图像可逆信息隐藏技术若干问题研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
可逆信息隐藏技术是近几年信息隐藏领域一个新的研究热点。不同于传统的信息隐藏技术在嵌入信息的同时会造成原始载体的永久失真,可逆信息隐藏技术能够在正确提取信息后无损地恢复原始载体,这在对载体信号的质量要求严苛的场合具有很高的应用价值。本文着重对基于图像的可逆信息隐藏技术进行了研究,主要贡献如下:
     1、提出了一种基于五像素预测误差扩展的可逆信息隐藏算法。算法以五个像素为一组来划分图像,在每个图像块中利用三对预测误差之间的关系嵌入秘密信息。最好的情况下,单个图像块中,每个像素的值最多改变1,即可嵌入六比特数据,有效地扩充了隐藏容量。同时,算法通过对图像块复杂度的识别,摒弃了纹理复杂的块,只选择纹理简单的块嵌入数据,降低了高容量对图像质量的损耗。
     2、提出了一种基于插值预测和块分类模型的可逆信息隐藏算法。对已有的直方图平移算法进行研究后发现,如果在不影响可逆性的同时,控制平移点的数量和减小秘密信息流中“1”的比例,算法的隐蔽性可以得到进一步提高。因此,本算法一方面通过设计一个图像块类型的预测器,同时对秘密信息进行预处理,限定了嵌入信息时被修改像素的数量,进而提高了隐密图像的质量。另一方面,对图像进行插值预测,采用插值误差直方图双向平移的方法隐藏信息,保证了较高的嵌入容量。
     3、提出了一种基于插值运算和隐写编码的二值图像可逆信息隐藏算法。算法重点解决了三个方面的问题:一是实现可逆。鉴于二值图像在实际存储时,每个像素占用一个比特,数据量较少,因此在嵌入提取信息时,对图像先扩后缩:嵌入信息时,对图像进行插值运算,在插值后的图像中寻找特定的插值点隐藏数据。提取信息后,通过重组非插值点来恢复原始图像,实现了算法的可逆性。二是减小图像失真。设定“可翻转点”选取规则,尽可能选取对人眼视觉影响较小的像素点来隐藏秘密信息。三是提升嵌入容量。应用隐写编码,在m×n的图像块中通过至多修改两个像素点,来隐藏r比特数据,r=log2(mn+1)。对于大小为M×N的插值后图像,其最大嵌入容量可达到M×N/m×n×r比特。
     4、从实际应用的角度出发,设计并实现了一个融合可逆信息隐藏技术和鲁棒水印技术的图像保护应用系统。系统实现了对图像的双重保护,并且通过标准的REST网络服务接口进行通讯,可以方便地集成到诸如远程医疗系统、电子政务系统等应用系统中。同时,针对鲁棒水印技术进行了研究,提出了一种抗抖动攻击的鲁棒水印算法。算法对图像进行DCT变换,以9个相邻块为一组划分单元,在每个单元内通过调整中心块的DC系数值嵌入和提取水印。实验结果显示,算法抗抖动等攻击的能力较强。
Reversible data hiding is one of the hot research areas of information hiding in recent years. Unlike the traditional techniques, by which the source data is distorted permanently due to data hiding, the reversible techniques can fully restore the source data after the hidden data being correctly extracted. It is high valuable in the cases which distortion is intolerable. This paper mainly focuses on the image reversible data hiding algorithms, the major contributions are as the followings:
     1. A reversible data hiding algorithm based on five-pixel block and prediction-error expansion is proposed. The image is divided into five-pixel blocks, the secret data can be embedded by using the relationship between three pairs of prediction-error. In the best situation, each pixel value is modified at most by1in each block to embed six bits, in this way the high capacity is achieved. At the same time by identifying the complexity of image blocks, only the ones of simple texture are selected to hide data and the others of complexity are dropped, the impact on image quality is minimized.
     2. A reversible data hiding algorithm base on interpolation prediction and blocking model is proposed. The analysis on the previous histogram shifting algorithms shows that the quality of the stego-image can be improved by reducing the number of shifting points and the number of "1" in the secrete data without having impact on reversibility. Therefore a block predictor is designed and the secret data is pre-processed to improve the quality. Furthermore, the interpolation-error histogram is generated using interpolation prediction in the cover image, the histogram is shifted in two directions to have the high capacity.
     3. A binary image reversilbe data hiding algorithm using interpolation computation and steganographic coding is proposed. Three problems are resolved:the first is to have reversibility. Based on the fact that in binary image each pixel is saved in one bit and the required space is not big, the image is expanded when embedding data and is shrinked when extracting the data. The stego-image is obtained by hiding secret data in the particular pixels of the interpolated image; the cover image can be restored by re-arranging the non-interpolated pixels. The second is to decrease image distoration. Only the pixels with less effect on human being visual system can be selected to hide the secret data by setting the rules of modification. The third is to improve the capacity. By using steganographic coding, r bits data can be hidden in one block with changing up to two pixels, r=log2(mn+1). For the image with size of M×N, the maximum capactity can reach to (M×N)/(m×n)×r bits.
     4. In practice, a combined technical image protection system of reversible data hiding and robust watermarking is designed and implemented. The system implements two levels of protection for the cover image and can communicate with other application systems based on REST network interface. It can be easily integrated to the existing systems like remote-medical or E-government. At the same time, an anti-dithering attack algorithm is proposed after studying the robust watermarking. The image is divided into units with nine adjacent blocks in DCT domain, then the watermark is embedded and extracted by adjusting the DC coefficient of the center block. The experimental results show that the algorithm is robust for dithering and other attacks.
引文
[1]Abbas C, Joan C, Kevin C, et al. Digital image steganography:survery and analysis of current methods[J].Signal Processing,2010,90:727-752.
    [2]Provos N, Honeyman P.Hide and seek:an introduction to steganography[J].IEEE Security and Privacy,2003,1(3):32-44.
    [3]Bailey K,Curran K. An evaluation of image based steganography methods[J].Multimedia Tools and Applications,2006,3(1):55-88.
    [4]Simmons G.J.The prisoner's problem and the subliminal channel. Proceedings of the CRYPTO'83, 1984:51-67.
    [5]R. G. Van Schyndel, A. Z. Tirkel. A digital watermark[J]. IEEE International Conference on Image Processing,1994,2:86-90.
    [6]Frith D. Steganography approaches,options and implications[J].Network Security,2007(8):4-7.
    [7]I. J. Cox, J. Kilian, F. T. Lerghton. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing,1997,6(12):1673-1687.
    [8]Caldelli R, Filippini F, Becarelli R.Reversible watermarking techniques:An overview and a classification[J]. Eurasip Journal on Information Security,2010.
    [9]Dong P, Qian H,et al. A network covert channel based on packet classification [J]. International Journal of Network Security,2012,14(2):109-116.
    [10]Qian Y.W, Song H.J. Study on the module of network thumb printer based on network covert time channel[J]. Binggong Xuebao/Acta Armamentarii,2012,33(1):19-25.
    [11]Lin D.R, Wang C.I. A digital signature with multiple subliminal channels and its applications [J].Computers and Mathematics with Applications,2010,60(2):276-284.
    [12]Chen C.L, Liao J.J.A fair online payment system for digital content via subliminal channel[J]. Electronic Commerce Research and Applications,2011,10(3):279-287.
    [13]Zhuang J.X, Gong B. The connection anonymous scheme of trusted network[J].Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology,2010,36(5):597-600.
    [14]Jun J, Wu M.W. Trusted anonymous authentication scheme for trusted network connection in mobile environment[J].Journal of Networks,2012,7(9):1341-1348.
    [15]Kim J.W, Kim N, Lee D,et al. Watermarking two dimensional data object identifier for authenticated distribution of digital multimedia contents[J]. Signal Processing:Image Communication,2010,25(8):559-576.
    [16]Bhatnagar G,Raman B,Wu Q.M.Robust watermarking using fractional wavelet packet transform[J]. IET Image Processing,2012,6(4):386-397.
    [17]Lv L, Fan HI. A semi-fragile watermarking scheme for image tamper localization and recovery [J]. Journal of Theoretical and Applied Information Technology,2012,42(2):287-291.
    [18]Qin C, Chang C.C.Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism[J]. Signal Processing,2012,92(4):1137-1150.
    [19]Stefan Katzenbeisser, Fabien A. P. Petitcolas.信息隐藏技术-隐写术与数字水印[M].北京:人民邮电出版社,2001.
    [20]I. J. Cox, M. L. Miller, J. A. Bloom.数字水印[M].北京:电子工业出版社,2003.
    [21]杨义先,钮心忻.数字水印理论与技术[M]].北京:高等教育出版社,2006.
    [22]王丽娜,郭迟,李鹏.信息隐藏实验教程[M].武汉:武汉大学出版社,2008.
    [23]Xiang,Y, Rong,Y,et al.Robust patchwork-based embedding and decoding scheme for digital audio watermarking[J].IEEE Transactions on Audio, Speech and Language Processing,2012,20(8):2232-2239.
    [24]Nishimura R.Audio watermarking using spatial masking and ambisonics.IEEE Transactions on Audio, Speech and Language Processing[J],2012,20(9):2461-2469.
    [25]Yang G.B, Li J.J. An information hiding algorithm based on intra-prediction modes and matrix coding for H.264/AVC video stream[J]. AEU-International Journal of Electronics and Communications, 2011,65(4):331-337.
    [26]Alatan, A. Aydin. Robust video data hiding using forbidden zone data hiding and selective embed-ding [J].IEEE Transactions on Circuits and Systems for Video Technology,2011,21(8):1130-1138.
    [27]Yang B, Sun X.M. A novel reversible text data hiding scheme[J]. Information Technology Journal, 2012,11 (8):1084-1090.
    [28]Por L.Y, Wong K, Chee K.O. A text-based data hiding method using Unicode space characters[J]. Journal of Systems and Software,2012,85(5):1075-1082.
    [29]Kamel I, Albluwi Q.A robust software watermarking for copyright protection[J]. Computers and Security,2009,28(6):395-409.
    [30]Lipinski P. Watermarking software in practical applications[J]. Bulletin of the Polish Academy of Sciences:Technical Sciences,2011,59(1):21-25.
    [31]Y K Lee,L Chen.High Capacity Image Steganographic Model[C].IEE Proceedings Vision,Image and Signal Processing.Vol.147,Issue 3,June 2000:288-294.
    [32]Bender W, Butera W,Gruhl D,et al. Appliations for data hiding[J].IBM System Journal,2000,39 (3&4):547-568.
    [33]H Hirohisa.A data embedding method using BPCS principle with new complexity measures[C]. Proc.of Pacific Rim Workshop on Digital Steganography,Jul.2002:30-47.
    [34]K.Solanki, U.Madhow, B.S.Manjunath,S.Chandrasekaran,I.EI-Khalil. Print-scan resilient data hiding in imag[J].Information Forensics and Security,2006,1:464-478.
    [35]Yen-Chung Chiu, Wen-Hsiang Tsai.Copyright protection against print and scan operations by watermarking for color images using coding and synehronization of peak loeations in frequeney domain[J],Journal of Information Science and Engineering,2006:483-496.
    [36]黄继武,Y. Q. Shi等.DCT域图像水印:嵌入对策和算法.电子学报.2000,28(4):57-60
    [37]牛少彰,伍宏涛,谢正程等.抗打印扫描数字水印算法的鲁棒性[J].中山大学学报(自然科学版),2004,(43):14.
    [38]D.Kundur,D.Hatzinakos.A robust digital image watermarking methodusing wavelet based fusion[J].Proceedings of IEEE ICIP,1997,1:544-547.
    [39]A.A.Abdelwahab,L.A.Hassan. A discrete wavelet transform based technique for image data hiding in:Proceedings of 25th National Radio Science Conference, NRSC 2008:1-9.
    [40]Keskinarkaus Anja, Pramila Anu. Wavelet domain print-scan and JPEG resilient data hiding method [C]. Digital Watermarking,2006,4283:82-95.
    [41]Li L, Xu H.H, Chang C.C,et al. A novel image watermarking ing redistributed invariant wavelet domain[J]. Journal of Systems and Software,2011,84(6):923-929.
    [42]刘瑞祯,谭铁牛.基于奇异值分解的数字图像水印方法[J].电子学报,2001,29(2):168-171.
    [43]李旭东,张振跃.图像双层划分和奇异值分解的数字水印算法[J].浙江大学学报(工学版),2006,40(12):2088-2092.
    [44]Rajab L, Al-Khatib T, Al-Haj A.Hybrid DWT-SVD video watermarking[C].International Conference on Innovations in Infromation Technology,2008,12:588-592.
    [45]王也隽.信息隐藏技术及其军事应用[M].北京:国防工业出版社,2009.
    [46]翁韶伟.数字图像的高容量可逆水印的研究[D].北京:北京交通大学博士论文,2009.
    [47]武丹.可逆数字水印技术的研究[D].浙江:浙江大学博士论文,2009.
    [48]赵彦涛.可逆信息隐藏技术及其在鲁棒数字水印中的应用研究[D].秦皇岛:燕山大学博士论文,2010.
    [49]罗剑高.可逆图像水印及可逆图像认证技术研究[D].广州:华南理工大学博士论文,2011.
    [50]Rec.ITU-R BT.500-11, Methodology for the subjective assessment of the quality of television pictures[S].2002.
    [51]Barton J M.Method and apparatus for embedding authentication information within digital data[P].US:5646997,1997.
    [52]Honsinger C W,Jones P,Rabbani M,et al.Lossless recovery of an original image containing embedded data[P].US:6278791,2001.
    [53]Fridrich J,Goljan J,Du R.Invertible authentication[C].Proceedings of SPIE Security and Watermark-ing of Multimedia Content.2001:197-208.
    [54]Fridrich J.Goljan M,Du R.Invertible authentication watermark for JPEG images[C]. Proceedings of Information Technology:Coding and Computing,2001:223-227.
    [55]Fridrich J,Du R.Lossless authentication of MPEG-2 video[C].Proceedings of 2002 International Conference on Image Processing,2002:893-896.
    [56]Fridrich J,Goljan M,Du R.Lossless data embedding for all images formats[C]. Proceedings of SPIE Security and Watermarking of Multimedia Content,2002:572-583.
    [57]Goljan M.Fridrich J,Du R.Distortion-free data embedding for images[A].Proceedings of 4th Inform-ation Hiding Workshop[C],2001:27-41.
    [58]Celik M U,Sharma G.Tekalp A M,et al.Reversible data hiding[A].Proceedings of International Conference on Image Processing[C],2002,2:157-160.
    [59]Celik M U.Sharma G,Saber E,et al.Lossless generalized-LSB data embedding[J]. IEEE Transactions on Image Processing,2005,14(2):253-266.
    [60]Tian J.Reversible data embedding using a difference expansion [J].IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):890-896.
    [61]Alattar A.M.Reversible watermark using the difference expansion of a generalized integer transform [J].IEEE Transactions on Image Processing,2004,13(8):1147-1156.
    [62]Alattar A.M. Reversible watermark using differenceexpan-sion of quads [C]. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP'04),2004:377-380
    [63]Xuan G.R, Yang C.Y, Zhen Y.Z,et al.Reversible data hiding based on wavelet spread spectrum[J]. Proceedings of IEEE 6th Workshop on Multimedia Signal Processing,Siena,Italy,2004:211-214.
    [64]Xuan G.R, Yang C.Y, Zhen Y.Z,et al. Reversible data hiding using integer wavelet transform and companding technique[C]. Proceedings of International Workshop on Digital Watermarking,2004:115-124.
    [65]Kamstra L,Heijmans H.Reversible data embedding into images using wavelet techniques and sorting[J].IEEE Transactions on Image Processing,2005,14(12):2082-2090.
    [66]Chang Z, Kou W, Xu J. More compressible location map for reversible watermarking using expansion embedding [J].Electronies Letters,2007,43(24):1353-1354.
    [67]Chang Z, Kou W, Xu J. Erratum for 'More compressible location map for reversible watermarking using expansion embedding'[J].Electronics Letters,2008,44:389-389.
    [68]Weng S.W, Zhao Y. Reversible Watermarking Based on Invariability and Adjustment on Pixel Pairs[J]. IEEE Signal Proeessing Letters,2008,15:721-724.
    [69]Weng S.W, Zhao Y. Reversible Data Hiding using the companding technique and improved DE method[J].Circuits Systems and Signal Proeessing,Springer-Verlag,2008,27(2):229-245.
    [70]Thodi D M,Rodriguez J J. Prediction-error based reversilble wateramarking[C].Proceedings of 2004 International Conference on Image Processing,Genova,2004,3:1549-1552.
    [71]Thodi D M,Rodriguez J J.Expansion embedding techniques for reversible watermarking[J].IEEE Transactions on Image Processing,2007,16(3):721-730.
    [72]Hu Y.Lee H K,Li J.DE-based reversible data hiding with improved overflow location map[J].IEEE Transactions on Circuits and Systems for Video Technology,2009,19(2):250-260.
    [73]Coltuc D. Improved embedding for prediction-based reversible watermarking [J]. IEEE Transactions on information forensics and security,2011,6(3):873-882.
    [74]Coltuc D. Low distortion transform for reversible watermarking [J]. IEEE Transactions on Image Process,2012,21(1):412-417.
    [75]曾骁,陈真勇,陈明等.基于全方向预测与误差扩展的可逆数据隐藏[J].计算机研究与发展2011,47(9)1595-1603:
    [76]Lee C.F, Chen H.L. Embedding capacity raisingin reversible data hiding based on prediction of difference expansion[J]. The Journal of Systems and Software,2010,83:1864-1872.
    [77]Huang H.C, Chang F.C, Fang W.C. Reversible Data Hiding with Histogram-Based Difference Expansion for QR Code Applications[J]. IEEE Transactions on Consumer Electronics,2011,57(2): 779-787.
    [78]Qin C, Chang C.C, Liao L.T. An adaptive prediction-error expansion oriented reversible information hiding scheme [J]. Pattern Recognition Letters,2012,33:2166-2172.
    [79]Lee C.F, Chen H.L. Adjustable prediction-based reversible data hiding[J]. Digital Signal Processing.2012,22:941-953.
    [80]宋伟,侯建军,李赵红.一种基于块分类和差值扩展的可逆数据隐藏算法[J].中南大学学报(自然科学版),2011,42(3):693-702.
    [81]熊志勇,王江晴.基于单向差值扩展的彩色图像可逆数据隐藏.[J].光电子.激光,2010,21(12): 1849-1855.
    [82]熊志勇,王江晴.基于互补嵌入的彩色图像可逆数据隐藏[J].光电子.激光,2011,22(7):1085-1090.
    [83]Wang X, Li X,Yang B,et al.Efficient generalized integer transform for reversible watermarking[J]. IEEE Signal Processing Letter,2010,17(6):567-570.
    [84]Peng F, Li X.L, Yang B.Adaptive reversible data hiding scheme based on integer transform [J]. Signal Processing,2012,92:54-62.
    [85]Li X.L, Yang B, Zeng T.Y. Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection[J]. IEEE Transactions on Imge Processing,2011,20(12):3524-3533.
    [86]Li X.L, Li J, Li B, et al. High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion [J]. Signal Processing,2012,93(1):198-205.
    [87]Ni Z,Shi Y Q,Ansari N.Shi Y Q,Ansari N.Reversible data hiding[J]. IEEE Transactions on Circuits and Systems for Video Technology,2006.16(3):354-362.
    [88]高铁杠,顾巧论.一种大容量的图像可逆信息隐藏算法[J].光电子.激光,2008,19(5):663-666.
    [89]C.C.Lin, W.L.Tai, C.C.Chang. Multilevel reversible data hiding based on histogram modification of difference images [J]. Pattern Recognition,2008,41(12):3582-3591.
    [90]Tai W.L.Yeh C.M,Chang C.C. Reversible data hiding on histogram modification of pixel differences [J].IEEE Transactions on Circuits and Systems for Video Technology,2009,19(6):906-910.
    [91]Tsai P, Hu Y.C, Yeh H.L. Reversible image hiding scheme using predictive coding and histogram shifting [J].Signal Processing,2009,89(6):1129-1142.
    [92]Kim K.S, Lee M.J, Lee H.Y, et al. Reversible data hiding exploiting spatial correlation between sub-sampled images [J]. Pattern Recognition,2009,42(11):3083-3096.
    [93]Li Y.C, Yeh C.M,Chang C.C. Data hiding based on the similarity between neighboring pixels with reversibility [J].Digital Signal Processing,2010,20:1116-1128.
    [94]Luo H, Yu F.X, Chen H, et al. Reversible data hiding based on block median preservation [J]. Information Sciences,2011,181(2):308-328.
    [95]Yeo D.G, Lee H.Y, Kim B.M. High capacity reversible watermarking using differential histogram shifting and predicted error compensation [J] Journal of Electronic Imaging,2011.20(1):1-11.
    [96]Hong W,Chen T.S, Chang Y.P,et al. A high capacity reversible data hiding scheme using orthogonal projection and prediction error modificaition [J].Signal Processing,2010,9:2911-2922.
    [97]Hong W. Adaptive reversible data hiding method based on error energy control and histogram shifting [J].Optics Communicaitons,2012,285:101-108.
    [98]Feng G.R,Qian Z.X, Dai N.J. Reversible watermarking via extreme learning machine prediction [J].Neurocomputing,2012,82:62-68.
    [99]Lee C.F, Huang Y.L. An efficient image interpolation increasing payload in reversible data hiding [J]. Expert Systems with Applications,2012,39(8):6712-6719.
    [100]Ou B, Zhao Y, Ni R. Reversible watermarking using optional prediction error histogram modify-cation [J]. Neurocomputing,2012,93:67-76.
    [101]Luo L.X, Chen Z.Y, Chen M, et al. Reversible image watermarking using interpolation technique [J].IEEE Transactions on information forensics and security,2010,5(1):187-193.
    [102]Jung K.H, Yoo K.H. Data hiding method using image interpolation [J].Computer and Interfaces, 2009,31(2):465-470.
    [103]Lee C.F, Huang Y.L. An efficient image interpolation increasing payload in reversible data hiding [J].Expert Systems with Applications,2012,39:6712-6719.
    [104]Lin C.C, Hsueh N.L.A lossless data hiding scheme based on three-pixel block differences [J]. Pattern Recognition,2008,41:1415-1425.
    [105]Jung S.W, Ha L.T, Ko S.J. A new histogram modification based reversible data hiding algorithm considering the human visual system [J].IEEE Signal Processing Letters,2011,18(2):95-98.
    [106]Hong W. Rerversible data embedding for high quality iamges using interpolation and reference pixel distribution mechanism [J]. J.Vis.Commun.Image R.2011(22):131-140.
    [107]Chung K.L, Huang Y.H, Yan W.M, et al. Distortion reduction for histogram modification-based reversible data hiding [J]. Applied Mathematics and Computation,2012,218(9):5819-5826.
    [108]Lin Y.K.High capacity reversible data hiding scheme based upon discrete cosine transformation [J].The Journal of Systems and Software,2012,85:2395-2404.
    [109]王俊祥,倪江群,潘金伟.一种基于直方图平移的高性能可逆水印算法[J].自动化学报,2012,38(1):88-96.
    [110]De V.C, Delaigle J.F,Macq B.Circular interpretation of bijective ransformations in lossless watermarking for media asset management[J]. IEEE Transactions on Multimedia,2003,5(1):97-105.
    [111]Ni Z.C, Shi Y.Q, Ansari N,et al.Robust lossless image data hiding[J].IEEE Int. Conf. on Multimedia and Expo,2004,3(6):2199-2202.
    [112]Ni Z.C, Shi Y.Q, Ansari N,et al. Robust lossless image data hiding designed for semi-fragile iamge authentication[J].IEEE Transactions on Circuits and Systems for Video Technology,2008,18(4):497-508.
    [113]Zeng X.T, Ping L.D,Pan X.Z. A lossless robust data hiding scheme[J].Pattern Recognition,2010,43 :1656-1667.
    [114]Gu Q.L, Gao T.G. A novel reversible robust watermarking algorithm based on chaotic system[J]. Digital Signal Processing,2013,23:213-217.
    [115]Chang C C,Kieu T D,Chou Y C.Reversible information hiding for VQ indices based on locally adpative coding[J].Journal of Visual Communication and Image Representation,2009,20(1):57-64.
    [116]Wang Z.H,Chang C.C,Chen K.N,et al. A modification of VQ index table for data embedding and lossless hidices reeovery[J].Journal of Computers,2010,20(4):42-52.
    [117]程永强,谢克明.图像插值和压缩算法原理及应用[M].北京:机械工业出版社,2010.
    [118]Zhang L, Wu X.L. An edge-guided inage interpolation algorithm via directional filtering and data fusion[J]. IEEE Trans. Image Processing,2006,15(8):2226-2238.
    [119]Fu M.S, Au O.C. Data hiding watermarking for halftone images[J].IEEE Trans.Image Process, 2002,11(4):477-484.
    [120]Lee Y, Hur J, Kim H,et al. A new binary iamge authentication scheme with small distortion and low false negative rates[J]. IEICE Transactions on Communications 2007, E90-B (11):3259-3261.
    [121]Pei S.C, Guo J. M. Hybrid pixel-based data hiding and block-based watermarking for error-diffused halftone images[J]. IEEE Transactions on Circuits and Systems for Video Technology,2003,13 (8):867-884.
    [122]Tseng Y.C, Chen Y.Y, Pan H.K. A secure data hiding scheme for binary images[J]. IEEE Trans. Communications,2002,50(8):1227-1231.
    [123]Wu M, Liu B. Data hiding in binary image for authentication and annotation[J]. IEEE Transactions on multimedia,2004,6(4):528-538.
    [124]Yang H, Kot A.C. Pattern-based data hiding for binary image authentication by connectivity pres-serving[J]. IEEE Transactions on Multimedia,2007,9(3):475-486.
    [125]Lee Y, Kim H, Park Y. A new data hiding scheme for binary image authentication with small image distortion[J].Infarmation Sciences,2009,179:3866-3884.
    [126]Lu H, Kot A.C. Distance-reciprocal distortion measure for binary document images[J]. IEEE Signal Processing Letters,2004,11 (2):228-231.
    [127]Brassil J. K, Low S, Maxemchuk N.F,et al. Electronic marking andidentificationtechniquesto discourage document copying[J]. IEEE J. Select. Areas Commun.,1995,13(8):1495-1504.
    [128]Wang C.C, Hwang Y.T, Chang C.C,et al. Hiding Information in Binary Images with Complete Reversibility and High Embedding Capacity[J]. International Journal of Innovative Computing, Infor-mation and Control, vol.2010,6(12).
    [129]Wang Z.H, Chang C.C, Lin C.C,et al. A reversible information hiding scheme using left-right and up-down chinese character representation[J].The Journal of Systems and Software,2009,82(8):1362-1369.
    [130]Jiang M.F. A high-capacity lossless data hiding scheme for binary images[J]. International Journal of Digital Content Technology and its Applications,2011,5(11):43-50.
    [131]Ho Y.A, Chan Y.K, Wu H.C, et al. High-capacity reversible data hiding in binary iamges using pattern substitution[J]. Computer Standards & Interfaces,2009(21):787-794.
    [132]童学峰,侯海峰,宣国荣等.基于直方图对二值图像无损数据隐藏算法的改进[J].同济大学学报(自然科学版),2011,39(1):115-120.
    [133]Wandell B.A. Foundations of Vision, Sinauer Associates Inc.,Stamford,1995.
    [134]Campbell F.W. The human eye as an optical filter[J]. Proceeding of the IEEE,1968,56(6):1009-1014.
    [135]Legge G.E, Foley J.M. Contrast masking in human vision[J]. Journal of the Optical Society of America,1980,70(12):1458-1471.
    [136]Wang Z, Wu G, Sheikh H.R. Quality-aware images[J]. IEEE Transactions of Image Processing, 2006,15(6):1680-1689.
    [137]丁玮,齐东旭.数字图像变换及信息隐藏与伪装技术[J].计算机学报,1998,21(9):838-842.
    [138]丁玮,闫伟齐等.基于Arnold变换的数字图像置乱技术[J].计算机辅助设计与图形学学报,2001.13(4):338-341
    [139]牛夏牧,陆哲明等.彩色数字水印嵌入技术[J].电子学报.2000,28(9):10-12.
    [140]孙圣和,陆哲明.数字水印技术及应用[M].北京:科学出版社,2004.
    [141]Bender.W, Gruhl.D. Techniques for data hiding[J]. IBM System Journal,1996,35(3&4):313-336.
    [142]王颖,肖俊,王蕴红.数字水印原理与技术[M].北京:科学出版社,2007.
    [143]S.Voloshynovskiy, S.Pereira, V.Iquise,et al. Attack modeling:towards a second generation watermarking benchmark[J]. Signal Processing,2001,81(6):1177-1214.
    [144]Asifullah K, Syed F.T, Abdul M, et al. Machine learning based adaptive watermark decoding in view of anticipated attack[J]. Pattern Recognition,2008,41(8):2594-2610.
    [145]http://watermarking.unige.ch/checkmark/
    [146]冈萨雷斯.数字图像处理(第三版)[M].北京:电子工业出版社,2011.
    [147]何斌,马天予,王运坚等.Visual C++数字图像处理.北京:人民邮电出版社,2001.
    [148]曾高荣.数字水印的鲁棒性评测建模和算法研究[D].北京:北京交通大学博士论文,2010.
    [149]冈萨雷斯.数字图像处理(MATLAB版)[M].北京:电子工业出版社,2005.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700