基于量化的水印研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
近几年来,为了获得Costa预测的编码端具有边信息的信道容量,人们越来越关注量化水印算法。本文在研究了量化水印算法性能的基础上,围绕着量化水印算法抗数值标量缩放、噪声、线性滤波等多种非加性攻击问题进行了深入研究。主要研究成果如下:
     (1)分析了基于传统通信模型的水印系统,探讨了边信息对水印系统性能的潜在影响,给出了量化索引调制(QIM)的一个特殊情形,即抖动量化算法的理论性能分析。
     (2)为了抵抗对量化水印的数值标量缩放攻击,给出了添加水印信号的概率密度函数,以及在没有减性抖动序列时受攻击信号的概率密度函数。根据这个模型,给出一种用基于Fourier的方法估计缩放因子。
     (3)在上述概率密度函数模型的基础上,给出了在编码端使用了减性抖动序列时添加水印信号的概率密度函数。使用这个概率密度函数模型的近似模型,给出一种幅值缩放因子的最大似然估计方法。
     (4)研究了对基于量化水印的两频带幅值缩放攻击的估计问题。文中考虑一种使用滤波器组调整信号频谱的多频带幅值比例攻击,通过拓展单通道的估计方法,提出两频带滤波攻击幅值比例因子的最大似然估计方法。最后,以合成的音频信号进行实验,结果显示出所提出的估计技术的有效性。
     (5)研究了比率抖动调制的量化水印算法。其核心思想是在嵌入端和解码端使用一个对缩放不变的自适应量化步长。实验结果证实了算法对于幅值缩放攻击保持不变。
     (6)将比率抖动调制算法拓展到离散付氏变换(DFT)域,使得算法对线性时不变滤波攻击具有鲁棒性。
     最后,分析了量化水印研究尚存在的问题及进一步研究的方向。
A considerable amount of attention has been paid to a number of digital watermarkingmethods based on quantization lately, seeking to achieve in practice the capacity predictedby Costa for a channel with side information at the encoder. The first objective of thisdissertation is to study the performance yielded by quantization-based watermarking scheme.A further motivation is focused on non additive attacks, such as the gain attack plus noise,and the linear filtering attack. The main achievements are listed as follows:
     (1) We first consider the watermarking model as one of communications with sideinformation at the encoder. Potential performance improvement in watermarking systemwith side information at the encoder is analyzed. We also provide the performance analysisof Dither Modulation (DM) method, which is the special case of Quantization IndexModulation (QIM).
     (2) Statistical estimation techniques to combat amplitude scaling in combination withadditive noise within a Quantization-based watermarking context are proposed. First wederive the probability density function (PDF) of the watermarked and attacked data in theabsence of subtractive dither. Based on this model we propose a Fourier-based procedure forestimating amplitude scaling factors.
     (3) We also derive the PDF models for subtractive dither used at the encoder. Using anapproximation of the PDF model in the presence of subtractive dither, we derive a MaximumLikelihood (ML) procedure for estimating amplitude scaling factors.
     (4) We also study the problem of estimating two-band amplitude scaling on QIMwatermarking scheme. Quantization-based watermarking schemes are not robust againstLinear Time Invariant (LTI) filtering attacks. We concentrate on a multi-band amplitudescaling attack that modifies the spectrum of the signal using an analysis/synthesis filter bank.By extending the single channel estimation procedure, we propose a ML procedure forestimating two-band amplitude scaling attack. Experimental results on synthetic signalsdemonstrate the effectiveness of the scheme.
     (5) A quantization-based watermarking method, named Ratio Dither Modulation is studied.This scheme is based on using a gain-invariant adaptive quantization step-size at bothembedder and decoder. Experimental results prove the validity of keeping invariance againstamplitude scaling attack.
     (6) We also propose an extension of Ratio Dither Modulation to construct a scheme that isrobust to linear time-invariant filtering attacks, named Frequency Ratio Dither Modulationbasically works in the DFT domain.
     At last, some open issues in quantization-based watermarking as well as the future work arepresented.
引文
1. J. H. Ahrens and U. Dieter, Extensions of Forsythe 's Method for Random Sampling from the Normal Distribution. Mathematics of Computation, 1973. 27(124), pp: 927-937.
    2. M. Wu, E. Tang, and B. Liu, Data Hiding in Digital Binary lmages. IEEE International Conference on Multimedia and Expo (ICME). Vol 1, 2000, pp. 393-396.
    3. J. Brassil, S. Low, N. Maxernchuk, and L. O'Gorman, Electronic Marking and Identification Techniques to Discourage Document Copying. Proceedings of IEEE Inforcom'94, Vol 3, 1994, pp: 1278-1287.
    4. J. Brassil, S. Low, N. Maxernchuk, and L. O'Gorman, Electronic Marking and Identification Techniques to Discourage Document Copying. IEEE Journal of Selected Areas in Communication. 13, 1995, pp: 1495-1504.
    5. S. Low and N. Maxemchuk, Performance Comparison of Two Text Marking Methods. IEEE Journal of Selected Areas in Communication, 16, 1998, pp: 561-572.
    6. O. Benedens, Geometry-based Watermarking of 3D Models. IEEE Computer Graphics and Applications, 19, 1999, pp: 46-55.
    7. R. Ohbochi, H. Masuda, and M. Aono, Watermarking Three-dimensional Polygonal Models Through Geometric and Topological Modifications. IEEE Journal of Selected Areas in Communication, 16(4), 1998, pp: 551-560.
    8. B. Girod, What's Wrong with Mean-squaredErro? A. B. Watson, editor, Digital Images and Human Vision, Chapter 15, 1993, Cambridge, MA: MIT Press, pp: 207-220.
    9. J. P. Stern, G. Hachez, E Koeune, and J. J. Quisquater, Robust Object Watermarking: Application to Code. Proceedings of Info Hiding'99, volume 1768 of Lecture Notes in Computer Science, 1999, pp: 368-378.
    10. J. Lach, W. Mangione-Smith, and M. Potknojak, Fingerprinting Digital Circuits on Programmable Hardware. Proceedings of the Second International Information Hiding Workshop, 1998, pp: 16-31.
    11. A. B. Hahng, S. Mantick, I. L. Markov, M. Potkonjak, P. Tucker, H. Wang, and G. Wolfe, Robust IP Watermarking Methodologies for Physical Design. Proceedings of the 35th Design and Automation Conference, 1998, pp: 782-787.
    12. D. Kesdogan, J. Egner, and R. Buschks, Stop-and -Go MiXes Providing Probabilistic Anonymity in an Open System. Proceedings of the Second International Information Hiding Workshop, 1998, pp: 83-98.
    13. I. S. Moskowitz and L. W. Chang, An Entropy-based Framework for Database Inference. Proceedings of the Third International Information Hiding Workshop, 1999, pp: 405-418.
    14. Herodotus, The Histories. Translated byAubrey de Selincourt. London: Penguin Books, 1996.
    15. G. J. Simmons, The History of Subliminal Channels. R. Anderson, editor, Information Hiding: First International Workshop, volume 1174 of Lecture Notes in Computer Science, Berlin; New York: Springer-Veriag, 1996, pp: 237-256.
    16. H. A. Rahrnel, System for Determining the Listening Habits of Wave Signal Receiver Users. United States Patent 2, 513, 360, 1950.
    17. J. C. Oostveen, T. Kalker, M. Staring, Adaptive quantization watermarking. SPIE Security, Steganography, and Watermarking of Multimedia Contents Ⅵ, vol. 5306, January 2004, pp: 296-303.
    18. W. Szepanski, A Signal Theoretic Method for Creating Forgery-proof Documents for Automatic Verification. J. S. Jackson, editor, 1979 Camahan Conference on Crime Countermeasures, 1979, pp: 101-109.
    19. F. Perez-Gonzalez, C. Mosquera, M. Barni, and A. Abrardo, Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks. IEEE Trans. on Signal Processing, 53(10), Third supplement on secure media, 2005, pp: 3960-3975.
    20. N. Komatsu and H. Tominaga. Authentication System Using Concealed lmages in Telematics. Memoirs of the School of Science and Engineering, Waseda University, 1998, 52, pp: 45-60.
    21. A. Borodin, R. Ostrovsky, and Y. Rabani, Lower Bounds for High-Dimensional Nearest Neighbor Search and Related Problems. Proceedings of the 31st ACM STOC, 1999, pp: 312-321.
    22. A. Chakrabarti, B. Chazelle, B. Gum, and A. Lvov, A Lower Bound on the Complexity of Approximate Nearest Neighbor Searching on the Hamming Cube. IEEE International Conference on Image Processing, 3: 714-717, 2000.
    23. F. Perez-Gonzalez, C. Mosquera, M. Alvarez, and R. Lagendijk, High-rate quantization data hiding robust to arbitrary linear filtering attacks. Proceedings of SPIE, Security, Steganography, and Watermarking of Multimedia Contents Ⅷ, 2006.
    24. D. R. Stinson, Cryptography: Theory and Practice. Boca Raton, FL: CRC Press, 1995.
    25. G. L. Friedman, The Trustworthy Camera: Restoring Credibility to the Photographic lmage. IEEE Transactions on Consumer Electronics, 39(4), 1993, pp: 905-910.
    26. G. L. Friedman, Digital Camera with Apparatus for Authentication of Images Produced from an Image File. United States Patent 5, 499, 294, 1996.
    27. B. M. Macq and J-J. Quisquater, Cryptologyfor Digital TV Broadcasting, Proceedings of the IEEE, 83(6), 1995, pp: 944-957.
    28. R. B. Wolfgang and E. J. Delp, A Watermark for Digital lmages. Proceedings of the 1996 International Conference on Image Processing, volume 3, 1996, pp: 219-222.
    29. F. Hartung and M. Kutter, Multimedia Watermarking Techniques. Proceedings of the IEEE, 87(7), 1999, pp: 1079-1107.
    30. I. J. Cox and M. L. Miller, A Review of Watermarking and the Importance of Perceptual Modeling. Proceedings of SPIE, Human Vision & Electronic Imaging Ⅱ, volume 3016, 1997, pp: 92-99.
    31. F. A. P. Petitcolas, R. Anderson, and M. G. Kuhn, Information Hiding: A Survey. Proceedings of the IEEE, 87(7), 1999, pp: 1062-1077.
    32. G. W. Braudaway, K. A. Magerlein, and F. Mintzer, Protecting Publicly Available lmages with a visible lmage Watermark. SPIE Conference on Optical Security and Counterfiet Deterrence Techniques, volume 2659, 1996, pp: 126-133.
    33. J. A. Bloom, I. J. Cox, T. Kalker, J-P Linnartz, M. L. Miller, and B. Traw, Copy Protection for DVD Video. Proceedings of the IEEE, 87(7), 1999, pp: 1267-1276.
    34. H. S. Stone, Analysis of Attacks on Image Watermarks with Randomized Coefficients. Technical Report TR 96-045, NEC Research Institute, 1996.
    35. J. Kilian, F. T. Leighton, L. R. Matheson, T. shamoon, and R. E. Tarjan, Resistance of Watermarked Documents to Collusional Attacks. Technical Report TR 97-167, Princeton, NJ: NEC Research Institue, 1997
    36. F. Ergun, J. Kilan, and R. Kumar, A Note on the Limits of Collusion-resistant Watermarks. Advances in Cryptology: EUROCRYPT'99, Berlin: New York: Springer-Verlag, 1999, pp: 140-149.
    37. A. E. Bell, The Dynamic Digital Disk. IEEE Spectrum, 36(10), 1999, pp: 28-35.
    38. M. Kutter and F. A. P. Petitcolas, A Fari Benchmark for Image Watermarking Systems. Security and Watermarking of Multimedia Contents, SPIE-3657, 1999, pp: 226-239.
    39. F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn. Attacks on Copyright Marking Systems. Workshop on Information Hiding, Portland, OR, 1998, pp: 218-238.
    40. I. J. Cox, J. Kilian, F. T. Leighton, and T. Shanmoon, Secure Spread Spectrum Watermarking for Multimedia. IEEE Transactions on Image Processing, 6(12), 1997, pp: 1673-1687.
    41. C. E. Shannon, Channels with Side Information at the Transmitter. IBM Journal of Research and Development, 1958, pp: 289-293.
    42. M. Costa, Writing on Dirty Paper. IEEE Transactions on Information Theory, 29, 1983, pp: 439-441.
    43. C. Heegard and A. EI Carmal, On the Capacity of Computer Memory with Defects. IEEE Transactions on Information Theory, 29, 1983, pp: 731-739.
    44. A. D. Wyner and J. Ziff, The Rate Distortion Function for Source Coding with Side Information ate the Decoder. IEEE Transactions on Information Theory, 22, 1976, pp: 1-10.
    45. B. Chen and G. W. Womell, Pre-processed and Post-processed Quantization Index Modulation Methods for Digital Watermarking. Security and Watermarking of Multimedia Contents Ⅱ, SPIE-3971, 2000, pp: 48-59.
    46. J. Chou, S. S. Pradhan, and K. Ramehandran, On the duality Between Distributed Source Coding and Data Hiding. Thirty-third Asilomar Conference on Signals, Systems and Computers, 2, 1999, pp: 1503-1507.
    47. I. J. Cox, M. L. Miller, and A. McKellips, Watermarking as Communications with Side Information. Proceedings of the IEEE, 87(7), 1999, pp: 1127-1141.
    48. P. Moulin and A. O'Sullivan, Information-Theoretic Analysis of Information Hiding. IEEE Transactions on Information Theory. vol. 49, no. 3, 2003, pp: 563-593.
    49. J. J. Eggers, J. K. Su, and B. Girod, A Blind Watermarking Scheme Based on Structured Codebooks. lEE'Seminar on Secure Images and Image Authentication, 2000, pp: 4/1-4/21.
    50. B. Chen and G. W. Womell, An Information-theoretic Approach to the Design of Robust Digital Watermarking Systems. IEEE Conference on Acoustics, Speech, and Signal Processing, volume 4, 1999, pp. 2061-2064.
    51. M. Ramkumar, Data Hiding in Multimedia: Theory and Applications. PhD. Thesis, New Jersey Institute of Technology, Nework, 1999.
    52. J. J. Eggers, J. K. Su, and B. Girod, Public Key Watermarking by Eigenvectors of Linear Transforms. EUSIPCO, Tampere, Finland, September 2000.
    53. B. Chen and G. W. Womell, Digital Watermarking and Information Embedding Using Dither Modulation. Proc. of IEEE Second Workshop on Multimedia Signal Processing, pp. 273-278.
    54. R. Petrovic, J. M. Winograd, K. Jemili, and E. Metois, Data Hiding Within Audio Signals. Fourth International Conference on Telecommunications in Modem Satellite, Cable, and Broadcasting Services, volume 1, 1999, pp. 89-95.
    55. B. Chen and G. W. Womell. Provably robust digital watermarking. Proc. of SPIE, vol. 3845 of Multimedia Systems and Applications Ⅱ, (San Jos'e, USA), 1999, pp: 43-54.
    56. B. Chert and G. W. Womell. Dither modulation: A new approach to digital watermarking and information embedding. Proe. of SPIE, vol. 3657 of Security and Watermarking of Multimedia Contents, (San Jos'e, USA), 1999, pp: 342-353.
    57. L. Schuchman. Dither signals and their effect on quantization noise. IEEE Trans. on Communication Technology (COM), vol. 12, 1964, pp: 162-165.
    58. B. Chen and G. Wornell. Quantization lndex Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding. IEEE Transactions on Information Theory, vol. 47, 2001, pp: 1423-1443.
    59. S.I. Gel'fand and M. S. Pinsker. Coding for Channel with Random Parameters. Problems of Control and Information Theory, vol. 9, 1980, pp: 19-31.
    60. M. L. Miller, G. J. Doerr, and J. Cox, Dirty-Paper Trellis Codes For Watermarking. IEEE International Conference On Image Processing, vol. 2, 2002, pp: 129-132.
    61. B. Bradley. Improvement to CDF Grounded Lattice Codes. SPIE Security, Steganography, and Watermarking of Multimedia Contents Ⅵ, vol. 5306, 2004.
    62. J.J. Eggers, R. Bauml, and B. Girod. Estimation of Amplitude Modifications before SCS Watermark Detection. SPIE Security and Watermarking of Multimedia Contents Ⅳ, vol. 4675, 2002, pp. 387-398.
    63. T. Kawata. Fourier Analysis in Probability Theory. Academic Press, 1972.
    64. H.V. Poor. An Introduction to Signal Detection and Estimation. 2nd ed. Springer-Verlag, 1994.
    65. R. L. Lagendijk and I. D. Shterev, Estimation of Attacker's Noise and Variance for QIM-DC Watermark Embedding. IEEE International Conference on Image Processing, October 2004.
    66. J.H. Conway and N. J. A. Sloane, Sphere Packings, Lattices and Groups. 3rd ed. Springer-Verlag, 1999.
    67. R. Zamir, S. Shamai (Shitz), and U. Erez, Nested Linear/Lattice Codes for Structured Multiterminal Binning. IEEE Transactions on Information Theory, vol. 48, no. 6, 2002, pp: 1250-1276.
    68. I. D. Shterev, R. L. Lagendijk, and R. Heusdens. Statistical Amplitude Scale Estimation for Quantization-based Watermarking. SPIE Security, Steganography, and Watermarking of Multimedia Contents Ⅵ, vol. 5306, January 2004.
    69. F. Bartolini, M. Bami, and A. Piva, Performance analysis of spread transform dither modulation (STDM) watermaking in presence of nonadditive attacks. IEEE Transactions on Signal Processing, Supplement on Secure Media, vol. 52, no. 10, October 2004, pp: 2965-2974.
    70. M.L. Miller, G. J. Doerr, and I. J. Cox, Applying informed coding and embedding to design a robust, high capacity, watermark. IEEE Trans.on Image Processing, vol. 13, no. 6, 2004, pp: 792-807.
    71. A. Abrardo and M. Barni, Orthogonal dirty paper coding for informed watermarking. Security, Steganography, and Watermarking of Multimedia Contents Ⅵ, Proc. SPIE Vol. 5306, P. W. Wong and E. J. Delp, Eds., San Jose, CA, USA, January 2004.
    72. W. Feller, An Introduction to Probability Theory and Its Applications. Wiley, New York, 2nd edition, 1971.
    73. B. Chen and G. Wornell, Achievable performance of digital watermarking schemes. Proc. IEEE Int. Conf. on Multimedia Computing and Systems, ICMCS '99, Florence, Italy, June 1999, vol. 1, pp: 13-18.
    74. S.I. Gelf'and and M. S. Pinsker, Coding for channel with random parameters. Problems of Control and Information Theory, vol. 9, no. 1, 1980, pp: 19-31.
    75. J. H. Conway and N. J. A. Sloane, Sphere Packings, Lattices, and Groups, Springer-Verlag, New York, 1988.
    76. J. J. Eggers, R. B"auml, R. Tzschoppe, and B. Girod, Scalar Costa scheme for information embedding. IEEE Trans. on Signal Processing, vol. 4, no. 51, 2003, pp: 1003-1019.
    77. R. Zamir, S. Shamai, and U. Erez, Nested linear/lattice codes for structured multiterminal binning. TIT, vol. 48, no. 6, 2002, pp: 1250-1276.
    78. K. Lee, D. S. Kim, T. Kim, and K. A. Moon, EM estimation of scale factor for quantization-based audio watermarking. Proceedings of Second International Workshop on Digital Watermarking, I. Cox T. Kalker and Y.M. Ro, Eds., Seoul, October 2003, pp: 316-327.
    79. J. R. Norris, Markov Chains. Cambridge University Press, Cambridge, 1st edition, 1997.
    80. D.J. Goodman and A. Gersho, Theory of an adaptive quantizer. IEEE Trans. on Communications, vol. COM-22, no. 8, 1974, pp: 1037-1045.
    81. F. Perez-Gonzalez, F. Balado, and J. R. Hernandez, Performance analysis of existing and new methods for data hiding with known-host information in additive channels. IEEE Trans. on Signal Processing, vol. 4, no. 51, 2003, pp: 960-980.
    82. H. S. Malvar and D. A. Florencio, Improved spread spectrum: A new modulation technique for robust watermarking. IEEE Trans. on Signal Processing, vol. 4, no. 51, 2003, pp: 898-905.
    83. J. Oostven, T. Kalker, and M. Staring, Adaptive quantization watermarking. Security, Steganography, and Watermarking of Multimedia Contents Ⅵ, Proc. SPIE Vol. 5306, P. W. Wong and E. J. Delp, Eds., San Jose, CA, USA, January 2004, pp. 296-303.
    84.王卓,赵千川,基于能量量化的音频水印算法.计算机工程与应用,2004,26(40),PP:48-51,55.
    85.吴敏金,张良仪,非奇异多通道滤波器组合及其优化设计.电子学报,2006,34(8),pp1492-1496.
    86.赵险峰,汪为民,陈克非,基于逆问题扰动的脆弱数字水印认证.电子学报.2002.30(12A),PP:2131-2134.
    87.李春,黄继武,一种抗JPEG压缩的半脆弱图像水印算法.软件学报,2006.17(2),PP:315-324.
    88. M.S. Kankahalli, R. Ramakrishinan, Adaptive visible watermarking of images. Proceedings of IEEE Multimedia Systems, 1999, pp: 568-573.
    89.郭捷,施鹏飞,基于亮度和纹理特征的可见水印技术.红外与激光工程,2003.32(1),PP:92-95.
    90. W. Bender, D. Gruhl, N. Morimoto, A. Lu, Techniques for data hiding. IBM System Journal, 1996.
    91. M. Ramkurnar, A. N. Akansu, A. A. Alatan, A robust data hiding scheme for images using DFT. Proceedings of IEEE International Conference on Image Processing, 1999, pp: 211-215.
    92. A. Piva, M. Barni, F. Bartonlini, V. Cappellini, DCT-based watermarking recovering without resorting to the uncorrupted original image. Proceedings of IEEE International Conference on Image Processing, 1997, pp: 520-523.
    93. H. Inoue, A. Miyazaki, T. Katsura, An image watermarking method based on the wavelet transform. Proceedings of IEEE International Conference on Image Processing, 1999, pp: 296-300.
    94. J. J. Lee, W. Kim, N. Y. Lee, A new incremental watermarking based on dual-tree complex wavelet transform. The Journal of Supereomputing, 33(2), 2005, pp: 133-140.
    95.江铭炎,许国平,黄春华,基于复小波变换和人类视觉模型的数字水印算法.山东大学学报,2005.35(2),PP:32-35.
    96.刘琚,孙建德,基于图像独立特征分解的数字水印方法.电子与信息学报,2003.25(9),PP:1174-1179.
    97. S. Stankovic, I. Djurovic, I. Pitas, Watermarking in the space/spatial-frequency domain using two-dimensional raon-wigner distribution. IEEE Transaction on Image Processing, 10(3), 2001, pp: 650-658.
    98. S. Voloshynovskiy, S. Pereira, and T. Pun, Attacks on Digital Watermarks: Classification, Estimation Based Attacks, and Benchmarks. IEEE Commtmieation Magazine, 2001, pp: 118-126.
    99. S. Voloshynovskiy, S. Pereira, V. Iquise, et al., Attack Modeling: Towards a Second Generation Watermarking Benchmark. Signal Processing, Special Issue on Information Theoretic Issues in Digital Watermark, 81 (6), 2001, pp: 1177-1214.
    100. F. Hartung, J, K. Su and B. Girod, Spread Spectrum Watermarking." Malicious Attacks and Counter Attacks. Proceedings of SPIE on Security and Watermarking of Multimedia Contents, San Jose, CA USA, 1999, 3657.
    101.桑茂栋,赵.,抵抗几何攻击的数字图像水印.电子与信息学报,2004.26(12),pp.1875-1881.
    102.赵耀,基于小波变换的抵抗几何攻击的鲁棒视频水印.中国科学E辑:信息科学,2006.36(2),PP:137-152.
    103.李黎,张明敏,潘志庚,一种抗几何变换的图像盲水印算法.浙江大学学报,38(2),2004,PP:141-144.
    104.俞龙江,牛夏牧,孙圣和,一种旋转、尺度变换和平移鲁棒水印算法.电子学报,2003.31(12A),pp:2071-2073.
    105. F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, Attacks on Copyright Marking Systems. Information Hiding: 2nd Int. Workshop (Lecture Notes in Computer Science), Berlin, Germany vol, 1525, 1998, pp: 218-238.
    106. J. Wu, B. B. Zhu, S. Li, et al., Efficient Oracle Attacks on Yeung-Minzer and Variant Authentication Schemes. IEEE International Conference on Multimedia and Expo, Taipei, Taiwan China, 2004, 2, pp: 931-934.
    107. L. Qiao and K. Nahrstedt, Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights. Journal of Visual Communication and Image Representation, 1998, 9(3), pp: 194-210.
    108. S. Craver, N. Memon, B. Yeo, et al., On the lnvertibility of Invisible Watermarking Techniques. IEEE International Conference on Image Processing, Santa Barbara, CA USA, 1997, 1, pp: 540-543.
    109. M. Kutter. S. Voloshynovskiy and A. Herrigel, Watermark Copy Attack. Proceedings of SPIE on Security and Watermarking of Multimedia Content Ⅱ, San Jose, CA USA, 2000, 3971, pp: 371-379.
    110.季智,戴旭初,数字水印攻击技术及其对策分析.测控技术,2005,24(5),PP:14-17.
    111. B. Pfitzmann, Information Hiding Terminology. Proceedings of Information Hiding Workshop, Cambridge, UK, 1996, LNCS 1174, pp: 347-350.
    112. M. D, Swanson, M. Kobsyashi, A. H. Tewfik, Multimedia data embedding and watermarking technologies. Proceedings of IEEE, 1998, 86 pp: 1064-1087.
    113. I. Djurovie, S. Stankovic, I. Pitas, Digital watermarking in the fractional Fourier transformation domain. Journal of Network and Computer Applications, 2001, 24 pp: 167-173.
    114. C. Y. Lin, M. Wu, Y. M. Lui, et al, Rotation, scale, and translation resilient public watermarking for images. IEEE Transactions on Image Processing, 2001, 10(5), pp: 767-782.
    115. J. Fridrich, M. Golian, R. Du, Steganalysis based on JPEG compatibility. Special Session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding. SPIE Multimedia Systems and Applications Ⅳ[C]. 2001, pp: 275-280.
    116. J. A. O'Rsullivan, P. Moulin, J. M. Ettinger, Information-theoretic analysis of steganography, Proceedings of IEEE International Symposium on Information Theory [C], 1998. 297.
    117. P. Moulin, J. A. O'Rsullivan, Information-theoretic analysis of watermarking. Proceedings of the International Conference on Aecousties, Speech and Signal Processing [C], 2000, pp: 3630-3633.
    118. X. G. Kang, J. W. Huang, Y. Q. Shi, A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Transactions on Circuits and Systems for Video Technology, 2003, 13(8), pp: 776-786.
    119. M. J. Tsai, K. Y. Yu, Y. Z. Chen, Joint wavelet and spatial transformation for digital watermarking. IEEE Transactions on Consumer Electronics, 2000, 46(1), pp: 241-245.
    120. Y. M. Fang, J. W. Huang, S. Q. Wu, CDMA-based watermarking resisting to cropping. ISCAS [C]. 2004, pp:25-28.
    121. L. M. Gu, J. W. Huang, Analysis of block coding strategies in watermarking channel. Journal of software, 2004, 15(9), pp:1413-1422.
    122. F. Perez-Gonzalea, J. R. Hernandes, Balado F, Approaching the capacity limit in image watermarking: a perspective on coding techniques for data hiding applications. Signal Processing 2001, 81 (6), pp:1215-1238.
    123. F. Perez-Gonzalez, F. Balado, J. Hernandez, Performance analysis of existing and new methods for data hiding with known-host information in additive channels, IEEE Trans. on Signal Processing, vol. 4, 2003, pp: 960-980.
    124. J. J. Eggers, R. R. Bauml, B. Girod, Digital watermarking facing attacks by amplitude scaling and additive white noise. 4th International ITG Conference on Source and Channel Coding, Berlin. Jan. 2002, pp: 28-30.
    125. J. J. Eggers, R. Bauml, B. Girod, A communication approach to image steganography. Proceedings of SPIE vol.4675, Security and Watermarking of Multimedia Contents Ⅳ, San Jose, Ca., Jan., 2002.
    126. C. Cachin, An information-theoretic model for steganography. Information Hiding, 2nd International Workshop, volume 1525 of Lecture Notes in Computer Science, Springer, 1998, pp: 306-318.
    127. Gelfand S I, Pinsker M S, Coding for channel with random parameters. Problems of Control and Information Theory, 1980.
    128. J. K. Su, J. J. Eggers, B. Girod, Analysis of digital watermarks subjected to optimum linear filtering and additive noise. Signal Processing, 2001, 81(6), pp: 1141-1175.
    129.王颖,李象霖,教字水印的信道容量研究综述.电子与信息学报,2006,28(5),PP:955-960.
    130.许君一,熊昌镇,齐东旭,黄继武,量化水印算法分析,通信学报,2006,27(3),pp:15-27.
    131.熊淑华,卜云,周激流,付媛媛,一种基于小波变换的非均匀量化索引调制水印算法.四川大学学报(工程科学版),2006,38(3),pp:140-143.
    132.王丽,赵嫒嫒,赵耀,一种抗剪切的鲁棒数字水印.数据采集预与处理,2006,3(21):330-333.
    133. J.R. Hernandez, and F.P. Gonzlez, Statistical analysis of watermarking scheme for copyright protection of images. Proceeding of IEEE (Special Issue on Identification and Protection of Multimedia Information), Vol.87, 1999, pp: 1142-1166.
    134. N. Merhav, On random coding error exponents of watermarking codes. IEEE Transactions on Information Theory, Vol.46, 2000, pp: 420-430.
    135. F.M.J. Willems, An information theoretical approach to information embedding. The 21st Symposium on Information Theory, 2000, pp: 255-260.
    136. Y. Steinberg, and N. Merhav, Identification in the presence of side information with application to watermarking. IEEE Transactions on Information Theory, Vol.47, No.4, 2001, pp: 1410-1422.
    137. P. Moulin, J.A.O. Sullivan, Information theoretic analysis of information hiding. IEEE Transactions on Information Theory, Vol. 49, No.3, 2003, pp: 563-593.
    138.傅祖芸,信息论——基础理论及应用.北京:电子工业出版社,2001:90-111.
    139.郭捷,基于边信息的数字水印技术研究.上海交通大学博士学位论文,2003

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700