用户名: 密码: 验证码:
基于视觉特性的信息隐藏算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
互联网技术和信息科学技术的飞速发展,在为信息的传输和处理提供极大便利的同时,也给信息安全问题带来了极大的挑战,因此信息安全研究越来越受到重视,而这其中密码技术和信息隐藏技术是最重要的两个研究领域。密码技术把想要隐藏的秘密信息通过加密转换为让人无法理解的乱码数据,通信双方只有掌握了密钥才能提取正确的信息。但是将信息加密变成乱码数据后,更容易引起监控者的怀疑,即便他们无法正确解密,也可能将拦截到的可疑信息破坏从而干扰通信的正常进行,特别是在计算机并行处理速度和密码解析技术飞速发展的大背景下,传统密码技术的安全性受到严峻挑战。信息隐藏技术克服了密码技术的诸多局限性,成为保障信息安全的重要手段,它是将特定的信息嵌入到数字化的载体信息中,然后通过公开信息的传输来传递秘密信息,隐藏秘密数据后的载体信息能够被正常访问和使用,其目的在于防止隐藏信息被拦截者关注和怀疑,从而降低被攻击的可能性。与密码技术相比,信息隐藏不但隐藏了信息的内容还隐藏了信息的存在,其安全性来自于对第三方感知上的麻痹性,使得保密通信从“看不懂”变为“看不见”,因此在某些场合,信息隐藏比加密更安全。
     对于信息隐藏技术的研究,不可感知性、鲁棒性和嵌入量是三个最重要的性能衡量指标,三者之间也是相互制约的矛盾统一体,不同的应用环境对性能指标要求的侧重点不同,不可能同时达到最优,通常对一般信息的隐藏,主要考虑嵌入量和不可感知性,可以适当牺牲鲁棒性,而对秘密信息的隐藏,则主要考虑不可感知性和鲁棒性,可以适当牺牲嵌入量。本文以数字图像和视频为载体,从降低图像失真和增强鲁棒性两方面着手,基于人类视觉特性对信息隐藏过程中的嵌入域特征提取和自适应嵌入算法进行研究,并根据数字图像或视频载体的不同,结合嵌入域特征选择和嵌入算法,提出几种行之有效的信息隐藏方案。
     论文的主要贡献有:
     (1)提出一种基于Stentiford视觉注意模型的信息隐藏方案。传统信息隐藏算法主要利用视觉掩蔽性提高不可感知性,而从关注区域选择的角度来改善不可感知性的方法鲜有报道,本文从人眼观察图像时关注区域选择的过程入手,利用Stentiford视觉注意模型对图像根据关注程度的不同进行区域划分,在图像的视觉关注区域嵌入较少信息,确保隐藏信息图像的不可见性,在视觉弱关注区域嵌入较多信息,保证隐藏信息的嵌入量。仿真实验表明,该算法不仅有效平衡了信息嵌入量和视觉不可见性,还提高了信息隐藏的鲁棒性。同时,在进行信息隐藏不可见性评价的研究中,引入了基于视觉注意的PSNR计算方法,为更好地进行符合人眼主观视觉的图像质量评价提供了参考。
     (2)提出一种基于人类视觉模型的迭代自适应QIM算法。秘密信息隐藏传输过程中要保证载密图像在没有被处理和攻击时能够被完整提取,才能提升隐藏信息的认证和完整性判断,本文基于视觉隐蔽特性对信息隐藏嵌入算法进行研究,针对Cox提出的自适应QIM算法缺陷产生的原因进行了理论分析,并提出一种改进的迭代AQIM算法,有效改进了自适应QIM算法即使在没有攻击时也无法克服的信息检测错误。
     将视觉特性对信息隐藏嵌入域选择和嵌入算法影响两方面结合,从关注区域的选择和关注区域内的细节观察两个角度来改善信息隐藏性能,提出Stentiford视觉注意模型和迭代AQIM算法结合的信息隐藏方案,实现了隐藏信息较好的不可见性和鲁棒性,
     ICA是一种可以获得独立特征的信号处理方法,能够提取出信号最本质的特征,并且所得到的特征在统计意义上是相互独立的,由于在独立的信息隐藏嵌入域上可以获得最大的嵌入量,本文提出二抽取ICA和迭代AQIM算法结合的信息隐藏方案,结果显示了很好的统计特性和较强的鲁棒性。
     (3)提出一种对MPEG2、MPEG4和H.264之间的转码有较强鲁棒性的高容量视频信息隐藏方案。三网融合技术不断发展,视频在传输过程中需要更多考虑的不是重新解压和再压缩,而是在各种视频压缩编解码标准间灵活转换,目前基于视频的信息隐藏考虑转码影响的并不多。由于主流视频压缩编码标准编码过程都是基于大小不同的宏块的DCT变换,本文以转码过程中块之间的变化入手,分析了不同大小数据块DCT系数之间的空间关系,选取受压缩和转码影响较小同时运算量小的DCT系数进行信息隐藏,仿真结果显示,本方案运算复杂度小,同时可以大大提高信息隐藏容量,并保持很好的鲁棒性和不可见性。
With the rapid development of the information technology and computer network, information transmission and processing are becoming more and more convenient. But information security has come to be a social issue at the same time. At present, information security includes two techniques:Cryptography and Information Hiding. As to cryptography, the secret information is transformed into a random sequence by encrypting, only the partners with the key are able to correctly extract the information. But with the development of cryptanalysis and the high speed of computer parallel processing technology, the traditional password security system is faced with severe challenges, and garbled encrypted information is more easily leading to the attention of the preventer. Even if the preventer can not break in, the successful intercepted information may also be damaged and interfered with normal communications.
     Limitations of the cryptography promote the generation and development of the information hiding technology. As an important method of information security transmission, information hiding technology hasattracted great concern. By this means, the specific information is embedded into digital carrier information, and then the confidential information is transferred through the public one. It aims not to restrict normal access to information, but rather to ensure that hidden information does not draw monitor's attention, so the likelihood of attack is reduced. Compared with cryptography, information hiding not only hides the content of information but also hides the existence of information. The security comes from t the paralysis perception of the third parties, making secure communication from the "readable" to "invisible ". Therefore, in some cases, information hiding is more secure than encryption.
     For information hiding techniques, there are three most concerned points: imperceptibility, hidden capacity and robustness. The three evaluation aspects are mutually interdependent, while not optimal. So as to a specific application an appropriate balance should be sought. For the general information hiding, the imperceptibility and hidden capacity are more important. For the secret information hiding, hthe imperceptibility and robustness are more important. In the thesis three aspects are discussed based on the image and video:capacity improvement, reducing image distortion and robustness improvement. The embedding domain feature extraction and adaptive embedding algorithm based on human visual characteristics are studied. Several information hiding algorithms are proposed based on different carriers and feature extraction.
     The main contributions are as following:
     (1) A fresh information hiding algorithm based on Stentiford visual attention model is proposed. Traditional information hiding algorithms improved the invisibility by the means of image vision masking, rarelyfby the selection of the attention region. This thesis, Stentiford visual attention model is utilized to diverse the region according to the degree of attention. By embedding less information in sensitive regions, the invisibility of a image with hidden information is improved. By embedding more information in non-sensitive regions, the information capacity is improved. Experiments demonstrate that the proposed algorithm not only achieves good performance on information capacity and visual invisibility, but also improves the robustness. Meanwhile, a visual attention based PSNR algorithm is also proposed. It provides a reference to the subjective visual evaluation of image quality.
     (2) An Adaptive Quantization Index Modulation (AQIM) algorithm based on the Watson's visual model is proposed. Secret information is invisible during the transmission process. Hidden information should be extracted even if the carrier image is processed and attacked. Then the authentication and integrity can be enhanced. In the thesis, information hiding algorithm is studied based on the visual hidden attribute. The defaults of the Adaptive QIM algorithm are analyzed first. Then an improved iterative AQIM algorithm is proposed.
     By combining the two factors of information hiding embedding domain selection and embedding algorithm, we proposed an information hiding scheme which combines the Stentiford visual attention model and iterative AQIM algorithm. In this algorithm, the hiding performance is improved from the point view of the attention region selection and region detail. Experiments demonstrate that the proposed algorithm has better imperceptibility and robustness.
     ICA is a kind of signal processing method that can extract the independent characteristics of the signal and the characteristics are independent in the sense of the statistics. Because the maximum embedding capacity can be obtained in the independent information hiding embedding domains, an information hiding scheme is proposed by combining subsample ICA and iterative AQIM. Experiments demonstrate that the proposed algorithm has better statistical property and robustness.
     (3) A video information hiding scheme is proposed which has high capacity and robustness to MPEG2, MPEG4 to H.264 transcoding. With the development of Triple Play Service, decompression and recompression are not important, while the transformation among different compression standards should be more considered. The coding processing of the most standards is based on the block DCT transform. In the proposed algorithm, the spatial relationship between different-size blocks is analyzed first. The DCT coefficients which have less impact to compression and transcoding are selected for information hiding. Compared with the previous algorithm, the proposed one improves the capacity much and has good robustness and invisibility.
引文
[I]Ackan J M. How watermarking adds value to digital content. Communications of the ACM,1998,41(7):75-77.
    [2]Emil Frank Hembrooke, Identification of Sound and Like Signals [P], United States Patent,3,004,104,1961.
    [3]Moulin P., O'Sullivan J.A.. Information-theoretic analysis of information hiding[J]. IEEE Transactions on Information Theory,2003,49(3):563-593.
    [4]W. Szepanski, A Signal Theoretic Method of Creating Forgery-proof Documents for Automatic Verification [C], Carnahan Conference on Crime Countermeasures, 1979:101-109.
    [5]L. Holt, B. G M aufe, and A. Wiener, Encoded Marking of a Recording Signal [P], U. L. Patent GB 2196167A,1988.
    [6]A. Z. Tirkel, G A. Rankin and R. van Schyndel, Electronic Water Mark [C], In Digital Image Computing, Tech nology and Applications - DICTA93, Macquarie University,1993:666-673.
    [7]R. G van Schyndel, A. Z. Tirkel, N. Mee and C. F. Osborne, A Digital Watermark [C], Proceedings of IEEE International Conference on Image Processing, Nov. 1994,2:86-90.
    [8]Pfitzman B. Information hiding terminology [A]. First Information Hiding Workshop[C].1996,347-350.
    [9]KatzenbeiSSer S., Petiteola F.A.P. Information hiding techniques for steganography and digital watermarking[M]. [S.l.]:Artech House,2000.
    [10]Cox L.J., Miller M.L., Bloom J.A. Watermarking application and their properties. In Proc. of Int. Conf. on Information Technology:Coding and Computing, Mar. 2000, vol.2729:6-10.
    [11]Fridrich J., Goljan M. Practical steganalysis of digital images-state of the art. In Proc. of SPIE Photonics West, San Jose, CA,2002, vol.4675:1-13.
    [12]Johnson N.F.2010. Steganography Software[EB/OL]. USA:Johnson&Johnson Technology Consultants, [2010-04-15]..http://www.jjtc.com/ Steganography/tools.html.
    [13]Kahn D. The history of steganography. Proceedings of Informmi on Hiding. First International Workshop, IH'96,1996. Berlin:Spfinger-Verlag, LNCS, V01.1174, 1-5.
    [14]吴秋新,钮心忻,杨义先等译.信息隐藏技术隐写术与数字水印[M],北京:人民邮电出版社,2001.
    [15]尤新刚,周琳娜,郭云彪.信息隐藏学科的主要分支及术语[A].信息隐藏全国学讨会(CIHWZ000/2001)论文集[C].西安:西安电子科技大学出版社,2001:43-50.
    [16]Petitcolas F.A.P, Anderson R.J., and Kuhn M.G. Information Hiding-A Survey. Proceedings of the IEEE, special issue on protection of multimedia content, July 1999:1062-1078.
    [17]Hua Yuan, Xiao-Ping Zhang. Multiscale Fragile Watermarking Based on the Gaussian Mixture Model. IEEE Transactions on Image Processing,2006, Vol.15: 3189-3200.
    [18]Hongtao Lu, Ruiming Shen, Fu-Lai Chung. Fragile watermarking scheme for image authentication.2003, Vol.39:898-900.
    [19]Zafeiriou S., Tefas A., Pitas, I.. Blind robust watermarking schemes for copyright protection of 3D mesh objects. IEEE Transactions on Visualization and Computer Graphics,2005, Vol.11:596-607.
    [20]J. S. Tsai, W. B. Huang, C. L. Chen, and Y. H. Kuo, "A feature-based digital image watermarking for copyright protection and content authentication," in Proc. IEEE Int. Conf. Image Process., Sep.2007, vol.5, pp.469-472.
    [21]G J. Simmons. The Prisoners' Problem and Subliminal Channel[A]. In:Proeeedings of CRYPTO'83 [C]. Plenum Press,1984:51-67.
    [22]X. Zhu. A semi-fragile digital watermarking algorithm in wavelet transform domaim based on Arnold transform [A]. In:Proceedings of 9th International Conference on Signal Processing,2008, ICSP[C], pp:2217-2220.
    [23]齐东旭,邹建成,韩效有.一类新的置乱变换及其在图像信息隐藏中的应用[J].中国科学(E辑),2000,30(5):440-447.
    [24]X.Yan, S. Guan, X. Niu. Research on the capacity of Error-Correcting Codes-Based information hiding [A]. In:Proceedings of International Conference on Intelligent Information Hiding and Multimedia Signal Processing[C], Harbin, 2008, pp:1158-1161.
    [25]王育民,张彤,黄继武.信息隐藏—理论与技术[M].北京:清华大学出版社,2006.
    [26]Voloshynovskiy S, Pun T. Capacity-Security Analysis ofData Hiding Technologies[A]. IIl Proc. IEEE Int. Conf. On Multimedia and Expo(ICME2002). Switzerland:Lausanne,2002.
    [27]Faisal Alturki, Thoery and applications of information hiding jn still images, Submitted in partial fulfillment of requirement for the degree of PHD ofcomputing,2001, UMI Number:3003824.
    [28]Bender W., Gruhi D., Morimoto N., et al, Techniques for Data Hiding, IBM System Journal,1996,35(3):313-335.
    [29]C.H. Yang, C.Y. Weng, S.J. Wang. Adaptive data hiding in edge areas of images with spatial LSB domain systems [J]. IEEE Transactions on Information Forensics and Security,2008,3(3):488-497.
    [30]W.N. Lie, L.C. Chang. Data hiding in images with adaptive numbers of least significant bits based on the human visual system[A]. Proc. IEEE International Conference on Image Processing[C], Kobe, Japan, Oct.1999,1:286-290.
    [31]R.Z. Wang, C.F. Lin, J. C. Lin. Image Hiding by optimal LSB substitution and genetic algorithm [J]. Pattern. Recognition,2001,34(3):671-683.
    [32]孙文静,孙亚民,张学梅.基于直接位平面替换的LSB信息隐藏技术[J].计算机科学,2008,35(12):207-209.
    [33]Solachidis V, Pitas L. Circularly symmetric watermark embedding in 2-D DFT domain Image Processing. IEEE Transactions on Image Processing,2001, vol.10: 1741-1753.
    [34]Ramkumar M., Akansu A.N., Alatan A.A.. A robust data hiding scheme for images using DFT. Proc.1999 International Conference on Image Processing,1999, vol.2:211-215.
    [35]Chiou-Ting Hsu, Ja-Ling Wu. Hidden digital watermarks in images. IEEE Transactions on Image Processing,1999, vol.8:58-68.
    [36]Barni M., Bartolini F., De Rosa A., Piva A.. Capacity of full frame DCT image watermarks. IEEE Transactions on Image Processing,2000, vol.9:1450-1455.
    [37]Wang Y, Pearmain A.. Blind MPEG-2 video watermarking in DCT domain robust against scaling. IEE Proceedings-Vision, Image and Signal Processing,2006, vol.153:581-588.
    [38]N.Bi, Q. Sun, D. Huang, et al. Robustimage watermarking based on multiband wavelets and empirical mode decomposition [J]. IEEE Transaetions on Image processing,2007,16(8):1956-1966.
    [39]Y. H. Zhang. Blind Watermark algorithm based on HVS and RBF neural network in DWT domain [J]. WSEAS Transactions on ComPuters,2009,8(1):174-183.
    [40]Haiying Gao, Xiaolong Zheng. Image information hiding algorithm based on DWT with alterable parameters. IEEE International Conference on Information Theory and Information Security (ICITIS),2010, Page(s):279-282.
    [41]Qiang Li, Chun Yuan, Yu-Zhuo Zhong. Adaptive DWT-SVD Domain Image Watermarking Using Human Visual Model. The 9th International Conference on Advanced Communication Technology,2007, vol.3:1947-1951.
    [42]V. Aslantas. An optimal robust digital image watermarking based on SVD using differential evolution algorithm [J]. Optics Communieations,2009, 282(5):769-777.
    [43]楼偶俊,钲旋.基于特征点模板的Contourlet域抗几何攻击水印算法研究[J]. 计算机学报,2009,32(2):305-316.
    [44]肖亮,韦志辉.脊波域稳健性水印嵌入算法与可靠性分析[J].南京理工大学学报(自然科学版),2008,32(4):411-415.
    [45]Qi Dongxu, Zou Jianchen, Han Xiaoyou. A new class of scrambling transformation and its application in the image information covering. Science in China(Seres E),2000,43(3):304-312.
    [46]孙兆林.Matlab6.X图像处理[M].北京:清华大学出版社,2002.
    [47]黎绍发,詹青.层次余弦变化的零树编码法.通信学报,2000,21(3):84-87.
    [48]Rajeodra Acharya U, U C. Niranjan, et al. Simultaneous storage of patient information with medical images in the frequency domain[J]. Computer Methods and Programs in Biomedicine,2004, vol.76:13-19.
    [49]Chang, C.-C., Chen, T.-S., et al. A staganographic method based upon JPEG and quantization table modification [J]. Information Sciences,2002,141:123-138.
    [50]Podilchuk C. I., Wenjun Zeng. Image adaptive Watermarking Using Visual Models. IEEE Journal on Selected Areas in Communications, 1998,vol.16:525-539.
    [51]Podilchuk C. I., Wenjun Zeng. Perceptual Watermaking of Still Images. IEEE Fisrt Workshop on Multimedia Signal Processing.1997, vol5:363-368.
    [52]Grossmann A., Morlet J.. Decomposition of hardy functions into square intergrable wavelets of constant shape. SIAM Jouranal of Mathematical Analysis, 1984,15:723-736.
    [53]Grossmann A., Morlet J.. Transforms associated to square integrable group representations. Journal of Mathematical Physics,1985,26(10):2473-2479.
    [54]Malla S.. A theory for multiresolution signal decomposition:The wavelet representation. IEEE Trans Pattern Anal Mach Intel,1989,11(7):674-693.
    [55]胡昌华,张军波,夏军,张伟.基于MATLAB的系统分析与设计一小波分析.西安:西安电子科技大学出版社.1999.
    [56]R. L. Pickholtz, D. L. Schilling, L. B. Millstein. Theory of spread spectrum communications—A tutorial. IEEE Trans. Commun.,1982, vol.COMM-30:855-884.
    [57]Cox I.J., Kilian J, Leighton T, et al. Secure spread spectrum watermarking for images, audio and video [C]. Proceedings of International Conference on Image Processing,1996, Lausanne, Switzerland.3:243-246.
    [58]Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon. Secure Spread Spectrum Watermarking for Multimedia [J]. IEEE Transaction on Image Processing,1997,6(12):1673-1687.
    [59]I. J. Cox, et al. Watermarking as Communications with Side Information [J]. Proceedings of the IEEE,1999,87(7):1127-1141.
    [60]Hartung F, Girod B. Watermarking of uncompressed and compressed video [J]. Signal Processing,1998,66(3):283-301.
    [61]Hartung F, Su J.K. Spread spectrum watermarking:malicious attacks and counterattacks[C]. Proceedings of the SPEE, Security and Watermarking of Multimedia Contents,1999, San Jose. USA.3657:147-158.
    [62]Zhu W W, Xiong Z X, Zhang Y Q. Multiresolution watermarking for images and video[J]. IEEE Transactions on Circuits and Systems for Video Technology,1999, pp:545-550.
    [63]Brian Chen and Gregory W. Wornell, Quantization Index Modulation:A Class of Provably Good Methods for Digital Watermarking and Information Embedding, Proceedings IEEE International Symposium on Information Theory,2000:46.
    [64]Brian Chen and Gregory W. Wornell, Quantization Index Modulation:A Class of Provably Good Methods for Digital Watermarking and Information Embedding, IEEE Transactions on Information Theory,2001, Vol.47, No.4, pp.1423-1443.
    [65]Voloshynovskiy S, Pun T. Capacity-Security Analysis of Data Hiding Technologies[A]. IIl Proc. IEEE Int. Conf. On Multimedia and Expo(ICME2002). Switzerland:Lausanne,2002.
    [66]Faisal Alturki, Thoery and applications of information hiding jn still images, Submitted in partial fulfillment of requirement for the degree of PHD ofcomputing,2001, UMI Number:3003824.
    [67]Itti. L, Koch. C and Niebur. E. A model of saliency-based visual attention for rapid scene analysis[J], IEEE Trans. on Pattern Analysis and Machine Intelligence, 1998,20(11):1254-1259.
    [68]F. W. M. Stentiford, "An estimator for visual attention through competitive novelty with application to image compression," Picture Coding Symposium, Seoul,24-27 April,2001.
    [69]F. W. M. Stentiford, N. Morley and A. Curnow, "Automatic identification of regions of interest with application to the quantification of DNA damage in cells," Proc SPIE Vol 4662, San Jose,20-26 Jan 2002.
    [70]F. W. M. Stentiford. An attention based similarity measure with application to content-based information retrieval [C]. Proceedings of the Storage and Retrieval for Media Databases Conference, SPIE Electronic Imaging,2003,5021:1-12.
    [71]Yaqing Niu, Qin Zhang and Kyan M. A combined just noticeable distortion model guided image watermarking Digital Content.2010 6th International Conference on Multimedia Technology and its Applications (IDC),2010:321-326.
    [72]Sur A, Sagar S.S and Pal R. "A New Image Watermarking Scheme using Saliency Based Visual Attention Model," India Conference (INDICON),2009 Annual IEEE:1-4.
    [73]Pashler. H. E. Attention[M]. Philadelphia:Psychology Press,1998:52-75.
    [74]Methodology for the subjective assessment of the quality of television pictures[S]. ITU-R BT 500-11,2002. International Telecommunication Union Radiocommunication Sector Recommendations, Geneva, Switzerlan.
    [75]Z. Wang, A.C. Bovik, L. Lu. Why is image quality assessment so difficult? [A] In: Proc. IEEE International Conference on Acoustics, Speech and Signal Processing[C], Orlando,2002, vol.4:IV-3 3312-3316.
    [76]Z. Wang, A.C. Bovik, H.R. Sheikh, et al. Image quality assessment:From error visibility to structural similarity [J]. IEEE Transactions on Image Processing,2004, 13(4):600-612.
    [77]X.Z. Pan, C.L. Yang, S.L. Xie. An improved structural similarity for image quality assessment [A]. In:Proceedings of the SPIE:The International Society for Optical Engineering [C], Wuhan,2005, vol.60441 I:1-9.
    [78]M.Cadik, P. Slavik. Evaluation of two principal approaches to objective image quality assessment [A]. In:Proceedings of the 8th International Conference on Information Visualisation [C], London:IEEE Computer Society,2004:513-518.
    [79]杨春玲,旷开智,冠豪等.基于梯度的结构相似度的图像质量评价方法[J].华南理工大学学报(自然科学版),2006,34(9):22-25.
    [80]Sheikh H.R., Bovik A.C.. Image information and visual quality [J]. IEEE Transactions on Image Processing,2006,15(2):430-444.
    [81]Andrew B. Watson. DCT Quantization Matrices Visually Optimized for Individual Images, Proc SPIE on Human Vision[J], Visual Processing, and Digital Display IV, pp.202-216,1993.
    [82]Watson Andrew B, Yang Gloria Y. Visibility of Wavelet Quantization Noise. IEEE Transactions on Image Processing,1997,6(8):1164-1175.
    [83]Watson Andrew B, Yang Gloria Y. Visual Thresholds for Wavelet Quantization Error. In Proc. SPIE Human Vision and Electronic Imaging,1996,2657:381-392.
    [84]Christone I, Podilchuk, Zeng Wenjun. Image Adaptive Watermarking Using Visual Models. IEEE Journal on Selected Areas in Communications,1998, vol.16:525-539.
    [85]Kundur DeePa, Hatzinakos Dimitrios. A robust digital image watermarking method using wavelet-based fusion. IEEE International Conference on Image Processing,1997, Vol.l:544-547.
    [86]Levine M. D. Vision in Man and Machine. Toronton:McGraw-Hill,1985.
    [87]Ourique F., Licks V, Jordan R., Perez-Gonzalez F., Angle QIM:a novel watermark embedding scheme robust against amplitude scaling distortions[C], IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP'05), Volume 2,2005, pp.797-800.
    [88]Perez-Gonzalez F., Barni M., Abrardo A., Mosquera C., Rational Dither Modulation:a Novel Data-Hiding Method Robust to Value-Metric Scaling Attacks[C], IEEE 6th Workshop on Multimedia Signal Processing,2004, pp. 139-142.
    [89]V. Saravanan, P. K. Bora, D. Ghosh, Oblivious Image-Adaptive Watermarking Using Quantization Index Modulation, The Eighth National Conf. On Communications, India, Jan.26-27,2002.
    [90]Q. Li and I. J. Cox, Using perceptual models to improve fidelity and provide invariance to valumetric scaling for quantization index modulation watermarking, presented at the IEEE Int. Conf. Acoustics, Speech and Signal Processing, Philadelphia, PA, Mar.2005.
    [91]Q. Li and I. J. Cox, Using Perceptual Models to Improve Fidelity and Provide Resistance to Valumetric Scaling for Quantization Index Modulation Watermarking, IEEE transactions on information forensics and security, Vol.2, NO.2,2007.
    [92]Gonzalez-Serrano, et al, "Independent Component Analysis Applied to Digital Image Watermarking", ICASSP'01,2001, Vol.3, pp.1997-2000.
    [93]S. Bounkong, et al., "ICA for Watermarking Digital Images", Journal of Machine Learning Research,2003, Vol.4, pp.1471-1498.
    [94]Sun J.D., Liu J., Data Hiding with Video Independent Components, IEE Electronics Letters,2004, pp.858-859.
    [95]J. L. Mannos, J. J. Sakrison, The Effects of a Visual Fidelity Criterion on the Encoding of Image[J], IEEE Transactions on Information Theory,1974, IT-4:525-536.
    [96]Hyvrinen A., Oja.E, A Fast Fixed-Point Algorithm for Independent Component Analysis, Neural Computation,1997, Vol.9, No.7, pp.1483-1492.
    [97]J. Liu, J. Sun, Z. Du and Y. Wan, Embodying Information into Images by an MMI-Based Independent Component Analysis Algorithm, Proceedings of the 6th International Conference on Signal Processing, Aug.2002,2:1600-1603.
    [98]Huibo Hu, Yu Huang, Ju Liu, Jiande Sun. An ICA-based Watermarking Scheme Resistant to Copy Attack [A],2005 IEEE International Workshop on VLSI Design and Video Technology (IWVDVT'05) [C], Suzhou, China, May,2005,154-157.
    [99]Satyen Biswas, Sunil R. Das, and Emil M. Petriu. An Adaptive Compressed MPEG-2 Video Watermarking Scheme, IEEE Transaction on Instrumentation and Measurement, vol.54, no.5 (2005),1853-1861.
    [100]Adnan M. Alattar, Eugene T. Lin, and Mehmet Utku Celik,2003. Digital Watermarking of Low Bit-Rate Advanced Simple Profile MPEG-4 Compressed Video, IEEE Transactions on Circuits and Systems for Video Technology, vol.13, no.8 (2003),787-800.
    [101]Maneli Noorkami, and Russell M. Mersereau,2005. Compressed-Domain Video Watermarking for H.264, IEEE International Conference on Image Processing,2 (2005),890-893.
    [102]Jing Zhang, Anthony T. S. Ho, Gang Qiu, et al,2007. Robust Video Watermarking of H.264/AVC, IEEE Transactions on Circuits and Systems-II, vol.54, no.2 (2007),205-207.
    [103]R. Lancini, F. Mapelli, and S. Tubaro,2002. A Robust Video Watermarking Technique for Compression and Transcoding Processing, IEEE International Conference on Multimedia and Expo,1 (2002),549-552.
    [104]Y. Wang, and A. Pearmain,2003. Robust Data Hiding in MPEG-2 Video against Transcoding,4th EURASIP Conference focused on Video/Image Processing and Multimedia Communications,2 (2003),695-700.
    [105]Qibin Sun, Dajun He, and Qi Tian,2006. A Secure and Robust Authentication Scheme for Video Transcoding, IEEE Transactions on Circuits and Systems for Video Technology, vol.16, no.10 (2006),1232-1244.
    [106]ISO/IEC International Standard 13818-2. Generic coding of moving pictures and associated audio information, Part 2:video,1994.
    [107]ISO/IEC International Standard 14496-2. Information Technology-Generic coding of audio-visual objects, Part 2:Visual. MPEG98/N2502a,1998.
    [108]ITU-T Recommendation H.263:Video Coding for Low Bit Rate Communication, 1996.
    [109]Joint Video Team (JVT) of ISO/IEC MPEG & ITU-T VCEG Draft ITU-T Recommendation and Final Draft International Standard of Joint Video Specification (ITU-T Rec. H.264| ISO/IEC 14496-10 AVC). JVT-G050r1. Mar. 2003.
    [110]CCITT Recommendation H.261:Video codec for audio visual services at p×64kbits/s,1990.
    [111]毕厚杰.新一代视频压缩编码标准:H.264/AVC[M].北京:人民邮电出版社,2009.
    [112]Jianmin Jiang, and Guocan Feang,2002. The Spatial Relationship of DCT Coefficients between a Block and Its Sub-blocks", IEEE Transactions on Signal Processing, vol.50, no.5 (2002),1160-1169.
    [113]P. Moulin, J. A. O'Sullivan. Information-Theoretic Analysis of Information Hiding, IEEE Transaction on Information Thoery, vol.49, no.3 (2003):563-593.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700