用户名: 密码: 验证码:
H.264/AVC视频信息隐藏方法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数字化信息时代,秘密信息传输的安全性要求越来越高。传统密码技术对需要保护的信息进行加密,使之变为内容不可理解的密文。密文虽然不易被解读,但其不可理解性也暴露了加密行为本身,这种密文存在时空的泄露往往容易引起攻击者的注意。它们可以实施截获、破解或重放等攻击,这将给秘密信息传输的安全带来极大威胁。
     信息隐藏技术力图改变这一状况。它将秘密信息隐藏在不易被人怀疑的普通文件中,使秘密信息存在的事实本身不被察觉。利用大众(非专用设施)数字载体来隐密传递秘密信息,可以达到既保障内容隐密,又保障行为(加密与传递)隐密的目的。近年来,H.264/AVC视频编解码标准因其出色的压缩效率、突出的网络亲和力等特性而迅速得到普及,已经成为大众视频传播的常规方式。因此,利用普遍采用的H.264/AVC标准视频,进行信息隐藏方法的研究,设计和实现具高安全性与强鲁棒性的H.264/AVC标准视频信息隐藏算法,保证特殊环境下,秘密信息的隐秘传递,是一项崭新的研究。
     提出帧内失真漂移问题是以H.264/AVC视频为载体进行安全高效的隐秘通信需解决的关键问题。在总结现有H.264/AVC视频标准视频信息隐藏算法的基础之上,指出适用于隐秘通信的H.264/AVC视频信息隐藏算法为提取型内置式且嵌入位置为量化DCT系数的算法。通过对该类型算法的信息隐藏过程以及H.264/AVC标准视频编解码过程的理论推导,得到亮度块残差的嵌入失真误差公式,并得到宏块内部嵌入误差仅与嵌入系数位置相关,基本独立于具体视频的结论。对该标准特有的帧内预测技术的分析表明:块内嵌入误差通过帧内预测过程向邻块传递并逐步累积,产生帧内失真漂移现象。对嵌入误差累积过程的理论分析及实验结果表明:帧内失真漂移问题的存在大大影响了嵌入视频的视觉效果,一方面降低了嵌入视频的视觉隐蔽性,容易暴露秘密信息隐藏行为;另一方面也相应限制了现有H.264/AVC标准视频信息隐藏算法的容量,使得安全性与鲁棒性增强技术失去可操作空间。因此,该问题已经成为以H.264/AVC视频为载体进行安全高效的隐秘通信亟待解决的问题。
     提出整数离散余弦变换中的系数位置耦合关系。为了有效控制帧内失真漂移的影响,从消除或减少嵌入失真出发,对帧内预测过程中导致嵌入误差块间传递的关键像素(后续邻块帧内预测过程将会使用的参考像素,块的最后一行与最后一列共7个像素)进行归零假设,发现了嵌入系数位置的耦合性关系,定义出整数离散余弦变换中的耦合系数对。理论上得到24个耦合系数对。
     基于耦合系数对嵌入点位置,提出耦合系数对信息隐藏方法。在向耦合系数对中的嵌入系数进行信息嵌入调制的同时,调整耦合系数对中的补偿系数,以对块内嵌入失真进行补偿。特别是对宏块内的帧内预测关键像素的嵌入误差进行补偿,使得部分关键像素的嵌入误差为零,减小了可能向邻块传递的块内嵌入误差,降低了嵌入误差传递的累积效应。实验结果表明,该方法在控制帧内失真漂移问题方面有显著成效。
     提出为了截断嵌入误差传递,邻块帧内预测模式应满足的两种限制条件。对帧内失真漂移原理的进一步分析表明:当前块嵌入误差可能会传递到其四个邻块,这四个邻块的帧内预测模式决定了当前块的关键像素的嵌入误差是否会传递。依据H.264/AVC视频标准的帧内预测模式方向,提出的类垂直纹理与类水平纹理限制条件,可分别截断块内最后一列与最后一行关键像素嵌入误差的传递途径,从而完全避免帧内失真的漂移。
     提出基于纹理特征的H.264/AVC视频信息隐藏方法。根据邻块帧内预测模式是否满足限制条件进行嵌入块与块内的嵌入耦合系数对选择,在利用耦合系数对嵌入块边缘关键像素的嵌入误差进行归零补偿的基础上,结合邻块的帧内预测方向,将嵌入误差未归零的边缘像素排除在其邻块的帧内预测参考像素之外。研究证明此方法剥夺了块内嵌入误差传递的机会,从根源上断绝了嵌入失真的积累途径,可以完全解决帧内失真漂移问题。实验结果与性能对比显示了该方法的优势,特别是其在嵌入容量与视觉隐蔽性方面具备优异性能,给安全性与鲁棒性加固技术提供了的充足的可操作空间。进一步提高基于纹理特征的H.264/AVC视频信息隐藏方法性能的几种扩展方法有:阶梯隐藏、单系数嵌入法。在提高鲁棒性和安全性方面,提出鲁棒性分层加固的概念,定义衡量鲁棒性的比特生存率指标。
     将单系数嵌入法运用于H.264/AVC视频上的可逆信息隐藏。通常可逆信息隐藏在嵌入过程中会大范围大幅度地修改隐藏载体,而帧内失真漂移问题的存在使得大范围大幅度修改H.264/AVC视频载体不太现实。单系数法避免了帧内失真漂移,将其与基于差值扩展的通用可逆信息隐藏算法相结合,在H.264/AVC视频的单个系数中无补偿嵌入,在提取时同步还原,提取秘密信息的同时完全恢复原始视频。实验结果以及与现有方法的性能比较说明了该方法的合理性与高效性。此次尝试也说明了突破帧内失真漂移这一瓶颈对H.264/AVC视频信息隐藏的关键性意义。
The security requirement of secret information transmission is becoming stricter in digital age. The traditional cryptography technology encrypts the protected information to get the ciphertext which is hard for understanding. Though the ciphertext is hard to understand, it would leak the existence of encryption behavior and absorb the attackers' attention. The attackers would intercept, break or replay the ciphertext and bring a serious threat to the security of the secret information transmission.
     Data Hiding is trying to change this situation. It can make the existence of secret information unnoticeable by hiding it into those common files. Using public (non-dedicated facilities) digital covers to transmit information secretly can protect not only the content of the information but also the secret behaviors (encryption and transmission). In recent years, H.264/AVC video encode/decode standard has gained popularity rapidly for its high compression efficiency and outstanding network-friendly property, and has become one of the most conventional ways for video transmission. Thus, it is a brand-new research on secure and robust data hiding method by utilizing widely-used H.264/AVC videos to protect the secret information transmission security in unsafe circumstance.
     The intra-frame distortion drift problem has been raised to be the key issue of the covert communication utilizing H.264/AVC video covers. Based on the summary of the existing H.264/AVC video data hiding methods, the readable and built-in type methods which hide data into the quantized DCT (Discrete Cosine Transformation) coefficients are considered appropriate for covert communication. The embedding error formula of the luminance block residual deduced from the theoretical analysis of the encoding/decoding and data hiding procedures shows that the embedding error within a block is only related to the location of the embedding coefficients and basically independent on the specific video cover. The embedding error within a block would propogate to other neighbored blocks and accumulates based on the analysis of the intra-frame prediction. This phenomenon is called the intra-frame distortion drift. Analysis of the accumulating procedure and the experimental results shows that the drift problem would bring significant distortion to the embedded videos. This would challenge the visual concealment of the embedded video and exposes the hiding behavior of the secret information consequently. Furthermore, this would limit the embedding capacity and makes the security and robustness enhancement methods inapplicable. Thus, in order to utilizing H.264/AVC video covers for covert communication, it is crucial to solve the intra-frame drift problem.
     The coupled relationship of the coefficients'locations in IntDCT (Integer Discrete Cosine Transform) is discovered.In order to constraint the influence of the intra-frame distortion drift, aiming to eliminate or reduce the embedding error, under the zero assumption of the crucial pixels (which will be used in the intra-frame prediction of other blocks and make the embedding error propagate to other blocks, the pixels on the last line and the last column, totaled 7 pixels), the coupled relationship of the coefficients' locations in IntDCT is discovered. Consequently, the coupled paired-coefficients in IntDCT is defined and 24 coupled paired-coefficients are derived.
     The coupled-paired coefficients data hiding method is proposed based on the embedding locations. The information is embedded into the embedding coefficient of a coupled-paired coefficients, and the compensation coefficient of the coupled-paired coefficients is modified simultaneously to compensate the embedding error within the block. Specifically, the embedding error of some crucial pixels is compensated to be zero; the propagated error and the accumulated error are reduced consequently. The experimental results show that this method can control and reduce the intra-frame distortion drift.
     Two kinds of restrictions on the intra-frame prediction modes of the neighbored blocks are proposed to intercept the embedding error propagation. Further analysis on the intra-frame distortion drift shows that the embedding error of current block would propagate to its four neighbored blocks, and the intra-frame prediction modes of these blocks determine whether the embedding error will propagate. Based on the nine intra-frame prediction modes, the vertical-like texture restriction and horizontal-like texture restriction are proposed to intercept the embedding error propagation of crucial pixels on the last row and on the last column respectively. And this can totally avoid the intra-frame distortion drift.
     The H.264/AVC video data hiding method based on the texture property is proposed. The embedded block and paired-coefficients are chose according to the intra-frame prediction modes of neighbored blocks. Combining the paired-coefficients with the texture property can make the embedding error of some crucial pixels to be zeroes and exclude the other crucial pixels with non-zero embedding error from the referenced pixels of the intra-frame prediction in other blocks. The research proves that this method can deprive the propagation chance of embedding error, break off the accumulation channel and eliminate intra-frame distortion drift completely. The experimental results and comparison with other methods demonstrate the superiority of this method. Its outstanding performance on the embedding capacity and visual concealment makes the security and robustness enhancement methods applicable. Further improvements include stair-like embedding; single-coefficient embedding et al. Besides, the layered robustness enhancement concept is discussed and the embedded bits survive ratio is defined to evaluate the robustness.
     The single-coefficient embedding method is applied to the reversible data hiding of H.264/AVC videos. Generally, the data hiding covers will go through extensive and severe modifications. However, this is not appropriate for H.264/AVC videos because of the intra-frame distortion drift. The single-coefficient embedding method which can avoid the drift is combined with the reversible data hiding based on difference expansion. The proposed method embeds data into the single coefficient and recovers the original videos at the extraction stage. The experimental results and comparisons to the existing methods prove its correctness and high efficiency. This attempt can also demonstrate the important significance of the breakthrough in the intra-frame distortion drift.
引文
[1]I. Richardson. H.264 and MPEG-4 video compression:video coding for next-generation multimedia.1st ed. Chichester:Wiley,2003.
    [2]张江,赵黎,杨士强.视频水印技术综述.计算机应用,2005,25(4):850-852
    [3]毕厚杰.新一代视频压缩编码标准H.264.北京:人民邮电出版社,2005.97—129
    [4]G. J. Simmons. The prisoners'problem and the subliminal channel. in International Cryptology Conference,1983. CRYPTO'83. Plenum Press.1983. New York, United States,1983:22-24.
    [5]王炳锡,彭天强.信息隐藏技术.北京:国防工业出版,2007.
    [6]王丽娜,张焕国,叶登攀,信息隐藏技术与应用.武汉大学出版社,2009.
    [7]钮心忻,信息隐藏与数字水印.北京邮电大学出版社,2004.
    [8]D. Kahn. The history of steganography. in Information Hiding,1996. IH'96. Springer. Cambridge, United Kingdom.1996:1-5
    [9]I. Cox, M. Miller, J. Bloom et al. Digital Watermarking and Steganography.2nd ed. Burlington:Elsevier,2007.
    [10]S. Murdoch and S. Lewis. Embedding Covert Channels into TCP/IP. in Information Hiding,2005. IH'05. Springer. Barcelona, Spain.2005:247-261
    [11]N. Lucena, J. Pease, P. Yadollahpour et al. Syntax and Semantics-Preserving Application-Layer Protocol Steganography. in Information Hiding,2005.IH'05. Springer. Barcelona, Spain.2005:164-179
    [12]M. K. Reiter and A. D. Rubin. Crowds:anonymity for Web transactions. ACM Transaction on Information and System Security,1998,1(1):66-92
    [13]M. G. Reed, P. F. Syverson, and D. M. Goldschlag. Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications,2002,16(4): 482-494
    [14]I. Clarke, O. Sandberg, B. Wiley et al. Freenet:A distributed anonymous information storage and retrieval system. in Proc. of the ICSI Workshop on Design Issues in Anonymity and Unobservability,2000. Berkeley, California.2000:46-66
    [15]T. Chung, M. Hong, Y. Oh et al.Digital watermarking for copyright protection of MPEG2 compressed video. IEEE Transactions on Consumer Electronics. 1998,44(3):895-901
    [16]F. Hartung and B. Girod.Digital watermarking of MPEG-2 coded video in the bitstream domain. in IEEE International Conference on the Acoustics, Speech, and Signal Processing,1997. ICASSP'97. Munich, Germany.1997:2621-2624
    [17]C. Lu, J. Chen, H. Liao, and K. Fan. Real-time MPEG2 video watermarking in the VLC domain. in 16th International Conference on Pattern Recognition,2002. ICPR'02. Quebec City, Canada.2002:552-555
    [18]C. Li.Multimedia Forensics and Security. Pennsylvania:IGI Global,2008.
    [19]G. Doerr and J. Dugelay.A guide tour of video watermarking. in Signal Processing: Image Communication.2003,18(4):263-282
    [20]G. Langelaar, I. Setyawan, and R. Lagendijk.Watermarking digital image and video data:A state-of-the-art overview. in IEEE Signal Processing Magazine. 2000,17(5):20-46
    [21]欧阳合,韩军.H264和MPE-4视频压缩:新一代多媒体的视频编码技术.长沙:国防科技大学出版社,2006.185—206
    [22]F. Hartung and B. Girod.Watermarking of uncompressed and compressed video. Signal Processing.1998,66(3):283-301
    [23]H. Yoshiura, I. Echizen, T. Arai, H. Kimura et al.Vsp:A Digital Watermark Method For Motion Picture Copyright Protection. in International Conference on Consumer Electronics,1998. ICCE'98.Copenhagen,Denmark.1998:338-339
    [24]T. Kalker, G. Depovere, J. Haitsma et al.Video watermarking system for broadcast monitoring. in Proc. SPIE. San Jose, USA.1999:103-112
    [25]K. Su, D. Kundur, and D. Hatzinakos.A content dependent spatially localized video watermark forresistance to collusion and interpolation attacks.in International Conference on Image Processing,2001.ICIP'01.2001:818-821
    [26]M. Swanson, B. Zhu, B. Chau et al.Multiresolution video watermarking using perceptual models and scene segmentation. in International Conference on Image Processing,1997.ICIP'97.1997:558-561
    [27]B. Vassaux, P. Nguyen, S. Baudry, P. Bas et al.Scrambling technique for video object watermarking resisting to MPEG-4.in Video/Image Processing and Multimedia Communications 4th EURASIP-IEEE Region 8 International Symposium on VIPromCom.2002:239-244
    [28]F. Deguillaume, G. Csurka, J. O'Ruanaidh et al.Robust 3D DFT video watermarking. in Proc. SPIE. San Jose, CA, USA.1999:113-124
    [29]C. Hsu and J. Wu.DCT-based watermarking for video. in IEEE Transactions on Consumer Electronics.1998,44(1):206-216
    [30]E. Koch and J. Zhao.Towards robust and hidden image copyright labeling.in IEEE Workshop on Nonlinear Signal and Image Processing. Neos Marmaras, Greece. 1995:452-455.
    [31]J. Dittmann, M. Stabenau, and R. Steinmetz. Robust MPEG video watermarking technologies. in Proceedings of the sixth ACM international conference on Multimedia.1998.MM'98. Bristol, United Kingdom.1998:71-80
    [32]F. Jordan, M. Kutter, and T. Ebrahimi.Proposal of a watermarking technique for hiding/retrieving data in compressed and decompressed video. Technical report. M2281, ISO/IEC Doc. JTC1/SC29/WG11.1997.
    [33]Z. Zhao, N. Yu, and X. Li. A novel video watermarking scheme in compression domain based on fast motion estimation. in International Conference on Communication Technology Proceedings,2003. ICCT'03.2003:1878-1882
    [34]J. Zhang, H. Maitre, J. Li et al.Embedding watermark in MPEG video sequence. in IEEE Fourth Workshop on Multimedia Signal Processing,2001. MMSP'01.2001: 535-540
    [35]Y. Dai, L. Zhang, and Y. Yang. A new method of MPEG video watermarking technology. in International Conference on Communication Technology Proceedings,2003. ICCT'03.2003:1845-1847
    [36]F. Hartung, P. Eisert, and B. Girod.Digital watermarking of MPEG-4 facial animation parameters.in Computers & Graphics.1998,22(4):425-435
    [37]G. Kim, J. Lee, and C. Won.An object-based video watermarking.in International Conference on Consumer Electronics.1999. ICCE'09.1999:100-101
    [38]J. Guo, P. Shi, and T. Fang.Object based video watermarking scheme using inertia ellipse and shape adaptive DCT.in IEEE Workshop on Multimedia Signal Processing.2002.MMSP'02.2002:308-311
    [39]J. Linnartz and J. Talstra.MPEG PTY-Marks:Cheap detection of embedded copyright data in DVD-video. in the European Symposium on Research in Computer Security.1998.ESORICS'98.1998:221-240.
    [40]A. Alattar, E. Lin, and M. Celik.Digital watermarking of low bit-rate advanced simple profile MPEG-4 compressed video.in IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):787-800
    [41]张桂东.基于MPEG-2的视频水印技术研究:硕士学位论文,南京理工大学,2004.
    [42]G. C. Langelaar, R. L. Lagendijk, and J. Biemond.Real-Time Labeling of MPEG-2 Compressed Video.in Journal of Visual Communication and Image Representation, 1998,9(4):256-270
    [43]L. Qiao and K. Nahrstedt.Watermarking Methods for MPEG Encoded Video: Towards Resolving Rightful Ownership.in IEEE International Conference on Multimedia Computing and Systems. Austin,TX,USA.1998:276-285
    [44]H. Ling, Z. Lu, and F. Zou.New real-time watermarking algorithm for compressed video in VLC domain.in International Conference on Image Processing,2004. Singapore.ICIP'04.2004:2171-2174
    [45]L. Tian, N. Zheng, J. Xue et al.A CAVLC-Based Blind Watermarking Method for H.264/AVC Compressed Video. in Asia-Pacific Services Computing Conference. 2008. APSCC'08. Yilan,Taiwan.008:1295-1299
    [46]W. Bo and F. Jiuchao.A chaos-based steganography algorithm for H.264 standard video sequences.in International Conference on Communications, Circuits and Systems.2008. ICCCAS'08. Xiamen,China.2008.750-753
    [47]M. Wang, K. Fan, B. Yue et al.A content protection scheme for H.264-based video sequence.in 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing.2007. SNPD'07.Qingdao,China.2007:388-393
    [48]P. Su, M. Li, and I. Chen.A Content-Adaptive Digital Watermarking Scheme in H.264/AVC Compressed Videos. in International Conference on Intelligent Information Hiding and Multimedia Signal Processing.2008. IIHMSP'08. Harbin, China.2008:849-852
    [49]S. Bhattacharya, T. Chattopadhyay, and Arpan Pal.A Survey on Different Video Watermarking Techniques and Comparative Analysis with Reference to H.264/AVC.in International Symposium on Consumer Electronics.2006.ISCE'06. Samos Island, Greece.2006:1-6
    [50]M. Yang and N. Bourbakis.A high bitrate information hiding algorithm for digital video content under H.264/AVC compression.in Midwest Symposium on Circuits and Systems.2005.MWSCAS'05. Ohio,USA.2005:935-938
    [51]G. Z. Wu, Y. J. Wang, and W. H. Hsu.Robust watermark embedding/detection algorithm for H.264 video.in Journal of Electronic Imaging,2005,14(1):2005.
    [52]G. Qiu, P. Marziliano, A. Ho, D. He et al.A hybrid watermarking scheme for H.264/AVC video. in the 17th International Conference on Pattern Recognition, 2004.ICPR'04. Cambridge, UK.2004:865-868
    [53]J. Zhang and A. Ho.Robust digital image-in-video watermarking for the emerging H.264/AVC standard.in IEEE Workshop on Signal Processing Systems Design and Implementation.2005.SIPS'05. Athens, Greece.2005:657-662
    [54]J. Zhang and A. Ho.Efficient Robust Watermarking of Compressed 2-D Grayscale Patterns for H.264/AVC.in Workshop on Multimedia Signal Processing.2005. MMSP'05. Shanghai, China.2005:1-4
    [55]C. Hua, Z. Jingli, and Y. Shengsheng.An implement of fast hiding data into H.264 bitstream based on intra-prediction coding in SAR and Multispectral Image Processing 2005.MIPPR'05. Wuhan, China.2005:604301-8
    [56]曹华,周敬利,余胜生等.基于H.264低比特率视频流的半脆弱盲水印算法实现.电子学报,2006,34(1):40-44
    [57]胡洋,张春田,苏育挺.基于H.264/AVC的视频信息隐藏算法.电子学报,2008,36(4):690-694
    [58]J. Hsieh and L. Chang.A high capacity watermarking for H.264/AVC based on frequency weighting.in International Symposium on Intelligent Signal Processing and Communications.2006.ISPACS'06. Yonago, Japan.2006:899-902
    [59]余小军,莫玮,范科峰等.一种抗H.264压缩的低比特率视频水印算法.计算机工程,2008,34(3):171—173
    [60]J. Zhang and A. Ho.Efficient Video Authentication for H.264/AVC.in International Conference on Innovative Computing, Information and Control.2006. ICICIC'06.Beijing,China.2006:46-49
    [61]M. Noorkami and R. M. Mersereau.A Framework for Robust Watermarking of H.264-Encoded Video With Controllable Detection Performance, in IEEE Transactions on Information Forensics and Security,2007,2(1):14-23
    [62]M. Noorkami and R. Mersereau.Towards robust compressed-domain video watermarking for H.264.in Proceedings of the SPIE.2006:721-721
    [63]M. Noorkami and R. Mersereau.Compressed-domain video watermarking for H.264.in IEEE International Conference on Image Processing.2005. ICIP'05. Atlanta, GA, USA.2005:II-890-3
    [64]C. Nguyen, D. Tay, and G. Deng.A Fast Watermarking System for H.264/AVC Video.in IEEE Asia Pacific Conference on Circuits and Systems,2006. APCCAS'06. Singapore.2006:81-84
    [65]J. Zhang and Anthony T.S.Ho.An efficient digital image-in-image watermarking algorithm using the integer discrete cosine transform.in Joint Conference of International Conference on Information,Communications and Signal Processing and the Fourth Pacific Rim Conference on Multimedia the Fourth. 2003.ICICS-PCM'03. Singapore.2003:1163-1167
    [66]B. G. Mobasseri and Y. N. Raikar.Authentication of H.264 streams by direct watermarking of CAVLC blocks. in Proceedings of the SPIE.2007:65051W
    [67]S. Sakazawa, Y. Takishima, and Y. Nakajima.H.264 native video watermarking method.in International Symposium on Circuits and Systems.2006. ISCAS'06. Greece.2006:1-4
    [68]X. Gong and H. Lu.Towards Fast and Robust Watermarking Scheme for H.264 Video.in International Symposium on Multimedia,2008.ISM'08. Berkeley, California, USA.2008:649-653
    [69]Z. Ni, Y. Shi, N. Ansari et al.Reversible data hiding.in IEEE Transactions on Circuits and Systems for Video Technology.2006,16(3):354-362
    [70]W. Tai, C. Yeh, and C. Chang.Reversible Data Hiding Based on Histogram Modification of Pixel Differences.in IEEE Transactions on Circuits and Systems for Video Technology.2009,19(6):906-910
    [71]V. Sachnev, H. J. Kim, J. Nam, et al.in Reversible Watermarking Algorithm Using Sorting and Prediction. IEEE Transactions on Circuits and Systems for Video Technology.2009,19(7):989-999
    [72]C. Lin, S. Yang, and N. Hsueh.Lossless Data Hiding Based on Difference Expansion without a Location Map. in Congress on Image and Signal Processing. 2008. CISP'08. Sanya,Hainan,China.2008:8-12
    [73]Y. Hu, H. Lee, and J. Li.DE-Based Reversible Data Hiding With Improved Overflow Location Map. in IEEE Transactions on Circuits and Systems for Video Technology.2009,19(2):250-260
    [74]Y. Q. Shi, Z. Ni, D. Zou et al.Lossless data hiding:fundamentals, algorithms and applications.in International Symposium on Circuits and Systems.2004.ISCAS'04. Vancouver,Canada.2004:II-33-6
    [75]赵彦涛.可逆信息隐藏技术及其在鲁棒数字水印中的应用研究:博士学位论文,燕山大学,2010.
    [76]J. Fridrich, M. Goljan, and R. Du.Invertible authentication watermark for JPEG images.in International Conference on Information Technology:Coding and Computing.2001.ITCC'01. Las Vegas, NV.2001:223-227
    [77]Y. K. Chan, W. T. Chen, S. S. Yu et al.A HDWT-based reversible data hiding method.in Journal of Systems and Software.2009,82(3):411-421
    [78]M. U. Celik, G. Sharma, A. M. Tekalp et al.Lossless generalized-LSB data embedding.in IEEE Transactions on Image Processing.2005,14(2):253-266
    [79]D. M. Thodi and J. J. Rodriguez.Expansion embedding techniques for reversible watermarking.in IEEE Transactions on Image Processing.2007,16(3):721-730
    [80]A. M. Alattar.Reversible watermark using the difference expansion of a generalized integer transform.in IEEE Transactions on Image Processing.2004, 13(8):1147-1156
    [81]J. Tian.Reversible data embedding using a difference expansion.in IEEE Transactions on Circuits and Systems for Video Technology.2003,13(8):890-896
    [82]L. Kamstra and H. Heijmans.Reversible data embedding into images using wavelet techniques and sorting. in IEEE Transactions on Image Processing.2005,14(12): 2082-2090
    [83]M. U. Celik, G. Sharma, A. M. Tekalp et al.Reversible data hiding.in International Conference on Image Processing.2002. ICIP'02.Rochester,New York.Proceedings. 2002:157-160
    [84]W. Hong, T. Chen, and C. Shiu. Reversible Data Hiding Based on Histogram Shifting of Prediction Errors.in International Symposium on Intelligent Information Technology Application.2008. IITAW'08. Shanghai, China.2008: 292-295
    [85]P. Tsai, Y. C. Hu, and H. L. Yeh.Reversible image hiding scheme using predictive coding and histogram shifting.in Signal Processing.2009,89(6):1129-1143
    [86]M. Fallahpour and D. Megas.Reversible Data Hiding Based On H.264/AVC Intra Prediction.in International Workshop on Digital Watermarking.2008. IWDW'08. Busan, Korea.2008:52-60
    [87]Lin, S.D., Hsiang-Cheng Meng, and Yu-Lung Su.A novel error resilience using reversible data embedding in H.264/AVC. in International Conference on Information, Communications and Signal Processing.2007. ICICS'07.Singapore. 2007:1-5
    [88]A. Piva, R. Caldelli, and F. Filippini.Data hiding for error concealment in H.264/AVC.in IEEE Workshop on Multimedia Signal Processing.2004.MMSP'04. Siena, Italy.2004:199-202
    [89]W. Lie, T. C. Lin, D. Tsai et al.Error Resilient Coding Based on Reversible Data Embedding Technique for H.264/AVC Video.in IEEE International Conference on Multimedia and Expo.2005. ICME'05.Amsterdam, The Netherlands.2005: 1174-1177
    [90]C. Lin and N. Hsueh.Hiding data reversibly in an image via increasing differences between two neighboring pixels. IEICE Transactions on Information and Systems. 2007,90(12):2053-2059
    [91]M. U. Celik, G. Sharma, A. M. Tekalp et al.Lossless generalized-LSB data embedding.IEEE Transactions on Image Processing.2005,14(2):253-266
    [92]N. Provos and P. Honeyman.Hide and Seek:An Introduction to Steganography. IEEE Security and Privacy,2003, 1(3):32-44
    [93]王聪丽,平西建.矩阵编码的实现及其在图像信息隐藏中的应用.计算机工程与应用,2005,41(34):146-148
    [94]A. Westfeld.F5—a steganographic algorithm. in Information Hiding.2001.IH'01. Pittsburgh,PA,USA.2001:289-302
    [95]T. K. Moon.Error correction coding.Wiley-Interscience,2005.
    [96]E. Brickell.Some ideal secret sharing schemes. in Advances in Cryptology.1989. EUROCRYPT'89. Houthalen,Belgium.1989:468-475
    [97]A. Shamir.How to share a secret. Communications of the ACM.1979,22(11): 612-613
    [98]J. Fridrich, M. Goljan, and D. Soukal.Efficient Wet Paper Codes.in Information Hiding.2005.IH'05. Barcelona.2005:204-218
    [99]W. Zhang, X. Zhang, and S. Wang.Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes. in Information Hiding.2008.IH'08. Santa Barbara,California,USA.2008:60-71
    [100]J. Fridrich, M. Goljan, P. Lisonek et al.Writing on wet paper. IEEE Transactions on Signal Processing.2005,53(10):3923-3935

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700