海量多媒体数字水印技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
计算机运算速度和存储容量的不断提高,网络技术、数字化技术的迅猛发展,使得图像、视频、音频、三维图形等多媒体信息日益丰富,其传播日益容易。目前,几乎所有人类知识都可以数字化并在网络上传播。
     然而,大量的媒体信息鱼目混杂,基于互联网的信息盗版十分猖獗,如何规范互联网信息的传播秩序?如何约束信息源的非法传播?本文研究海量环境中的多媒体信息安全、多媒体盲水印的嵌入和提取、基于视觉特征的视频水印技术以及音频水印技术研究。主要完成如下工作:
     1.提出了一个面向搜索引擎的海量多媒体信息安全系统结构,并给出了原型系统实现。目前无处不在的搜索引擎是多媒体盗版和非法传播的主要途径,本方案通过基于数字水印技术的互联网信息发布、面向搜索引擎的海量多媒体监控、和海量信息安全认证三个部分创建一个中央权威机构。将传统水印技术和搜索引擎技术相结合,通过创建中央权威认证库、海量多媒体信息特征库、海量多媒体源数据库以及引擎跟踪数据库,对基于搜索引擎的海量信息传播行为进行监督。通过提供明确的非法信息来源来约束搜索引擎对非法信息的传播,并为正版多媒体信息通过搜索引擎的有偿传播提供了一条新的路径,为搜索引擎的信息传播行为开辟了一个新的方向。
     2.实现了一个面向搜索引擎的海量多媒体信息监控系统,系统采用Tracker和Crawlers分工合作的方式,使海量多媒体的监控的系统复杂度大大降低。系统通过人工规则设定,区域划分,搜集本地化实现面向引擎的海量信息跟踪与监控。
     3.提出了一个多媒体盲水印技术以实现上述普遍适用的音、视频水印算法。针对传统盲水印算法的不足,结合海量应用对水印技术的基本要求,提出了能量跨度函数来实现盲水印嵌入。以此为基础,根据零水印技术的基本原理并利用媒体信息的丰富特征,给出了一个适合于多媒体水印技术海量应用的盲水印嵌入和提取模型。实验结果表明,该模型具有很高的可行性,针对海量的多媒体信息处理,这一模型具备较高的使用价值。
     4.提出了一个基于特征建模的自适应视频水印算法。该算法根据人类视觉系统(HVS)特性,对DCT子块进行特征分类。将分类得到的视频帧纹理、亮度、边缘信息以及运动特征来计算水印嵌入的伪装系数,实现了水印嵌入自适应于视频的视觉特征;针对视频数据的海量应用,考虑算法鲁棒性需求,提出了一个独立于视觉特征的统计模型。该统计模型进一步细化视觉伪装模型所描述的子块之间的特征差异。实验结果表明该算法具有很好的
With the fast developments of networking technologies and multimedia technologies, there is an increasing demand of information security protection and multimedia authentication technologies. Nowerdays, the copyright protection is in great demand, especially in the case of search engine, video ordering and online music. This thesis mainly focuses on the magnitude watermarking and its implementation and the main contributions of this thesis are as follows:
    1. Considering the illegal downloading and spreading of digital media, a framework which works finely to protect the digital media copyrights under the massive circumstance. The framework combines the traditional copyright protection and search engine technologies and it consists of video-audio watermarking embedding, digital media retrieval and media authentication. The video-audio watermarking embedding algorithm is composed of video and audio watermarking embedding algorithms which can be widely used; both the content-based retrieval and text-based retrieval algorithms consititute the digital media retrieval algorithms; the media authentication mainly validates media watermarking and other information related to the internet.
    2. A monitor system of mass multimedia is implemented. The goal of the system is to monitor and correct the behavior of search engine.
    3. A blind watermarking technology is proposed in this paper to facilitate video-audio watermarking embedding and security authentication of the framework. Put the blemishes of traditional copyright protection technologies and the principles of zero watermarking into consideration, an energy span fuction is proposed. Based on the function, a watermarking embedding and detection model which can deal whith the massive digital media is proposed. The model can make use of abundant information in digital media themselves and experiments show that the model is robust and the performance is remarkable when dealing with massive multimedia objects.
    4. According to the blind watermarking technology, we present a novel watermarking algorithm of MPEG video based on visual features. An effective mixed feature model of the block is delicately designed by texture, luminance and motion features of the video. According to the perceptual features derived from the masking behavior of the human perceptual model, a feature statistics model is introduced to adjust the extracted block feature, and then the copyright protection is embedded into the block according to the modified block feature. Experimental results show that the watermarked video is highly imperceptible robust.
引文
[1] Walter Bender, Daniel Gruhl, Norishige Morimoto, Anthony Lu. Techniques for Data Hiding. IBM Systems Journal 1996,35(3/4): 313-336.
    [2] Bruce Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc, 1996.
    [3] 卢开澄.计算机密码学.计算机网络中的数据保密与安全.北京:清华大学出版社,1998.
    [4] Fabien A. P. Petitcolas, Ross J. Anderson, Markus G.Kuhn. Information Hiding-A Survey. Proceedings of the IEEE, 1999, 87(7): 1062-1078.
    [5] Marco Grangetto, Enrico Magli,,Gabriella Olmo. Multimedia Selective Encryption by Means of Randomized Arithmetic Coding, IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 5, OCTOBER 2006,8(5):905-917.
    [6] Yinian Mao,Min Wu. A joint signal processing and cryptographic approach to multimedia encryption. IEEE Transactions on Image Processing, 2006,5(7):2061-2075.
    [7] Ranjan Bose,Saumitr Pathak. A Novel Compression and Encryption Scheme Using Variable Model Arithmetic Coding and Coupled Chaotic System. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS, 2006,53(4):848- 857.
    [8] Sheng-bing Che, Da Huang, Guang Li.A Self-Adaptive Image Encryption Algorithm Based on Composite Discrete Chaotic System. In Proceedings of Intelligent Information Hiding and Multimedia Signal Processing, 2006:135-138.
    [9] Qiu-Hua Lin,Fu-Liang Yin,Tie-Min Mei,Hualou Liang. A blind source separation based method for speech encryption. IEEE Transactions on Circuits and Systems, 2006,53(6): 1320-1328.
    [10] Li Weng, Karel Wouters, and Bart Preneel. Extending the Selective MPEG Encryption Algorithm PVEA. Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2006:117-120.
    [11] RG van Schyndel, AZ Tirkel, CF Osborne. A digital watermark. In Proceedings of International Conference on Image Processing (ICIP),Austin, Texas USA, 1994:86-90.
    [12] Ingemar J. Cox, Matthew L. Miller. A Review of Watermarking and The Importance of Perceptual Modeling. In Proceedings of the SPIE Human Vision and Electronic Imaging. San Jose, CA,USA,Vol.3016,1997:92-99.
    [13] 《2006年中国搜索引擎市场调查报告》.http://www.cnnic.cn,2006.
    [14] Scott Craver,Nasir Memon,Boon-Lock Yeo,Minerva M. Yeung. Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks and implications. IEEE Journal on Selected Areas in Communications, 1998,16(4):573-586.
    [15] G. Boato, F. G. B. De Natale, C. Fontanari. An Improved Asymmetric Watermarking Scheme Suitable for Copy Protection. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2006,54(7): 2833-2834.
    [16] Fei LunKe,Ding ZhenFan. Research on Developmental Direction of Digital Watermarking. Journal of East China Jiaotong University, 2006: 78-81.
    [17] 黄继武,SHI Yun Q.一种自适应图像水印算法.自动化学报,1999,25(4):477-482.
    [18] 黄继武,Shi Yun Q,姚若河.基于块分类的自适应图像水印算法.中国图像图形学报,1999,4(8):640-643.
    [19] Frank Hartung, Bemd Girod. Watermarking of MPEG-2 Encoded Video without Decoding and Re-encoding. Multimedia Computing and Networking 1997: 264-273.
    [20] Ingemar J. Cox, Joe Kilian, Tom Leighton, Talal Shamoon. A Secure, Robust Watermark for Multimedia. IEEE International Conference on Image Processing, 1996:185-206.
    [21] Cong Jin,Feng Tao, Yu Fu. Image Watermarking Based HVS Characteristic of Wavelet Transform. In Processings of Intelligent Information Hiding and Multimedia Signal Processing, 2006:71-74.
    [22] Jinwei Wang, Shigno Lian, Zhongxuan Liu. Zhen Ren, Yuewei Dai, Haila Wang. Image Watermarking Scheme Based on 3-D DCT. In Processings of Industrial Electronics and Applications, 2006:1-6.
    [23] Frank Hartung, Bernd Girod. Watermarking of uncompressed and compessed video. Signal Processing, Special Isue on Copyright Protection and Access Control for Multinedia Services, 1998,66(3) :283-301,
    [24] Fabien A. P. Petitcolas, Ross J. Anderson. Evaluation of copyright masking systems. Multimedia Computing and Systems, 1999,1:7-11.
    [25] Gabriela Csurka,E Deguillaume, Joseph O'Ruanaidh, Thierry Pun. A Bayesian approach to affine transformation resistant image and video watermarking. Proceedings of 3rd International Information Hiding Wrokshop,1999:315-330.
    [26] Dimitrios Simitopoulos, Dimitrios Koutsonanos, Michael G. Strintzis. Image watermarking resistant to geometric attacks using generalized Radon transformations. IEEE Transactions on Circuits and Systems for Video Technology, 2003,13(8):732-745.
    [27] Ching-Yung Lin, Min Wu,Jeffrey A. Bloom, Ingemar J. Cox, Matthew L. Miller. Rotation, Scale, and Translation Resilient Watermarking for Images. IEEE Transactions on Image Processing, 2001,10(5):767-782.
    [28] Zhicheng Ni, Eric Sung, Yun Q. Shi. Enhancing Robustness of Digital Watermarking Against Geometric Attack based on Fractal Transform. IEEE International Conference on Multimedia and Exposition(ICME2000), 2000,2(1): 1033-1036.
    [29] Frank Hartung, Jonathan K. Su, Bernd Girod. Spread specturm watermarking: Malicious attacks and counterattacks. In Proceedings of SPIE Security and Watermarking of Multimedia Contents, San Jose, 1999:147-158.
    [30] Fuhao Zou, Zhengding Lu, Hefei Ling, Yanwei Yu. Real-time video watermarking based on extended m-sequences, In Proceedings of ICME2006, 2006:1561-1564.
    [31] Young-Yoon Lee, Han-Seung Jung, Sang-Uk Le. 3D DFT-based video watermarking using perceptual models. Proceedings of 2003 IEEE International Midwest on Circuits and Systems. 2003,3:1579-1582.
    [32] Bin B. Zhu, Chun Yuan, Yidong Wang, Shipeng Li. Scalable protection for MPEG-4 fine granularity scalability. IEEE Transactions on Multimedia, 2005,7(2):222-233.
    [33] Mauro Banff, Franco Bartolini,Nicola Checcacci. Watermarking of MPEG-4 video objects. IEEE Transactions on Multimedia, 2005,7(1):23-32.
    [34] Frank Hartung, Bemd Girod. Digital watermarking of MPEG-2 coded video in the bitstream domain. Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing(ICASSP 1997), Munich, Germany, 1997:2621-2624.
    [35] Yulin Wang, Alan Pearmain. Blind MPEG-2 Video Watermarking Robust Against Geometric Attacks: A Set of Approaches in DCT Domain, IEEE TRANSACTIONS ON IMAGE PROCESSING, 2006,15(6):1536-1543.
    [36] Zina Liu,Huaqing Liang,Xinxin Niu,YixianYang. A robust video watermarking in motion vectors. In Proceedings of 7th International Conference on Signal Processing, 2004, 3:2358-2361.
    [37] Yoshito Ueno. A digital video watermarking method by associating with the motion estimation. In Proceedings of 7th International Conference on Signal Processing, 2004,3:2576-2579.
    [38] Sviatoslav Voloshynovskiy, Shelby Pereira, V. Iquise, Thierry Pun, Attack on digital watermarks: Classification, estimation based attacks, and benchmarks. IEEE Communications Magazine, 2001,39(8): 118-126.
    [39] Jack Lacy, James H. Snyder, Amy R. Reibman. Watermarking as a protection mechanism for IPR in MPEG=4. Fribourg, Switzerland, ISO/IEC JTC1/SC29/WG11/M2829,1997.
    [40] 陈小明,湖泽.听觉临界频带及其在声频信号处理中的应用。北京广播学院学报(自然科学版),2004:28-35.
    [41] Mitchell D. Swanson, Bin Zhu, Ahmed H. Tewfik. Current state of the art challenges and future directions for audio watermarking. Proceedings of International Conference on Multimedia Computing and Systems, 1999:19-24.
    [42] Mohamed E Mansour, Ahmed H. Tewfik. Audio watermarking by time-scale Modification. Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing(ICASSP), Salt Lake, 2001:1353-1356.
    [43] Wei Li, Xiangyang Xue, Peizhong Lu. Localized audio watermarking technique robust against time-scale modification. IEEE Transactions on Multimedia, 2006,8(1):60-69.
    [44] S.A. Chou, S.F. Hsieh. An Echo-Hiding Watermarking Technique Based on Bilateral Symmetric Time Spread Kernel. In Proceedings of International Conference on Acoustics, Speech and Signal Processing, 2006,3:1100-1103.
    [45] Nedeljko Cvejic, Anja Keskinarkaus, Tapio Seppanen. Audio watermarking using m-sequences and temporal masking. Proceedings of the 7th IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, New York,USA, 2001:227-230.
    [46] Jonathan Foote, John Adcock, Andreas Girgensohn. Time Base Modulation: A New Approach to Watermarking Audio. IEEE International Conference on Multimedia and Expo, 2003:221-224.
    [47] Holt Lyn, Maufe Barry Gordon, Wiener Anthony. Encoded Marking of a Recording Signal. UK Patent GB2196167,1988.
    [48] Xing He, Alexander I. Iliev, Michael S. Scordilis. A high capacity watermarking technique for stereo audio. IEEE Intenational Conference on Acoustics, Speech, and Signal Processing (ICASSP2004), Montreal, Canada, 2004:393-396.
    [49] Andrew Z. Tirkel, GA. Rankin, Ron G.. van Schyndel. Electronic watermark. Digital Image Computing, Technology and Applications, 1993:666-672.
    [50] Xing He and Michael S. Scordilis. Improved Spread Spectrum Digital Audio Watermarking Based on a Modified Perceptual Entropy Psychoacoustic Model. Proceedings of SECON2005, 2005:283-286.
    [51] Hyoung Joong Kim, Taehoon Kim, In-Kwon Yeo. A robust audio watermarking scheme. IEEE International Symposium on Circuits and Systems(ISCAS2004), 2004:696-699.
    [52] Jongwon Seok, Jinwoo Hong, Jinwoong Kim. A novel audio watermarking algorithm for copyright protection of digital audio. ETRI Journal, 2002,24(3):181-189.
    [53] Yi-Wen Liu, Julius O. Smith. Audio watermarking based on sinusoidal analysis and synthesis. Proceedings of the International Symposium on Musical Acoustics(ISMA-02), Nara, Japan, 2004.
    [54] Laurent Girin, Sylvain Marchand. Watermarking of speech signals using the sinusoidal model and frequency modulation of the partials. IEEE International Conference on Acoustics, Speech and Signal Processing(ICASSP 2004), Montreal, Canada, 2004:633-636.
    [55] Jaap Haitsma, Michiel van der Veen, Ton Kalker, Fons Bruekers. Audio watermarking for monitoring and copy protection. Proceedings of the 2000 ACM workshops on Multimedia, Los Angeles. Califomia,USA, 2000:119-122.
    [56] Gui-jun Nian, Zhiyuan Xie, Shu-xun Wang. Audio Watermarking Based on Reverberation. Proceedings of International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2006:37-40.
    [57] Petitcolas F. http://www.petitcolas.net/fabien/steganography/mp3stego/, in mp3stego1.1, 1999.
    [58] D.K. Koukopoulos, Y. C. Stamatiou. A Compressed-Domain Watermarking Algorithm for MPEG audio layer 3. Multimedia and Security Workshop at ACM Multimedia, 1999:7-10.
    [59] Ching-Te Wang, Tung-Shou Chen, Wen-Hung Chao. A new audio watermarking based on modified discrete cosine transform of MPEG/Audio Layer3. Proceedings of the International Conference on Networking, Sensing & Control, Taipei, 2004:984-989.
    [60] Ming Li, Yun Lei, Jian Liu and Yonghong Yan. A Novel Audio Watermarking in Wavelet Domain. Proceedings of International Conference on Intelligent Information Hiding and Multimedia Signal Processing. 2006:27-32
    [61] Changsheng Xu. Yongwei Zhu, David Dagan Feng. Digital audio watermarking based on multiple-bit hopping and human auditory system. Proceedings of the ninth ACM international conference on Multimedia, Ottawa, Canada, 2001:568-571.
    [62] Regunathan Radhakrishnan, Nasir D. Memon. Audio content authentication based on psycho-acoustic model. Security and Watermarking of Multimedia Contents. San Jose, CA, 2002.
    [63] Chung-Ping Wu, C.C. Jay Kuo. Fragile speech watermarking based on exponential scale quantization for tamper detection. IEEE international Conference on Acoustic, Speech and Signal Procesing, Florida,USA, 2002:13-17.
    [64] Chung-Ping Wu, C.C. Jay Kuo. Fragile speech watermarking for content integrity verification. IEEE International Symposium on Circuits and Systems. Scottsdale, Arizona, 2002:26-29.
    [65] Martin Steinebach,Fabien A. P. Petitcolas,Jana Dittmann, Nazim Fatès, Caroline Fontaine, F. Raynal, Christian Seibel. StirMark benchmark: audio watermarking attacks. Proceedings of the International Conference on Information Technology: Coding and Computing(ITCC), Las Vegas, Nevada,2001:49-54.
    [66] Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom. Digital Watermarking. Morgan Kaufman Publishers, 2002.
    [67] Abdellatif Zaidi, Rémy Boyer, Pierre Duhamel. Audio watermarking under desynchronization and additive noise attacks.IEEE Transactions on Signal Processing, 2006,54(2):570-584.
    [68] Byeong-Scob KO, Ryouichi Nishimura, Yoiti Suzuki. Log-scaling watermarking detection in digital audio watermarking. Proceedings of International Conference on Acoustics, Speech and Signal Proccssing(ICASSP2004),Montrcal, Canada, 2004:81-84.
    [69] Wei Li, Xiangyang Xue. Audio watermarking based on music content analysis: robust against time scale modification. Proceedings of the Second International Workshop on Digital Watermarking (IWDW2003), Korea, 2003:289-300.
    [70] Wei Li, Xiangyang Xue. An audio watermarking technique that is robust against random cropping. Computer Music Journal, MIT Press, USA. 2003,27(4):58-68.
    [71] Siho Kim, Keunsung Bac. Estimation of Quantization Step Size Against Amplitude Modification Attack in Scalar Quantization-Based Audio Watermarking. Proceedings of International Conference on Acoustics, Speech and Signal Processing, 2006,5:389-392.
    [72] Sergey Brin, Lawence Page. The Anatomy of a Large-Scale Hypertextual Web Search Engine. Computer Networks.1998:107-117.
    [73] Luiz André Barroso, Jeffrey Dean, Urs Holzle. Web Search for a Planet: The Google Cluster Architecture. IEEE Micro, 2003,23(2):22-28.
    [74] Chris Mellor, Google's Storage Strategy, http://www.techworld.com.
    [75] Press Center of Googlc, http://www.google.com/press/descriptions.html.
    [76] 尹康康,石教英,潘志庚.一种强壮性好的图像水印算法.软件学报,2001,12(5):668-676.
    [77] Raymond. B. Wolfgang, Edward J. Delp. A Watermark for Digital Images. Proceedings of the IEEE International Conference on Image Processing, Lausanne, Switzerland, 1996,3:219-222.
    [78] David J. Fleet, David J. Heeger. Embedding Invisible Information in color Images. Proceedings of IEEE International Conference on Image Processing, Santa Barbara, California, 1997,1:532~535.
    [79] J.J.K.O Ruanaidh, PUN T. Rotation. Translation and Scale Invariant Digital Image Watermarking, Proceedings of IEEE International Conference on Image Processing, Santa Barbara,California, 1997,1:26-29.
    [80] 张立和.隐藏信息检测与新型数字水印算法.北京邮电大学博士论文.2004.
    [81] 李黎.数字图像和三维几何模型水印技术研究.浙江大学博士论文.2004.
    [82] 温泉,孙谈锋,王树勋.基于零水印的数字水印技术研究.全国第三届信息隐藏学术研讨会论文集(CIHW’2001),西安:西安电子科技大学出版社,2001.
    [83] Huai-yu Zhuang, Ying Li, Cheng-ke Wu. A blind spatial-temporal algorithm based on 3D wavelet for video watermarking. Proceedings of International Coference on Multimedia and Expo, 2004 3:1727-1730.
    [84] Bijan G. Mobasseri. A spatial digital video watermark that survives MPEG. Proceedings of International Coference on Information Technology: Coding and Computing, Nevada,USA, 2000:68-73.
    [85] Dan Cross, Bijan G. Mobasseri. Watermarking for self-authentication of compressed video. IEEE International Conference on Image Porcessing, Rochester, 2002,2:913-916
    [86] Choong-Hoon Lee, HwangSeok Oh, Heung-Kyu Lee. Adaptive video watermarking using motion information. Proceedings of SPIE Security and Watermarking of Multimedia Contents Ⅲ. San Jose, 2000, 3971:209-217.
    [87] Simone Arena, Marcello Caramma, Rosa Lancini. Digital watermarking applied to MPEG-2 coded video sequences exploiting space and frequency masking. Proceedings of International Conference on Image Processing, Vancouver, 2000:438-441
    [88] Sviatoslav Voloshynovskiy, Alexander Herrigel, Nazanin Baumgaertner, Thierry Pun. A stochastic approach to content adaptive digital image watermarking. Proceedings of the Third International Workshop on Information Hiding, Dresden, Germany, 2000,1768:212-236.
    [89] 黄继武,Yun Q.SHI,程卫东.DCT域图像水印:嵌入对策和算法.电子学报.2000,28(4):386-389.
    [90] Jiwu Huang, Yun Q. Sift. Adaptive image watermarking scheme based on visual masking. Electronics Letters, 1998,34(8): 748-750.
    [91] N. Kaewkamnerd, K.R. Rao. Wavelet based image adaptive watermarking scheme. Electronics Letters, 2000,36(4):312-313.
    [92] Santiago Arroyo, Ronald P. Lesser, Wai-Tat Poon, W. Robert S. Webber, Gordon B. Neuronal generators of visual evoked potentials in humans: Visual processing in the human cortex. Epilepsia, 1997,38(5):600-610.
    [93] Qing-Ming Ge, Zhe-Ming Lu, Xia-Mu Niu. Oblivious Video Watermarking Scheme with Adaptive Embedding Mechanism. Proceedings of the Second International Conference on Machine Learning and Cybernetics, Xi'an, 2003:2876-2881
    [94] Henry H. Y. Tong, Anastasios N. Venetsanopoulos. A Perceptual Model for JPEG Applications based on Block Classification, Texture Masking and Luminance Masking. Proceedings of International Conference on Image Processing(ICIP), Chicago, Illinois, 1998:428-432.
    [95] Hongliang Li, Guizhong Liu, Yongli Li. A robust, efficient, and fast global motion estimation method from MPEG compressed video. Third IEEE Pacific Rim Conference on Multimedia(PCM2002), H sinchu, Taiwan, 2002,2532:151-158.
    [96] Boon-Lock Yeo, Bede Liu. Rapid scene analysis on compressed video. IEEE Transactions on Circuits and Systems for Video Technology, 1995,5(6):533-544.
    [97] 刘丽,王红霞.混沌在数字水印技术中的应用研究.大众科技,2006:80-82.
    [98] Nedeljko Cvejic, Tapio Seppanen. A wavelet domain LSB insertion algorithm for high capacity audio steganography," in Proceedings of IEEE 10th Digital Signal Processing Workshop, and the 2nd Signal Processing Education Workshop, 2002:53-55.
    [99] Nedeljko Cvejic. Algorithms for Audio Watermarking and Steganography. in Department of Electrical and Information Engineering, Information Processing Laboratory,vol. PhD. Oulu, Finland: University of Oulu, 2004.
    [100] Renato Iannella, Digital Rights Management (DRM) Architectures. D-Lib Magazine,2001,6(7):207-216.
    [101] Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard. Digital Rights Management for Content Distribution. Proceedings of the Australasian information security workshop conference on ACSW frontiers, Adelaide, Australia, 2003,21:49-58.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700