用户名: 密码: 验证码:
几类数字图像水印算法的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数字技术的发展使得人们在享受数字化带来便利的同时,也深陷安全隐患之中。数字图像,作为多媒体形式的主要内容,其获取、修改、传输越来越容易,随之而来的数字图像的真实性、完整性验证以及数字版权带来的归属确认等问题一定程度上制约了信息化技术的发展。出于保护多媒体产品特别是数字图像知识产权不断增长的需求,出于使用传统的密码技术受到限制而又必须进行隐秘通信的特殊需求,信息隐藏技术得到了迅速发展。本课题就信息技术领域中的一大研究热点问题,即信息隐藏中的数字水印技术进行研究。
     本文在查阅了大量资料的基础上,从图像认证技术、鲁棒性数字水印技术、零水印技术和可逆信息隐藏技术四个方面进行了研究,提出了新的算法和模型。取得的成果总结如下:
     1.针对图像认证技术中定位精度和安全性之间矛盾这一关键问题,提出了新的基于混沌系统的图像认证水印算法。基于猫映射构成的循环结构将不相关的图像块由于水印的嵌入变得相关,解决了传统的一一对应块相关算法定位精度不高的问题。选取对初值极端敏感的Logistic混沌系统构造伪随机循环链,利用奇异值分解构造基于图像内容的水印,在保持块独立算法高定位精度的同时,提高了算法的安全性;同时证明矩阵行或列互换时奇异值不发生改变,从而指出利用奇异值直接生成水印,在水印检测时发生漏检,导致篡改定位精度不高的问题。
     2.为有效解决数字图像版权保护问题,提出了两类具有良好数学基础的鲁棒性水印算法。将优化理论中具有良好学习能力和泛化能力的支持向量机和数字水印算法相结合完成了一种基于优化理论的鲁棒性数字水印算法,利用支持向量机的回归理论建立图像像素间关系的理论模型,通过该模型利用周围像素预测目标像素值,从而通过修改目标像素值嵌入水印。将分解理论中的QR分解引入数字水印技术中,通过分析QR分解后Q矩阵中系数的的不变特性,从而通过修改Q矩阵第一列系数嵌入水印。两类算法均为盲水印算法,且能够有效地抵抗一系列常规的图像攻击,具有很好的鲁棒性。
     3.针对传统水印算法通过修改原始宿主图像内容嵌入水印,对图像造成不可修复性损失的问题,提出了基于奇异值分解的零水印算法。利用奇异值分解的稳定性,通过验证奇异值对算法鲁棒性的影响,选取第一个奇异值构造图像信息,并利用具有意义的二值图像作为水印图像,将其与图像信息进行运算作为保存在第三方的版权认证信息,有效地解决了传统零水印算法可视性效果不佳的问题。同时对水印容量和算法安全性进行了深入的分析。
     4.在可逆信息隐藏技术方面,针对基于差值扩展技术中差值扩展对图像像素值修改幅度过大的问题,引入了改进型对数函数,进一步缩小了差值扩展后的像素值和原始像素值之间的距离,从而有效地提高了嵌入数据后图像的质量。同时,针对传统可逆信息隐藏算法单一嵌入容量和单一嵌入方向的问题,利用图像块间的均值关系,设计了图像块类型判定准则和图像块嵌入方向判定准则,实现了多嵌入容量和多嵌入方向的目标,在增加数据嵌入容量的同时,有效地提高了嵌入数据后图像的质量。
     该研究是属于图像处理、信息安全、数学等领域的交叉学科,研究成果解决了数字水印技术中存在的一些关键问题,丰富和完善了数字水印技术,对数字多媒体信息特别是数字图像的版权保护起到了积极地推动作用。
     本文共7章,含图66幅,表11个,参考文献134篇。
The development of digital technology not only brings convenience to people, but also makes us involved with troubles of information security. Digital image is main content of multimedia, and its capture, modification and transmission become more and more easy. The authentication, integrity verification of digital images and the argument of copyright restrict the development of information technology in a certain extent. In order to meet the growing requirement of multimedia products'copyright protection, especially the copyright of digital images, and meet the special requirement of covert communication limited by using of traditional cipher technology, there is rapid devel-opment for the information hiding. This dissertation focuses on the digital watermarking technology in the field of information hiding, which is one of hot issues in information technology.
     After having read a great deal of papers, four aspects in the digital watermarking technology are studied, and they are image authentication algorithm, robust digital im-age watermarking algorithm, zero-bit watermarking algorithm and reversible data hid-ing algorithm. And several novel algorithms and models are proposed. The main achievements are shown as follows:
     1. Considering the conflict between watermark localization accuracy and security, two image authentication algorithms based on chaotic system are proposed. The circular structure built by cat mapping makes different blocks correlative for the watermarks embedding, which overcomes the problem of low localization accuracy in traditional one-to-one mapping algorithms. Logistic mapping with sensitive character to initial value is selected to construct the pseudorandom circular chain, and singular value de-composing is used to generate block watermarks, that make the proposed algorithm not only achieves high localization accuracy as block-independent algorithm, but also en-hances the security. Exchange of rows or columns will not alter singular value, and wa-termarks may be checked unsuccessfully if the watermarks are generated directed by singular value, that will result in low localization accuracy.
     2. To protect the copyright of digital images, two robust digital watermarking algo-rithms having good mathematic foundation are proposed. As one of optimization theory, support vector machine with good learning ability and generalization ability is used to build a relationship model between the target pixel and neighbor pixels by its regression theory, and watermarks are embedded by modifying the target pixels. QR decomposi-tion is introduced into digital watermarking technology. Watermarks can be embedded into the first column component of Q matrix due to the stability of Q matrix in QR de-composition. The two algorithms are blind methods, which can resist some distortions and have good robustness.
     3. To change the traditional way that embedded watermarking by modifying the content of host images, which induce irreversible distortion, a novel zero-bit water-marking algorithm based on singular value decomposition is proposed. The invariant characters of singular value decomposition make the first singular value generate the information of images. The binary watermark image is computed with information of images to generate authorized information saved at the registration center, and this method overcomes the shortcoming that the watermarks of existing zero-bit water-marking algorithms are invisible and meaningless. The relationship between water-marks capacity and security is also studied.
     4. In reversible data hiding algorithm, in order to mitigate the distortion between the modified pixels and original pixels in difference expansion scheme, Logarithm func-tion is used. In addition, the relationship of mean values between image blocks is used to design the rule of the classification of the image blocks and the rule of embedded di-rections, and the rules solve the problem that traditional methods only embedded the same amount data in single direction in each image blocks. Experimental results show that our method can increase the payload and provide high embedded image quality.
     The topic of this dissertation is in an interdisciplinary research area, which is part of image processing, information security, mathematics and so on. Some key problems in digital watermarking are solved, and the work will bring improvement of digital wa-termarking technology, and would promote the development of copyright protection of multimedia, especially digital images.
     This dissertation consists of 7 chapters, including 66 figures,11 tables, and 134 references.
引文
[1]中国互联网络信息中心.第24次《中国互联网络发展状况统计报告》.2009.7
    [2]中国互联网络信息中心.《2003年中国互联网络信息资源数量调查报告》.2004.2
    [3]中国互联网络信息中心.《2004年中国互联网络信息资源数量调查报告》.2005.2
    [4]中国互联网络信息中心.《2005年中国互联网络信息资源数量调查报告》.2006.3
    [5]王育民,张彤,黄继武.信息隐藏--理论与技术.北京.清华大学出版社.2006.3
    [6]杨义先,钮心忻.数字水印理论与技术.北京.高等教育出版社.2006.3
    [7]王炳锡,彭天强.信息隐藏技术.北京.国防工业出版社.2007.9.31-31
    [8]Schyndel R.G., Tirkel A Z. A digital watermark. IEEE International Conference on Image Processing (ICIP'94). Auatin, Texas. Nov.1994.2.86-90
    [9]王朔中,张新鹏,张开文.数字密写和密写分析-互联网时代的信息战技术.北京.清华大学出版社.2005.4.5-5
    [10]张立和,周继军,陈伟,王颖.透视信息隐藏.北京.国防工业出版社.2007.2.5-5
    [11]Digital signature standard (DSS). Federal information processing standard publication.2001 FIPS PUB 186-2
    [12]孙圣和,陆哲民,牛夏牧.数字水印技术及应用.北京.科学出版社.2004.487
    [13]钟桦,张小华,焦李成.数字水印与图像认证-算法及应用.西安.西安电子科技大学出版社.2006.8.6-6
    [14]Wong P W. A public key watermark for image verification and authentication. Proceedings of the International Conference on Image Processing. Chicago:IEEE Computer Society Press. 1998:425-429
    [15]Holliman M, Memon N. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing.2000.9(3):432-441
    [16]Fridrich J, Goljan M, Memon N. Further attacks on Yeung-Mintzer fragile watermarking scheme. Proc. SPIE vol.3971 Security and Watermarking of Multimedia Contents Ⅱ. Califor-nia:SPIE.2000:428-437
    [17]Wong P W, Memon N. Secret and public key image watermarking schemes for image authen-tication and ownership. IEEE Trans Image Process.2001.10(10):1593-1601
    [18]丁科,何晨,王宏霞.一种定位精确的混沌脆弱数字水印技术.电子学报.2004.32(6):1009-1012
    [19]张小华,孟红云,刘芳.一类有效的脆弱型数字水印技术.电子学报.2004.32(1):114-117
    [20]陈帆,和红杰.朱大勇.基于混沌和图像内容的脆弱水印方案.计算机应用.2005.25(9):2151-2154
    [21]和红杰,张家树.基于混沌置乱的分块自嵌入水印算法.通信学报.2006.27(7):86-86
    [22]Lin C Y. Chang S F. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Transactions on circuits and systems of video technology. 2001.11(2):153-168.
    [23]Coppersmith D, Mintzer F, Tresser C, et al. Fragile imperceptible digital watermark with pri-vacy control. Proc. SPIE/IS&T, Int. Symp. Electronic Imaging:Science and Technology. Sn Jose, CA:1999.659-670
    [24]Liu F, Zhu X, Wang Y. Feature based fragile image watermarking framework. ACTA Auto-matica Sinica.2004.30(5):641-651
    [25]和红杰,张家树.基于混沌的自嵌入安全水印算法.物理学报.2007.56(6):3092-3100.
    [26]Celik M, Sharma G, Saber E, et al. Hierarchical watermarking for secure image authentication with localization. IEEE Transactions on Image Processing.2006.15(4):1042-1049
    [27]Barreto P M, Kim H Y, Rijmen V. Toward secure public-key blockwise fragile authentication watermarking. IEE proceddings on Vision, Image and Signal Procedding.2002.149(2):57-62
    [28]张宪海,杨永田.基于脆弱水印的图像认证算法研究.电子学报.2007.35(1):34-39
    [29]张静,张春田.用于JPEG2000图像认证的半脆弱性图像数字水印算法.电子学报.2004.32(1):157-160
    [30]李春,黄继武.一种抗JPEG压缩的半脆弱图像水印算法.软件学报.2006.17(2):314-324
    [31]王向阳,陈利科.一种新的自适应半脆弱算法.自动化学报.2007.33(4):361-366
    [32]张鸿宾,杨成.图像自嵌入及窜改的检测和恢复算法.电子学报.2004.32(2):196-199
    [33]Lin P L, Hsieh C K, Huang P W. A hierarchical digital watermarking detection and recovery. Pattern recognition.2005.38:2519-2529
    [34]Chang C C, Fan Y H, Tai W L. Four-scanning attack on hierarchical digital watermarking de-tection and recovery. Pattern recognition.2008.41:654-661
    [35]Wang M S, Chen W C. A majority-voting based watermarking scheme for color image detec-tion and revovery. Computer standard & interfaces.2007.29:561-570
    [36]刘泉,江雪梅.用于图像篡改定位和恢复的分层半脆弱数字水印算法.通信学报.2007.28(7):104-110
    [37]和红杰,张家树,陈帆.一种高定位精度的可恢复水印算法.中国科学(E辑:信息科学).2008.38(4).533-552
    [38]Lee T Y, Lin S D. Dual watermar for image tamper detection and recovery. Pattern recogni-tion.2008.41:3497-3506
    [39]Yang C W, Shen J J. Recover the tampered image based on VQ indexing.Singal processing. 2010.90:331-343
    [40]Nikolaidis N, Pitas I. Robust image watermarking in the spatial domain.Signal Processing. 1998.66(3):385-403
    [41]朱从旭,陈志刚.一种基于混沌映射的空域数字水印新算法.中南大学学报.2005.36(2):272-276
    [42]邹露娟,汪波,冯久超.一种基于混沌和分数阶傅里叶变化的数字水印算法.物理学报.2008.57(5):2750-2754
    [43]Tsui T K, Zhang X P, Androutsos D. Color image watermarking using multidimensional Fou-rier transforms. IEEE Transactions on Information Forensics & Security.2008.3 (1):16-26
    [44]Briassouli A, Strintzis M G. Locally optimum nonlinearities for DCT watermark detec-tion.IEEE Transactions on Image Processing.2004.13(12):1604-1617
    [45]王宏霞,何晨,丁科.基于混沌映射的鲁棒性公开水印.软件学报.2004.15(8):1245-1251
    [46]Lu W, Sun W, Lu H T. Robust watermarking based on DWT and nonnegative matrix factori-zation. Computers & Electrical Engineering.2009.35(1):183-188
    [47]Li E P, Liang H Q. Blind image watermarking scheme based on wavelet tree quantization ro-bust to geometric attacks.Proc.IEEE WCICA.2005.623-626
    [48]Lin W H, Horong S J, et al. An efficient watermarking method based on significant difference of wavelet coefficient quantization.IEEE Transactions on Multimedia.2008.10(5):746-757
    [49]Wong P H W, Au O C. A capacity estimation technique for JPEG to JPEG image watermark-ing. IEEE Transactions on Circuits and Systems for Video Technology.2003.13(8):746-752
    [50]Lu Z M, Sun S H. Digital image watermarking technique based on vector quantization. IEE Elextronics Letters.2000.36(4):303-305
    [51]Makur A, Selvi S S. Variable dimension vector quantization based image watermarking. Sig-nal Processing.2001.81(4):889-893
    [52]Kang X G, Huang J W. Zeng W J. Improving robustness of quantization-based image water-marking via adaptive receiver. IEEE Trans on Multimedia.2008.10(6):953-959
    [53]Shih F Y, Wu S Y T. Combinational image watermarking in the spatial and frequency domains. Pattern Recognition,2003.36(4):969-975
    [54]Shieh C S, Huang H C, et.al. Genetic watermarking based on transform-domain techniques. Pattern Recognition.2004.37(3):555-565
    [55]Davis K J, Narian K. Maximizing strength of digital watermarks using neural networks. In: Proceedings of the International Joint Conference on Neural Networks. Washington DC.USA. 2001.4:2893-2898.
    [56]Zhang F, Zhang H B. Applications of a neural network to watermarking capacity of digital image. Neurocomputing.2005.67:345-349
    [57]张新红,张帆.基于神经网络和感知模型的盲检测数字水印.仪器仪表学报.2006.z3:2475-2476
    [58]张军,王能超.用于图像认证的基于神经网络的水印技术.计算机辅助设计与图形学学报.2003.15(3):307-312
    [59]Wang Z Q, Sun X, Zhang D X. A novel watermarking scheme based on PSO algorithm. Lec-ture Notes in Computer Science.2007.4688:307-314
    [60]Zheng Y, Wu C H, Lu Z M, Lp W H, Optimal robust image watermarking based on PSO and HVS in integer DCT domain. International Journal of Computer Sciences and Engineering Systems.2008.2:1-7
    [61]Knowles H D, Winne D A, Canagarajah C N, Bull D R.Image tamper detection and classifica-tion using support vector machines, IEE Proceedings Vision, Image and Signal Processing 2004.151(4):322-328.
    [62]Vatsa M, Singh R. A Noore. Improving biometric recognition accuracy and robustness using DWT and SVM watermarking. IEICE Electronics Express.2005.2(12):362-367
    [63]Tahir S F, Khan A, Majid A, Mirza A M. Support vector machine based intelligent watermark decoding for anticipated attack, in:Proceedings of the XV International Enformatika Confer-ence.October 22-24.2006. Barcelona.Spain.
    [64]Khan A, Tahir S F, Majid A, et al. Machine learning based adaptive watermark decoding in view of anticipated attack. Pattern Recognition.2008.41(8):2594-2610
    [65]Tsai H H, Sun D W. Color image watermark extraction based on support vector machines. Inform. Sci.2007.177 (2):550-569
    [66]Fu Y G, Shen R M, Lu H T. Watermarking scheme based on support vector machine for color images.IEE Electronics letters.2004.40(16):986-987
    [67]Lu W, Chung F L, Lu H T, Choi K S. Detecting fake images using watermarks and support vector machines.Computer Standards & Interfaces.2008.30(3):132-136
    [68]Li C H, Lu Z D, Zhou K. SVR-parameters selection for image watermarking. In:Proceedings of 17th IEEE International Conference on Tools with Artificial Intelligence. Hongkong. China. 2005:466-470.
    [69]Li C H, Lu Z D, Zhou K. Application research on support vector machine in image water-marking. Neural Networks and Brain.2005. ICNN&B'05. International Conference on. 2005.2:1129-1134
    [70]Shen R M, Fu Y G, Lu H T. A novel image watermarking scheme based on support vector re-gression. Journal of Systems and Software.2005.78(1):1-8.
    [71]李春花,卢正鼎.一种基于支持向量机的图像数字水印算法.中国图象图形学报.2006.11(9):1322-1326
    [72]吴健珍,谢剑英.基于支持向量机同步的自适应水印检测方法.上海交通大学学报.2006.40(3):480-489
    [73]Wang X Y, Xu Z H, Yang H Y. A robust image watermarking algorithm using SVR detection. Expert Systems with Applications.2009.36(5):9056-9064
    [74]Alter O, Brown P O, Botstein D. Singular value decomposition for genome-wide expression data processing and modeling. The Proceedings of the National Academy of Sciences of the United States of America (PNAS).2000.97(18):10101-10106
    [75]白云,刘新元,何定武等.在SQUID心磁测量中基于奇异值分解和自适应滤波的噪声消除法.物理学报.2006.55(5):2651-2656
    [76]遇辉,马秀莉,谭少华等.基于奇异值分解的异常切片挖掘.软件学报.2005.16(7):1282-1288
    [77]Liu R Z, Tan T N. A new SVD based image watermarking method. In:Proceedings of 4th Asia Conference of Computer Vision (ACCV'2000).Taiwan.2000:63-67
    [78]Liu R Z, Tan T N. An SVD based watermarking shcme for protecting rightful owenership. IEEE Transactions on multimedia.2002.4(1):121-128
    [79]Zhang X P, Li K. Comments on "an SVD-based watermarking scheme for protecting rightful ownership". IEEE Transactions on Multimedia.2005.7(2):593-594
    [80]Rykaczewsk R. Comments on "An SVD-Based Watermarking Scheme for Protecting Rightful Ownership". IEEE Transactions on Multimedia.2007.9(2):421-423
    [81]Xing Y, Tan J Q. A color watermarking scheme based on block-SVD and Arnold transforma-tion. Second Workshop on Digital Media and its Application in Museum & Heritages. 2007:3-8
    [82]Gorodetski V I, Popyack L J, Samoilov V, et al. SVD-based approach to transparent embed-ding data into digital images. Lecture Notes in Computer Science.2001.2052:263-274
    [83]Bao P, Ma X. Image adaptive watermarking using Wavelet domain singular value decomposi-tion.IEEE transactions on Circuits and systems for Video technology.2005.15(1):96-102
    [84]Chandra D V S. Digital image watermarking using singular value decomposition. In:Pro-ceeding of 45th IEEE Midwest Sysposium on Circutis and Systems.Tulsa.Ok. USA.2002. 264-267
    [85]周波,陈健.基于奇异值分解的抗几何失真的数字水印算法.中国图象图像学报.2004.9(4):506-512
    [86]Ganic E, Eskicioglu A M. Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition. Journal of electronic imaging.2005.14(4): 43004
    [87]Sun R, Sun H, Yao T R. A SVD and quantization based semi-fragile watermarking technique for image authentication. Proc Internet Conf Signal Process.2002.2(2):1952-1955
    [88]Chang C C, Tsai P Y, Lin C C. SVD-based digital image watermarking scheme.Pattern Rec-ognition Letters.2005.26(6):1577-1586
    [89]Chung K L, Yang W N, Huang Y H, et al. On SVD-based watermarking algorithm. Applied Mathematics and Computation.2007.188:54-57
    [90]Fan M Q, Wang H X, Li S K. Restudy on SVD-based watermarking scheme. Applied Mathe-matics and Computation.2008.203:926-930
    [91]张建伟,鲍政,王顺凤.图像小波域分块奇异值分解的自适应水印方案.中国图形图像学报.2007.12(5):811-818
    [92]温泉,孙锬锋,王树勋.零水印的概念与应用.电子学报.2003.31(2):214-216
    [93]Wang N, Li X. RST invariant zero-watermarking scheme based on mathching pursuit. Chi-nese Journal of Electronics.2006.15(2):269-272
    [94]胡裕峰,朱善安.基于PCA和混沌置乱的零水印算法.浙江大学学报.2008.42(4):593-597
    [95]杨树国,李春霞,孙枫,孙尧.小波域内图象零水印技术的研究.中国图形图像学报.2003.8(6):664-669
    [96]高仕龙.一种DT-CWT域内的自适应图像零水印算法.四川大学学报.2008.45(3):493-497
    [97]向华,曹汉强,伍凯宁,魏访.一种基于混沌调制的零水印算法.中国图形图像学报2006.11(5):720-724
    [98]马建湖,何甲兴.基于小波变换的零水印算法.中国图形图像学报.2007.12(4):581-585
    [99]Boyer, J P, Duhamel P, Blanc-Talon J. Performance analysis of scalar DC-QIM for zero-bit watermarking. IEEE Transactions. Information Forensics and Security.2007.2(2):283-289
    [100]Teddy F A. Constructive and Unifying Framework for Zero-Bit Watermarking. IEEE Transac-tions on Information Forensics and Security.2007.2(2):149-163
    [101]Chang C C, Kieu T D, Chou Y C. Reversible information hiding for VQ indices based on lo-cally adaptive coding. Journal of Visual Communication and Image Representation. 2009.20(1):57-64
    [102]Honsinger C W, Jones P, Rabbani M, et al. Lossless recovery of an originalimage containing embedded data.US Pattern Application.6278791.1999
    [103]Tian J. Reversible data embedding using a difference expansion.IEEE Transactions on Cir-cuits and Systems for Video Technology.2003.13(8):890-896
    [104]Alattar, A.M. Reversible watermark using the difference expansion of a generalized integer transform. IEEE Transactions on Image Processing.2004.13(8):1147-1156
    [105]Hu Y J, Lee H K, Chen K YD. Difference expansion based reversible data hiding using two embedding direction.IEEE Transactions on Multimedia.2008.10(8):1500-1512
    [106]Hsiao J Y, Chan K F, Chang J M. Block-based reversible data embedding. Signal Processing. 2009.89(4):556-569
    [107]Lou D C, Hu M C, Liu J L. Multiple layer data hiding scheme for medical images.Computer Standards & Interfaces.2009.31(2):329-335.
    [108]Hu Y J, Lee H K, Li J W. DE-based reversible data hiding with improved overflow location map. IEEE Transactions on Circuits and Systems for Video Technology.2009.19(2):250-260
    [109]Thodi M, Rodriguez J J. Prediction error-based reversible watermarking.In:IEEE ICIP. Sin-gapore.24-27.2004.3:1549-1552
    [110]Tseng H W, Hsieh C P. Prediction-based reversible data hiding. Information Sciences. 2009.179(14):2460-2469
    [111]Hong W, Chen T S, Shiu C W. Reversible data hiding for high quality images using modifica-tion of prediction errors. The Journal of System and Software.2009.82(11):1833-1842
    [112]Weng S W, Zhao Y, Ni R R, et al. Lossless data hiding based on prediction-error adjustment. Sci China Ser F-Inf Sci.2009.52(2):269-275
    [113]Wu H C, Lee C C, Tsai C S, et.al. A high capacity reversible data hiding scheme with edge prediction and difference expansion. Journal of Systems and Software. 2009.82(12):1966-1973
    [114]Chung K L, Huang Y H, Yang W N, et.al. Capacity maximization for reversible data hiding based on dynamic programming approach. Applied Mathematics and Computation.2009. 208(1):284-292
    [115]Lin C C, Tai W L, Chang C C.Multilevel reversible data hiding based on histogram modifica-tion of difference images. Pattern Recognition.2008.41(12):3582-359
    [116]Tsai P Y, Hu Y C, Yeh H L. Reversible image hiding scheme suing predictive coding and his-togram shifting. Signal Processing.2009.89(6):1129-1143
    [117]Ni Z C, Shi Y Q, Ansari N, et.al. Reversible data hiding.IEEE Transactions on Circuits and Systems for Video Technology.2006.16(3):354-362
    [118]Methodology for the subjective assessment of the quality of television pictures:Recommen-dation ITU-R-BT.500-10. ITU Radiocommunication Assenbly.2000
    [119]Kutter M, Petitcolas F AP. A fair benchmark for image watermarking systems. Proceedings of SPIE.1999.3657
    [120]李旭东.评价数字水印相似程度的公式分析及改进.自动化学报.2008.34(2):208-210
    [121]Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, et al. Digital watermarking and steg-anography(Second Edition). USA. Morgan Kaufmann Publishers.2008.41-44
    [122]Zeng W J, Yu H, Lin C Y. Multimedia security technologies for digital rights management. USA. ACADEMIC PRESS.2006.13-13
    [123]Memon N, Shende S, and Wong P. On the Security of the Yueng-Mintzer authentication wa-termark. Final Program and Proceedings of the IS&T PICS 99. Georgia:PICS.1999:301-306
    [124]史荣昌.矩阵分析.北京.北京理工大学出版社.1996.149-153
    [125]田盛丰.基于核函数的学习算法.北方交通大学学报.2003.27(2):1-8
    [126]MifllerK R, Mika S, Tsch G, et.al. An Introduction to kernel based learning algorithm.IEEE Transactionson Neural Networks.2001.12(2):181-201.
    [127]Cristianini N, Shawe-Taylor J. An introduction to support vector machines. Cambridge.UK. Cambirdge University Press,2000
    [128]阮秋奇.数字图像处理学.北京.电子工业出版社.2001.1.325-326
    [129]Ahn C J. Parallel Detection algorithm using multiple QR decompositions with permuted channel matrix for SDM/OFDM. IEEE Transactions on Vehicular Technology.2008.57(4): 2578-2582
    [130]http://ghw.hebei.net.cn/Html/lishu/160957866.html
    [131]盛利元,曹莉凌,孙克辉,闻姜.基于TD-ERCS混沌系统的伪随机数发生器.物理学报.2005.54(9):4031-4037
    [132]张帆,窦勇,邬贵明.基于C6000的滑动窗口图像处理算法存储优化.计算机工程.2009.35(1):46-48
    [133]Swaminathan A. Wu M. Liu K J R. Digital image forensics via intrinsic fingerprints. IEEE Transactions on Information Forensics and Security.2008.3(1):101-117
    [134]Fridrich J. Digital image forensic using sensor noise. IEEE Signal Processing Magazine.2009. 26(2):26-37

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700