鲁棒图像多目数字水印技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数字水印是一种保护数字材料版权的方案。自从上个世纪90年代以来,越来越多的人工作在这个充满趣味、挑战和机会的研究领域。在本论文中,引入了LCNN(Lagrange约束神经网络)方法,模仿哺乳动物双眼系统比单眼更清晰的观测过程,以期获得更清晰的数字水印。
     经典LCNN(CLCNN)效率低,容易碰到“病态”矩阵问题。本文仔细研究了LCNN的学习矩阵的逼近过程,发现了Lagrange约束入与有监督学习目标min(As-X)之间的关系,引入x的逼近加速度替换入病态学习逼近的方案,更彻底地阐述了大脑有监督学习和无监督学习的“你中有我、我中有你”的关系。正是通过对这种并行学习的认识,本文提出了4类自适应LCNN(ALCNN)快速算法,为欠定稀疏分析(m<n)和超超定(m>>n)分析的快速、并行实现,提供了新的思路和解决办法。
     本文在讨论多种主流数字水印技术(基于小波和基于独立成分)的基础上,自主设计了2种小波域自适应水印嵌入方案,一种是二值鲁棒水印,一种是鲁棒灰度水印。进一步,利用LCNN和双正交的小波基,设计了一个多分辨率子带分解与独立成分分析融合(MSD-ICA)的灰度数字水印嵌入方案,实验表明,对于较高强度的噪声、压缩等攻击,它的提取精度提高到90%以上,这对受环境影响较大的弱图像和弱水印的提取和验证是非常有用的。最后,针对安全中间件技术在电子政务印章系统中的应用项目,本文设计了一个基于双脆弱水印的电子印章公文保护方案,并申请了发明专利。
     在创新方面,归纳如下:
     (1)提出了一种根据宿主信号亮度变化自适应调整嵌入参数的灰度水印算法:针对灰度水印,自动调整插入和提取乘法系数。该算法对灰度水印和Cox的乘法、加法嵌入规则是有效的。能抗击水印游戏竞技中的较恶劣噪声、JPEG压缩等攻击。实际上,该算法对于一些背景亮度敏感的图片,效果也不错。相关内容发表在[134]。
     (2)提出了一种根据二值水印关键点的自适应调整的鲁棒参考水印算法:对著名的鲁棒参考水印算法(RRW)进行分析,针对其对纹理平滑部分的不适应的缺陷,提出了根据二值水印边界的关键点来选择不同长度网格(Grid)的量化指数算法,实验表明在所考虑的情况下该算法优于RRW算法,适应面更广。相关内容已经发表在[135][136]。
     (3)提出了4种快速、高效的自适应Lagrange约束神经网络(ALCNN)算法:重新认识了Lagrange函数约束项系数入的物理意义——有监督学习的加速度。所设计的4种算法的学习矩阵收敛都是O(n),其中自适应调整λ算法的独立成分求解复杂度也是O(n),使它具有更广阔的应用空间,并奠定了ICA大规模并行处理的基础;其它3种算法的独立成分求解复杂度都是O(n~2),可以利用它们学习矩阵收敛的优势,在识别、追踪方面发挥作用。而带检验的ALCNN算法,则充分发挥了无监督学习、有监督学习的融合优势。这些工作经过总结,已递交到“电子科技大学学报”上。
     (4)设计了基于双脆弱水印的电子印章公文保护算法:将文档Hash值作为水印数据嵌入到电子印章里,加盖到电子文档中,使电子印章与文档相关联,以保护水印-文档的唯一性,具有数字签名性质。电子印章在单独存放时,用单位的标识作为脆弱水印嵌入,以保证印章的完整性。上述工作成果已集成到安全中间件体系架构中,并在“电子政务安全服务平台”项目中获得了应用。相关内容已经申请发明专利。专利申请号:200510021291.3,公开号:1725244。
     (5)提出了基于LCNN和小波技术嵌入灰度水印到彩色宿主图像的算法。使用LCNN的ICA技术,将灰度水印嵌入到彩色图像中。该方案对弱水印的提取效果较好,在好的不可感知性(高PSNR)的情况下,能获得较好的水印相似性NC。相关内容已经发表在[226][227]。
Digital watermarking is one solution to protect copyright of digital materials. Since 1990s, more and more people focused on this interesting, full of challenges and opportunities field. In this dissertation, LCNN(Lagrange Constraints Neural Network) was introduced to imitate 2-eye system of mammals for getting the clearer watermarks in a noised environment.
     Classical LCNN(CLCNN) fell short of lower effective and ill-conditioned matrix. In this dissertation, LCNN was carefully investigated to learn the approximate procedure of the learning matrix, and found out the relationship between Lagrange constraintλand supervised learning target min(As-x), so the approximate acceleration of x,which is a supervised learning gradient,was supposed to replaceλwhich should be obtained by an unsupervised method, and the relationship——"And and Or Logistic"——between supervised and unsupervised learning, was depicted more deeply. Based on this kind of parallel learning, 4 types of Adaptive LCNN(ALCNN) algorithm were discovered, new idea and solution were emerged for quick and parallel analysis of underdetermined and overdetermined matrices.
     Several mainstream watermarking technologies,which are based on wavelet and independent components, were discussed, and 2 adaptive embedding solutions were designed, one is a robust 2-value watermarking, and another is a robust grey watermarking. Furthermore, based on the fusion of multiple resolutions subband decomposition and LCNN independent components, LCNN and biorthogonal wavelet basis were employed for a grey watermarking.The test results showed that the decoding accuracy had been improved to over 90% for higher noise, compression, etc. attacks. This is very useful to the extract and verification of weak watermarked image or weak watermarks, which will be varied with the environment. At the end of dissertation, a double-fragile-watermark solution was proposed in a security middleware project of E-government sealing system for protecting the documents with an electronic seal and an invented patent has been hold on this achievement.
     Innovations of this dissertation were depicted as follows:
     (1) Proposing a grey watermarking algorithm with adaptively adjusting embedded references, according to the luminance of host image, and has been published in a paper [134].
     (2) Proposing an adaptive robust reference watermarking(RRW) algorithm based on on the keypoints of 2-value watermarks.According to the shortages the famous RRW for texture smooth, the solution based on the keypoints, which were the edges of 2-value watermarks, was proposed. The relevant QIM can be chosed from different scale grid with the keypoints and achieve a better result than that standard RRW in some experiments. This achievements have been published in papers [135][136]
     (3) Proposing 4-type rapid, effective ALCNN Algorithms. The coefficientλof Lagrange function constraints was re-known as an acceleration of that supervised learning, and 4-type of adaptive LCNN algorithm were designed. We proved that all learning matrices of the 4-type algorithm converged in O(n) time, and the adaptiveλlearning algorithm converged also in O(n) for solving independent components(IC), which means this algorithm will be used in wider applications and lays the foundation for parellel ICA, and the rests(the other 3 types of algorithm) converged in O(n2) for ICs, which can be used in the recognition,and tracing, while the algorithm of ALCNNs with checking showed the advances of fusing the unsupervised and supervised learning. All works of the achievements have been in the paper submitted to "Journal of the University of Electronic Science and Technology of China".
     (4) A double-fragile-watermarking algorithm for protecting electronic documents with electronic seals was designed. The Hash value of the document was used as watermarks to embed into an electronic seal and then the seal was stamped over the document. This process combined the seal with the document and guarrented the uniqueness of the pair of watermark-document, with the characteristic of digital signature. When the electronic seal was stored standalone, the tag of unit can be embedded as a fragile watermark in order to assure the integration of the seal. This achievement has been integrated into security middleware architecture and used in the project "Secure Service Platform of E-government", now, a patent has been applied with the application number 200510021291.3, and publication NO.1725244.
     (5) Based on LCNN and wavelet, a solution with embedding the grey watermarks into color host image was designed: this solution was particularly useful to extract the weak watermarks, and the good comparability(NC) between original and estimative watermarks can be obtained when the imperception is higher(higher PSNR). This achievement has been published in papers.
引文
[1]Petitcolas, F.A.P., Anderson, R.J.Kuhn, M.G., Information Hiding-A Survey, Proceeding of the IEEE, July 1999, 87(7):1062-1078
    [2]Petitcolas, C.I., Delp, E.J., Digital Watermarking: Algorithms and Applications, IEEE Signal Processing Magazine, July 2001, 18(4): 33-46
    [3]Wu, M., Liu, B., Data Hiding in Image and Video. Ⅰ. Fundamental Issues and Solutions, IEEE Trans. On Image Processing, June 2003,12(6): 685-695
    [4]Tewfik, A.H., Swanson, M., Data Hiding for Multimedia Personalization, Interraction, and Protection, Signal Processing. Magazine, IEEE, July. 1997, 14(4): 41-44
    [5]Anderson, R.J., Petitcolas, F.A.P., On the Limits of Steganography, IEEE Journal on Selected Areas in Communications, May 1998,16(4): 474-481
    [6]Marvel, L.M., Boncelet,V.G., Retter, C.T., Spread Spectrum Image Steganography, IEEE Trans. On Image Processing, Aug. 1999, 8(8): 1075-1083
    [7]Provos N, Honeyman P. Dectecting Steganographic Content on the Internet. In Proceedings of Network and Distributed System Security Symposium. San Diego, CA,2002
    [8]Kelley J. Terrorist Instructions Hidden Online. USA Today, 2001
    [9]佘堃,周明天,安全中间件核心——公共安全服务,小型与微型计算机系统,2003,24(7):1190-1193
    [10]佘垄,杨四铭,周明天,一种多媒体服务器混合缓存策略,小型与微型计算机系统,2005.1,24(7):143-146
    [11]佘垄,黄均才,周明天,用动态扣分策略消除序列局部联配中的马赛克问题,计算机科学,2003.11,30(11):44—47
    [12]Cox I J, Miller M. L. The first 50 years of electronic watermarking, EURASP J. of Applied Signal Processing, 2002.2: 126-132
    [13]Tirkel A Z, et al, Electronic watermark, Digital image computing, Technology and Applications, 1993, Macquarie University, 1:666-673
    [14]SchyndelRGvan, Tirkel A Z, Obsborne C F, Adigital watermark, First 1EEE International Image Processing Conference, 1994, 2:86-90
    [15]王塑中,张新鹏,张开文,数字密写和密写分析,清华大学出版社,2005
    [16] D. Delannay, B. Macq and M. Barlaud, Compensation of geometrical deformations for watermark extraction in the digital cinema application, SPIE Electronic Imaging 2001, Security and watermarking of multimedia contents III, San Jose, CA, January, 2001, p: 22-25
    
    [17] S. Voloshynovskiy, F. Deguillaume and T. Pun, Multibit digital watermarking robust against local nonlinear geometrical distortions, IEEE International Conference on Image Processing, ICIP2001, Thessaloniki, Greece, 2001, p: 999-1002
    
    [18] Petitcolas EA.P., R.J. Anderson and M.G. Kuhn, Attacks on copyright marking systems, Proc. 2nd International Workshop on Information Hiding, Portland, OR, Apr. 1998, p:15-17
    
    [19] F. Hartung, J.K. Su and B. Girod, Spread spectrum watermarking: Malicious attacks and counter-attacks, Proc. SPIE: Security and Watermarking of Multimedia Contents, January 1999, Vol. 3657:147-158
    
    [20] F.Deguillaume, S. Voloshynovskiy and T. Pun, Method for the estimation and recovering from general affine transforms in digital watermarking applications, SPIE phtonics West, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, CA, January 2002, p:20-24
    
    [21] M. K. Mihcak and R. Venkatesan, New iterative geogemtric methods for robust perceptual image hashing, Proceedings of ACM Workshop on Security and Privacy in Digital Rights Management, Philadelphia, Pa, November 2001
    
    [22] LB. Ozer, M. Ramkumar and A.N.Akansu, A new method for detection of watermarks in geometrically distorted images, Proc. IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP'00), Istanbul, Turkey, June 2000
    
    [23] Lisa Gottesfeld Brown, A survey of image registration techniques, ACM Computing Surveys, 1992, 24(4): 325-376
    
    [24] J.L. Dugelay and F.A.P Petitcolas, Image watermarking: possible counterattacks against random geometric distortions, Proceedings of SPIE Vol. 3917, Security and Watermarking of Multimedia Contents II, San Jose, CA, January 2000, Vol.3971:24-26
    
    [25] N.F Johnson, Z. Duric and S. Jajodia, Recovery of watermarks from distorted images, Proc. 3rd International Workshop on Information Hiding, 1999, p:361-375
    
    [26] C.Y.Lin, M.Wu, J.A.Bloom, IJ.Cox, M.L.Miller and Y.M.Lui, Rotation,scale and translation resilient watermarking of images, IEEE Trans. On Image Processing, May 2001,10(5): 767-782
    
    [27] J.J.K. O Ruanaidh and T.Pun, Rotation, scal and translation invariant spread spectrum digital image watermarking, Signal Processing, Nov. 1998,66(3): 303-317
    [28] V.Solachidis and I.Pitas, Circularly symmetric watermark embedding in 2-d domain, Proc. IEEEE int. Conf. on Acoustics,Speech and Signal Processing (ICASSP'99), Phoenix, 1999, Vol.6: 3469-3472
    
    [29] P.Loo and N.G.Kingsbury, Watermarking using complex wavelets with resistance to geometric distortion, Proc. EUSIPCO 2000,Tampere,Finland, Sept. 2000
    
    [30] P.Loo and N.G.Kingsbury, Motion estimation based registration of geometrically distorted images for watermark, Proc. SPIE Conference on Security and Watermarking of Multimedia Contents III, San Diego, CA,Jan. 2001
    
    [31] M.Barni, F.Bartolini, R.Caldelli and A.Piva, Geometric-invariant robust watermarking through constellation matching in the frequency domain, 7th IEEE International Conference on Image Processing(ICIP 2000), Vancouver, Canada, Sept. 2000, vol.II:65-68
    
    [32] M. Alghoniemy and A.H.Tewfik, Geometric distortions correction in image watermarking, Proc. SPIE on Security and Watermarking of Multimedia Contents II, San Jose,CA,USA, 2000, vol. 3971
    
    [33] D.J.Fleet and D.J.Heger, Embedding invisible information in color images, Proc. IEEE International conference on ImageProcessing (ICIP'97), SantaBarbara, CA, 1997, vol.1: 532-465
    
    [34] S.Pereira and T. Pun, Fast Robust template matching for affine resistant image watermarks, Proc. 3rd International Workshop on Information Hiding, 1999, Vol. LNCS(1768):207-218
    
    [35] A.Piva,M.Barni,F.Bartolini,V.Cappellini,A.De Rosa and M.Orlandi, Improving watermarking robustness through optimum detection and synchronization, GMD Report 85, Multimedia and Security Workshop at ACM Multimedia ' 99, Orlando,USA,October 1999, p: 65-69
    
    [36] S.Pereira, J.J.K O Ruanaidh, F.Deguillaume, GCsurka and Thierry Pun, Template based recovery of fourier-based watermarks using log-polar and log-log maps, IEEE Multimedia Systems 99, International Conference on Multimedia Computing and Systems, Florence, Italy, 7-11 June 1999, Vol.1: 870-874
    
    [37] S.Pereira and T.Pun, An iterative template matching algorithm using the chirp-z transform for digital image watermarking, Pattern Recognition, Jan. 2000, 33(1): 173-175
    
    [38] V.Licks and RJordan, On digital Image Watermarking robust to Geometric transformations, Proc. IEEE International Conference on Image Processing(ICIP'00), Vancouver, 2000, vol. 3:690-693
    
    [39] A.Herrigel, S. Voloshynovskiy and Y.Rytsar, The watermark template attack, SPIE Photonics West, Electronic Imaging 2001, Security and Watermarking of Multimedia Contents III, W. Wong and E.J. Delp, Eds., San Jose, CA,USA,Jan. 2001, p: 4314-4346
    
    [40] D.Delannay and B.Macq, A method for hiding synchronization marks in scale and rotation resilient watermarking schemes, SPIE Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, CA, USA, Feb. 2002
    
    [41] M.Kutter, Watermarking resisting to translation, rotation and scaling, Proc. SPIE Multimedia Systems and Applications, 1999, Vol. 3528: 423-431
    
    [42] D.Delannay and B.Macq, Generalized 2-d cyclic patterns for secret watermark generation, ICIP 2000 - IEEE Signal Processing Society International Conference on Image Procesing, Vancouver, Canada, September 10-13 2000, Vol. II: 72-79
    
    [43] F.Deguillaume S. Voloshynovskiy and T.Pun, Content adaptive watermarking based on a stochastic multiresolution image modeling, 10th European Signal Processing Conference(EUSIPCO'2000), Tampere, Finland, Sep. 5-8 2000
    
    [44] P.Bas,J.M.Chassery, and B. Macq, Robust watermarking based on the warping of pre-defined triangular patterns, Proc. SPIE, January 2000
    
    [45] P.Bas,J.M.Chassery, and F.Davoine, A Geometrical and Frequential Watermaking Scheme Using Similarities, EI'1999: Security and Watermarking of Multimedia Content I, San Jose, CA, January 1999, p: 264-272
    
    [46] P.Bas,J.M.Chassery, and B. Macq, Geometrically invariant watermarking using feature point, IEEE Trans. On Image Processing,, Sept. 2002,11(9):1014-1028
    
    [47] M.Celik, E. Saber,G.Sharma and A.M/Tekalp, Analysis of feature-based geometry invariant watermarking, Proc. Of SPIE: Security and Watermarking of Multimedia Contents III, January 2001, vol. 4314
    
    [48] MJ.Maes and C.W. van Overveld, Digital watermarking by geometric warping, Proc. IEEE Int. Conf. Image Processing, 1998, vol.2: 424-426
    
    [49] P.M.J. Rongen, M.J.J.J.B.Maes and C.W.A.M. van Overfeld, Digital image watermarking by salient point modification practical result, Proc. Of SPIE, 1999, vol. 3657: 273-282
    
    [50] R.Bauml, JJ.Eggers and J.Huber, A channel model for watermarks subject to desynchronizetion attacks, Proc. 4th International ITG Conference on Source and Channel Coding, Berlin, Germany, January 28-30 2002
    
    [51] V.Licks, F. Ourique, F.Perez-Gonzalez and RJordan, The effect of the random jitter attack on the bit error rate performance of spatial domain image watermarking, Proc. Of the IEEE Int. Conf. Image Processing(ICIP 2003), Barcelona, Spain, Sept. 2003, vol.2: 455-458
    [52]S.Baudry, P.Nguyen and H.Maitre, A soft decoding algorithm for watermark subjects to a jitter attack, Proc. 46th SPIE Annual Meeting, San Diego, CA, USA, July 2001
    [53]P.Moulin,A.Briassouli and H.Malvar, Detection-theoretic analysis of desynchronization attacks in watermarking, Proc. 14th Int. conf. on DSP(DSP'02), Santorini, Greece, July 2002
    [54]A.Briassouli and P.Moulin, Detection-theoretic analysis of warping attacks in spread-spectrum watermarking, IEEE Proc. ICASSP, Hong Kong, April 2003
    [55]S.Baudry, P.Nguyen and H.Maitre, Some theoretical bounds on the capacity of watermarking channels with geometric distorsions, Proc. IEEE International Conference on Image Processing(ICIP'01), Thessaloniki, Greece, October 2001, vol.3:995-998
    [56]M.Alvarez-Rodriguez and F.Perez-Gonzalez, Analysis of pilot-based synchronization algorithms for watermarking of still images, Signal Processing: Image Communication,, Sept. 2002,17(8): 633-661
    [57]凌贺飞,卢正鼎,邹复好,李瑞轩,基于Watson视觉感知模型的能量调制水印算法,软件学报,May 2006,17(5):1124-1132
    [58]Szu H, Hsu C. Blind De-Mixing with Unknow Sources, Proceedings of International Conference on Neural Networks, Houston, 1997, p: 2518-2523
    [59]Szu H, Progresses In Unsupervised Artificial Neural Networks of Blind Image Demixing, New Tech of IEEE Ind, Elec. Soc. Newsletter, 1999, p:7-12
    [60]She Kun, Wu Yuancheng, Zhou Mingtian, Consistence of Network Filtering Rules, Journal of Electronic Science and Technology of China, 2004.1, p: 38-42
    [61]佘堃,牛新征,周明天,证书系统缓存替换算法的研究,计算机科学,2004.2,30(11):89—92
    [62]刘振华,尹萍著.信息隐蔽技术及其应用.第一版,北京:科学出版社,2002.
    [63]钮心忻著.信息隐藏与数字水印.第一版,北京邮电大学出版社,2004.
    [64]王炳锡,陈琦,邓峰森,数字水印技术,西安电子科技大学出版社,2003
    [65]孙圣和,陆哲明,牛夏牧著.数字水印技术及应用.第一版,科学出版社,2004
    [66]Voyatzis G.Pitas I. The use of watermarks in the protection of digital multimedia products, Proceedings of IEEE, 1999, 87(7): 1197-1207
    [67]M. Barni, F. Bartolini, V. Cappellini, and A. Piva. A DCT-domain system for robust image watermarking, in Processing[J], 1998,Vol.66:357-372.
    [68]Hongmei Liu, Jiufen Liu, Jiwu Huang, Daren Huang, Y.Q.Shi. A robust DWT-based blind data hiding algorithm. IEEE International Symposium on Circuits and Systems, 2002, Vol. 2:672-675.
    [69]Cox I J, Linnartz J P, Some General Methods for Tampering with Watermarking, IEEE Journal on Selected Areas of Communication, 1998,16(4):587-593
    [70]Maes M, Twin Peaks, The Histogram Attack on Fixed Depth Image Watermarks, In Second workshop on information hiding, 1998, Portland OR, Springer Lecture Notes in Computer Science 1525, p:290-305
    [71]Langelaar G C, Lagendijk R L, Biemond J, Romoving spatial spread spectrum watermarks by non-linear filtering, EUSIPCO'98,1998.4, p:2281-2284
    [72]Kutter M, Petitcolas F.A.P. A fair benchmark for image watermarking systems, in Proceeding of SPIE: Security and Watermarking of Multimedia Contents, Jan.1999, p:226-237.
    [73]Seungwon Shin, Oanjin Kim,Jongweon Kim,Jonguk Choil. A robust audio watermarking algorithm using pitch scaling. 2002 14th International Conference on Digital Signal Processing,2002, Vol.2:701-704
    [74]Cox I. J., Killian J., and Leighton T, et al. Secure spread spectrum watermarking for multimedia. IEEE Trans. on Image Processing, 1997,(12): 1673-1687.
    [75]Fleet D, Heeger D, Embedding invisible information in color images, Proceedings IEEE International Conference on Image Processing, 1977, p: 532-465
    [76]Craver S,et al, On the invertibility of invisible watermarking techniques, Proceedings IEEE international conference image processing, 1997, p: 540-543
    [77]Kutter M, Voloshynovskiy S, Herrigel A, The Watermark Copy Attack, Proceedings of SPIE:Security and Watermarking of Multimedia Contents Ⅱ, 2000, San Jose California, p: 358-370
    [78]Voloshynovskiy S,et al, Attacks on digital watermarks: classification, estimation based attacks,and benchmarks. IEEE Communications Magazine, 2001, 39(8): 118-126
    [79]刘世栋,杨林,王建新.信息隐蔽原理及数字水印技术的若干问题和趋势,计算机工程及应用,2003,No.12:158-160.
    [80]汪保友,王俊杰,胡运发.数字水印与版权保护[J].计算机应用与软件,2004,21(1):30-32.
    [81]华先胜,石青云.易损数字水印若干问题的研究[J].中国图像图形学报,2001,6(A)(11):1089-1095.
    [82]侯振华,陈生潭.脆弱性数字水印研究[J].计算机应用,2003,Vol.23:106-108.
    [83]张静,张春田.用于JPEG2000图像认证的半脆弱性水印算法.电子学报,2004,32(1):157-160.
    [84]胡昌华,张军波等,基于Matlab的系统分析与设计——小波分析,西安电子科技大学出版社,1999.12
    [85]Grossman A, Morlet J., Decomposition of Hardy Functions into Square Integrable Wavelets of Constant Shape, SIAM J.Appl.Math., 1984,(15):723-736
    [86]Mallat S, A Theory for Multiresolution Signal Decomposition: The Wavelet Representation, IEEE Transaction, Pattern Analysis and machine Intelligence, 1989, p: 674-693
    [87]飞思科技产品研发中心,小波分析理论与MATLAB7实现,电子工业出版社,2005.3
    [88]Daubechies I, Orthogonal Bases of Compactly Supported Wavelets, Communication, on Pure and Application Math., 1988, Vol. 41:909-996
    [89]Daubechies I., Ten Lectures on Wavelets, Society for Industrial and Applied Mathematics,1992
    [90]Stephane Mallat著,杨力华,戴道清等译.信号处理的小波导引.机械工业出版社,2002.9.
    [91]孙延奎,小波分析及其应用.机械工业出版社,2005.3
    [92]Ho, K.C.; Chan, Y.T., Filter design and comparison for two fast CWT algorithms, IEEE Transactions on Acoustics, Speech, and Signal Processing, Vol. 47, Issue 11, Nov 1999, p:3013-3026
    [93]M. J. Shensa. The discrete wavelet transform: wedding the a trous and Mallat algorithms. IEEE Trans. Inform. Theory, 40, 1992, p:2464-2482.
    [94]C.S. Lu, S. K. Huang, C. J. Sze, and H. Y. M. Liao: Cocktail watermarking for digital image protection. IEEE Transactions Multimedia, Volume 2,, Dec. 2000. p: 209-224
    [95]Sweldens W. The lifting scheme:A custom-design construction of biorthogonal wavelets.Appl.Comut.Harmon.Appl., 1996,3(2):186-200
    [96]Sweldens W., Schroder P. Building your own wavelets at home. Wavelets in Computer Graphics, ACM SIGGRAPH Course Notes, 1996:15-87
    [97]Sweldens W. The lifting scheme: A construction of second generation wavelets. SIAM J. Math.Anal., 1997, 29(2):511-546
    [98]Daubechies I, Sweldens W., Factoring Wavelet Transforms into Lifting Steps, Journal of Analysis and Applications, 4(3), 1998, p: 247-269
    [99]Pereira S, Voloshynovskiy S, Pun T. Optimized Wavelet Domain Watermark Embedding Strategy Using Linear Programming, In proceedings of SPIE AeroSense, April 2000, Orlando, USA,Wavelet Applications Ⅶ, p: 26-28
    [100]周亚训,叶庆卫,徐铁锋,基于小波和余弦变换组合的图像水印方案,电子学报,2001,29(12):1693-1695
    [101]Tsekeridon S, Pitas I, Embedding Self-similar Watermarks in The Wavelet Domain, IEEE International Conference on Accoustics, Systems and Signal Processing, 2000, p:1967-1970
    [102]Kunder D. Improved Digital Watermarking through Diversity and Attack Characterization, Proceedings Workshop on Multimedia Security at ACM Multimedia'99, 1999, p:53-58
    [103]周四清,余英林,基于多分辨率和HVS的盲图像水印隐藏方法,计算机工程与应用,2001,Vol(13):71—72
    [104]Wang H J, Kuo C J. An Integrated Approach to Embedded Image Coding and Watermarking, Proceedings of the IEEE ICIP'98, 1998
    [105]Su O C, Wang H J, Kuo C J. Digital Watermarking on EBCOT Compressed Images,SPIE's 44th Annual Meeting Applications of Digital Image Processing ⅩⅫ(SD41), 1999
    [106]刘九芬,黄达人,胡军全,数字水印中的双正交小波基,中山大学学报,2002.7
    [107]M. Eskicioglu and J. Delp: An overview of multimedia content protection in consumer electronics devices. Signal Processing Image Communication, 2001, p: 681-699.
    [108]郭峰,张春田,应用于版权保护的视频数字水印,数字视频 2001.6,p:21—23
    [109]林刚,刘泽民,一种新的可扩展小波视频编码方法,高技术通讯,1999.5
    [110]黄达人,刘九芬,黄继武,小波变换域图像水印嵌入和对策算法,软件学报,2002,Vol.13:7
    [111]Cox, J. Kilian, T. Leighton,T. Shamoon.. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing. 1997, 6(12):1673-1687.
    [112]张冉,陈向东.一种基于小波变换的灰度数字水印嵌入技术,通信学报,2004,25(2):124—130。
    [113]Rafael C. Gonzalez, Richard E. Woods. Digital Image Processing, Second Edition,Publishing House of Electronic Industry, 2002.
    [114]C I Podilchuk, W Zeng. Image-Adaptive Watermarking Using Visual Model, IEEE Journal of Select Areas of Communication, 1998, 16(4):525-539.
    [115]汪小帆,信息隐藏技术:方法与应用,机械工业出版社,2001.
    [116]C.J.Hsu, J.L.Wu.Hidden Signatures in Images[P].IC IP-1996, 223~226
    [117]A.G.Bors, I.Pitas.Embedding Parametric Digital Signatures in Images. EUSIPCO'96,Trieste, Italy, Sep., 1996, 1701-1704.
    [118]J.Cox.Secure Spread Spectrum Watermarking for Multimedia.IEEE Transon Image Processing, 1997, 6(2):673-1687.
    [119]Houng-Jyh Mike Wang and C.-C. Jay Kuo.An integrated progressive image coding and watermark system. IEEE Speech and Signal Processing, Seattle, Washington, May, 1998, 12-15.
    [120]X. Xia, C.G.Boncelet, and GR Arce.A Multiresolution Watermark for Digital Images[J].Proc. of IEEE ICIP, Santa Barbara, CA, USA, Oct. 1997. 548-551.
    [121]Rakesh Dugad, K.Ratakonda, and N.Ahuja. A new wavelet-based scheme for watermarking images[J]. IEEE Image Processing, ICIP'98, Chicago, IL, USA, October 1998.4-7.
    [122]佘堃,蒲红梅,郑方伟,周明天,自适应多目独立成分分析,电子科技大学学报,已录用
    [123]斯华龄,张立明,智能视觉图像处理,上海科技教育出版社,2002.10
    [124]柏森,胡中豫,吴乐华,周道华,通信信息隐匿技术,国防工业出版社,2005.7
    [125]A.K.Jain, Fundamentals of digital image processing. Prentice-Hall, NJ, 1985
    [126]Andrew B. Watson, Cloria Y. Yang, Joshua A. Solomon, John Villasenor. Visibility of Wavelet Quantization Noise. IEEE Trans. Image Processing, 1997, vol.6: 1164-1175.
    [127]A.S.Lewis, G.Knowles. Image Compression using the 2-D wavelet transform. IEEE Transactions on Image processing, April 1992, vol.1: 244-250
    [128]崔锦泰著,程正兴译.小波分析导论,西安交通大学出版社,1995.
    [129]Mart D, Hildreth E. Theory of Edge Detection. Proceedings of Royal Society of London B, 1980, Vol.200:269-292
    [130]Wandell B. Foundations of Vision. Sinauer Associates, Inc. Sunderland Mass, Stanford,1995
    [131]Bell A, Sejnowski T. Edges are the independent components of natural scenes. Advances in Neural Information Processing 9(NIPS*96). MIT Press, 1997
    [132]Szu H, Wang H, Chanyagon P. Human Visual System Singularity Map Analyses. Wavelet Applications Ⅶ, SPIE Proc., 2000, Vol. 4056:525-538
    [133]黄继武,Shi Y Q.,程卫东.DCT域图像水印:嵌入对策和算法,电子学报,2000,28(4):386-389
    [134]She Kun, Duan Gui duo, Peng Jing, Zhou Mingtian, A New Watermarking Embedding Algorithm Regulating the Intensity of Watermarking Automatically, Proceedings of the 6th International Progress on Wavelet Analysis and Active Media Technology, Vol(3), p:1352-1357, World Scientific Publishing Co. Pte. Ltd., 2005.8
    [135]佘堃,黄均才,周明天,基于关键点信息的鲁棒参考水印算法,电子学报,2003.11,31(11):1709—1712
    [136]She Kun, Huang Juncai, Zhou Mingtian, Using Key Points to Improve Robust Reference Watermarking Algorithm, Proceedings of the 2003 IEEE International Conference on Information Reuse and Integration, 2003.10, p:311-316
    [137]D.Kundur and D.Hatzinakos,Digital watermark using Multiresolution Wavelet Decomposition. IEEE Intenational Conference On Acoustics,Speech and Signal Processing.1998, p:2969~2972.
    [138]Perrett D.I., May K., & Yoshikawa S. Attractive characteristics of female faces: preference for non-average shape. Nature, Lond. 368, 1994, p:239-242
    [139]Perrett D.I., Less K.J.,etc., Effects of sexual dimorphism on facial attractiveness. Nature, 394, 1998, p: 884-887.
    [140]B. Chen and G.W. Wornell. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory, 47(4):1423-1443, May 2001.
    [141]程正兴,小波分析算法与应用,西安交通大学出版社,1998
    [142]S. Jaffard, Y. Meyer, R. D.Ryan,Wavelets Tools for Science, Society for Industrial and Applied Mathematics, 2001
    [143]D H Hubel, T N Wiesel. Receptive fields, binocular interaction and functional architecture in the cat' s visual cortex. Journal of Physi2 ology,1962,160:106-154.
    [144]B A Olshausen,D J Field. Emergence of simple2cell receptive field properties by learning a sparse code for natural images. Nature, 1996,381:607-609.
    [145]佘堃,彭静等,基于脆弱水印的电子印章的产生及验证方法,中国,发明专利,2005.07,申请号:200510021291.3,公开号:1725244
    [146]Johnson J. Image Intensifier Symposium, Warfare Vision Branch, Electrical Engineering Department, US Army, Engineering Branch and Development Laboratories. Ft Belvoir, VA, 1958, p:249-273
    [147]P. Moulin and J.A. O'Sullivan. Information-theoretic analysis of information hiding. IEEE Transactions on Information Theory, March 2003, 49(3):563-593
    [148]D. Donoho, Sparse Components of Images and Optimal Atomic Decompositions, Tech.Report, Dept. of Stat., Stanford Univ., 1999. http://citeseer.ist.psu.edu/donoho99sparse.html
    [149]Andrzej Cichocki,Shun-ichiAmafi著,吴正国等译,自适应盲信号与图像处理,电子工业出版社,2005.5
    [150]A. Cichocki and R. Unbehauen, Neural Networks for Optimization and Signal Processing, John Wiley & Sons, New York, 1994
    [151]焦李成,谭山.图像的多尺度几何分析:回顾和展望,电子学报,2003,31(12A):1975~1981
    [152]Donoho D L. Orthonormal ridgelets and linear singularities. SIAM Journal on Mathematical Analysis, 2000, 31(5): 1062-1099
    [153]Candes E J, Donoho D L. Curvelets, multiresolution representation, and scaling laws. In: Aldroubi A, Laine A F, Unser M A, eds. SPIE Wavelet Applications in Signal and Image Processing Ⅷ, 2000, Vol 4119
    [154]N G Kingsbury, The dual-tree complex wavelet transform: a new technique for shift invariance and directional filters, IEEE Digital Signal Processing Workshop, DSP 98, Bryce Canyon,August 1998, p:86.
    [155]I.W. Selesnick. The double-density dual-tree DWT. IEEE Trans. on Signal Processing,, May 2004, 52(5):1304-1314
    [156]I. W. Selesnick. A higher-density discrete wavelet transform. IEEE Trans. on Signal Processing, 54(8):3039-3048, August 2006.
    [157]I.W. Selesnick, R. G. Baraniuk, and N. Kingsbury. The dual-tree complex wavelet transform-A coherent framework for multiscale signal and image processing. IEEE Signal Processing Magazine,, Nov. 2005, 22(6):123-151
    [158]S. Jaffard, Y. Meyer, R.D.Ryan, Wavelets tools for science, SIAM, 1993
    [159]MN Do, M.Vetterli. Contourlets[A]. J Stoeckler,GV Welland.Beyond Wavelets[C].Academic Press,2002.
    [160]stéphane Mallat著,杨力华等译,信号处理的小波导,机械工业出版社,2003
    [161]D L Donoho,M Vetterli,R A DeVore, Ⅰ Daubechies. Data compression and harmonic analysis. IEEE Trans, 1998, Information Theory 244(6):2435-2476.
    [162]E L Pennec, S Mallat. Image compression with geometrical wavelets. In Proc. of ICIP'2000[C]. Vancouver, Canada, September,2000. 661-664
    [163]D.L. Donohol Xiaoming Huo, Beamlets and Multiscale Image Analysis, Report,http://www-stat.stanford.edu/~donoho/Reports/2001/BeamletMSIP051101.pdf, 2001
    [164]D L Donoho. Sparse component analysis and optimal atomic decomposition. Constructive Approximation,1998,17:353-382.
    [165]马尔著,姚国政等译,视觉计算理论,科学出版社,1987
    [166]郑南宁,计算机视觉与模式识别,国防工业出版社,1998
    [167]菜浩然,马万禄,视觉的分子生理学基础,科学出版社,1978
    [168]吴立德,计算机视觉,复旦大学出版社,1994
    [169]Herault J, Jutten C, Space or Time Adaptive Signal Processing by Neural Network Models,Neural Networks for Computing, AlP conference proceeding 151, NY, American Institute for Physics, 1986
    [170]Olshausen B, Field D, Emergence of Simple——cell Receptive Field Properties by Learning a Sparse Code for Nature Image, Nature, 1996, Vol.381:607-609
    [171]St'ephane Bounkong, Bor'emi Toch, David Saad, David Lowe, ICA for Watermarking Digital Images, Journal of Machine Learning Research 4,2003), p:1471-1498
    [172]F.J. Gonz'alez-Serrano, H.Y. Molina-Bulla, and J.J. Murillo-Fuentes. Independent component analysis applied to digital watermarking. In International Conference on Acoustic,Speech and Signal Processing(ICASSP), May 2001., vol.3:1997-2000
    [173]阎平凡,张长水,人工神经网络与模拟进化计算,清华大学出版社,2005
    [174]Bell A.J, et al. An Information Maximization Approach to Blind Separation and Blind Deconvolution, Neural Computation, Vol(7), 1995, p:1129-1159
    [175]McCulloch, W. S., & Pitts, W., A logical calculus of the ideas immanent in nervous activity,Mathematical Biophysics, 1943, p: 18-27
    [176]Rosenblatt, F., The Perceptron: A perceiving and recognizing automaton. Technical Report 85-460-1, Project PARA, Comell Aeronautical Lab, 1957
    [177]Widrow, B. and M.E. Hoff, Jr.. Adaptive switching circuits. IRE WESCON Convention Record. 1960. p: 96-104
    [178]Hopfield, J.J.. Neural networks and physical systems with emergent collective computational abilities. In Proceedings of the National Academy of Sciences., 1982, 81:3088-3092
    [179]Rumelhart, D.E. and J.L. McClelland, eds., Parallel distributed processing: Explorations in the microstructure of cognition, Vol. 1 & 2, Cambridge, MA: MIT Press. 1986
    [180]Szu H.,Thermodynamics Energy for Both Supervised and Unsupervised Learning Neural Nets at a Constant Temperature, Int'l J. Neural Sys. 1999, Vol.9:175-186
    [181]Szu H., ICA—-An Enabling Tech for Intelligent Sensory Processing, IEEE Circuits and Systems Newsletters, 1999, p: 14-41
    [182]Szu H., Hsu C. Chaotic Neural Networks for Information Processing, Int'L Conf. CCCI South Africa,1998
    [183]Szu H., Hsu C. Meansfield Chaoes Dynamics eith Changing Chaoes Threshold Values, Int.Conf. on Neural Networks, 1997, Vol.2:651-656
    [184]Hebb, D.O. The Organization of Behavior: A Neurophysiological Theory. New York: Wiley, 1949.
    [185]Barlow, H. B. Summation and inhibition in the frog's retina. J Physiol, 1953. p: 69-88
    [186]Linsker R. Self-Organization in Perceptual Network. Computer, 21, 1988, p: 105-117
    [187]Geva A A. ScaleNet——Mulfiscale Neural Network Architecture for Time Series Prediction, IEEE Trans NN, 1998, Vol(9): 1471-1482
    [188]S.M.Kay, Fundamentals of Statistical Signal Processing, Prentice Hall, New Jersey, 1993
    [189]黑格尔著,范扬、张企泰译,法哲学原理,商务印书馆,1961
    [190]I.F Gorodnitsky and B.D Rao. Sparse signal reconstruction from limited data using FOCUSS: A re-weighted minimus norm algorithm. IEEE Trans. Sig. Proc., 1997, 45(3): 600-616
    [191]Ivica Kopfiva and Harold H. Szu, Fast LCNN ICA for unsupervised hyperspectral image classifier, Proceedings of SPIE——Wavelet and Independent Component Analysis Applications Ⅸ, March 2002, p: 169-183
    [192]N.G. Kingsbury, Shift invariant properties of the Dual-Tree Complex Wavelet Transform,Proc. CASSP 99, Phoenix, AZ, Mar 1999, p:16-19
    [193]刘震,佘堃,周明天,基于Bayes参数估计的垃圾邮件过滤算法研究,计算机科学,2005,32(9):55-57
    [194]向生建,安全中间件系统关键技术研究,博士论文,电子科技大学,2006.6
    [195]T.W. Lee, Sejnowski, et al.. Independent component analysis using an extended infomax algorithm for subGaussian and super-Gaussian sources. Neural Computation, 11(2):409-433, 1999
    [196]S.-I. Amari. New learning in structural parameter space——natural Riemannian gradient. Advances in Neural Information Processing Systems, 9: 127-133, 1997
    [197]佘堃等,国家863安全中间件项目863-301-7-9验收自评估报告,2002.1
    [198]佘堃,周明天,安全中间件核心——公共安全服务,小型与微型计算机系统,2003,24(7)
    [199]J.A. O'Sullivan, P. Moulin, and J. M. Ettinger, "Information theoretic analysis of steganography," in Proc. EEE International Symposium on Information Theory, p. 297, August 1998.
    [200]P. Moulin and J. A. O'Sullivan, "Information-theretic analysis of watermarking," in Proc.IEEE International Conference on Acustics, Speech and Signal Processing, vol. 6, pp. 3630-3633,2000.
    [201]Davis K J, Najarian K, Maximizing strength of digital watermarks using neural networks.Proceedings of the International Joint Conference on Neural Networks, 2001, 4, p: 2893-2898
    [202]徐军,叶澄清,向辉,基于神经网络分类的图像数字水印算法,模式识别与人工智能,2001,14(3),p:261-264
    [203]周亚训,白贵儒,在DCT域内应用RBF神经网络检测图像水印,数据采集预处理,2001,16(4)p:498—503
    [204]Yu Pao-ta, Tsai Huang-Hsu, Lin Jyh-shyan, Digital Watermarking based on neural networks for color images, Signal Processing, 2001, 81, p:663-671
    [205]Kutter M,Jordan F, Bossen F, Digital watermarking of color images using amplitude modulation, Electron. Imaging, 1998, 7(2), p: 326-332
    [206]H. Szu, Progress in Unsupervised Artificial Neural Networks for Image Demixing Applications, IEEE Industrial Electronics Society Newsletter, 46(2), 7-12, June 1999.
    [207]M. Antonini, M. Barlaud, P. Mathieu, and I. Daubechies, "Image coding using wavelet transform", IEEE Transactions on Image Processing, Vol. pp. 205-220, 1992
    [208]Zhong Hua Jiao Li-Cheng.Adaptive Gray-Level Digital Watermarking Technique.Chinese Journal of Computers,2002,25(12):1364-1370(in Chinese)
    [209]张力,钱恭斌,纪震,基于ICA的智能数字水印技术,电子与信息学报,2005 Vol.27No.3 P.78-482
    [210]Zhang Li, Sam Kwong, et al.. An intelligent watermark detection decoder based on independent component analysis, Proc. of 2nd International Workshop of Digital Watermarking,Seoul, Korea,October 2003:243-254.
    [211]Zhang Li, Xiao Wei Wei, et al.. Intelligent second generation watermarking technique with ICA, Proc. of SPIE on Multispectral Image Processing and Pattern Recognition, Beijing, China,2003:764-769.
    [212]刘琚,孙建德,基于图像独立特征分解的数字水印算法.电子与信息学报,2003,25(9):1174-1179.
    [213]刘琚,孙建德,ICA和镜头分割结合的盲视频水印方案,中国科学E辑:信息科学 2005Vol.35 No.12 pp.1266—1276
    [214]F.A.P. Petitcolas and M.G. Kuhn. Stirmark 4.0. Available electronically from http://www.cl.cam.ac.uk/fapp2/watermarking/stirmark/, 2002.
    [215]A. Hyv"arinen, J. Karhunen, and E. Oja. Independent Component Analysis.Wiley-Interscience, 2001.
    [216]A. Hyv"arinen and E. Oja. A fast fixed-point algorithm for independent component analysis. Neural Computation, 9(7):1483-1492, 1997.
    [217]Yu D, Sattar F, Ma K K. Watermark detection and extraction using independent component analysis method. EURASIP Journal on Applied Signal Processing, 2002, 17(1): 92-104.
    [218]刘映杰等,一种基于FICA的小波域数字水印算法,信息安全与通信保密,2006.5
    [219]Peter H. W. Wong, A Novel Blind Multiple Watermarking Technique for Images, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 8, AUGUST 2003, p:813-830
    [220]Liu Ju,Zhang Xingang,Sun Jiande et al.A Digital Waternarking Shceme Based on Ica Detection.4th International Symposium on Independent Component Analysis and Blind Signal Separation(ICA2003),April 2003:215-220
    [221]A.B. Watson, G.Y. Yang J. A. Solomon and J. Villasenor, Visibility of Wavelet Quantization Noise, IEEE Trans. on Image Processing, vol. 6, no. 8, pp. 1164-1175, Aug. 1997.
    [222]王炎,王建军,黄旭明,一种基于ICA的多边形曲线水印算法,计算机辅助设计与图形学学报,2006 Vol.(18)No(07),
    [223]Anestis Antoniadis, Multiscale Geometric Analysis: Thoughts and Applications(a summary), http://www-rocq.inria.fr/clime/assimage/documents/antoniadis2.pdf
    [224]Minfen Shen, Xinjung Zhang, etc.,A METHOD FOR DIGITAL IMAGE WATERMARKING USING ICA, 4th International Symposium on Independent Component Analysis and Blind Signal Separation(ICA2003), April 2003, Nara, Japan, p: 209-214
    [225]B. Toch, D. Lowe, and D. Saad. Watermarking of audio signals using independent component analysis. In International conference on WEB delivering of music, pages 71-74,September 2003.
    [226]She Kun, Huang Juncai, Zhou Mingtian, Pair Digital Watermarking Based in Unsupervised Learning, Proceedings of the 2003 IEEE Int. Conf. on Robotics, Intelligent Systems and Signal Processing, p: 1050-1255, 2003.10
    [227]She Kun, Huang Juncai, Zhou Mingtian, Wavelet Digital Watermarking with Unsupervised Learning, Chinese Journal of Electronics, Vol.14, No.1, p10-14, 2005
    [228]Peng Jing, She Kun, Hou Xiang-Yong, A New. Algorithm of Gray Image Watermark based on Bit-Plane Compression Coding, Proceedings of the 6th International Progress on Wavelet Analysis and Active Media Technology, World Scientific Publishing Co. Pte. Ltd., Aug. 2005,Vol(3):1176-1181
    [229]佘堃,蒲红梅,郑方伟,周明天,快速单像素多目独立成分设计,电子科技大学学报,已录用

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700