency and is very robust to common image processing and geometric attacks.
     2. An image watermarking scheme resilient to geometrical attacks is proposed based on affine-invariant feature point.
     Based on theory of affine-invariant feature point that is adaptive to local structure of image, we propose an image watermarking scheme of the second generation to effectively resist common geometrical attacks. First, the Harris-Affine detector is utilized to extract invariant feature points from the host image. Then, by the feature scale of the local structure, the feature regions are adaptively computed and normalized. Finally, several copies of the digital watermark are embedded into the unoverlapped local feature regions by quantizing the magnitude vectors of the DFT middle frequency. During detection, the resynchronization is achieved through feature points. And the embedded sequence can be extracted by“majority principles”without resorting to the original host image. Experimental results show that the proposed algorithm has good transparency and is very robust to common image processing and geometric attacks.
     3. Two novel robust image watermarking schemes are proposed based on contourlet transform.
     Contourlet transform performs better than wavelet transform in representing images. It is a“real”image representation, which has many good characteristics such as multiresolution, localization and directionality.
     1) We present an adaptive watermarking scheme based on contourlet transform. We analyze and discuss the characteristics of contourlet transform, and on the basis above, propose an adaptive contourlet-domain watermarking algorithm. The proposed algorithm includes three important techniques: firstly, selects the subband having maximum energy in the coarsest directional subbands as the band to be embedded watermarking so that the watermarking can be embed into significant region as well as highly textured region of the host image. Secondly, for each coefficient of the selected subband, embeds watermarking with different strength adaptively adjusted in terms of the energy of its parent coefficient in the lowest subband, and the texture of its neighborhood coefficients in finer scale. The choice of embedding position and the embedding strategy above effectively guarantee good transparency and maximum robustness of the proposed algorithm. Finally, when detection, does not need the original image, determines the existence of watermarking by the statistical correlation between the host image and watermarking. The experimental results show the proposed algorithm has good transparency and is very robust to common image processing.
     2) A contourlet-domain watermarking algorithm against geometric attacks based on feature template is presented. The proposed algorithm includes four important techniques: firstly, puts coefficients into one group with the same coordinate in each finest directional subband. Then selects the coefficient with the richest texture from each group as the coefficient to be embedded watermarking. Therefore, watermarking can be embedded into significant region as well as highly textured region of the host image. Secondly, for each coefficient of the selected subband, embeds watermarking with different strength adaptively adjusted in terms of the energy of its parent coefficient in the lowest subband, and the texture of its neighborhood coefficients in finer scale. The choice of embedding position and the embedding strategy above effectively guarantee good transparency and maximum robustness of the proposed algorithm. Thirdly, improves the Harris-Laplace operator, extracts the feature points robust to geometric deformation as template from the embedded image using improved Harris-Laplace operator. Finally, when detection, uses the transformation between corresponding points in feature template to realize resynchronization, and determines existence of watermarking by statistical correlation between host image and watermarking. Experimental results show the proposed algorithm has good transparency and is very robust to common image processing and geometric attacks.
     4. A robust video watermarking technique is presented against geometrical attacks based on invariability area of feature.
     In the embedding scheme, a geometrical invariable is proposed, which is based on the invariability of statistical feature in the circular image area. Using this invariability, the geometrical distortion is first retrieved. And then significative watermarking and synchronization information is adaptively embedded into the discrete cosine transform (DCT) domain according to characteristics of DCT coefficients. Moreover, the algorithm proposes a novel embedding method that can embed multi-bit information in a selected position. In the extraction scheme, the embedded watermarking is located by the synchronization information and the geometrical distortion is retrieved making use of circular feature area if geometrical attacks is encountered, and finally the watermarking is obliviously extracted in the DCT domain. The experimental results show the proposed scheme can achieve good transparency and better resistance against RST attacks and excellent robustness to common attacks such as MPEG compression, frame loss, etc..
引文
[1] Wang S M, Zhao W D, Wang Z C. A novel gray scale watermarking algorithm in wavelet domain[C]. IEEE International Conference on Information and Automation, Changsha, Peoples R China, June 20-23, 2008, 1-4: 470-475.
    [2] Chen B W, Zhao J Y, Wang D L. An adaptive watermarking algorithm for mp3 compressed audio signals[C]. 25th IEEE Instrumentation and Measurement Technology Conference, Victoria, Canada, May 12-15, 2008, 1057-1060.
    [3] Cruz C, Reyes R, Rnakano M, Perez H. Image content authentication system based on semi-fragile watermarking[C]. 51st Midwest Symposium on Circuits and Systems Knoxville, TN, August 10-13, 2008, 306-309.
    [4] Stefan K, Pabien A P P.信息隐藏技术-隐写术与数字水印[M].吴秋新等译,北京:人民邮电出版社, 2001, 9.
    [5] Tsai J S, Huang W B, Chen C, Kuo Y H. A feature-based digital image watermarking for copyright protection and content authentication[C]. IEEE International Conference on Image Processing, San Antonio, TX, United states, September 16-19, 2007, 5: V469-V472.
    [6] Chen T H, Tsai D S. Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol [J]. Pattern Recognition, 2006, 39(8): 1530-1541.
    [7] Chen N, Zhu J. A multipurpose audio watermarking scheme for copyright protection and content authentication[C]. IEEE International Conference on Multimedia and Expo, Hannover, Germany, June 23-26, 2008: 221-224.
    [8] Zhao B, Dang L, Kou W D, Zhang J, Li Z, Fan K. A watermarking scheme in the encrypted domain for watermarking protocol[C]. 3rd SKLOIS Conference on Information Security and Cryptology, Inscrypt 2007, Xining, China, August 31- September 5, 2007, 442-456.
    [9] Cox I J, Miller M L, Bloom J A. Watermarking application and their properties[C]. In: Conference on Information Technology, Las Vegas, NV, USA, March 27-29, 2000: 6-10.
    [10] Queluz M P. Authentication of digital images and video: Generic models and a new contribution[J]. Signal Processing: Image Communication.2001, 16: 461-475.
    [11]刘彤,裘正定.同时实现版权保护与内容认证的半易损水印方案[J].北方交通大学学报, 2002, 26(1): 6-10.
    [12] Lee S, Choi H, Choi K, Kim J. Fingerprint-quality index using gradient components[J]. IEEE Transactions on Information Forensics and Security, 2008, 3(4):791-799.
    [13] Choi J G, Sakurai K, Park J H. Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party[J]. Applied Cryptography and Network Security, 2003, 28 46(10):265-279.
    [14]任传伦,李远征,杨义先.一种安全的指纹身份认证系统的设计[J].计算机工程与应用.2003(17): 33-34.
    [15] Benhammadi F, Beghdad K B, Hentous H. Fingerprint verification based on core point neighborhoods minutiae[C]. 6th IEEE/ACS International Conference on Computer Systems and Applications, Doha, Qatar, March 31 - April 4, 2008: 530-536.
    [16] Bartolini F, Cappellini V, et al. MPEG-4 video data protection for internet distribution[C]. In: Evolutionary Trends of the Internet: Tyrrhenian International Workshop on Digital Communications, IWDC 2001, Taormina, Italy, September 17-20, 2001: 713-720.
    [17] Julien L T, Olivier B, Valerie G B, Nozha B. Robust voting algorithm based on labels of behavior for video copy detection[C]. 14th Annual ACM International Conference on Multimedia, Santa Barbara, CA, United states, October 23-27, 2006: 835-844.
    [18] Julien L T, Olivier B, Valerie G B, Nozha B. Labeling complementary local descriptors behavior for video copy detection[C]. International Workshop on Multimedia Content Representation, Classification and Security, Istanbul, Turkey, September 11-13, 2006: 290-297.
    [19] Kwok S H, Cheung S C, et al. Integration of digital rights management into the internet open trading protocol[J]. Decision Support Systems, 2003, 34 (4):413-425.
    [20] Cox I J, Miler M L. The first 50 years of electronic watermarking[J]. Journal of applied signal processing, 2002, 2: 126-132.
    [21] Eggers J J, Ihlenfeldt W D, Girod B. Digital watermarking of chemical structure sets[C]. In: Information Hiding: 4th International Workshop, IHW2001, 2001:200-214.
    [22] Cayre F, Rondao A P, Schmit F. Application of spectral decomposition to compression and watermarking of 3D triangle mesh geometry[J]. Signal Processing: Image Communication, 2003, 18(4): 309-319.
    [23] Yu Z Q, Ip H H S, Kwok L F. A robust watermarking scheme for 3D triangular mesh models [J]. Pattern Recognition, 2003, 36(11): 2603-2614.
    [24] Tsai H M, Chang L W. A high secure reversible visible watermarking scheme[C]. Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, Beijing, China, July 2-5, 2007: 2106-2109.
    [25] Huang C H, Wu J L. A user attention based visible video watermarking scheme [J]. International Conference on Informatics, Cybernetics and Systems, 2003:12-15.
    [26] Topkara M, Kamra A, Atallah M J, Cristina N R. ViWiD: Visible watermarking based defense against phishing[J]. Lecture Notes in Computer Science, 2005, 3710 LNCS: 470-483.
    [27] Mohanty S P, Guturu P, Kougianos E, Pati N. A novel invisible color image watermarking scheme using image adaptive watermark creation and robust insertion-extraction[C]. ISM 2006-8th IEEE International Symposium on Multimedia, San Diego, CA, United states,December 11-13, 2006: 153-160.
    [28] Maheshwari M, Arora R, Singh G. Invisible image watermarking using a public key algorithm[J]. Journal of the Institution of Engineers, Part CP: Computer Engineering Division, 2006, 87: 27-31.
    [29] Yuan H, Zhang X P. A secret key based multiscale fragile watermark in the wavelet domain[C]. IEEE International Conference on Multimedia and Expo, ICME 2006 Proceedings, Toronto, ON, Canada, July 9-12, 2006, 2006: 1333-1336.
    [30] Liu X L, Kou W D, Wang Z G. Public-key watermarking algorithm resistant to geometric attacks [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2007, 34(4): 629-633.
    [31] Su J K, Hartung F, Griod B. Channel model for a watermark attack[C]. Proceedings of SPIE, Security and Watermarking of Multimedia Contents, San Jose, CA, January 25- 27, 1999, 3657: 159-170.
    [32] Reddy A A, Chatterji B N. A new wavelet based logo-watermarking scheme[J]. Pattern Recognition Letters, 2005, 26(5): 1019-1027.
    [33] Mainardia L T, Ducab G, Ceruttia S. Analysis of esophageal atrial recordings through wavelet packets decomposition[J]. Computer Methods and Programs in Biomedicine, 2005, 78(3): 251-257.
    [34] Lou D C, Liu J L. A robust watermarking scheme based on the just-noticeable-distortion[J]. Journal of Chung Cheng Institute of Technology, 2003, 31(2): 11–22.
    [35]肖亮,韦志辉,吴慧中.一种利用人眼掩蔽特性的小波域水印[J].通信学报, 2002, 3(23): 100-106.
    [36]杨恒伏,陈孝威.小波域鲁棒自适应公开水印技术[J].软件学报,2003, 14(9):1652-1660.
    [37] Eyadat M, Vasikarla S. Performance evaluation of an incorporated DCT block-based watermarking algorithm with human visual system model[J]. Pattern Recognition Letters, 2005, 26(5):1405-1411.
    [38] Bors A G, Pitas I. Image watermarking using DCT domain constraints[C]. Proceeding IEEE Internet Conference Image Processing, Lausanne, Switzerland, September 16-19, 1996, 3:231-234.
    [39] Koch E, Zhao J. Toward robust and hidden image copyright labeling[C]. IEEE Workshop Nonlinear Signal and Image Processing, Neos Marmaras, Greece, June, 1995, 1195: 452-455.
    [40] Tanka K, Nakamura Y, Matsuik. Embedding secret information into a dithered Multilevel image[C]. Processing of the 1990 IEEE Military communications conference, Monterey, CA, USA, September 30- October 3, 1990, 1: 216-220.
    [41] Caronni G. Ermitteln unauthorisierter verteiler von maschinenlesbaren daten[C]. Technical report, RTH ZiiRCH, Switerland, 1993: 8.
    [42] Tirkel A, et al. Electronic watermark[J]. Processing DUCTA 1993(12): 666-672.
    [43] Tirkel A, et al. A digital watermarking[J]. In Processing ICIP, IEEE, 1994(2): 86-89.
    [44] Lu W, Lu H T, Chung F L. Robust digital image watermarking based on subsampling[J]. Applied Mathematics and Computation, 2006, 181(2): 886-893.
    [45] Navas K A, Cheriyan A M, Lekshmi M, et al. DWT-DCT-SVD based watermarking[C]. 3rd International Conference on Communication System Software and Middleware and Workshops, Bangalore, India, January 6- 10, 2008: 271-274.
    [46] Cika P. The new watermarking scheme with error-correction codes[C]. 14th International Workshop on Systems, Signals, & Image Processing & Eurasip Conference Focused on Speech & Image Processing, Multimedia Communications & Services, Maribor, Slovenia, June 27-30, 2007: 233-236.
    [47] ElShafie D R, Kharma N, Ward R. Parameter optimization of an embedded watermark using a genetic algorithm[C]. 3rd International Symposium on Communications, Control and Signal Processing, St. Julians, Malta, March 12-14, 2008: 1263-1267.
    [48] Agarwal P, Prabhakaran B. Robust blind watermarking of point-sampled geometry[J]. IEEE Transactions on Information Forensics and Security, 2009, 4(1): 36-48.
    [49] Doerr G, Dugelay J L. A guide tour of video watermarking [J]. Signal Processing: Image Communication, 2003, 18(4):263-282.
    [50] Lin Y R, Huang H Y, Hsu W H. An embedded watermark technique in video for copyright protection[C]. 18th International Conference on Pattern Recognition, Hong Kong Peoples R China, August 20-24, 2006, 4:795-798.
    [51] Judge P, Ammar M. WHIM: watermarking multicast video with a hierarchy of intermediaries[J]. Computer Networks, 2002, 39(6): 699-712.
    [52] Harmanci O, Mihcak M K, Tekalp A M. Watermarking and streaming compressed video[C]. 2007 IEEE International Conference on Acoustics, Speech, and Signal Processing, Honolulu HI, April 15-20, 2007, 1: I-833-I-836.
    [53] Liu L, Lu L, Peng D Y. The design of secure video watermarking algorithm in broadcast monitoring[C]. International Conference on Information and Automation, Changsha Peoples R China, June 20-23, 2008, 1-4: 476-480.
    [54] Cvejic N, Seppanen T. Spread spectrum audio watermarking using frequency hopping and attack characterization[J]. Signal Processing. 2004, 84(1): 207-213.
    [55] Ercelebi E, Batakci L. Audio watermarking scheme based on embedding strategy in low frequency components with a binary image[J]. Digital Signal Processing, 2009, 19(2): 265-277.
    [56] Li Q C, Dong Z H. Novel text watermarking algorithm based on Chinese characters structure[C]. International Symposium on Computer Science and Computational Technology, Shanghai Peoples R China, December 20-22, 2008, 2: 348-351.
    [57] Kim M Y. Text watermarking by syntactic analysis[C]. Proceedings of the 12th Wseas International Conference on Computers, Heraklion Greece, July 23-25, 2008, Pts 1-3: 904-909.
    [58] Turner L F. Digital data security system[P]. Patent IPN WO 89/08915, 1989.
    [59] Schyndel V R G, Tirkel A Z, Osborne C F. A digital watermark[C]. In: Internet conference on Image Processing, 1994(2): 86-90.
    [60] Wolfgang R B, Delp E J. Overview of image security techniques with applications in multimedia system[C]. Multimedia Networks: Security, Displays, Terminals, and Gateways. Dallas, TX, United states, November 4-4, 1997, 3228: 297-308.
    [61] Fleet D J. Embedding in visible images in color images[C]. In: proceedings IEEE Internet Conference on Image Processing, Piscataway: IEEE Press, 1997, 1: 532-535.
    [62] Brassil J, Low S, Maxemchuk N, O' Gorman L. Electronic marking and identification techniques to discourage document copying[J]. IEEE Journal on Selected Areas in Communications, 1995, 13(8):1495-1504.
    [63] Brassil J, Low S, Maxemchuk N, O’Gorman L. Copyright protection for the electronic distribution of text document[J]. Proceedings of the IEEE, 1999, 87(7): 1181-1196.
    [64] Bender W, Gruhl D, Morimoto N, Lu A. Techniques for data hiding[J]. IBM Systems Journal archive, 1996, 35(3-4): 215-218.
    [65] Burgett S, Koch E, Zhao J. Copyright labeling of digitized image data[J]. IEEE Communications Magazine, 1998, 36(3): 94-100.
    [66] Zhao J, Koch E. Digital watermarking system for multimedia copyright protection[C]. In: Proceedings of the 4th ACM International Multimedia Conference, Boston, MA, USA, November 18-22, 1996: 443-445.
    [67] Cox I J, Killian J, et al. Secure spread spectrum watermarking for multimedia[J]. IEEE Transactions on Image Processing, 1997, 6(12): 1673-1687.
    [68] Zhao R M, Lian H, Pang H W, et al. A watermarking algorithm by modifying AC coefficies in DCT domain[C]. International Symposium on Information Science and Engineering, Shanghai Peoples R China, December 20-22, 2008, 2: 159-162.
    [69] Belkacem S, Dibi Z, Bouridane A. A masking model of HVS for image watermarking in the DCT domain[C]. 14th IEEE International Conference on Electronics, Circuits and Systems Marrakech, Marrakech Morocco, December 11-14, 2007, 1-4: 330-334.
    [70] Chen C C, Kao D S. DCT-based zero replacement reversible image watermarking approach[J]. International Journal of Innovative Computing Information and Control, 2008, 4(11): 3027-3036.
    [71] Betancourth G P, Haggag A, Ghoneim M, et al. Robust watermarking in the DCT domain using dual detection[C]. IEEE International Symposium on Industrial Electronics, Montreal Canada, July 9-13, 2006, 1-7: 579-584.
    [72] Al-Gindy A N, Tawfik A, Al-Ahmad H, et al. A new blind image watermarking technique for dual watermarks using low-frequency band DCT coefficients[C]. 14th IEEE International Conference on Electronics, Circuits and Systems, Marrakech Morocco, December 11-14, 2007, 1-4: 538-541.
    [73] O'ruanaidh J, Pun T. Rotation, scale and translation invariant spread spectrum digital image watermarking [J]. Signal Processing, 1998, 66(3): 303-317.
    [74] Solachidis V, Pitas I. Circularly symmetric watermark embedding in 2-D DFT domain[J]. IEEE Transactions on Image Processing, 2001, 10(11), 1741-1753.
    [75] Kundur D, Hatzinakos D. Digital watermarking using multiresolution wavelet decomposition[C]. In Proceedings of IEEE ICASSP’98, Seattle, WA, USA, May 12-15, 1998, 5: 2969-2972.
    [76] Kundur D, Hatzinakos D. Robust digital image watermarking method using wavelet-based fusion[C]. In International Conference on Image Processing, Santa Barbara, California, USA, October 26-29, 1997, 1: 544-547.
    [77] Kundur D, Hatzinakos D. A novel blind deconvolution scheme for image restoration using recursive filtering[J]. IEEE Transactions on Signal Processing, 1998, 46(2): 375-390.
    [78]黄达人,刘九芬,黄继武.小波变换域图像水印嵌入对策和算法[J].软件学报, 2002, 13(7): 1290-1297.
    [79] Niu X M, Lu Z M, Sun S H. Digital image watermarking based on multiresolution decomposition[J]. Electronics Letters, 2002, 38(14): 702-704.
    [80] Zhang X D, Feng J, Lo K T. Image watermarking using tree-based spatial-frequency feature of wavelet transform[J]. Journal of Visual Communication and Image Representation, 2003, 14: 474-491.
    [81] Xu Y L, Zhang R. A new digital watermark algorithm based on wavelet transformation[C]. 7th International Symposium On Test And Measurement, Beijing, Peoples R China, August 5-8, 2007, 1(7):1736-1739.
    [82] Baaziz N. Adaptive watermarking schemes based on a redundant contourlet transform[C]. IEEE International Conference on Image Processing, Genoa, Italy, September 11-14, 2005, 1: 221-224.
    [83] Jayalakshmi M, Merchant S N, Uday B D. Digital watermarking in contourlet domain[C]. The 18th International Conference on Pattern Recognition, Hong Kong, China, August 20-24, 2006, 3:861-864.
    [84] Bouzidi A, Baaziz N. Contourlet domain feature extraction for image content authentication[C]. Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Pasadena, California, USA, December 18 - 20, 2006:202-206.
    [85]李海峰,宋巍巍,王树勋.基于Contourlet变换的稳健性图像水印算法[J].通信学报,2006, 27(4): 87-94.
    [86] Song H H, Yu S Y, Yang X K, Song L, Wang C. Contourlet-based image adaptive watermarking[J]. Signal Processing-Image Communication, 2008, 23(3): 162-178.
    [87] Cox I J, Kilian J, et al. Secure spread spectrum watermarking for images, audio and video[C]. Proceedings of the 1996 IEEE International Conference on Image Processing, ICIP'96. Part 2 (of 3), Lausanne, Switz, September 16-19, 1996, 3: 243-246.
    [88] Cox I J, Kilian J, et al. A secure, robust watermark for multimedia[C]. In: Proceedings of Info Hiding'96, Cambridge University, London, England, 1996: 185-206.
    [89] Cox I J, Kilian J, et al. Secure, imperceptable yet perceptually salient, spread spectrum watermark for multimedia[C]. Proceedings of the 1996 Southcon Conference, Orlando, FL, USA, June 25-27, 1996, 192-197.
    [90] Bouchakour M, Jeannic G, Autrusseau F. JND mask adaptation for wavelet domain watermarking[C]. IEEE International Conference on Multimedia and Expo, Hannover Germany, June 23-26, 2008: 201-204.
    [91] Liu K C. Just noticeable distortion model and its application in color image watermarking[C]. 4th International Conference on Signal Image Technology and Internet Based Systems, Proceedings, Bali Indonesia, November 30-December 03, 2008: 260-267.
    [92] Liu R Z, Tan T N. An SVD-based watermarking scheme for protecting rightful ownership[J]. IEEE Transactions on Multimedia, 2002, 4(1): 121-128.
    [93] Ganic E, Zubair N, Eskicioglu A M. An optimal watermarking scheme based on singular value decomposition[C]. Proceedings IASTED International Conference on Communication, Network, and Information Security, New York, NY., United states, December 10-12, 2003: 85-90.
    [94]周波,陈建.基于奇异值分解的抗几何失真的数字水印算法[J].中国图像图形学报, 2004, 9(4): 506-512.
    [95]陈永红,黄席樾.基于混沌映射和矩阵奇异分解的公开数字水印技术[J].计算机仿真, 2005, 22(1): 138-141.
    [96]胡志刚,谢萍,张宪民.一种基于奇异值分解的数字水印算法[J].计算机工程, 2003, 17(29): 162-164.
    [97]王炎,王建军,黄旭明.一种基于ICA的多边形曲线水印算法[J].计算机辅助设计与图图形学学报, 2006, 18(7): 1054-1059.
    [98] Thang V N, Jagdish C P. A simple ICA-based digital image watermarking scheme[J]. Digital Signal Processing, 2008, 18(5): 762-776.
    [99] Wang D H, Li D M, Yan J. Robust watermark algorithm based on the wavelet moment modulation and neural network detection[C]. Advances In Neural Networks - Isnn 2008, Pt 2, Proceedings, Beijing Peoples R China, September 24-28, 2008, 5264: 392-401.
    [100] Huang S, Zhang W, Feng W, et al. Blind watermarking scheme based on neural network[C].7th World Congress on Intelligent Control and Automation, Chongqing Peoples R China, June 25-27, 2008, 1-23: 5985-5989.
    [101]凌贺飞,卢正鼎,邹复好,李瑞轩.基于Watson视觉感知模型的能量调制水印算法[J].软件学报, 2006, 17(5): 1124-1132.
    [102]高崎,李人厚,刘连山.基于帧间相关性的盲视频数字水印算法[J].通信学报, 2006, 27(6): 43-48.
    [103]杨列森,郭宗明.基于帧间中频能量关系的自适应视频水印算法[J].软件学报,2007, 18(11): 2863-2870.
    [104] Rathore S A, Gilani S A M, et al. Enhancing invisibility and robustness of DWT based video watermarking scheme for copyright protection[C]. International Conference on Information and Emerging Technologies, Karachi, Pakistan, July 6-7, 2007: 116-120.
    [105] Yang G, Sun X M, Wang X J. A genetic algorithm based video watermarking in the DWT domain[C]. International Conference on Computational Intelligence and Security, Guangzhou, China, October 3-6, 2006, 2: 1209-1212.
    [106] Lv A Q, Li J. A novel scheme for robust video watermark in the 3D-DWT domain[C]. Chengdu, China, November 1-3, 2007: 514-516.
    [107] Deguillaume F, Csurka G, O'ruanaidh J, et al. Robust 3D DFT video watermarking[C]. Proceedings of SPIE - The International Society for Optical Engineering, San Jose, CA, USA, January 25-27, 1999, 3657: 113-124.
    [108] Liu Y, Wang D, Zhao J Y. Video watermarking based on scene detection and 3D DFT[C]. Proceedings of the Fifth IASTED International Conference on Circuits, Signals, and Systems, Banff, AB, Canada, July2-4, 2007: 124-130.
    [109] Kutter M, Jordan F, Ebrahimi T. Proposal of a watermarking technique for hiding retrieving/data in compressed and decompressed video[R]. Technical report M2281, ISO/IEC document, JTCI/SC29/WG11, 1997.
    [110] Kung C H, Jeng J H, Lee YC, et al. Video watermarking using motion vector[C]. Proceedings of 16th IPPR Conference on computer vision, graphics and image processing, Taipoi, China, 2003: 547-551.
    [111] Zhang J, Li J G, Zhang L. Video watermark technique in motion vector[C]. Computer Graphics and Image Processing, 2001 Proceedings of XIV Brazilian Symposium on, Florianopolis, Brazil, October 15-18, 2001: 179-182.
    [112] Zhang G D, Mao Y B, Wang Z Q. A video watermarking theme based on motion vectors[J]. Acta Scientiarum Naturalium Universitatis Sunyatseni, 2004, 43(2): 117-119.
    [113]郑振东,王沛,陈胜.基于运动矢量区域特征的视频水印方案[J].中国图象图形学报, 2008, 13(10): 1926-1929.
    [114] Lu C S, Chen J R, Liao H Y M, et al. Real-time MPEG video watermarking in the VLC domain[C]. In: Proceedings of 16th International Conference on Pattern Recognition. LosAlamitos, CA, USA: IEEE Computer Soc, 2002: 552 -555.
    [115]邹复好,卢正鼎,凌贺飞. MPEG2变长编码域实时视频水印[J].计算机科学, 2006, 33(7):147-152.
    [116] Hanjalic A, Lngelaar G C, et al. Image and video databases: restoration, watermarking and retrieval[J]. Circuits and Devices Magazine, IEEE, 2001, 17(4):37-38.
    [117]吴国民,庄越挺,吴飞,潘云鹤.基于视觉特征的视频水印技术[J].计算机辅助设计与图形学学报, 2006, 18(5):715-721.
    [118]杨凯,向辉.基于运动、内容和帧分类的自适应视频水印算法[J].中国图象图形学报2003,(SA)1: 621-625.
    [119] Zhang J, Ho A T S. Robust digital image-in-video watermarking for the emerging H.264/AVC standard[C]. IEEE Workshop on Signal Processing Systems, SiPS: Design and Implementation, Athens, Greece, November 2-4, 2005, 2005: 657-662.
    [120] Sakazawa S, Takishima Y, Nakajima Y. H.264 native video watermarking method[C]. Proceedings - IEEE International Symposium on Circuits and Systems, Kos Island, Greece, May 21-24, 2006:1439-1442.
    [121]单承赣,孙德辉.基于H.264/AVC低比特率视频流的双水印算法[J].计算机应用, 2007, 27(8): 1922-1925.
    [122]曹华,周敬利,徐胜利,苏曙光.基于H.264低比特率视频流的半脆弱盲水印算法实现[J].电子学报, 2006, 34(1): 40-41.
    [123]刘九芬,王振武,黄达人.抗几何攻击的小波变换图像水印算法[J].浙江大学学报, 2003, 37(4): 386-392.
    [124] Davoine F. Watermarking et résistance aux deformation géometriques[C]. In Cinquiemes journées d'études et d'échanges sur la compression et la representation des signaux audiovisual, Centre de Recherchéet Développement de France Té1écom(Cnet), EURECOM, Conseil Général des alpes-Maritimes and Té1écom Valley,Sophia-Antipolis, France, Jun, 1999: 14 -15.
    [125] Johnson N F, Duric Z, Jajodia S. Recovery of watermarks from distorted images[C]. In Proceeding 3rd Internet Information Hiding Workshop, Dresden, Germany, 1999: 361-375.
    [126] Braudaway G W, Minter F. Automatic recovery of invisible image watermarks from geometrically distorted images[C]. Security and Watermarking of Multimedia Contents II, San Jose, CA, USA, January 24-26, 2000, 3971:74-81.
    [127] Kang X G, Huang J W, Shi Y Q. An image watermarking algorithm robust to geometric distortion[J]. Lecture Notesin computers Science: Proceeding of IWDW 2002, Spinger-Verlag, 2002, 2613: 212-213.
    [128] Pereira S, Pun T. Fast robust template matching for affine resistant image watermarks[J]. IEEE Transactions on Image Processing, 2000, 9(6): 1125-1129.
    [129]康显桂,黄继武,林彦,杨群生.抗仿射变换的扩频图像水印算法[J].电子学报, 2004,9(6): 8-12.
    [130] Motallebi F, Aghaeinia H. RST invariant wavelet-based image watermarking using template matching techniques[C]. 1st International Congress on Image and Signal Processing, Sanya, Hainan, China, May 27-30, 2008, 5: 720-724.
    [131]胡玉平,韩德志,羊四清.抗几何变换的小波域自适应图像水印算法[J].系统仿真学报, 2005, 17(10): 2470-2475.
    [132]俞龙江,牛夏牧,孙圣和.一种旋转、尺度变换和平移鲁棒水印算法[J].电子学报, 2003, 31(12): 2071-2073.
    [133]王春桃,倪江群,黄继武,张荣跃.结合Zernike矩和模板具有RST不变性的DWT-HMM鲁棒水印算法[J].中国图象图形学报, 2008, 13(7): 1250-1257.
    [134] Lu W, Lu H T, Chung F L. Feature based watermarking using watermark template match[J]. Applied Mathematics and Computation, 2006, 177(1): 377-386.
    [135] Kutter M. Watermarking resisting to translation rotation and scaling[C]. Proceedings of the 1998 Multimedia Systems and Applications, Boston, Massachusetts, 1999, 3528: 423-431.
    [136] Voloshynovskiy S, Deguillaume F, Pun T. Content adaptive watermarking based on a stochastic multiresolution image modeling[C]. In: Proceeding of EUSIPCO 2000, Tampere, Finland, September, 2000.
    [137] Deguillaume F, Voloshynovskiy S, Pun T. A method for the estimation and recovering from general affine transforms in digital watermarking applications[C]. Security and Watermarking of Multimedia Contents IV, San Jose, USA, January 21-24, 2002, 4675: 313-322.
    [138]桑茂栋,赵耀.抵抗几何攻击的数字图像水印[J].电子与信息学报, 2004, 26(12): 1875-1880.
    [139] Zhang L, Qian G B, Xiao W W. Geometric distortions invariant blind second generation watermarking technique based on tchebichef moment of original image[J]. Journal of Software, 2007, 18(9):2283-2294.
    [140]张力,韦岗,张宏基. Tchebichef矩在图像数字水印技术中的应用[J].通信学报, 2003, 24(9):11-18.
    [141]桑茂栋,赵耀.基于几何矩的抵抗RST攻击的数字图像水印[J].电子与信息学报, 2007, 29 (1): 77-81.
    [142]周晓.基于Randon变换和图像矩的抗RST攻击算法[J].计算机科学, 2007, 34(12): 257-259.
    [143]杨晓元,钮可,魏萍,吴艺杰.基于Cartesian矩的水印图像矫正算法[J].计算机工程, 2007, 33(12): 139-141.
    [144]徐紫涵,王向阳.可有效抵抗一般性几何攻击的数字水印检测方法[J].自动化学报, 35(1): 23-27.
    [145] O'ruanaidh J, Pun T. Rotation, scale and translation invariant digital imagewatermarking[J]. IEEE International Conference on Image Processing Santa Barbara, CA, USA, October 26-29, 1997,1: 536-539.
    [146] Lin C, Wu M, Bloom J, Cox I J, et al. Rotation, scale, and translation resilient watermarking for images[J]. IEEE Transactions on image Proceedings, 2001, 10(5): 767-782.
    [147] Kim B S, Choi J G, Park C H, et al. Robust digital image watermarking method against geometrical attacks[J]. Real-Time Image, 2003, 9(2):139-149.
    [148] Solachidis V, Pitas I. Circularly symmetric watermark embedding in 2-D DFT domain[J]. IEEE Transactions on Image Processing,2001,10(11): 1741-1753.
    [149] Licks V, Jordon R. On digital image watermarking robust to geometric transformations[C]. IEEE International Conference on Image Processing, Vancouver, BC, Canada, September 10-13, 2000, 3: [d] 690-693.
    [150] Shi L, Hong F, et al. Geometrical transformations resistant digital watermarking based on quantization[J]. Wuhan University Journal of Natural Sciences, 2005, 10(1): 319-323.
    [151] Zheng D, Zhao J, Saddik A. RST invariant digital image watermarking based on log -polar mapping and phase correlation[J]. IEEE Transaction Circuits System Video Technology, 2003, 13(8): 753-765.
    [152] Song Q, Zhu G X, Luo H J. Geometrically robust image watermarking based on image normalization[C]. 2005 International Symposium on Intelligent Signal Processing and Communication Systems, Hong Kong, China, December 13-16, 2005: 333-336.
    [153] Zheng D, Zhao J Y. A rotation invariant feature and image normalization based image watermarking algorithm[C]. IEEE International Conference on Multimedia and Expo, Beijing, China, July 2-5, 2007: 2098-2101.
    [154] Manuel C H, Mariko N M, Hector P M. Robust watermarking to geometric distortion based on image normalization and texture classification[C]. IEEE International 51st Midwest Symposium on Circuits and Systems, Knoxville, TN, United states, August 10-13, 2008: 245-248.
    [155] Vural C, Kazan S. Robust digital image watermarking based on normalization and complex wavelet transform[C]. 4th Ph.D. Research in Microelectronics and Electronics Conference 2008, Istanbul, Turkey, June 22-25, 2008: 57-60.
    [156]孟岚,杨红颖,王向阳.基于图像归一化的DFT域数字水印嵌人算法[J].小型微型计算机系统, 2008, 29(11): 2153-2156.
    [157] Rothe I, Susse H, Voss K. The Method of Normalization to Determine Invariants[J]. Pattern Analysis and Machine Intelligence, IEEE Transaction on, 1996, 18(4):36 6- 376.
    [158]扬文学,赵耀.抵抗仿射变换攻击的多比特图像水印[J].信号处理, 2004, 20(3): 245-252.
    [159] Ping D, Galatsanos NP. Affine transformation resistant watermarking based on imagenormalization[J]. IEEE International Conference on Image Processing, 2002, 3: 489-492.
    [160] Alghoniemy M, Tewifik A H. Geometric distortions correction through image normalization[C]. In: Processing of ICME, New York, USA, July 30-August 2, 2000: 1291-1294.
    [161] Ping D, Brankov J. Geometric robust watermarking based on a new mesh model correction approach [C]. International Conference on Image Processing, Rochester, NY, United states, September 22-25, 2002, 3: III/493-III/496.
    [162] Bas P, Chassery J M, Macq B. Geometrically invariant watermarking using feature points[J]. IEEE Transaction Image Processing, 2002, 11(9):1014-1028.
    [163] Alghoniemy M, Tewfik A H. Geometric invariance in image watermarking[J]. IEEE Transaction Image Processing, 2004, 13(2) :145-153.
    [164]周波,陈健.基于奇异值分解的抗几何失真的数字水印算法[J].中国图像图形学报, 2004, 9(4):507-509.
    [165] Liu R Z, Tan T N. SVD-based watermarking scheme for protecting rightful ownership[J]. IEEE Transaction on Multimedia, 2002, 4(1):121-128.
    [166]张宪,杨永田.基于DFT-SVD域抗几何攻击图像水印算法[J].计算机工程, 2006, 32(18): 120-122.
    [167]同鸣,冯玮,姬红兵.一种强稳健性的抗几何攻击图像水印算法[J].系统仿真学报, 2008, 20(24): 6613-6617.
    [168] Liu L, Sun Q. Robust image watermarking against geometrical attacks[C]. IET International Conference on Wireless Mobile and Multimedia Networks Proceedings, Hangzhou, China, November 6-9, 2006, 292.
    [169] Kutter M, Blmattacharjee S K, Ebrhinmi T. Towards second generation watermarking schemes[C]. IEEE International Conference on Image Processing, Kobe, Japan, October 24-28, 1999, 1: 320-323.
    [170] Bas P, Chassery J M, Macq B. Geometrically invariant watermarking using feature points[J]. IEEE Transaction on Image Processing, 2002, 11(9): 1014-1028.
    [171] Liu J, Yang H J, Kot A C. Relationships and unification of binary images data-hiding methods[C]. IEEE International Conference on Image Processing, Genova, Italy, September 11-14, 2005, 1:11-14.
    [172] Nikolaidis A, Pitas I. Region-based image watermarking[J]. IEEE Transactions on Image Processing, 2001, 10(11):1726-1740.
    [173]钟桦,焦李成.基于特征子空间的数字水印技术[J].计算机学报, 2003, 26(3): 1-6.
    [174] Tang C, Huang H. A feature based robust digital image watermarking scheme[J]. IEEE Transactions on Signal Processing, 2003, 51(4):950-959.
    [175] Solachidis V, Pitas L. Circularly symmetric watermark embedding in 2-D DWT domain[J]. IEEE Transactions Image Process, 2001, 10: 1741-1753.
    [176]王向阳,侯丽敏,邬俊.基于图像特征点的强鲁棒性数字水印嵌入方案[J].自动化学报, 2008, 34(1):1-6.
    [177] Yu Y W, Lu Z D, Ling H, Zou F. A robust blind image watermarking scheme based on feature points and RS-invariant domain[C]. 8th International Conference on Signal Processing, Guilin, China, November 16-20, 2006, 2.
    [178] Tone M, Hamada N. Scale change and rotation invariant digital image watermarking method[J]. Systems and Computers in Japan, 2007, 38(10):1-11.
    [179]李振宏,吴慧中.基于SIFT的抗几何攻击局部化图像水印[J].计算机工程, 2008, 34(19): 154-156.
    [180] Santa A, Guido A, Daniela P, Luigia P. An image adaptive, wavelet-based watermarking of digital images[J]. Journal of Computational and Applied Mathematics, 2007, 210(1-2): 13-21.
    [181]陈晨,成礼智.基于奇异值的DWT域公开零水印技术[J].通信学报.2006,27(11A): 81-84.
    [182]刘彤,裘正定.小波域自适应图像水印算法研究[J].计算机学报,2002,25(11): 1195-1199.
    [183]陈青苏,祥芳,王延平.采用小波变换的鲁棒隐形水印算法[J].通信学报,2001,22(7): 42-45.
    [184] Zhang L, Sam K, Gang W. Geometric moment in image watermarking[C]. Proceedings of the 2003 International Symposium on Circuits and Systems, Bangkok, Thailand , May 25-28, 2003, 2:25-28.
    [185]张仁昌,耿国华.基于奇异值分解和小波变换的抗几何失真数字水印新方法[J].计算机应用与软件, 2007, 24(7):33-35.
    [186] Wang X Y, Wu J, Niu P P. A new digital image watermarking algorithm resilient to desynchronization attacks[J]. IEEE Transactions on Information Forensics and Security, 2007, 2(4): 655-663.
    [187] Lee H Y, et al. Evaluation of feature extraction techniques for robust watermarking[J]. Lecture Notes in Computer Science, Germany: Springer, 2005, 3710: 418-431.
    [188] Mikolajczyk K, Schmid C. Scale & affine invariant interest point detectors[J]. International Journal of Computer Vision, 2004, 60(1): 63-86.
    [189]焦李成,谭山,刘芳.脊波理论:从脊波变换到Curvelet变换[J].工程数学学报,2005,22(5): 761-773.
    [190] Minh N D, Martin V. Contourlets: a new directional multiresolution image representation[J]. Signals, Systems and Computers, 2002, 1: 497-501.
    [191]焦李成,孙强.多尺度变换域图像的感知与识别:进展和展望[J].计算机学报, 2006, 29(2): 177-193.
    [192] Minh N D, Martin V. Framing pyramids[J]. IEEE Transactions Signal Processing, 2003, 51(9): 2329-2342.
    [193] Bunt P J, Adelson E H. The laplacian pyramid as a compact image code[J]. IEEETransactions on Communications, 1983, 31(4): 532-540.
    [194] Bamberger R H, Smith M J T. A filter bank for the directional decomposition of images theory and design[J]. IEEE Transactions Signal Processing, 1992, 40(4): 882-893.
    [195] Minh N D, Martin V. The contourlet transform: an efficient directional multiresolution image representation[J]. IEEE Transactions on Image Processing, 2005, 14(12): 2091-2106.
    [196]赵耀.基于小波变换的抵抗几何攻击的鲁棒视频水印[J].中国科学E辑,2006,36(2): 137-152.
    [197]陈真勇,邓俊辉,唐龙,唐泽圣.抗时空联合同步攻击的视频水印新方案[C].第十二届全国图象图形学学术会议论文集,中国,北京, 2005: 161-166.
    [198]杨晓元,钮可,魏萍,王育民.一种抗几何攻击的视频水印算法[J].计算机工程, 2007, 33(8): 142-145.
    [199] Wessely U. Synchronization of video watermarks for oblivious detection after geometrical distortions [EB/OL]. Virtual Goods 2004, http://virtualgoods.tu-ilmenau.de/2004/wmsync-VG04.pdf.
    [200]戴侃斐,陈真勇,唐龙.基于运动矢量的抗几何攻击视频水印方案[J].中国图像图形学报, 2007, 12(9): 1682-1687.
    [201]伍瑞,孙延奎,唐龙.基于图像归一化的针对视频对象的水印嵌入及检测[J].计算机工程与应用, 2003, 39(19): 65-68.
    [202] Xu D W, Wang R D, Wang J C. Object-based watermarking scheme against geometrical attacks[C]. 2008 IEEE International Conference Neural Networks and Signal Processing, Zhenjiang, China, June 7-11, 2008: 255-258.
    [203]陈光喜,成彦.基于HVS的抗几何攻击视频水印方案[J].计算机工程, 2008, 34(24): 152-154.
    [204]黄文勇,唐龙.一种抗几何变换攻击的MPEG-4视频对象水印方案[J].小型微型计算机系统, 2005, 26(5): 803-806.
    [205]钱莉,刘文予,张帆,Matthias H U B.一种基于DCT域特征块的抗几何攻击的视频水印[J].中国图象图形学报, 2007, 12(5): 819-825.
    [206] Jaap H, Ton K. A watermarking scheme for digital cinema[C]. IEEE International Conference on Image Processing, Thessaloniki, Greece, October 7-10, 2001, 2: 487-489.
    [207] Zhao Y, Reginald L L. Video watermarking scheme resistant to geometric attacks[C]. International Conference on Image Processing, Rochester, NY, United states, September 22-25, 2002, 2: II/145-II/148.
    [208] Nin X M, Sehmucker M, Busch C. Video watermarking resisting to rotation, scaling and translation[C]. Security and Watermarking of Multimedia Contents IV, San Jose, CA, United states, January 21-24, 2002, 4675: 512-519.
    [209] Sun S W, Chang P C. Video watermarking synchronization based on profile statistics[J]. IEEE Aerospace and Electronic Systems Magazine, 2004, 19(5):21-25.
    [210] Lin E T, Delp E J. Temporal synchronization in video watermarking: further studies[C]. Security and Watermarking of Multimedia Contents V, Santa Clara, CA, United states, January 21-24, 2003, 5020: 493-504.
    [211] Lin E T, Delp E J. Temporal synchronization in video watermarking[J]. IEEE Transactions on Signal Processing, 2004, 52(10): 3007-3022.
    [212] Ye D P, et al. A fast motion segmentation based watermarking for MPEG-2 video[C]. 8th International Conference on Control, Automation, Robotics and Vision, Kunming, China, December 6-9, 2004, 2: 1088-1091.
    [213] Kim S W, Sung H S. An improvement of auto-correlation based video watermarking scheme using independent component analysis[C]. International Conference on Computational Intelligence and Security, Xi'an, China, December 15-19, 2005, 3802 LNAI: 643-648.
    [214] El'Arbi M, Ben A C, Nicolas H. A video watermarking scheme resistant to geometric transformations[C]. IEEE International Conference on Image Processing, San Antonio, TX, United states, September 16-19, 2007, 5: V481-V484.
    [215] Takashi T, Masaaki F, Hitoshi K. A watermarking scheme without reference images for broadcast monitoring [J]. Electronics and Communications in Japan, 2004, 87(9): 22–32.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700