音频数字水印与隐写分析算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着互联网应用的普及,越来越多的数字化多媒体内容信息纷纷以各种形式在网络上快速的交流和传播。如何对数字化多媒体内容进行有效的管理和保护,成为信息安全领域的研究热点。多媒体数字内容在网络上的传递、发布和扩散带来了一系列问题和应用需求,从总体上来说可以分为两大部分:多媒体数字内容的版权保护问题和伪装式保密通信。
     对于上述问题和需求,人们最初的想法是求助于传统的密码学,但是传统的加密手段无法解决上述问题。为此,人们开始寻找新的解决办法来作为对传统密码系统的补充。信息隐藏可以在载体中嵌入难以被感知的秘密信息以保护数字内容的版权或用于保密通信,可以很好的解决上述问题。数字水印和隐写术是信息隐藏的两个重要研究分支,用于信息隐藏的载体可以是图像、视频、音频、文本和网络协议等。
     音频数字水印是在音频中嵌入与音频载体有关的信息来保护数字音频,音频隐写术主要是把需要传递的秘密信息隐藏在看似正常的音频载体中,以隐藏秘密信息的存在性,用于保密通信。音频数字水印和隐写术的研究课题可分为正向研究和逆向研究。基于音频的隐写术和数字水印的研究是正向研究,音频数字水印主要是研究在音频中嵌入和提取水印的各种算法。基于音频的水印攻击和隐写分析是逆向研究,音频水印攻击的目标是妨碍水印信息顺利提取。音频隐写术主要是研究如何在音频载体中隐藏秘密信息用于保密通信。隐写分析的目标是判断和检测听觉上正常的音频载体中是否隐藏秘密信息。
     本文的研究工作主要集中在音频的数字水印和隐写分析领域,提出两种变换域音频水印算法和两种专用的音频隐写分析算法。本文工作主要包括以下四个方面。
     1.提出一种结合离散小波变换、离散余弦变换和奇异值分解的音频盲水印算法。算法首先将音频分段,每段音频进行一维小波变换,取出近似分量。将近似分量进行离散余弦变换,将变化后前四分之一的系数取出转成二维矩阵A,对A进行奇异值分解,利用奇异值分解后S矩阵的S(1,1)和S(2,2)的比值关系在S(1,1)中嵌入水印信息。奇异值分解后S矩阵的调整不会对矩阵A产生较大影响,因此该算法具有较好的透明性。该算法将水印信息嵌入在离散小波变换后的近似分量,算法具有较好的鲁棒性。同时S矩阵具有较强的稳定性,矩阵A的变化也不会对S矩阵的值产生较大影响,因此该算法能抵抗各种常规音频信号处理攻击。实验表明该算法具有较好的透明性,同时对MP3压缩、重采样、重量化、加噪、低通滤波和裁剪替换等常规音频信号处理攻击具有较强的鲁棒性。
     2.提出一种用于音频内容完整性保护的离散小波变换域半脆弱音频水印算法。该算法对原始音频进行一维小波变换后取出近似分量,计算所有近似分量的平均值作为量化步长,然后将音频近似分量分段,将每段近似分量的平均值进行量化处理后嵌入置乱后的二值图像水印信息。该算法具有很好的透明性,实验表明该算法能容忍如加噪、MP3压缩、重采样和低通滤波等常规音频信号处理。作为音频内容完整性保护的半脆弱音频水印算法,该算法能检测出静音替换、使用原始音频代替含水印音频、甚至是两种替换组合的恶意篡改,而且还能准确定位篡改位置,实验表明该算法恶意篡改定位误判率低于8%。
     3.提出一种离散余弦变换音频隐写的专用隐写分析算法。通过对隐写算法分析得出隐写算法改变了分段信号的均值,利用音频均值为正、负的分段数目差值比例来判断音频是否为隐写音频。检测的方法是对所有待检测音频进行二次隐写,自然音频二次隐写前后的均值为正、负的分段数目差值比例的值明显高于隐写音频,通过差值比例和阈值比较判断待检测音频是否为隐写音频。实验结果表明该算法的准确率为80.6%。
     4.提出一种基于回声隐藏的专用隐写分析算法。该算法基于回声隐藏改变自然语言倒谱分布这一特点,通过构造倒谱和差分方差VDSC (Variants of Difference of Sum of Cepstrum)来反映隐写对自然音频的影响,并据此来判断该音频文件是否为隐写音频。分析过程在不同的偏移条件下计算待检测音频的VDSC值,如果VDSC的值没有显著变化,且在相对判决域以下,则该待检测音频为自然音频。如果计算出来的VDSC值有显著变化,且在相对判决域以上,则该待检测音频为隐写音频。实验结果表明该算法准确率为88.2%。
With the popularity of Internet applications, the transmission opportunities of multimedia data become increasing. How to manage and protect these multimedia data has attracted more attentions in the field of information security. Lots of problems and application requirements raise when the digital content distributes on networks, which generally can be divided into two parts:the copyright protection and camouflage confidential communication.
     Initially, the researchers want to use traditional cryptography to solve the security problems of multimedia content. But the traditional encryption methods can not meet its requirements. So the researchers begin to look for new solutions as a complement for the traditional cryptography. Information hiding is a new solution for the security of digital media content, which embeds secret information into digital carrier imperceptibility. Digital watermarking and steganography are two important branches of inforamtaion hiding. The carrier can be digital graph, audio, video, text and network protocol.
     Audio digital watermarking embeds the secret message which related with the audio into the audio to protect the audio file. Steganography embeds the secret message to hide the existence of the hidden message for confidential communication. According to the research achievements at present, audio information hiding can be roughly divided into four aspects: digital watermarking, watermarking attack, steganography and steganalysis. Audio watermarking algorithm focuses on kinds of audio watermark embedding and extracting watermarking algorithms. Audio watermarking attack mainly research on various attack methods to audio watermarking, which target is that obstacle the watermark information extracted smoothly. Audio steganographic methods mainly research on various algorithms used to hide the secret information in audio carrier used for confidential communication. Steganalysis is the opposite aspect of Steganography, which mainly studies various technical analysis algorithms. The algorithms are used to judge the audio is the stego audio or not.
     This dissertation focuses on audio digital watermarking and steganalysis, and proposes two novel audio watermarking algorithms and two novel specific audio steganalysis algorithms. The main content of this dissertation is summarized as follows:
     1. A novel DWT-DCT-SVD based audio blind watermarking algorithm is proposed. In this algorithm, the audio is split into non-overlapping frames, and each frame is decomposed on one-dimensional discrete wavelet transform (DWT), then the approximate sub-band coefficients are decomposed on discrete cosine transform (DCT) and partitioned into2-D matrix A for the first quarter of the DCT coefficients, then A decomposed on singular value decomposition (SVD) and get a diagonal matrix S. the watermarking information is embedded into S(1,1) according the ratio of S(1,1) and S(2,2). The change of S-matrix does not affect the value of matrix A, the algorithm has good transparency. The algorithm has better robustness because the watermark information is embedded in the approximate sub-band coefficients. S-matrix has a strong stability, and the change of matrix A does not greatly affect the value of S-matrix, so the algorithm can resist all kinds of common audio signal processing attacks. The experiments show that the algorithm has strong robustness against the common audio signal processing such as additive white Gaussian noise, MP3compression, resampling, low-pass filtering, requantization, cropping and denoising.
     2. A new DWT-based semi-fragile audio watermarking algorithm used for content authentication is proposed. In this algorithm, the original audio is decomposed on three layers DWT transform to get DWT approximation coefficients. Then the values of all approximate coefficients are computed and as the quantization step. Then the approximate coefficients are split into non-overlapping blocks, and the mean value of each approximate component block is quantized and embedded watermark information. The transparency of this algorithm is excellent and can tolerate MP3compression, Re-sampling, low-pass filter and other conventional signal processing. As a content authentication algorithm, this algorithm can accurately detect the replacing positions from mute replaced, or using natural audio instead of the Stego audio, or even two methods with combination. The accuracy of this algorithm is6%
     3. A novel specific steganalysic algorithm based on DCT is proposed. The analysis of the Steganography changed the statistical characteristics of DCT coefficient symbols. Based on this, a new difference ratio steganalysis algorithm is proposed. The detection method is to make all test carriers have second Steganography. Since the DR value proportion of the natural audio is significantly higher than that of Stego audio before and after the second Steganography, then the threshold testing could judge whether the carrier is the Stego audio. The experiment results show that the accuracy of this algorithm is80.6%.
     4. A novel special steganalysis algorithm based on echo hiding is proposed. Based on the specialty that echo hiding alter nature language epstrum distribution, this algorithm constructs cepstrum and difference variance of VDSC (Variants of Sum of Cepstrum) to reflect the influence of steganalysis algorithm to natural audio, which can be used to judge whether the test audio is stego audio. Analyzing process uses different migration conditions to calculate VDSC value of the testing carrier. If there is no significant change of the VDSC values and it is below the value of relative judgment domain, the test audio is the original audio. If there is significant change of the VDSC values and it is above the value of relative judgment domain, then the test audio is the stego audio. The experiment shows that the accuracy of this algorithm is88.2%.
引文
[1]John Wiley, Sons. Hiding in Plain Sight:Steganography and the Art of Covert Communication. Wiley Publishing, Inc,2003.
    [2]Ross J Anderson, Fabien A Petitcolas. On the Limits of Steganography. IEEE Journal of Selected Areas in Communications,16(4),1998:474-481.
    [3]M D Swanson, M Kobayashi, A H Tewfik. Multimedia Data-Embedding and Watermarking Technologies. Proceedings of the IEEE,6(86), June 1998:1064-1087.
    [4]杨义先,钮心忻.数字水印理论与技术.高等教育出版社.2006:27-28.
    [5]Miroslav Goljan. Lossless Data Embedding Methods for Digital Images and Detection of Steganography. [Dissertation]. Binghamton University, State University of New York, 2001.
    [6]Martin Steinebach, Jana Dittmann.Watermarking-Based Digital Audio Data Authentication. Journal on Applied Signal Processing.2003(10):1001-1015.
    [7]M Steinebach, F A Petitcolas, F Raynal, J Dittmann, C Fontaine, S Seibel, N Fates, L C Ferri. StirMark Benchmark:Audio Watermarking Attacks. Proc. of International Conference on Information Technology. Coding and Computing,2001:49-54.
    [8]钮心忻.信息隐藏与数字水印.北京邮电大学出版社,2004.
    [9]I J Cox, J-P.M.G. Linnartz. Some General Methods for Tampering with Watermarks. IEEE Journal on Selected Areas in Communications,16(4), May 1998:587-593.
    [10]Sviatolsav Voloshynovskiy, Shelby Pereira, Thierry Pun. Attacks on Digital Watermarks:classification, estimation-based, attacks, and benchmarks. IEEE Communication Magazine,39, Aug.2001:118-126.
    [11]M Arnold. Attacks on Digital Audio Watermarks and Countermeasures. Proc. of Third International Conference on Web Delivering of Music,2003:55-62.
    [12]M Kutter, S Voloshynovskiy, A Herrigel. The Watermark Copy Attack. Proceedings of SPIE:Security and Watermarking of Multimedia Contents Ⅱ,3971, San Jose, California, 2000:371-380.
    [13]Cedric T M M, Adi R W, Mclougblin L. Data Concealment in Audio Using a Nonlinear Frequency Distniution of PRBS Coded Data and Frequenoydomain LSB Insertion. TENCON 2000,1:275-218.
    [14]Nedeljko C, Tapio S. Increasing the Capacity of LSB-Based Audio Steganography. IEEE 2002,336-338.
    [15]陈亮,张雄伟.语音保密通信中的信息隐藏算法研究.解放军理工大学学报(自然科学版),6(3),2002:1-5.
    [16]岳军巧,钮心忻,杨义先.声音保密通信中的信息隐藏技术.北京邮电大学学报,25(1),2002:1-5.
    [17]杨伟,王飞,张中,杨义先,钮心忻.伪装式数字化语音保密通信系统.通信学报,25(2),2004:75-81.
    [18]Zhi-jun Wu, Wei Yang, Yi-xian Yang. ABS-based Speech Information Hiding Approach[J]. Electronics Letters,39(22),2003:1617-1619.
    [19]吴志军,钮心忻,杨义先.语音隐藏的研究及实现.通信学报,23(8),2002:99104.
    [20]白剑,杨榆,徐迎晖,钮心忻,杨义先.GSM移动通信系统中语音隐藏算法研究.中山大学学报(自然科学版),43(S2),2004:156-159.
    [21]陈中,刘昌荣,旷海兰.基于Arnold变换的改进LSB水印嵌入方法研究.衡阳师范学院学报,31(3),2010:67-70.
    [22]Bender W, Gruhl D, Morimoto N. Techniques for Data Hiding. IBM Systems J, 35(3&4),1996.
    [23]P Bassia, I Pitas. Robust Audio Watermarking in the Time Domain. IEEE Transactions on Multimedia.2001:232-241.
    [24]Wen-Nung Lie, Li-Chun Chang. Robust and High-Quality Time-Domain Audio Watermarking Based on Low-Frequency Amplitude Modification. IEEE transactions on multimedia,8(1),2006:46-59.
    [25]Harumi Murata, Akio Ogihara, Motoi Iwata, Akira Shiozaki. Multiple Embedding for Time-Domain Audio Watermarking Based on Low-Frequency Amplitude Modification. The 23rd International Technical Conference on Circuits/Systems, Computers and Communications,2008:1461-1464.
    [26]Cox I J, Kilian J, Leighton F T, Shamoon T. Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans.on Image Process,12(6),1997:1673-1687.
    [27]Tilki J, Beex A. Encoding a Hidden Digital Signature onto an Audio Signal Using Psychoacoustic Masking. In. Proc.7th Int. Conf. Sig. Proc Application Technology,1, 1996:476-480.
    [28]Pranab Kumar Dhar, Mohammad Ibrahim Khan, Jong-Myon, Kim. A New Audio Watermarking System Using Discrete Fourier Transform for Copyright Protection. International journal of computer science and network security.6(10),2010:35-40.
    [29]马翼平,韩纪庆.基于能量特性分块的DCT域自适应音频水印算法.信号处理,4(22),2006:519-522.
    [30]Kamalika Datta, Indranil Sengupta. A Redundant Audio Watermarking Technique Using Discrete Wavelet Transformation. The second international conference on communication software and networks,2010:27-31.
    [31]项世军,黄继武,王永雄.一种抗D/A和A/D变换的音频水印算法.计算机学报,2(29),2006:308-316.
    [32]徐天岭.可抗重录音的鲁棒性音频数字水印算法研究.[学位论文],中国北京,北方工业大学,2010.
    [33]马天笑,王向阳,杨红颖.一种基于均值量化的抗去同步攻击数字水印算法.计算机科学,4(36),2009:257-260.
    [34]鲍德旺,杨红颖,祁嶶,王向阳.基于音频特征的抗去同步攻击数字水印算法.中国图象图像学报,12(14),2009:2619-2622.
    [35]Ehsan Tavakoli, Bijan Vosoughi Vahdat, Mohammad Bagher Shamsollahi, Reza Sameni. Audio Watermarking for Covert Communication through Telephone System. IEEE international symposium on signal processing and information technology,2006:955-959.
    [36]Qiao L, Nahrstedt K. Non-Invertible Watermarking Methods for MPEG Encoded Audio. Proc of SPIE on Security and Watermarking of Multimedia Contents,1999:194-202.
    [37]Wu Chung-Ping, Kuo C-C Jay. Fragile Speech Watermarking based on Exponential Scale Quantization for Tamper Detection. IEEE Internation Conference on Acoustics, Speech and Signal Processing (ICASSP),2002:3305-3308.
    [38]Ronghui Tu, Jiying Zhao. A Novel Semi-Fragile Audio Watermarking Scheme. IEEE International Workshop on Haptic, Audio and Visual Environment and their Applications, 2003:89-94.
    [39]付兴滨.基于均值量化的音频脆弱水印算法研究.应用科技,8(32),2005:17-19.
    [40]Hong Zhao, Dong-sheng Shen. A New Semi-Fragile Watermarking for Audio Authentication. The international conference on artificial intelligence and computational intelligence,2009:299-302.
    [41]Ning Chen, Jie Zhu. A Multipurpose Audio Watermarking Scheme for Copyright Protection and Content Authentication. Proc. of IEEE Internatioanl Conference on Multimedia and Expo,2008:221-224.
    [42]王丽娜,张焕国,叶登攀.信息隐藏技术与应用.武汉大学出版社,2009.
    [43]International Federation of the Phonographic Industry. http://www.ifpi.org.
    [44]P Bassia, L Pitas, N Nikolaidis. Robust Audio Watermarking in the Time Domain. IEEE Trans. on Multimedia,3(2),2001:232-241.
    [45]M Mansour, A Tewfik. Time-Scale Invariant Audio Data Embedding. Proc. of IEEE International Conference on Multimedia and Expo, Aug.2001:76-79.
    [46]A Ricardo. Digital Watermarking of Audio Signals Using a Psychoacoustic Auditory Model and Spread Spectrum Theory.107-th Convention, Audio Engineering Society,1999: 24-27.
    [47]X Li, H Yu. Transparent and Robust Audio Data Hiding in Sepstrum Domain. Proc. of IEEE International Conference on Multimedia and Expo,2000:397-399.
    [48]C P Wu, P C Su, C C Kuo. Robust and Efficient Digital Audio Watermarking Using Audio Content Analysis. Proc. of SPIE Security and Watermarking of Multimedia Contents,2000:23-28.
    [49]W Li, X Y Xue, P Z Lu. Localized Audio Watermarking Technique Robust Against Time-Scale Modification. IEEE Trans. on Multimedia,8(2),2006:60-69.
    [50]Chun-Shien Lu. Audio Fingerprinting Based on Analyzing Time-Frequency Localization of Signals. IEEE Workshop on Multimedia Signal Processing, Dec.2000:174-177.
    [51]王秋生,孙圣和,郑为民.数字音频信号的脆弱水印嵌入算法.计算机学报,25(5),2002:520-525.
    [52]P Moulin, R Koetter. Data-Hiding Codes. Proc. of the IEEE,93(12), Dec.2005:2083-2126.
    [53]王善辉.用于广播监控的视频水印研究.[学位论文],中国吉林,吉林大学,2006.
    [54]T Nakamura, R Tachibana, S Kobayashi. Automatic Music Monitoring and Boundary Detection for Broadcast Using Audio Watermarking. Proc. of SPIE Security and Watermarking of Multimedia Contents Ⅳ,4675,2002:170-180.
    [55]Ryuki Tachibana. Audio Watermarking for Live Performance. Proc. of SPIE,5020, 2003:32-43.
    [56]王朔中,张新鹏,张开文等.数字密写和密写分析.清华大学出版社,2005:143-145.
    [57]葛秀慧,田浩等.信息隐藏原理及应用.清华大学出版社,2008,10.
    [58]王丽娜,张焕国,叶登攀.信息隐藏技术与应用,武汉大学出版社,2009.
    [59]DUMITRESCU S, WU X L, WANG Z. Detection of LSB Steganography via Sample Pair Analysis. IEEE Trans. on Signal Processing,51 (7),2003:1995-2007.
    [60]AVCIBAS I, MEMON N, SANKUR B. Steganalysis Using Image Quality Metrics. IEEE Trans on Image Processing,12(2),2003:221-229.
    [61]LYU S W, FARID H. Steganalysis Using Higher-Order Image Statistics. IEEE Transactions on Information Forensics and Security,1(1),2006:111-119.
    [62]ZENG W, AI H J, HU R M, et al. Steganalysis of LSB Embedding in Audio Signals Based on Sample Pair Analysis. WICOM,2007:2960-2963.
    [63]宋华,幸丘林,李维奇等MP3Stego信息隐藏与检测方法研究.中山大学学报(自然科学版),43(2)增刊,2004:221-224.
    [64]GEETHA S, SIVATHA SINDHU S S, GOBI S, et al. Evolving GA Classifiler for Audio Steganalysis Based on Audio Quality Metrics. IEEE Intelligent Sensing and Information Processing,2006:105-108.
    [65]Hamza Ozer, Ismail Avcibas, Bulent Sankur, Nasir Memon. Steganalysis of Audio Based on Audio Quality Metrics. Presented at Security and Watermarking of Multimedia Contents V, Santa Clara, CA, US,2003.
    [66]Ismail Avcibas. Audio Steganalysis with Content-Independent Distortion Measures. Signal Processing Letters,13(2),2006:92-95
    [67]Osman Hilmi Kocal, Emrah Yurukru, smail Avcoba. Speech Steganlysis Using Chaotic-Type Feaatures. Proceedings of 13th European Signal Processing Conference, Antalya,2005.
    [68]Hamza czer, Bulent Sankur, Nasir Memon, et al. Detection of Audio Covert Channels Using Statistical Footprints of Hidden Messages. http://www.sciencedirect. com
    [69]Wei Zeng, Haojun Ai, Ruimin Hu, etc. An Algorithm of Echo Steganalysis Based on Bayes Classifier. IEEE International Conference, Information and Automation,2008:1667-1670.
    [70]Wei Zeng, Haojun Ai, Ruimin Hu. An Algorithm of Echo Steganalysis Based on Power Cepstrum and Pattern Classification. IEEE International Conference, Audio, Language and Image Processing,2008:1344-1348.
    [71]Zeng Wei, Ai Haojun, Hu Ruimin. A Novel Steganalysis Algorithm of Phase Coding in Audio Signal. IEEE International Conferenc, Advanced Language Processing and Web Information Technology,2007:261-264.
    [72]Kocal O H, Yuruklu E, Avcibas I. Chaotic-Type Features for Speech Steganalysis. IEEE Transactions, Information Forensics and Security,2008:651-661.
    [73]Westfeld A. Detecting Low Embedding Rates. Proceeding Information Hiding Workshop, Springer LNCS,2578,2002,324-339.
    [74]梁敬弘,王道顺,黄连生等.一种对MP3Stego的攻击研究.计算机辅助设计与图形学学报,15(8),2003:954-960.
    [75]Andreas W. Detecting Low Embedding Rates. Information Hiding 5st Int Workshop, Noordwijkerhout,2002:329-342.
    [76]宋华,幸丘林,李维奇等MP3Stego信息隐藏与检测方法研究.中山大学学报(自然科学版),43(2)增刊,2004:221-224.
    [77]陈良景.特殊矩阵.清华大学出版社,2001.
    [78]Xue-Min Ru, Hong-Juan Zhang, Xiao Huang. Steganalysis of Audio:Attacking the Steghide. IEEE Conference:Machine Learning and Cybernetics,7,2005:3937-3942.
    [79]Micah K Johnson, Siwei Lyu, Hany Farid. Steganalysis of Recorded Speech. Security, Steganography, and Watermarking of Multimedia Contents VII, CA, USA,5681,2005: 664-672.
    [80]杨洋,陈小平.一种数字音频多水印算法.苏州大学学报(工科版),24(1),2004:18-22.
    [81]刘瑞祯,谭铁牛.基于奇异值分解的数字图像水印方法.电子学报,29(2),2001:168-171.
    [82]Hamza O, Sankur B, Nasir M. An SVD-Based Audio Watermarking Technique. Proceeding of the 7th workshop on Multimedia and Security,2005:51-56.
    [83]Wang R, Xu D, Chen J, Du C. Digital Audio Watermarking Algorithm Based on Linear Predictive Coding in Wavelet Domain. In:7th International conference on signal processing,1,2004:2393-2396.
    [84]Wu S, Huang J, Huang D, Shi Y Q. Efficiently Self-Synchronized Audio Watermarking for Assured Audio Data Transmission. IEEE Trans Broadcast,51(1),2005: 69-76.
    [85]Zezula R, Misurec J. Audio Digital Watermarking Algorithm Based on SVD in MCLT Domain. Third International Conference on Systems,2008:140-143.
    [86]Vivekananda B K, Indranil S, Abhijit D. An Audio Watermarking Scheme Using Singular Value Decomposition and Dither-Modulation Quantization. Multimedia Tools and Applications,52(2-3),2010:369-383.
    [87]陈寅秋,伍祥生.基于SVD-DWT的音频盲水印.湖南师范大学自然科学学报,1(32),2009:47-55.
    [88]Ali A H. Digital Audio Watermarking Based on the Discrete Wavelets Transform and Singular Value Decomposition. European Journal of Scientific Research.39(1),2010:6-21.
    [89]杨榆.信息隐藏与数字水印实验教程.国防工业出版社,2010
    [90]Lin E T, Delp E J. A Review of Fragile Image Watermarks. Proceeding of the ACM Multimedia and Security Workshop. Orlando:ACM Press,1999:25-29
    [91]Fridrich J. Methods for Tamper Detection in Digital Images. Proceeding of the ACM Work shop on Multimedia and Security. Orlando:ACM Press,1999:19-23.
    [92]Lin E T, Podilchuk C I, Delp E J. Detection of Image Alterations Using Semi-Fragile Watermarks. SPIE,3971,2000:152-163.
    [93]Yu G J, Lu C S, Mark Liao H Y, etc.. Mean Quantization Blind Watermarking for Image Authentication. In Proceedings of International Conference on Image Processing,3, 2000:706-709.
    [94]Rey C, Dugelay J L. Blind Detection of Malicious Alterations on Still Image Using Robust Watermarks. In Proceedings of IEE Seminar on Secure Image and Image Authentication.2000,7/1-7/6.
    [95]李伟,袁一群,李晓强,薛向阳,陆佩忠.数字音频水印技术综述.通信学报,26(2),2005:100-111.
    [96]全笑梅,张鸿宾.用于篡改检测及认证的脆弱音频水印算法.电子与信息学报,27(8),2005:1187-1192.
    [97]王向阳,祁薇.用于版权保护与内容认证的半脆弱音频水印算法.自动化学报,09,2007:936-938.
    [98]赵红,沈东升,朱元辉.一种抗裁剪的半脆弱音频水印算法.自动化学报,34(6),2008:647-651.
    [99]王宏霞,范明泉.基于质心的混合域半脆弱音频水印算法.中国科学:信息科学,40(2),2010:313-326.
    [100]赵红,崔永瑞,沈东升.用于内容认证的半脆弱音频水印算法.小型微型计算机系统,30(1),2009:140-143.
    [101]陈宁.数字音频水印中的关键技术研究.[学位论文],中国天津,复旦大学,2008.
    [102]金聪.数字水印理论与技术.清华大学出版社,2008.
    [103]周继军.信息隐藏逆向分析研究.[学位论文],中国北京,北京邮电大学,2005.
    [104]Niels Provos, Peter Honeyman. Hide and Seek:An Introduction to Steganography. IEEE SECURITY&PRIVACY,1540-7993/03,2003:32-44.
    [105]Hsu C T, Wu J L, Hidden Digital Watermarks in Images. IEEE Transactions on Image Processing,8(1),2002:58-68.
    [106]Chang C C, Chen T S, Chung L Z. A Steganographic Method Based upon JPEG and QuantizationTable Modification. Information Science,141(1),2002:123-128.
    [107]Jessica Fridrich, Miroslav Goljan, Dorin Hogea. Attacking the OutGuess. Proc. of the ACM Workshop on Multimedia and Security, December,2002.
    [108]J Fridrich, M Goljan, D Hogea. Steganalysis of JPEG Images:Breaking the F5 Algorithm.5th Information Hiding Workshop, October,2002.
    [109]韩晓东,平西建,张涛.基于0,1系数组合差异的F5隐写分析算法.信息工程大学学报,10(2),2009:184-187.
    [110]赵永宽,蔡晓霞,陈红.基于DCT域最低位平面量子位的隐写分析.通信对抗,109(1),2010:20-22.
    [111]黄聪,宣国荣,高建炯等.基于DCT域共生矩阵的JPEG图像隐写分析.计算机应用,12(26),2006:2863-2865.
    [112]Manikopoulos C, Shi Y Q, Song S et al. Detection of Block DCT-Based Steganography in Gray-Scale Images. Multimedia Signal Processing,12(1),2002:355-358.
    [113]史经业,赵耀,倪蓉蓉.基于DCT系数统计特性和支持向量机的图像隐写分析.东南大学学报,37(增刊),2007:119-122.
    [114]王勇,刘九芬,张卫明.基于DCT系数多方向相关性的信息隐藏盲检测方法.计算机应用.9,2009:2344-2347.
    [115]孙子文,纪志成.基于离散余弦变换域的块相关性和马尔可夫模型的图像隐写分析.信息与控制,10,2009:602-607.
    [116]徐志杰,蔡晓霞,陈红.基于LSSVM的JPEG图像信息隐藏盲检测算法.火力与指挥控制,8(35),2010:121-124.
    [117]钱萍,陈丽亚,李建华.基于图像DCT域差分直方图的隐写分析方法.信息安全与保密通信,8,2005:106-108.
    [118]温泉,王树勋,年桂君.DCT域音频-水印算法和不可感知性测度.电子学报,9,2007:1703-1705.
    [119]杨榆,白剑,徐迎晖等.回声隐藏的研究与实现.中山大学学报(自然科学版),43(A),2004:50-52.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700